Hi Murray, Hi Éric,
I have added Éric on CC because he also asked for a IANA registry for
catalog zones properties (which we have added).
Op 28-12-2022 om 23:29 schreef Murray Kucherawy via Datatracker:
(1) It's expected (required?), with no actions for IANA, to expressly include a
section that says so. It's conspicuously missing here.
We've added the section.
(2) Why is there no registry for custom properties? I can see that Section 4.5
takes a run at dealing with the collision risk by SHOULDing a particular way of
naming custom properties, but it feels to me like a registry is the right way
to deal with this. As a consumer of this work, I might not want to reveal (via
names) which DNS implementation I'm using, for example.
We (the co-authors) discussed this and do recognize that a registry for
*properties* is a good idea and have added that to the draft (with PR
https://github.com/NLnetLabs/draft-toorop-dnsop-dns-catalog-zones/pull/67 )
(3) I have a similar question about groups in Section 4.4.2; "nodnssec" is an
example of something that we might want to register with global semantics, or
more generally, that some values might be common in implementations and
therefore worth documenting.
Those group values are not for implementations, but for operators to
choose. We have done several modifications to clarify that:
- The group values now have non-descriptive names as to not suggest
that they have meanings in implementations (it's the operator that
determines the "meaning" and not the implementation)
- We have extended the lines about catalog producers publishing at
two consumer operators and how mapping of group values is a matter of
those producer/consumer relationships, so it now reads:
"Implementations MAY facilitate mapping of a specific group
value to specific configuration configurable on a per catalog zone basis
to allow for producers that publish their catalog zone at multiple
consumer operators. Consumer operators SHOULD namespace their group
values to reduce the risk of having to resolve clashes."
(4) Do we need a registry of names that are special in the context of catalog
zones, e.g., "zones", "ext", "group", "version", "coo", "invalid"?
We have added a registry for catalog zones properties, already
provisioned with "zones", "ext", "group", "version" and "coo".
The latest version of the IANA registry (including "zones") can be seen
here:
https://github.com/NLnetLabs/draft-toorop-dnsop-dns-catalog-zones/blob/master/draft-ietf-dnsop-dns-catalog-zones.md#iana-considerations-iana
"invalid" is already part of the "Special use domain names" registry:
https://www.iana.org/assignments/special-use-domain-names/special-use-domain-names.xhtml
Separately: What action should be taken if a nameserver is already
authoritative for a zone (say, is a primary), yet it receives a catalog update
that now contains that same zone? This seems like a possible attack that
should be discussed. I guess the second-last paragraph of Section 7 covers
this, though indirectly.
There is text for this in section 5.2:
"If there is a clash between an existing zone's name (either from
an existing member zone or otherwise configured zone) and an incoming
member zone's name (via transfer or update), the new instance of the
zone MUST be ignored and an error SHOULD be logged."
----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------
General:
Could I trouble you for an example of a complete sample catalog zone, perhaps
in BIND format, in an appendix? I can see each individual concept illustrated,
but it would be helpful to see them assembled someplace.
Ack. We've added a sample zone:
https://github.com/NLnetLabs/draft-toorop-dnsop-dns-catalog-zones/blob/master/draft-ietf-dnsop-dns-catalog-zones.md#catalog-zone-example
Section 3:
"Catalog consumers MUST ignore any RR in the catalog zone which is meaningless
to or otherwise not supported by the implementation" seems peculiar. Wouldn't
you do that anyway?
We thought it couldn't harm to repeat this for clarity. Some reviewers
"stumbled" over the word "meaningless" so we rephrased this to:
"Catalog consumers MUST ignore any RRs in the catalog zone for
which no processing is specified or which are otherwise not supported by
the implementation."
Section 4.1:
Given the text in Section 3 (specifically that a catalog zone follows the same
rules as any other zone), is this section needed? The third paragraph could be
its own differently-named section, but the rest seems redundant.
This has moved up and rephrased into one sentence:
"A catalog zone MUST follow the usual rules for DNS zones. In
particular, SOA and NS record sets MUST be present and adhere to
standard requirements (such as [RFC1982])"
Is that better?
Section 4.2:
The SHOULD at the end leaves implementers with a choice. Why might an
implementer choose to do something other than what it says? Or should this
really be a MUST?
As it is most likely that catalog producers and consumers hold the zone
authoritatively, TTLs shouldn't play a role as the records are not
cached anyway. However, we could imagine a catalog consumer processing
the catalog (or part of it) by performing queries. Such a consumer may
not have the choice to ignore TTLs when it is querying indirectly via a
resolver. SHOULD leaves the door open for other "kinds" of
implementations than we have now.
Section 4.3:
It doesn't say anywhere (unless I missed it) that the RRTYPEs of properties are
unspecified, and depend on the property. It might be good to make that
explicit, because I kept searching for it.
We said in the second half of the second sentence of the section:
"with type(s) as appropriate for the respective property."
We've changed "with type(s)" into "with RR types(s)" to make it clearer.
Section 4.4.1:
Regarding the last paragraph, is there any advice to pass on to operators about
how exactly one can tell when the COO is complete?
Not really without querying all the secondaries, but at least
secondaries will pick it up if they either lost the notify or were down.
I suppose monitoring the network status of the secondary provider and
making sure the whole network has been up for at least the refresh time
of the catalog zone ... and then a bit more, would be a safe bet, but
it's very much dependent on the specific operational reality.
Section 7:
Why are the protections of zone transfers and updates only SHOULDs?
It depends on the operational reality. Zone transfers may be using a
completely separate distribution network which is shielded from external
DNS access (with VPNs or UPDATES from an internal network or local
machine even). It is also not a MUST with zone transfers in general
which may also contain privacy sensitive or operational critical
information.
I plan to record all the changes that have been done in the Change
History appendix and then upload version -09 for rereview.
Best regards,
Willem Toorop on behalf of the draft-ietf-dnsop-dns-catalog-zones co-authors
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop