From Fedora Project Wiki
No edit summary
Line 9: Line 9:
=== Common operation ===
=== Common operation ===


When using DNSSEC, DNS data is retrieved along with respective DNSSEC
When using DNSSEC, DNS data are retrieved along with respective DNSSEC
records usually from a compliant recursive DNS server. The validator
records usually from a DNSSEC-compliant recursive DNS server. The validator
then uses a local copy of root DNSSEC data together with the retrieved
then uses a local copy of root DNSSEC public key together with the retrieved
DNSSEC data to build and verify a chain of trust. At the end of the
DNSSEC data to build and verify the chain of trust. At the end of the
process we have a ''cryptograhpical'' proof that trust for the DNS data
process we have a ''cryptograhpical'' proof of validity or invalidity of the
derives from trust for the DNS root keys and applied cryptography.
obtained data. The trust for the DNS data verification derives from trust
for the DNS root keys and applied cryptography.


When DNSSEC is enabled and DNSSEC data cannot be retrieved, security is maintained
When DNSSEC is enabled and DNSSEC data cannot be retrieved, security is maintained
Line 27: Line 28:
features.
features.


Keeping DNSSEC enabled all the time may be a challenge especailly for road
Keeping DNSSEC enabled all the time may be a challenge especially for road
warrior setups and other mobile devices. The word ''opportunistic'' stands
warrior setups and other mobile devices. The word ''opportunistic'' stands
for the fact that the application doesn't check whether the received data
for the fact that the end user application doesn't check whether the received
is secure or not.
data are secure or not.


When DNSSEC is disabled, the security features are gone but functionality
When DNSSEC is disabled, the security features are gone but functionality
Line 39: Line 40:
In addition, applications and libraries may choose to treat validated DNS
In addition, applications and libraries may choose to treat validated DNS
data specially and use them for security purposes. This allows for storing
data specially and use them for security purposes. This allows for storing
security data in DNS and verifying them using DNSSEC.
security data (e.g. certificate fingerprint, IPSec keys, etc.) in DNS and
authenticating them using DNSSEC.


The chain of trust is thus extended from the authenticated data to other
The chain of trust is thus extended from the authenticated data to other
security mechanisms. That way DNSSEC indirectly covers other protocols
security mechanisms. That way DNSSEC indirectly covers other protocols
than just DNS and helps to mitigate all sorts of attacks.
than just DNS and helps to mitigate attacks relying on the name resolution
as one of the attack vectors.


Security data stored in DNS and secured by DNSSEC are typically fingerprints
Security data stored in DNS and secured by DNSSEC are typically fingerprints
of various keys and certificates and DNSSEC provides a secure way to get the
of various keys and certificates and DNSSEC provides a way to validate the
data and even detect when an attacker is trying to hide the data from us.
data integrity and authenticity and even detect when an attacker is trying
to hide the data from us.


When DNSSEC is disabled, the application will treat all DNS data as insecure
When DNSSEC is disabled, the application will treat all DNS data as insecure
Line 56: Line 60:
=== Network configuration ===
=== Network configuration ===


* Automatically or manually configured DNS servers should be tested. They should be used for retrieving DNSSEC data when possible. Fallback methods should be used when configured servers turn out to be broken. User should be notified when there's no way to contact a working name server and they should be presented with a possibility to turn off DNSSEC temporarily.
* Automatically or manually configured DNS servers should be tested for the ability to provide DNSSEC data. They should be used for retrieving DNSSEC data when possible. Fallback methods should be used when configured servers turn out to be broken. User should be notified when there's no way to contact a working name server and they should be presented with a possibility to turn off DNSSEC temporarily. In Fedora Workstation no dialog will be displayed ATM and the DNSSEC validation is turned off automatically in such situation.
* Overhead caused by DNSSEC testing and validation should be kept reasonable.
* Overhead caused by DNSSEC testing and validation is kept reasonable thanks to the local DNS cache.


=== Application API ===
=== Application API (not part of the '''Default DNS resolver''' change) ===


* Applications and libraries can trust DNS data from glibc resolver is are marked as DNSSEC secure.
* Applications and libraries can trust DNS data from glibc resolver is are marked as DNSSEC secure.
Line 74: Line 78:


To achieve the stated goals we need to perform DNSSEC validation on every
To achieve the stated goals we need to perform DNSSEC validation on every
client machine (except a couple of corner cases like Docker) and allow
client machine (except a couple of Cloud and containers use-cases) and allow
application to use DNS as a trusted source of security data (certificate
application to use DNS as a trusted source of security data (certificate
fingerprints, SSH fingerprints, ...).
fingerprints, SSH fingerprints, ...).


Fedora is using a combination of NetworkManager, dnssec-trigger and unbound
Fedora is using a combination of NetworkManager, dnssec-trigger and Unbound
to perform all the configuration tasks, DNS data retrieval and DNSSEC
to perform all the configuration tasks, DNS data retrieval and DNSSEC
validation.
validation.
Line 95: Line 99:
=== NetworkManager operations ===
=== NetworkManager operations ===


The main network configuration tool is NetworkManager. When using DNSSEC it is combined with dnssec-trigger via a script shipped in the dnssec-trigger package.
The main network configuration tool is NetworkManager. When using DNSSEC it is combined with dnssec-trigger via a script shipped in the dnssec-trigger package. The script is run on every network configuration change and the current configuration is fetched from NetworkManager through the libnm API.


==== Common operations ====
==== Common operations ====


With or without DNSSEC, NetworkManager '''gathers the list of recursive name servers''' from DHCP and/or configuration. The purpose of those name servers is '''to answer DNS queries''' including those for DNSSEC records. Those name servers are not meant to be trusted for anything else than attempting to answer the queries and especially '''not for performing DNSSEC validation'''.
With or without DNSSEC, NetworkManager '''gathers the list of recursive name servers''' from DHCP, VPN connections and/or static configuration. The purpose of those name servers is '''to answer DNS queries''' including those for DNSSEC records. Those name servers are not meant to be trusted for anything else than attempting to answer the queries and especially '''not for performing DNSSEC validation'''.


==== Without DNSSEC ====
==== Without DNSSEC ====
Line 105: Line 109:
When DNSSEC is not in use, the easiest way to handle the list of name servers is to put them into <code>/etc/resolv.conf</code> so that the stub resolver can do its job.
When DNSSEC is not in use, the easiest way to handle the list of name servers is to put them into <code>/etc/resolv.conf</code> so that the stub resolver can do its job.


As <code>/etc/resolv.conf</code> doesn't support advanced configuration, it is often useful to instead configure a local recursive DNS server (e.g dnsmasq or unbound) with the name server list and point the stub resolver to the local host using <code>/etc/resolv.conf</code>.
As <code>/etc/resolv.conf</code> doesn't support advanced configuration (e.g. split-DNS commonly used with VPN connections), it is often useful to instead configure a local recursive DNS server (e.g dnsmasq or unbound) with the name server list and point the stub resolver to the local host using <code>/etc/resolv.conf</code>.


==== With DNSSEC ====
==== With DNSSEC ====


When DNSSEC is in use, after gathering the recursive nameservers, NetworkManager reconfigures a local unbound instance using dnssec-trigger. In this case the stub resolver should point to the local unbound instance and it should be instructed that the local unbound instance is not just an ordinary recursive name server '''but also a trusted DNSSEC validator'''.
When DNSSEC is in use, after gathering the recursive resolvers, NetworkManager notifies dnssec-trigger that the network configuration changed. Dnssec-trigger then fetches the current configuration from NetworkManager performs probing of the recursive resolvers. Finally dnssec-trigger reconfigures The local Unbound instance with the proper set of recursive resolvers for the global name resolution and potentially with some additional resolvers to handle specific domains (this is the split-DNS handling). In this case the stub resolver should use the local Unbound instance. Ideally the stub resolver should be instructed that the local Unbound instance is not just an ordinary recursive name server '''but also a trusted DNSSEC validator'''.


==== Notes ====
==== Notes ====


Problem: There is currently no way to distinguish ordinary recursive name servers and trusted DNSSEC validators in the stub resolver configuration, see later.
Problem: There is currently no way to distinguish ordinary recursive name servers and trusted DNSSEC validators in the stub resolver configuration, see later. However this is NOT part of the '''Default DNS resolver''' change.


=== Mobility challenges ===
=== Mobility challenges ===
Line 121: Line 125:
Captive portal detection needs to allow the user to log into the captive portal without being restricted by DNSSEC validation. The user might also want to access the hotspot resources even after logging also without being restricted by DNSSEC validation if the hotspot uses a hijacked domain name that is not designated as insecure in the global DNS tree.
Captive portal detection needs to allow the user to log into the captive portal without being restricted by DNSSEC validation. The user might also want to access the hotspot resources even after logging also without being restricted by DNSSEC validation if the hotspot uses a hijacked domain name that is not designated as insecure in the global DNS tree.


All of the above has to be done in a way that doesn't allow an attacker to compromise security.  
All of the above has to be done in a way that doesn't allow an attacker to compromise security.
 
Previously the Captive portal detection and login has been handled by the dnssec-trigger panel. However after discussions with NetworkManager and GNOME developers we decided that NetworkManager will be the only tool doing the detection and others will only consume the information from it. This requires implementation of notifications on connectivity state changes in NetworkManager ([[https://bugzilla.redhat.com/show_bug.cgi?id=1257888|Bug]]).
 
Originally the Hotspot sign on was handled by dnssec-trigger panel. After discussion with GNOME developers, this part will be handled only by GNOME Shell in Fedora Workstation. When doing the Hotspot sign on, GNOME will not rely on correct information being present in the <code>/etc/resolv.conf</code> and rather fetch the DNS resolvers to be used directly from NetworkManager and use them in a sandboxed browser window for sign on.


==== Broken networks ====
==== Broken networks ====


Some networks are so broken that even without captive portal they are not able to deliver DNSSEC data to the clients. In that case will try tunnel to other DNS servers on the Internet (Fedora Infra or public DNS root) and use them. Naturally, local/internal domains need to be available.
Some networks are so broken that even without captive portal they are not able to deliver DNSSEC data to the clients. In that case dnssec-trigger will setup Unbound to tunnel the Queries over SSL to other DNS servers on the Internet (Fedora Infra or public DNS root). Naturally, local/internal domains need to be available.


These sub-problems (including VPN handling an so on) are solved by dnssec-trigger with tweaks by [[User:thozza|Tomas Hozza]] and [[User:pavlix|Pavel Simerda]].
The connection provided resolvers will be used at least for the unsigned part of the DNS tree. Note that this relies on the "mixed-mode" Unbound module to be used. The module is not yet contributed to the Upstream, but the '''default DNS resolver''' change owners are working on getting everything done for Fedora 24.


==== Interesting packages ====
==== Interesting packages ====
Line 135: Line 143:
* dhclient
* dhclient
* libreswan ?
* libreswan ?
* resolved ?
* systemd-resolved/networkd ?
* connman ?
* connman ?


Line 148: Line 156:
=== Overview ===
=== Overview ===


The assumption here is that (something like) dnssec-trigger properly configures local resolver to do DNSSEC validation locally so that a fake DNS answer is detected and never gets it to the application and a DNSSEC secure DNS data is distingushed from DNS insecure data. The open question is how to pass the information about security status to all the parties. The mechanism needs to be simple so other resolver libraries like e.g. python-dns can follow the same rules and use the same logic as Glibc.
The assumption here is that (something like) dnssec-trigger properly configures local resolver to do DNSSEC validation locally so that a fake DNS answer is detected and never gets it to the application and a DNSSEC secure DNS data is distinguished from DNS insecure data. The open question is how to pass the information about security status to all the parties. The mechanism needs to be simple so other resolver libraries like e.g. python-dns can follow the same rules and use the same logic as libc.


=== Expected behavior ===
=== Expected behavior ===


Those distribution policies have been correct for ages. Before DNSSEC
Those distribution policies have been correct for ages. Before DNSSEC
was created, noone would question them.
was created, no one would question them.


We were looking for a solution where:
We were looking for a solution where:


1) Application or security library can trust the data from glibc resolver including security information.
1) Application or security library can trust the data from libc resolver including security information.


2) Resolver can provide unauthenticated DNS data when in non-DNSSEC mode and the list of recursive name servers is configured by a system administrator or an automated tool.
2) Resolver can provide unauthenticated DNS data when in non-DNSSEC mode and the list of recursive name servers is configured by a system administrator or an automated tool.


3) Resolver can provide autenticated DNS data when in DNSSEC mode andthe list of trusted resolvers is provided by the system administrator (rarely) or by an automated tool (in most cases giving just 127.0.0.1).
3) Resolver can provide authenticated DNS data when in DNSSEC mode and the list of trusted resolvers is provided by the system administrator (rarely) or by an automated tool (in most cases giving just 127.0.0.1).


The most important thing is that the application never receives autenticated
The most important thing is that the application never receives autenticated

Revision as of 16:34, 23 November 2015

Motivation

DNS is a hierarchical distributed database containing information about hosts and services. DNSSEC is a mechanism to detect and prevent man-in-the-middle attacks resulting in fake DNS data accepted by the clients. One of the main goals is to avoid user interaction and especially the need to configure exceptions every now and then.

Common operation

When using DNSSEC, DNS data are retrieved along with respective DNSSEC records usually from a DNSSEC-compliant recursive DNS server. The validator then uses a local copy of root DNSSEC public key together with the retrieved DNSSEC data to build and verify the chain of trust. At the end of the process we have a cryptograhpical proof of validity or invalidity of the obtained data. The trust for the DNS data verification derives from trust for the DNS root keys and applied cryptography.

When DNSSEC is enabled and DNSSEC data cannot be retrieved, security is maintained and DNS failure is reported. For proper DNS operation, at least one compliant recursive DNS server is needed.

Opportunistic DNSSEC

As long as DNSSEC is enabled, applications are protected from receiving fake DNS data for DNS secured domains. This technique covers all sorts of applications including those that don't contain any explicit security features.

Keeping DNSSEC enabled all the time may be a challenge especially for road warrior setups and other mobile devices. The word opportunistic stands for the fact that the end user application doesn't check whether the received data are secure or not.

When DNSSEC is disabled, the security features are gone but functionality is otherwise intact.

Applications and libraries with DNSSEC support

In addition, applications and libraries may choose to treat validated DNS data specially and use them for security purposes. This allows for storing security data (e.g. certificate fingerprint, IPSec keys, etc.) in DNS and authenticating them using DNSSEC.

The chain of trust is thus extended from the authenticated data to other security mechanisms. That way DNSSEC indirectly covers other protocols than just DNS and helps to mitigate attacks relying on the name resolution as one of the attack vectors.

Security data stored in DNS and secured by DNSSEC are typically fingerprints of various keys and certificates and DNSSEC provides a way to validate the data integrity and authenticity and even detect when an attacker is trying to hide the data from us.

When DNSSEC is disabled, the application will treat all DNS data as insecure and act accordingly.

Goals

Network configuration

  • Automatically or manually configured DNS servers should be tested for the ability to provide DNSSEC data. They should be used for retrieving DNSSEC data when possible. Fallback methods should be used when configured servers turn out to be broken. User should be notified when there's no way to contact a working name server and they should be presented with a possibility to turn off DNSSEC temporarily. In Fedora Workstation no dialog will be displayed ATM and the DNSSEC validation is turned off automatically in such situation.
  • Overhead caused by DNSSEC testing and validation is kept reasonable thanks to the local DNS cache.

Application API (not part of the Default DNS resolver change)

  • Applications and libraries can trust DNS data from glibc resolver is are marked as DNSSEC secure.
  • When DNSSEC is enabled, DNS data from domains secured by DNSSEC are properly validated and marked.
  • Name resolution works even when DNSSEC is disabled but all data is marked as DNSSEC insecure.

Applications and cryptographic libraries

  • TLS libraries should be able to make use of DNS data secured by DNSSEC when available.
  • SSH host keys should be verified using DNSSEC when available.
  • And more...

Configuration requirements

To achieve the stated goals we need to perform DNSSEC validation on every client machine (except a couple of Cloud and containers use-cases) and allow application to use DNS as a trusted source of security data (certificate fingerprints, SSH fingerprints, ...).

Fedora is using a combination of NetworkManager, dnssec-trigger and Unbound to perform all the configuration tasks, DNS data retrieval and DNSSEC validation.

Contemporary networks are full of broken DNS proxies so we need to jump through various hoops to get DNSSEC data. Therefore the configuration task consists not only of transporting the configuration from NetworkManager to unbound but also of testing the recursive DNS servers for the ability to deliver global DNSSEC data that is then used for validation.

When dnssec-trigger is running, it is expected to be the only tool managing /etc/resolv.conf. Unbound also accepts manual configuration from configuration files and using the command line interface.

NetworkManager operations

The main network configuration tool is NetworkManager. When using DNSSEC it is combined with dnssec-trigger via a script shipped in the dnssec-trigger package. The script is run on every network configuration change and the current configuration is fetched from NetworkManager through the libnm API.

Common operations

With or without DNSSEC, NetworkManager gathers the list of recursive name servers from DHCP, VPN connections and/or static configuration. The purpose of those name servers is to answer DNS queries including those for DNSSEC records. Those name servers are not meant to be trusted for anything else than attempting to answer the queries and especially not for performing DNSSEC validation.

Without DNSSEC

When DNSSEC is not in use, the easiest way to handle the list of name servers is to put them into /etc/resolv.conf so that the stub resolver can do its job.

As /etc/resolv.conf doesn't support advanced configuration (e.g. split-DNS commonly used with VPN connections), it is often useful to instead configure a local recursive DNS server (e.g dnsmasq or unbound) with the name server list and point the stub resolver to the local host using /etc/resolv.conf.

With DNSSEC

When DNSSEC is in use, after gathering the recursive resolvers, NetworkManager notifies dnssec-trigger that the network configuration changed. Dnssec-trigger then fetches the current configuration from NetworkManager performs probing of the recursive resolvers. Finally dnssec-trigger reconfigures The local Unbound instance with the proper set of recursive resolvers for the global name resolution and potentially with some additional resolvers to handle specific domains (this is the split-DNS handling). In this case the stub resolver should use the local Unbound instance. Ideally the stub resolver should be instructed that the local Unbound instance is not just an ordinary recursive name server but also a trusted DNSSEC validator.

Notes

Problem: There is currently no way to distinguish ordinary recursive name servers and trusted DNSSEC validators in the stub resolver configuration, see later. However this is NOT part of the Default DNS resolver change.

Mobility challenges

Captive portals (aka hotspots)

Captive portal detection needs to allow the user to log into the captive portal without being restricted by DNSSEC validation. The user might also want to access the hotspot resources even after logging also without being restricted by DNSSEC validation if the hotspot uses a hijacked domain name that is not designated as insecure in the global DNS tree.

All of the above has to be done in a way that doesn't allow an attacker to compromise security.

Previously the Captive portal detection and login has been handled by the dnssec-trigger panel. However after discussions with NetworkManager and GNOME developers we decided that NetworkManager will be the only tool doing the detection and others will only consume the information from it. This requires implementation of notifications on connectivity state changes in NetworkManager ([[1]]).

Originally the Hotspot sign on was handled by dnssec-trigger panel. After discussion with GNOME developers, this part will be handled only by GNOME Shell in Fedora Workstation. When doing the Hotspot sign on, GNOME will not rely on correct information being present in the /etc/resolv.conf and rather fetch the DNS resolvers to be used directly from NetworkManager and use them in a sandboxed browser window for sign on.

Broken networks

Some networks are so broken that even without captive portal they are not able to deliver DNSSEC data to the clients. In that case dnssec-trigger will setup Unbound to tunnel the Queries over SSL to other DNS servers on the Internet (Fedora Infra or public DNS root). Naturally, local/internal domains need to be available.

The connection provided resolvers will be used at least for the unsigned part of the DNS tree. Note that this relies on the "mixed-mode" Unbound module to be used. The module is not yet contributed to the Upstream, but the default DNS resolver change owners are working on getting everything done for Fedora 24.

Interesting packages

  • NetworkManager
  • initscripts
  • dhclient
  • libreswan ?
  • systemd-resolved/networkd ?
  • connman ?

Stub resolver requirements

Applications and cryptographic libraries need an interface to get DNS data that is either verified using a trusted DNSSEC validator (e.g. a local unbound instance) or declared as not trusted (not verified using DNSSEC). False positive answers are unacceptable because treating ordinary DNS data as DNSSEC secure data would allow attacks on applications that use DNSSEC secure data for security purposes.

Example: SSH server fingerprint verification

Imagine that OpenSSH client is verifying server's fingerprint against the value obtained from DNS instead of asking the user. If the client accepted a fake response with faked server's fingerprint then everything is doomed.

Overview

The assumption here is that (something like) dnssec-trigger properly configures local resolver to do DNSSEC validation locally so that a fake DNS answer is detected and never gets it to the application and a DNSSEC secure DNS data is distinguished from DNS insecure data. The open question is how to pass the information about security status to all the parties. The mechanism needs to be simple so other resolver libraries like e.g. python-dns can follow the same rules and use the same logic as libc.

Expected behavior

Those distribution policies have been correct for ages. Before DNSSEC was created, no one would question them.

We were looking for a solution where:

1) Application or security library can trust the data from libc resolver including security information.

2) Resolver can provide unauthenticated DNS data when in non-DNSSEC mode and the list of recursive name servers is configured by a system administrator or an automated tool.

3) Resolver can provide authenticated DNS data when in DNSSEC mode and the list of trusted resolvers is provided by the system administrator (rarely) or by an automated tool (in most cases giving just 127.0.0.1).

The most important thing is that the application never receives autenticated data that were only verified by an ordinary recursive server. That would mean an implicit trust in an unauthorized and unexpected DNSSEC validator.

Note that a recursive name server is typically a host on the local network announced by DHCP while a trusted validator is typically the local machine which itself is talking to a recursive name server.

Case: Captive portal, broken DNSSEC or DNSSEC turned off

We are in hot-spot sign-on mode or validating resolver is unavailable for some reason (early boot, resource constraints, Docker container [finally!], and so on):

In this case *nothing* can be trusted. Resolver might return faked answers and we have no means to check if declared trustworthiness is correct or not. Again, we need to be 100 % sure from the cryptographical point of view. Application must not recieve any DNS answer marked as DNSSEC secure in this mode.

Case: DNSSEC fully configured

Validating resolver is up, running, properly configured, and the path to the resolver is trusted - it might be running on localhost or we are in Docker container and we trust the host and so on.

In this case we trust to the result of validation indicated by AD bit. Application will receive the answer marked as trusted if the resolver tells us to do so by AD bit in the DNS reply.

Current status

The current implementation in glibc doesn't achieve the goals stated above and doesn't prevent the security problem of implicitly using foreign recursive name servers as trusted DNSSEC validators.

We have an experimental implementation using '/etc/resolv-secure.conf' that solves the problem. I'm looking forward to see any alternatives. The issue has been holding back DNSSEC deployment for long and might cause a lot of damage.

Solution: Separate file where all DNS servers are DNSSEC validators

We have an experimental solution that relies on a separate resolv-secure.conf file. As opposed to /etc/resolv.conf typically containing the list of recursive name servers, resolv-secure.conf contains a list of trusted DNSSEC validators in form of validating DNSSEC servers. The list typically includes a single DNSSEC validator which is running on the local host.

See also:

Advantages

  • The file can be separately protected using mandatory access control. The whole stub resolver configuration is protected.
  • The syntax is identical to /etc/resolv.conf. On a DNSSEC enabled system, /etc/resolv.conf can be just a symlink to /etc/resolv.conf.

Alternative solution: option secure-nameserver

Use a special

Risks

  • The configuration file could not be protected by mandatory access control while at the same time allowing tools to write a /etc/resolv.conf configuration when not using DNSSEC.

Alternative solution: option secure-dns

(or for example option trust-dnssec-validation)

Mark /etc/resolv.conf configuration as secure when providing the list of secure DNSSEC validators.

Risks

  • An existing tool might rewrite the list of name servers and keep the unknown options including option secure-dns.

Alternative solution: option insecure-dns

Mark /etc/resolv.conf configuration explicitly as insecure unless providing the list of secure DNSSEC validators.

Risks

  • Existing /etc/resolv.conf files would be wrongly considered secure for DNSSEC validation.
  • Existing tools would generate such files.

FAQ

Why is it wrong to implicitly trust the AD flag from recursive name servers

AD flag is how a validating name server informs the requester that the returned DNS data have been successfully validated using the DNSSEC mechanism.

There is a huge difference between using an untrusted recursive name server to retrieve DNS data and using an untrusted DNSSEC validator. DNSSEC works well with untrusted recursive name servers but its security is jeopardized by using them as DNSSEC validators. Applications may attribute additional trust to the validated data especially when they contain security keys for TLS, SSH and other authenticated protocols.

Trusting a random DNSSEC validator is like trusting a random security certificate.

Does DNSSEC work on untrusted or public networks?

Yes. There is no such concept as trusted or untrusted network in DNSSEC. The confusion comes from the distinction between a recursive name server (used by the system to retrieve DNS data) and a DNSSEC validator (which is typically a validating name server running on the local host).

For DNSSEC, all we need is to never implicitly use recursive name servers as trusted DNSSEC validators. In our opinion, the preferred way to implement that is to avoid passing security information from ordinary recursive name servers (not configured as trusted DNSSEC validators).

Does NetworkManager need to keep track of trusted DNSSEC validators

No. When working with dnssec-trigger, NetworkManager only needs to keep track of learnt and configured recursive name servers. The list of trusted DNSSEC validators always contains a single unbound instance running on the local host.

TODO

  • Some terms might need to be improved, especially recursive name server doesn't really say what we want to say which is a name server that is used by the system to gather necessary DNS data. I'm also still not sure about using opportunistic for security of DNSSEC-unaware applications. User:pavlix
  • Provide information about isolated network operation. This is especially important because our design often relies on learning about security of the local domains using the global DNS.

Resources

User:pavlix wrote most if this site using mostly sources of his own and those written by User:thozza and User:pspacek.