[DNSfirewalls] Fwd: New Version Notification for draft-vixie-dns-rpz-00.txt
Anne Bennett
anne at encs.concordia.ca
Thu Oct 13 01:28:33 UTC 2016
Vernon,
>> "... ignore DNSSEC. The result of "BREAK-DNSSEC" at DNS
>> clients using DNSSEC is functionally similar to an RPZ
>> NXDOMAIN policy action;"
>>
>> I'm not at all sure I understand the above sentence
>> correctly, but if I do, then I suggest:
>>
>> "... ignore DNSSEC for RPZ-modified queries even if otherwise
>> configured to use DNSSEC; thus, the result of such a configuration
>> is functionally similar to an RPZ NXDOMAIN policy action:"
>>
>> ... and if I don't understand correctly, perhaps some other
>> clarification would be in order?
>
> The idea is that any changes by anything including RPZ break DNSSEC
> verification. Connecting to web page using an A RRset that has DNSSEC
> records but that has been modified by RPZ seems likely to result in
> the browser showing something like
> "could not resolve www.example.com; try again?"
>
> Do you have a suggestion a better way to say that?
Possibly not without exposing to the world my woefully
inadequate understanding of DNSSEC. :-/
My understanding from the document was that RPZ is usually
implemented by the recursive resolver, so if that name server is
also configured to "BREAK-DNSSEC", it would return a modified
RRset regardless of the fact that this result would not match
the DNSSEC signature. I had assumed that the querying client
was *not* the entity doing DNSSEC validation, and that this
client would therefore meekly accept the modified result sent
by the resolving nameserver.
Am I mistaken? Does the querying client receive the result
RRset *and* the DNSSEC signature, and *itself* check the
validity? If so, then perhaps:
Therefore, by default, DNS resolvers using RPZ avoid
modifying DNS results when DNSSEC signatures are available
and are requested by the DNS client. However, when
the common "BREAK-DNSSEC" configuration setting is used,
RPZ-using resolvers do modify query results, even when this
renders them DNSSEC-invalid. In such a case, a querying
client which checks DNSSEC will ignore the invalid result,
and will effectively be blocked from malefactor domains;
this behaviour is functionally similar to that caused by
an RPZ NXDOMAIN policy action.
There may be a less wordy way to say it, but if I've understood
correctly this time, perhaps that's more clear?
Anne.
--
Ms. Anne Bennett, Senior Sysadmin, ENCS, Concordia University, Montreal H3G 1M8
anne at encs.concordia.ca +1 514 848-2424 x2285
More information about the DNSfirewalls
mailing list