[dns-operations] [dane] DNSSEC DANE testing

Warren Kumari warren at kumari.net
Thu Oct 18 22:43:38 UTC 2012


On Oct 18, 2012, at 5:56 PM, Mark Andrews <marka at isc.org> wrote:

> 
> In message <507FB355.4030908 at afnic.fr>, sandoche BALAKRICHENAN writes:
>> Hi Paul,
>> 
>>        I have deliberately added a bogus RRSIG record to
>> "https://dane-broken.rd.nic.fr". But the firefox add-on seems to
>> successfully validate mentioning "the domain is secured by DNSSEC".
>> 
>> Sandoche.
> 
> Well the TLSA is secure.   As long as that matches the CERT returned it *is*
> secured even if the RRSIG on the A RRset is broken.

Ooooh… This is an interesting case (which I personally hadn't considered)... 

This all makes sense, but "feels" odd… Not proposing that we do anything, but it did make me blink….

W



> 
> ; <<>> DiG 9.10.0pre-alpha <<>> _443._tcp.dane-broken.rd.nic.fr tlsa +dnssec
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52053
> ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags: do; udp: 4096
> ;; QUESTION SECTION:
> ;_443._tcp.dane-broken.rd.nic.fr. IN	TLSA
> 
> ;; ANSWER SECTION:
> _443._tcp.dane-broken.rd.nic.fr. 1 IN	TLSA	3 0 1 6E013C54DF90D42D3C016E1AC9EB21E6DA45403D3A5AE9B2D8F21FC3 600D409C
> _443._tcp.dane-broken.rd.nic.fr. 1 IN	RRSIG	TLSA 5 6 1 20130415134103 20121017134103 24975 dane-broken.rd.nic.fr. UFaeHhxVp8zy1tpcR049JqGEvNZrmDLkpgoo63v4gvEtwLp0KRbSBL5J vVlNnz8s5Uk68i8diY/zGt1epP72C2S6C3AUHKdYZiwvxBQwd34Sawna jZMjfAkXEH5z9cjkk1AVm0ReRPs9kbVc0iPDLcH+z21VJBZyFmloOflM EXU=
> 
> ;; Query time: 838 msec
> ;; SERVER: 127.0.0.1#53(127.0.0.1)
> ;; WHEN: Fri Oct 19 08:49:24 2012
> ;; MSG SIZE  rcvd: 288
> 
> 
>> On 09/12/2012 10:44 PM, Paul Wouters wrote:
>>> On Wed, 12 Sep 2012, Marco Davids (SIDN) wrote:
>>> 
>>>> On 08/23/12 20:02, Paul Wouters wrote:
>>>> 
>>>>> I put up the xpi as well, you can grab it at:
>>>>> http://people.redhat.com/pwouters/mozilla-extval-0.7.xpi
>>>> 
>>>> I like it.
>>>> 
>>>> However, there might be room for improvent in the wording of the the
>>>> messages.
>>>> 
>>>> I deliberately broke the TLSA record (https://forfun.net/) and the
>>>> message is (in green):
>>>> 
>>>> "Domainname is secured by DNSSEC and the certificate is validated by
>>>> CA."
>>>> 
>>>> Both true, but as a paranoid user, I would have appreciated a little bit
>>>> more information, like:
>>>> 
>>>> "... but the certificate did not pass a DANE check"
>>>> 
>>>> (or something similar)
>>> 
>>> It should do that. When I check your domain it tells me there is no TLSA
>>> record, but I checked all name servers and it is there (and incorrect)
>>> 
>>> I'll add it on my TODO list :)
>>> 
>>> Paul
>>> _______________________________________________
>>> dns-operations mailing list
>>> dns-operations at lists.dns-oarc.net
>>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>>> dns-jobs mailing list
>>> https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
>> 
>> _______________________________________________
>> dane mailing list
>> dane at ietf.org
>> https://www.ietf.org/mailman/listinfo/dane
> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742                 INTERNET: marka at isc.org
> _______________________________________________
> dane mailing list
> dane at ietf.org
> https://www.ietf.org/mailman/listinfo/dane
> 

--
After you'd known Christine for any length of time, you found yourself fighting a desire to look into her ear to see if you could spot daylight coming the other way.

    -- (Terry Pratchett, Maskerade)







More information about the dns-operations mailing list