I've read the draft. Overall it's pretty well written. I also personally support the idea of NTAs; although I see its side effect and the possibility of abuse, the draft seems to do its best to explain the implications and avoid abusing.
Here are some specific comments on the 01 version: - Section 8: Technical personnel trained in the operation of DNS servers MUST confirm that a failure is due to misconfiguration, as a similar breakage could have occurred if an attacker gained access to a domain's authoritative servers and modified those records or had the domain pointed to their own rogue authoritative servers. I agree with the sense of the statement, but specifically how can the operator confirm that it's misconfiguration? Cases like sending a bogus answer from an off-site attacker may be easier to distinguish (e.g. repeat the same query to the authoritative server by hand, maybe over TCP), but I guess such cases as compromised authoritative servers can be quite difficult to distinguish (or maybe impossible in some cases) from mere misconfiguration. It would help if it (maybe in the appendix) can provide example diagnosing techniques for such cases. - Also on that sense and this one in Section 8: Use of a Negative Trust Anchor MUST NOT be automatic. Again, I agree with the sense, but I wonder whether players like big ISPs or public DNS services are really willing to follow the suggestion of human intervention and/or ban of automation. In fact, with my biased impression it's quite surprising to me if Google really allows involving humans, not machines, in such cases:-) For these recommendations to be really effective rather than just ignored, I think we need to provide some more information, e.g., statistics on how often these events are happening in actual providers that use NTAs, show example of operational practices (which I guess would include some level of automation). - Also on Section 8: Finally, a Negative Trust Anchor SHOULD be used only in a specific domain or sub-domain and MUST NOT affect validation of other names up the authentication chain. I think it would also help clarify that the deepest anchor should be used, whether positive or negative. So, in the example diagram, if there's a (positive) trust anchor for sub.zone1.example.com, the NTA for zone1.example.com won't apply for sub.zone1.example.com, www.sub.zone1.example.com, etc (is my understanding correct?). It may look quite obvious, but I think it's worth noting. On a related note, there are some corner cases which may also be worth noting: queries for DS or DLV (or anything similar to that). So, for example, zone1.example.com/DS should still be validated even if there's an NTA for zone1.example.com. Again, this might sound obvious, but I think it's worthwhile. - Section 10 validates can have security considerations. It is therefore recommended that NTA implementors should periodically attempt to validate the domain in question, for the period of time that the I wonder whether this 'should' may better be SHOULD. Not a strong opinion, but it seems to be similar to other recommendations using the capitalized keyword in Section 8. - Section 12: a minor point, but it may be better to use "server failure" instead of SERVFAIL: this or other similarly intentionally broken domains should fail to resolve and should result in a SERVFAIL error. Even though this is a "de facto standard" technical term, I know some people hate it to be used in public documents as it's an "implementation-specific jargon". - Appendix A: not intending to endorse a particular implementation(s), but I'd suggest clarifying which specific implementations support various recommendations of the draft. For example, BIND 9 is quite diligently follow it while (if my memory is correct and it's still the case today) unbound's support is quite primitive and you cannot specify timeouts. I think it's important to avoid allowing lazy operators to just configure some NTAs and forget them. It would also encourage "lazy developers" to support full recommendations sooner. -- JINMEI, Tatuya _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop