I'm not sure where it would belong, exactly, but certainly between
"best practices" and DNSSEC security concerns, is the basic tenet:

The DNS is a unified namespace.

This leads to a number of potential issues, which can largely be
addressed by viewing the issues from the perspective of a unified
name-space's root. And by providing lots of literal and explicit
examples.

E.g.:
- It is recommended that use of private namespaces be restricted to
subdomains of legitimately-assigned domains by the domain owner
exclusively (e.g. ".private.example.com." and NOT ".private.")
- It is recommended that unofficial namespaces be avoided where
practical to do so (e.g. .local, .fake-domain, .TBD)
- It is recommended that any and all domain names be anchored with a
trailing "." when expressed in text form, regardless of scope
(global/private, bare TLD or otherwise) to remove any possible
ambiguity (e.g. ".example.com.", NOT ".example.com" which might
suggest use of search lists)
- It is recommended that inconsistent or conflicting namespace or
contents be avoided (e.g. split DNS with same labels having different
RVALUEs) (possibly handled by non-anchored names and search lists,
which result in unambigous names upon expansion)
- It is recommended that handling of restricting access to "private"
namespaces be handled in a manner that does not induce look-up
failures if the "wrong" nameserver is consulted first (e.g. ISP/global
before VPN/private, have ".private.example.com." return something
OTHER than NXDOMAIN, e.g. servfail or whatever anyone smarter than me
suggests)
- It is recommended that configured Trust Anchors (for private
namespaces) and "learned" Trust Anchors (KSK or ZSK of securely
delegated zones) be handled in a manner compatible with any usage of
split DNS (so that signature validation is deterministic)
- It is recommended that private namespaces underneath secure global
namespaces be DNSSEC-protected with either a global learned Trust
Anchor, or a configured Trust Anchor
- It is recommended that private namespaces be DNSSEC-protected where
practical to do so

The above is just off the top of my head as possible text that could
be used. Comments on style, content, etc., are more than welcome.

Brian

On Wed, Oct 19, 2011 at 1:58 PM,  <teemu.savolai...@nokia.com> wrote:
> Ted, thank you for comments.
>
> Please feel free to propose text - I love constructive text proposals:-)
> During following week would be nice, if possible, so that we can move
> forward with the draft before the next IETF.
>
> Now that you say it, we might state that not any VPN can be trusted by
> default (but VPN is an example here), but e.g. a VPN Configuration Profile
> could enable the setting for that particular VPN connection. If the trusted
> VPN then **cks you up, then, well, trusted parties sometimes do that..
>
> Best regards,
>
>        Teemu
>
>> -----Original Message-----
>> From: ext Ted Lemon [mailto:ted.le...@nominum.com]
>> Sent: 19. lokakuuta 2011 19:07
>> To: Savolainen Teemu (Nokia-CTO/Tampere)
>> Cc: Hui Deng; <m...@ietf.org>; dnsext List; dnsop@ietf.org WG; DHC WG;
>> sa.morr...@googlemail.com; p...@isoc.de
>> Subject: Re: [dhcwg] [mif] 2nd Last Call for MIF DNS server selection
>> document
>>
>> The DHCP changes look good.  You can get multiple selection tuples in
>> DHCPv4 if you want, but you seem to have decided its not important, which
>> is fine by me.   Let me know if you want me to explain how to do that.
>>
>> However, I reread the text on server selection, and it still has a serious
> and
>> easily exploited security flaw.   In order for DNSSEC validation to save
> you
>> from an attack, it has to be the case that you look the name up on every
>> possible name server to see if any claim it's in a signed zone.   If one
> does, it
>> has to be validated.   Right now it looks like if the "trusted" server
> doesn't
>> sign the zone, the DNSSEC validation will never happen.   We dealt with
> this
>> by trusting some networks more than others, and that eliminates a lot of
> the
>> risk.
>>
>> For example, in the case of a hotel net we're okay, because it will be
> less
>> trusted than the 3G network.   The case I am most concerned with is when
>> you VPN to a site that is not trusted: the default behavior will be to
> prefer
>> the VPN link, because we presume it is more trustworthy.  A consultant who
>> VPNs to multiple corporate sites could be spoofed here though, as could a
>> user of a firewall bypass VPN.
>>
>> Unfortunately, I don't know of a way to fix this that doesn't fire up both
>> radios for every query.   Leaving this off by default is probably the best
> we
>> can do, but it might be good to add more text to the security
> considerations
>> section describing specific exploit scenarios.   The text in 10.1 and 10.2
>> doesn't address this particular attack vector.
>>
>> I would propose adding a requirement that there be a mode, off by default,
>> enabled by UI, in which the resolver just fires up both radios, battery be
>> damned, but I am not sure anyone would use it, because it would be
> difficult
>> to explain why and when they should.
>>
>> So practically speaking, I am just proposing a tweak to the security
>> considerations.   I will send text if you don't object.   Sorry for the
> late
>> review.
>
> _______________________________________________
> dnsext mailing list
> dns...@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to