On Wed, Oct 19, 2022 at 12:22 PM Tim Wicinski <tjw.i...@gmail.com> wrote:

>
>
> This starts a Working Group Last Call for
> draft-ietf-dnsop-dnssec-validator-requirements
>
> Current versions of the draft is available here:
>
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-validator-requirements/
>
> The Current Intended Status of this document is: Informational
>
> Please review the draft and offer relevant comments.
> If this does not seem appropriate please speak out.
> If someone feels the document is *not* ready for publication, please speak
> out with your reasons.
>
> This starts a two week Working Group Last Call process, and ends on:  2
> November 2022
>
>
Here are some suggested additions to the document, both general, and where
appropriate, more specific in nature.

It may seem obvious to those familiar with operating DNS servers (resolvers
and authority servers), especially in the context of DNSSEC, but given
recent operation experience, I think the following need to be highlighted
explicitly, possibly in a new section (e.g. immediately after section 12 in
the document):

DNSSEC validation requires that the validator is able to reliably obtain
necessary records, especially DNSKEY records. This should be done at
initial configuration, and tested periodically.

This means the validator MUST ensure it is configured so that the UDP and
TCP transports, and DNS resolver components, are compatible with the
network paths that the majority of DNS queries traverse.

In other words, make sure that:

   - DNS UDP bufsize (EDNS parameter) is set to a value compatible with
   network MTUs the queries and responses will encounter.
      - If the validator advertises a bufsize >> MTU, responses with the DF
      bit set and response size R where MTU < R <= bufsize will be
dropped by any
      router with MTU < R.
   - The validator's OS TCP configuration has its advertised MSS set to a
   value compatible with network MTUs the queries and responses will encounter.
      - Having an advertised MSS set to a value < MTU ensures that Path MTU
      Discovery is not required
      - If PMTUD fails for any reason, or if the server responding does not
      maintain or use PMTUD, and advertised MSS > MTU at any point in the path,
      TCP may encounter problems caused by IP fragmentation and reassembly.
      - This is particularly relevant if there are any NAT type devices in
      the path, as those may not properly handle fragmentation and reassembly
      - If all TCP segments are smaller than the path MTU, TCP will work
      reliably.

We (GoDaddy) recently investigated a number of problems where the root
cause was one or more of the above situations.
While we have adjusted some of the server-side parameters, those can only
accommodate clients within an acceptable range of MTUs that we anticipate
will occur.
The avoidance of fragmentation in order to address known
fragmentation-related security issues with DNS (leading to cache poisoning,
for example) has resulted in the need to set the DF bit on UDP.
Validators will need to ensure their local environment can reliably get any
critical DNSSEC records (notably DNSKEY) over UDP, or reliably get
responses with TC=1 if overly large responses cannot be sent over UDP due
to answers not fitting within the advertised bufsize payload.
Validators also need to ensure TCP works if it is needed, for the same
situations.

Brian
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to