--- Begin Message ---
Hi Carsten,
Some Cloudflare DNS people wrote a nice blog that included some mention of the
decision-making process:
https://blog.cloudflare.com/de-tld-outage-dnssec/
We were guided by informal contact with people we knew at DENIC, the
interpretation of visible signals shared by other people in the DNS-OARC
community through this mailing list and Mattermost, and the guidance in RFC
7646. The decision to deploy an NTA was not taken lightly, and involved
briefing of and buy-in from some senior executives. The core question was, as
you say, whether the DNSSEC validation failures we were seeing on 1.1.1.1 were
a result of an operational accident at DENIC, or whether they were an
indication of an attack, the implications of which DNSSEC would more properly
defend.
I kind of agree with you that it would be nice to have a more objective way to
make this decision. However, these kinds of operational mishaps are often the
result of a failure in process or infrastructure; I don't know that it's
reasonable to imagine that at a time of operational crisis we should expect
other processes or infrastructure intended to provide a clear signal to be
working or trustworthy. When it comes down to it, there's no substitute for a
functional personal network that allows you to get current information from
people you trust. This is the Internet's secret superpower.
We have a nice opportunity to talk more about this coming up in Edinburgh.
Joe
> On 11 May 2026, at 08:27, Carsten Strotmann <[email protected]> wrote:
>
> Hello Joe,
> Hello DNS-OARC people,
>
>> On 6 May 2026, at 1:16, Joe Abley via dns-operations wrote:
>>
>> In case it's useful to know, an NTA for the DE top-level domain was rolled
>> out on 1.1.1.1 at around 2026-05-05 22:20 UTC.
>>
>> We see well-signed responses from most (but not clearly all) DE
>> authoritative servers right now, but we plan to leave the NTA in place until
>> we have had a chance to coordinate with DENIC, in the interests of avoiding
>> surprises.
>
> I wonder how Cloudflare and others made the decision to activate a NTA during
> the incident.
>
> During the incident, to me looking from the outside (without contact to
> DeNIC), there was no clear indication whether the DNSSEC issues seen in the
> "de."-zone were caused by attack or misconfiguration (or did I miss
> something?).
>
> Prematurely activating a NTA in case of an attack on DNSSEC might cause harm
> for the internet at whole, esp. on a public DNS resolver used by a large
> percentage of Internet users.
>
> It would be helpful if operators of important DNSSEC signed zones (Root,
> TLDs, important infrastructure providers like Google, Microsoft, Cloudflare
> ...) publish a statement online where they explain how they will communicate
> publicly in case of an DNSSEC incident, esp. how and where they will inform
> about the root-cause of the issue.
>
> The operator of the failing DNSSEC signed zone is in the best spot to
> distinguish an attack from misconfiguration or misbehaving equipment. Once
> the operator of the failing DNSSEC secured namespace has ruled out an attack,
> this finding should be public as soon as possible to help people in the
> Internet to decide on activating a NTA.
>
> A public communication channel would also lower the amount of people trying
> to reach the operator to get first hand information on the incident, needed
> to be able to decide on the activation of an NTA.
>
> Maybe we need a central, trusted information hub for DNSSEC issue related
> information. ICANN? DNS-OARC? DNS-VIZ?
>
> I have no answers, just the feeling that something is missing, and last
> week's incident has made it visible that the DNSSEC puzzle not complete.
>
>
> Greetings
>
> Carsten Strotmann
>
>
--- End Message ---
_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations