Hi Dave,
On 5/25/19 3:23 AM, Dave Crocker wrote:
> On 5/24/2019 5:41 PM, Peter Thomassen wrote:
>> The registration system thus needs to be aware of what's a public
>> suffix and what's not.
>
>
> Doesn't dnssec support obviate this kind of problem? (If the DNS data
> are validated by it, it doesn't matter what server provides the data. If
> the data are not validated, then the rogue server is useless.)
DNSSEC ensure that an attacker who manages to create and control a
subzone cannot inject malicious records, because the signing key is not
available to the attacker. The attacker also can't come up with a
different key because that would require creating a corresponding DS
record in the parent zone, but that requires collaboration of the parent
zone operator and is out of the attacker's control.
However, even with DNSSEC, queries will still be answered from the more
specific zone, producing invalid responses. Thus, unauthorized creation
of subzones leads to DoS on all names covered by the subzone. That is,
DNSSEC does not remove the problem, it just turns the integrity breach
into a DoS scenario. Depending on what subdomain you knock off this way,
that's already a pretty bad scenario.
Nevertheless, you're completely right that DNSSEC helps a lot. That was
precisely my thinking when I chose the title for the paper I referenced.