> On 30 Mar 2022, at 00:28, Peter Thomassen <pe...@desec.io> wrote:
> 
> 
> 
> On 3/28/22 20:34, Mark Andrews wrote:
>> About the only part not already specified is matching DS to DNSKEY using 
>> PRIVATEDNS but as you can see it is obvious to anyone with a little bit of 
>> cryptographic understanding.
> 
> That creates problems plus complexity, which I find very undesirable. 
> Orthogonality trumps complexity.
> 
> For example, zones need to have a DNSKEY for each signing algorithm given in 
> the DS record set. I would expect most implementations to currently only look 
> at the algorithm number in this context, and not at the 253/254 algorithm 
> identifier.

And if they don’t implement any PRIVATEDNS or PRIVATEOID algorithm this is 
EXACTLY the correct behaviour.

> Of course, a dedicated document may clarify this, but I don't see how this is 
> less complex than assigning experimental algorithm numbers. All DNSSEC 
> software out there would have to implement it, test/maintain it etc. This 
> does not only apply to resolver software; think of application-level 
> libraries like dnspython etc.

This is like all the cries of “think of the children”.  Adding support to look 
for a domain names at the start of the
key data in code that already extract domain names from packets should be a no 
brainer for any piece of DNSSEC software.

> There will also be implementations which don't care to implement such 
> "private algorithm peeking". For those, algorithm handling would not be 
> ensured in the same way as it is for non-253/254 algorithms.

Then they would be broken which by the way is why you run experiment.  

> Further, if someone actually *is* using private 253/254 algorithms in 
> production, any experiments would not be structurally independent from 
> potential such private use cases. Giving the little confidence that all DNS 
> software would implement "253/254 algorithm disentanglement" correctly, 
> private-algo zone owners may be hesitant to run any experiments at all.

If someone is using PRIVATEDNS or PRIVATEOID then they should be following 
rules for using that code point.  Are the experiments that use deliberately 
broken DNSSEC zone “structurally” independent?  

> Last, I'm not convinced that running a PQ algorithm (or other) experiment to 
> test (non-supporting) resolvers' behavior should require controlling a domain 
> name or OID (as is required for 253/254).

So rather than that you want to have to deal with potential colliding use of 
code points without identifiers.  That is
far worse than having to deal with PRIVATEDNS and PRIVATEOID as then you do get 
false validation failures.  You can’t
reliably clean up experimental code points, especially if there are a lot of 
implementations.  DNS has a long tail.
With PRIVATEDNS and PRIVATEOID you don’t need to cleanup the old code when the 
experiment is over, you just choose a
new name / OID for the next experiment.

To reliably run the experiments one is going to have to have a magic number for 
each algorithm embedded in the key data
and check it.  We have two code points that this do this already.  We don’t 
need anymore.

> These concerns bring us back to Nils' comment that 253/254 is not a good 
> basis for performing research and doing real-life experiments.
> 
> 
> The above headaches would be in addition to the effort of writing the 
> clarification document, whereas Paul's proposal requires just the document.

DNSSEC RFC say check the algorithm for a match.  They do not say check the 
number.  PRIVATEDNS and PRIVATEOID are sub typed
and checking of those fields was always required once you implemented an 
algorithm in those spaces.

> I therefore support the assignment of experimental algorithm numbers, and I 
> think the text should mandate that they MUST be treated as unknown and have 
> no special processing, unlike private ones.

Stop calling for polluting of the commons.  We can’t properly cleanup after 
using experimental code points.  We have 2
mechanisms that contain the pollution to a point (name/oid) for each 
experimental algorithim and we should use them.
This is good engineering.

> Best,
> Peter
> 
> -- 
> https://desec.io/

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to