A couple of reactions to this message:

On 11/27/17, 10:10, "DNSOP on behalf of Richard Barnes" <dnsop-boun...@ietf.org 
on behalf of r...@ipv.sx> wrote:

> [one] should know better than to claim that a mechanism that requires 
> resolver updates will have "immediate benefit" :)

I have been impressed by the impact of "Signaling Trust Anchor Knowledge in DNS 
Security Extensions (DNSSEC)".  Although the document was published in April, 
it seems that it has worked its way into operating servers quite quickly.  I 
see this as a testament to operators being able to pull off tech-refreshes more 
quickly as time progresses.  That is one aspect of this I am walking away with.

But "benefit."?  One can debate the benefit of the quickly adopted mechanism.  
There's a lot of uncertainty in what is being seen, that is what I mean.  Not 
meaning to demean the new mechanism, it does raise concerns about new proposals 
- which may also come with uncertainty.

I recall a conversation from early in 2015, when I lamented the lack of 
feedback related to Automated Updates (RFC 5011's mechanism).  I was told that 
if we had something, given a lack of a baseline, we would get confused with the 
results.  Later, the "Signaling Trust Anchor Knowledge..." effort (RFC 8145) 
began and, well, that prophecy has been fulfilled.

That's not a failure, just a learning curve.  I'd not label it a failure as it 
hasn't lessened where we are, it has helped lead more investigation even if it 
hasn't given us something we fully understand yet.

>wrong architecture for the long run.

I'm unsure of that.  I commented earlier that having the query/response 
mechanism be something the operator of the trust anchor store (connected to a 
DNSSEC validator that is part of a DNS cache, etc.) can use is a good first 
step.  In the constrained use case of "me owning the test target" (by owning, I 
mean credentials to access the configuration files of the target) there's a lot 
we can get from a query/response mechanism.  With that, whatever can be 
generalized for a replying party to glean and then report via a higher-layer 
test would be good.

A (as opposed to "the") test harness (the higher-layer) could then be designed 
a few different ways.  Describing the one the draft has in mind is a good idea, 
what I mean is that there could be other ways.  I can understand reluctance to 
accept a particular way to perform the test, but to throw out the under layer 
with that bathwater isn't the best way to go.

I had originally set out to agree with the "wrong architecture" for this reason 
though - I'd wish that there was a better description of managing secure entry 
points and trust anchors along the lines of a three-way handshake protocol.  
This begins with - how does a trust anchor manager know that it should be 
managing (pinning) keys for a domain, etc.?  I'm not sure we can get there 
though.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to