[dns-operations] Google (formerly also CF) public DNS sometimes forwards incomplete subset of NSEC RRs

Mark Andrews marka at isc.org
Sun Sep 20 21:52:34 UTC 2020


The no qname proof is the closest enclosure proof with NSEC. A seperate proof may be needed with NSEC3. 

-- 
Mark Andrews

> On 21 Sep 2020, at 04:53, Brian Somers <bsomers at opendns.com> wrote:
> 
> This is an interesting behaviour from google.  It’s not wrong…
> I struggled with this when doing the negative proof stuff in the
> OpenDNS code.
> 
> The issue is around providing the closest encloser when that
> closest enclosure is the zone apex.  Is it necessary?  A validator
> can reliably imply the closest encloser if it “falls off the top” when
> looking for it.  So if this zone was NSEC3 signed and only presented
> the *.runbox.com, the validator should be able to suspect that the
> *.runbox.com NSEC3’s parent is at the zone apex, then prove it.
> 
> In this case however, the presentation of *.runbox.com as an RR
> also implies that runbox.com has an NSEC.  As that NSEC is not
> otherwise required, that’s enough.  One record supplies the
> closest encloser and the proof that an applicable wildcard exists
> that doesn’t include the TLSA type.
> 
>> Brian
> 
>> On Sep 16, 2020, at 1:31 PM, Viktor Dukhovni <ietf-dane at dukhovni.org> wrote:
>> 
>>> On Wed, Sep 16, 2020 at 11:50:31AM -0700, Marek Vavruša wrote:
>>> Hi Viktor, I forgot to update this thread, but this should be fixed.
>> 
>> Thanks!  Looks much better now.  Now it is Google's turn.  I still see
>> an incomplete NSEC3 RRset from 8.8.8.8:
>> 
>>   $ hsdig -n8.8.8.8 -D -t tlsa _25._tcp.mx.runbox.com
>>   _25._tcp.mx.runbox.com. IN TLSA ? ; NoError AD=1
>>   runbox.com. IN SOA dns61.copyleft.no. hostmaster at copyleft.no. 3000008499 14400 3600 1296000 3600
>>   runbox.com. IN RRSIG SOA 13 2 86400 20200930104345 20200916091345 18202 runbox.com. <sig>
>>   *.runbox.com. IN NSEC _acme-challenge.runbox.com. A MX RRSIG NSEC
>>   *.runbox.com. IN RRSIG NSEC 13 2 3600 20200930104345 20200916091345 18202 runbox.com. <sig>
>> 
>> but the NSEC establishing the zone apex as the closest encloser (now
>> present in the CF responses):
>> 
>>   $ hsdig -n1.0.0.1 -D -t tlsa _25._tcp.mx.runbox.com
>>   _25._tcp.mx.runbox.com. IN TLSA ? ; NoError AD=1
>>   runbox.com. IN SOA dns61.copyleft.no. hostmaster at copyleft.no. 3000008499 14400 3600 1296000 3600
>>   runbox.com. IN RRSIG SOA 13 2 86400 20200930104345 20200916091345 18202 runbox.com. <sig>
>>   munin01.runbox.com. IN NSEC ipmi.mysql01.runbox.com. A RRSIG NSEC
>>   munin01.runbox.com. IN RRSIG NSEC 13 3 3600 20200930104345 20200916091345 18202 runbox.com. <sig>
>>   *.runbox.com. IN NSEC _acme-challenge.runbox.com. A MX RRSIG NSEC
>>   *.runbox.com. IN RRSIG NSEC 13 2 3600 20200930104345 20200916091345 18202 runbox.com. <sig>
>> 
>> is missing from the GOOG responses.
>> 
>> -- 
>>   Viktor.
>> _______________________________________________
>> dns-operations mailing list
>> dns-operations at lists.dns-oarc.net
>> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> 
> 
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations





More information about the dns-operations mailing list