From: Wes Hardaker <wjh...@hardakers.net> Ben Schwartz <bemasc=40meta....@dmarc.ietf.org> writes:
A few comments: 1. the MUST NOT in the first paragraph in 5.2 really feels like it should be a SHOULD NOT. Though its not wise, there could be scenarios where someone really wants to do it and if they feel it's operationally possible then they should be allowed to. In general, my view is that compliance with the mandatory requirements should be sufficient for interoperability. If this requirement is not mandatory, that creates an interoperability problem with the next paragraph's rule that "service operators MAY reject TLS connections whose SNI does not correspond to an approved TLSA base domain". [I had a really hard time writing this, as I think you're right about the importance, but we do try to opt for SHOULD NOTs unless it always breaks something] Personally, I tend to think that things that reliably break in some visible way don't really need normative language, because implementors will figure out that it's broken. "MUST NOT" is most important when the problem is subtle, systemic, or delayed, as in this case. Also, note that there is an escape hatch here ("unless they have an explicit arrangement ..."), so this is really not a technical requirement, and what constitutes such an arrangement is open to interpretation. 2. in the security considerations, the first sentence in the second paragraph seems like it should have a solid requirement in it. Maybe "The SVCB and associated TLSA records MUST be validated by DNSSEC." And this is one of those cases where the MUST feels right as it significantly degrades the security of the protocol if only a SHOULD is used. As such, I'd drop the rest of the paragraph. We avoided this requirement for two reasons, both somewhat related to ADoT: 1. Unsigned TLSA records do exist (e.g. dns:_853._tcp.a.ns.facebook.com?type=TLSA) and provide some security benefit in situations where (a) full authentication is not well-defined or widely deployed and (b) the attacker is on the application path but not on the DNS path. 2. There have been some Authenticated ADoT proposals that rely at least in part on transport security rather than DNSSEC. We used the phrase "resolved securely" to avoid prejudging that discussion. --Ben
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop