[Dnssec-trigger] [PATCH] Automatic fallback to insecure mode

Petr Spacek pspacek at redhat.com
Tue Dec 1 12:34:07 UTC 2015


On 30.11.2015 21:41, Paul Wouters wrote:
> On Mon, 30 Nov 2015, Philip Paeps wrote:
> 
>>>  To be honest this seems like what we need - if the local resolvers are not
>>>  usable for getting DNSSEC data, use them directly and ignore that they are
>>>  not providing the data.
>>
>> I think this is a really terrible idea.  I'm shocked that this is being
>> considered as a default configuration.
> 
> Well, the alternatives are worse :(
> 
> Fedora is going to basically be the first player to enable dnssec per
> default. We cannot afford this to turn into another "selinux" where
> at the first sign of trouble, people just disable the whole thing.
> 
> So the idea is, enable the extra security but fallback to the current
> insecure status. Then when we gain more confidence, we can bring up the
> security until at some point we can turn this into a "hard fail".
> 
> I do agree with you that we need a notification to the user, and a way
> for expert (dns) users to insist on having DNSSEC enabled in a way that
> dnssec-trigger guarantees it. We are trying to build all of this.
> 
>> We should be moving towards more trustworthy DNS.  Deliberately and
>> presumably invisibly turning off DNSSEC validation when it doesn't work is
>> exactly the opposite of what should be done, and what dnssec-trigger does by
>> default: "dear user, your network cannot be trusted; proceed with extreme
>> caution or not at all".
> 
> We won't do it invisibly. Some kind of notification will be provided,
> but do note that 90% of users won't really know what to do with that
> popup.
> 
>> I have read your original email in this thread and I wonder why you want to
>> bother with dnssec-trigger at all.  If trustworthiness of the DNS isn't
>> required (or even desirable), you can run unbound as a pure cache without
>> the validator module.
> 
> We do want to go there, but early adopters causing a hard fail is not
> going to move anyone forward to universal deployment of dnssec.
> 
>> I agree that the present state of affairs (working DNSSEC but barely
>> workable error reporting to application/presentation layer) is not perfect
>> but I strongly feel we should be working on fixing the error reporting
>> rather than working around broken network configurations that interfere with
>> DNSSEC.
> 
> It's more complicated than that. For instance, various parts of the OS
> are now independantly trying to deal with hotspot detection, so all of
> this requires coordination between the various OS parts.
> 
>> dnssec-trigger is very valuable precisely because it tells the user that the
>> network cannot be trusted.  That's its job.
> 
> But the user cannot do much. Usually they have no real alternative
> network, so a popup at most warns them implicitely not to go to banking
> sites or anything important.
> 
>>  That's the way DNSSEC is supposed to work.  Either you can trust the data
>> returned by the DNS or you need to tell the user that their network cannot
>> be trusted.
> 
> Hardfail is just not going to work like that. Look at selinux. Look at
> browser overrides for SSL certificates that are somehow bad. Look at
> the default of allowing mixed https/http content on webpages. If
> browsers didn't do this, they would see their userbase dwindling. The
> situation with SSL and DNS is quite similar.
> 
>> Pretending that everything is fine when you know it isn't is not a 'usable
>> out-of-the-box experience' for regular users.  It's a regression in terms of
>> their security.
> 
> Technically speaking, it is not a regression. For the 99.9% of users
> who are now not using dnssec on their own device, going into insecure
> mode is exactly how they are operating right now.
> 
> Paul

Thank you for summarizing this, Paul.

Once again, I would like to reiterate the point that *this is a temporary
measure*. It allows us to put dnssec-trigger and Unbound as validator
literally everywhere, into every network, without breaking 60 % of clients in
some way [1, page 22, table 11].

Imagine that we were DNSSEC fundamentalists and decided to break 60 % clients
in some way. That would cause a huge backlash against DNSSEC validation on end
clients.

[1]
http://www.nlnetlabs.nl/downloads/publications/os3-2015-rp2-xavier-torrent-gorjon.pdf

-- 
Petr Spacek  @  Red Hat



More information about the dnssec-trigger mailing list