[Dnssec-trigger] [PATCH] Automatic fallback to insecure mode

Philip Paeps philip at trouble.is
Mon Nov 30 16:35:59 UTC 2015


On 2015-11-30 19:25:40 (+0530), Tomas Hozza <thozza at redhat.com> wrote:
> On 30.11.2015 14:20, Paul Wouters wrote:
>> Did you mean turning of validation instead of hardening? Hardening 
>> strips things out of additional data, I don't think that's what you 
>> want.
>
> AFAIK the only real way to turn off the validation in Unbound is not 
> to use validator module. This can not be done during runtime.

That is my understanding too.  I feel this is a good thing though.

> To be honest this seems like what we need - if the local resolvers are 
> not usable for getting DNSSEC data, use them directly and ignore that 
> they are not providing the data.

I think this is a really terrible idea.  I'm shocked that this is being 
considered as a default configuration.

We should be moving towards more trustworthy DNS.  Deliberately and 
presumably invisibly turning off DNSSEC validation when it doesn't work 
is exactly the opposite of what should be done, and what dnssec-trigger 
does by default: "dear user, your network cannot be trusted; proceed 
with extreme caution or not at all".

I hadn't even considered the cache poisoning issue Paul points out.  
That just makes a bad solution seem even worse.

> Please be more specific about why this would not work for you. We will 
> have to come up with some sensible behavior and defaults (and flushing 
> cache is one of them IMO), because we want to move from the solution 
> that worked for handful of hackers that knew what is happening, to the 
> solution that will be used by default and has to be usable 
> out-of-the-box for regular users.

I have read your original email in this thread and I wonder why you want 
to bother with dnssec-trigger at all.  If trustworthiness of the DNS 
isn't required (or even desirable), you can run unbound as a pure cache 
without the validator module.

I agree that the present state of affairs (working DNSSEC but barely 
workable error reporting to application/presentation layer) is not 
perfect but I strongly feel we should be working on fixing the error 
reporting rather than working around broken network configurations that 
interfere with DNSSEC.

dnssec-trigger is very valuable precisely because it tells the user that 
the network cannot be trusted.  That's its job.  That's the way DNSSEC 
is supposed to work.  Either you can trust the data returned by the DNS 
or you need to tell the user that their network cannot be trusted.

Pretending that everything is fine when you know it isn't is not a 
'usable out-of-the-box experience' for regular users.  It's a regression 
in terms of their security.

Philip

-- 
Philip Paeps
Senior Reality Engineer
Ministry of Information



More information about the dnssec-trigger mailing list