Re: [DNSOP] [dns-privacy] Qname minimization IPR

2014-10-25 Thread Stephane Bortzmeyer
[Copy to dnsop since the qname minimisation draft is now a WG item at
dnsop.]

On Thu, Oct 23, 2014 at 10:21:57AM -0700,
 David Conrad d...@virtualized.org wrote 
 a message of 56 lines which said:

 http://www.google.com/patents/EP266A1?cl=en

Well, some resolvers (the programs which will have to implement qname
m12n) are maintained in Europe (for instance Unbound) so they can
safely ignore these patents
http://en.wikipedia.org/wiki/Software_patents_under_the_European_Patent_Convention

Back to IETF issues: can someone who have read RFC 3979 more
thoroughly than me tell me if, as the draft author, I'm supposed to
file the IPR disclosure or is it up to Verisign employees?


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Fwd: New Version Notification for draft-livingood-dnsop-negative-trust-anchors-01.txt

2014-10-25 Thread Livingood, Jason
On 10/24/14, 6:06 PM, Doug Barton do...@dougbarton.us wrote:

But worse yet, in the operator error case you make such errors painless.
Instead, if they are painful (as in, screw up DNSSEC and you go off line)
then it leads to more people taking DNSSEC seriously, and doing it right.
Of course I realize that the counter-argument is that if DNSSEC fails are
too painful then people will simply not do it. But to the extent that
people use that as a line of reasoning it's simply one more in a long
string of excuses.

I think we¹re seeing a collision of how we¹d like the world to work and
how it actually works. ;-) Operators are on the front lines here; trust us
on the realities of getting stuff like this deployed.

While I totally get  110% agree that when someone screws up their auth
records they should feel the pain - and that this pain is a signal to do
it better/right the next time - the reality is that the real pain is felt
by the DNS operator. Of course I am going to pains to point out who is
really to blame here:
http://tools.ietf.org/html/draft-livingood-dnsop-auth-dnssec-mistakes-00


Anyway, if a popular domain like google.com or facebook.com or netflix.com
was to sign - and then made a mistake - the call centers of an validating
operator would pretty much melt down. It wouldn¹t matter that we were not
to blame, we¹d feel the pain and people would be angry at us. There¹d be
pressure to Œmake the pain stop¹ (and associated costs). Oh - and these
days in the U.S. we¹d probably be blamed for ³blocking access² to the site
- violating net neutrality (that the facts would say otherwise wouldn¹t
matter**).

So - two choices - turn off DNSSEC validation for ALL domains or just the
one affected (assuming you can prove out it is a mistake and not an
attack). Which one is worse?

The market has already answered that: Negative Trust Anchors - turn it off
in as narrow a case as possible. The question for us here is whether we
wish to acknowledge this reality or pretend it does not exist. ;-)

The other problem is that this feature is only really useful in the
DNSSEC ramp-up period. Sure, mistakes are more common now, software is
immature, etc. etc. But if DNSSEC is successful, the software will get
better (it already is a lot better than even a few years ago), and
mistakes will be less common (both on an absolute, and on a percentage
basis). But once you introduce a feature like this, you cannot remove it.

We address the timeframe issue in the draft. Certainly you are correct
that the feature is still there afterwards, but of course the feature
already exists today so the genie is out of the bottle as they say.

So can we please let the functionality of DNSSEC stand as designed, and
not give people a giant trapdoor that they can trigger at the slightest
sign of trouble? Otherwise, why bother?

I wouldn¹t say that it is at the Œslightest¹ sign of trouble. This is
intended for use when there are major problems. Turning this around:
DNSSEC deployment only got as far as it did to date because of NTAs.
Without NTAs, I don¹t believe it¹ll go much further. So do we want to help
the world understand what it takes to push ahead with DNSSEC?

... and of course, I should point out that adding this as a knob is
utterly pointless, since any reasonably competent validating resolver
operator can engineer their own trapdoor.

Yes - we all decided the way to do it was with a Negative Trust Anchor.
That¹s what the draft documents. ;-)

- Jason Livingood



** From the discussion above (scroll back up to refresh your memory). A
good recent example is a claim by some anonymous poster in a Reddit thread
that Comcast was blocking Tor. Within hours it went viral and was posted
to major news sites, never mind that it wasn¹t true. I posted
http://corporate.comcast.com/comcast-voices/setting-the-record-straight-on-
tor and yet still to this day there are tweets and reposts about how we
block Tor, pointing back to the original news articles. I can¹t wait for
what will happen when a major domain breaks if a NTA did not exist.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New Version Notification for draft-livingood-dnsop-negative-trust-anchors-01.txt

2014-10-25 Thread David Conrad
Doug,

On Oct 24, 2014, at 3:06 PM, Doug Barton do...@dougbarton.us wrote:
 I know that there will be some philosophical objections / discussions on 
 this...
 
 It's not just a philosophical objection, it's an operational one. When DNSSEC 
 fails for a domain there are 2 main reasons. Operator error, and an actual 
 MITM or similar attack.

In these early days of DNSSEC deployment, we've seen numerous occasions in 
which the first has applied. Can you provide URLs to the cases where the second 
has applied?

 If the operators of validating resolvers simply turn off validation for 
 domains that should be validating but are not,* it kicks the door open for 
 the exact problem that DNSSEC was designed to solve.

In the cases I'm aware of when an actual attack that DNSSEC was designed to 
solve has occurred, there are artifacts in logs. I would presume network 
operators would, when they get notified that a domain isn't validating, check 
those logs in their process to determine what's going on. If they notice the 
artifacts, I suspect they won't install an NTA.

 But worse yet, in the operator error case you make such errors painless.

Only if you believe there will be universal and instantaneous deployment of 
NTAs any time the zone operator screws up. I suspect this unlikely.

 Of course I realize that the counter-argument is that if DNSSEC fails are too 
 painful then people will simply not do it. But to the extent that people use 
 that as a line of reasoning it's simply one more in a long string of excuses.

No. It is an acceptance of the operational reality that, at least today, the 
most common failure mode (by far) is for zone operators to screw up and the 
remedy for that other person screwing up is to either tell the resolver 
operators' customers sorry, the guys at auth zone made a booboo and you 
can't talk to them as long as you use our resolver or turning validation off 
for ALL zones.

If a zone is sufficiently popular that a resolver operator gets multiple calls 
when it doesn't validate because the zone's operated boobooed, the resolver 
operator _will_ turn off validation.  Do that enough times and I suspect it 
becomes questionable whether they'll bother to turn it on again. 

 The other problem is that this feature is only really useful in the DNSSEC 
 ramp-up period. Sure, mistakes are more common now, software is immature, 
 etc. etc. But if DNSSEC is successful, the software will get better (it 
 already is a lot better than even a few years ago), and mistakes will be less 
 common (both on an absolute, and on a percentage basis). But once you 
 introduce a feature like this, you cannot remove it.

You seem to believe that installing NTAs is without cost. First, it requires 
operator intervention in response to a notification. Second, I believe it opens 
the resolver operator up to liability -- by installing an NTA, they are, by 
direct intervention of their staff, purposefully defeating a protection that 
they explicitly configured that puts all of their customers at risk. The longer 
the NTA is left in place, the greater the risk.

 ... and of course, I should point out that adding this as a knob is utterly 
 pointless, since any reasonably competent validating resolver operator can 
 engineer their own trapdoor.


Since not all validating resolvers support NTAs, if you want to supply text, 
I'd support adding a section describing alternative approaches to implementing 
NTA functionality.

Regards,
-drc



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [dns-privacy] Qname minimization IPR

2014-10-25 Thread Ted Lemon
On Oct 25, 2014, at 5:24 AM, Stephane Bortzmeyer bortzme...@nic.fr wrote:
 Back to IETF issues: can someone who have read RFC 3979 more
 thoroughly than me tell me if, as the draft author, I'm supposed to
 file the IPR disclosure or is it up to Verisign employees?

You should, not must, file a third-party disclosure; you could ask Danny 
McPherson to file one so you don't have to, but one way or another the IPR 
disclosure needs to happen so people don't step on a land mine.   You are not 
obligated by the note well to do this--it's just the right thing to do, IMHO.   
Of course, now that we all know about it, anyone who's read this mail could in 
principle file the third-party disclosure.   And also if anyone from Verisign 
is participating, they are required to disclose, because after this discussion 
they should be aware of the patent even if they weren't previously.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [dns-privacy] Qname minimization IPR

2014-10-25 Thread Stephen Farrell


On 25/10/14 15:56, Ted Lemon wrote:
 And also if anyone from Verisign is participating, they are required to 
 disclose,

Well, only if they think that the IPR is relevant. Their claims
(I've not read 'em) could after all be unrelated to the draft,
e.g. if they've only claimed some madly complicated way of getting
the same effect as just leaving stuff out (which no doubt the
USPTO might still, in their infinite wisdom, consider patentable;-).

S.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Possible slower response with minimization

2014-10-25 Thread Stephane Bortzmeyer
On Mon, Oct 20, 2014 at 05:26:29PM -0400,
 Phillip Hallam-Baker hal...@gmail.com wrote 
 a message of 74 lines which said:

 If we are going there, I would want to know how common the
 configurations are.

Yes, actual numbers seen from a real resolver would be useful.

 Outside this list how common are hierarchies more than 4 levels deep
 in practice?

ip6.arpa, and other infrastructure domains?

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Possible slower response with minimization

2014-10-25 Thread Stephane Bortzmeyer
On Mon, Oct 20, 2014 at 05:03:19PM -0400,
 Bob Harold rharo...@umich.edu wrote 
 a message of 135 lines which said:

 With minimization:

Besides the fact that it is true only for a cold cache (as mentioned
by others in this thread), it depends on how minimisation is
implemented. One possible way is aggressive minimisation (the
algorithm you describe), but another one is lazy minimisation
(sending the full qname at the beginning and learning the zone cuts,
then switching to minimisation). If it is realistic (I did not analyze
the idea in detail), lazy minimisation will bring less privacy but
will improve performances.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [dns-privacy] Qname minimization IPR

2014-10-25 Thread Phillip Hallam-Baker
The claims are broad, not specific to one field of use.

But there isn't a patent yet and they may have been waiting to file after
grant.

It is possible for someone other than the IPR holder to file but best if
its the IPR holder.

The mere existence of a patent does not necessarily mean an intention to
enforce.


On Sat, Oct 25, 2014 at 11:51 AM, Stephen Farrell stephen.farr...@cs.tcd.ie
 wrote:



 On 25/10/14 15:56, Ted Lemon wrote:
  And also if anyone from Verisign is participating, they are required to
 disclose,

 Well, only if they think that the IPR is relevant. Their claims
 (I've not read 'em) could after all be unrelated to the draft,
 e.g. if they've only claimed some madly complicated way of getting
 the same effect as just leaving stuff out (which no doubt the
 USPTO might still, in their infinite wisdom, consider patentable;-).

 S.

 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Possible slower response with minimization

2014-10-25 Thread Stephane Bortzmeyer
On Tue, Oct 21, 2014 at 02:14:49PM +0900,
 Masataka Ohta mo...@necom830.hpcl.titech.ac.jp wrote 
 a message of 27 lines which said:

 As the choice between privacy and latency is on resolver side,
 moderate latency is not harmful.

I fully agree. Qname minimisation is an _unilateral_ decision. Any
resolver can make its own trade-off, depending on its administrator's
choices.

dataminimisation: on|off (programmers, pick the best default value)

 Right, NXDOMAIN returned by some broken implementation to
 empty non-terminals MUST NOT be interpreted that the
 terminals does not exist.

Full agreement again and I suggest everyone to consider
draft-vixie-dnsext-resimprove-00, section 3 (an useful thing for qname
minimisation but also against current random qnames attacks
https://indico.dns-oarc.net//contributionDisplay.py?contribId=37sessionId=3confId=20).



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [dns-privacy] Qname minimization IPR

2014-10-25 Thread Rubens Kuhl

 On Oct 25, 2014, at 2:03 PM, Phillip Hallam-Baker ph...@hallambaker.com 
 wrote:
 
 The claims are broad, not specific to one field of use.
 
 But there isn't a patent yet and they may have been waiting to file after 
 grant.
 
 It is possible for someone other than the IPR holder to file but best if its 
 the IPR holder.
 
 The mere existence of a patent does not necessarily mean an intention to 
 enforce. 
  

Verisign has been telling its investors that they have intention to enforce and 
monetize patents. Excerpts from their SEC filings and investor calls can be 
found at:

http://domainnamewire.com/2013/01/25/heads-up-competing-registries-verisign-might-start-asserting-its-patents/
 
http://domainnamewire.com/2013/01/25/heads-up-competing-registries-verisign-might-start-asserting-its-patents/
http://domainnamewire.com/2014/09/24/verisigns-standards-group-patents/ 
http://domainnamewire.com/2014/09/24/verisigns-standards-group-patents/


Rubens



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [dns-privacy] Qname minimization IPR

2014-10-25 Thread Paul Vixie


 Stephane Bortzmeyer mailto:bortzme...@nic.fr
 Saturday, October 25, 2014 2:24 AM
 [Copy to dnsop since the qname minimisation draft is now a WG item at
 dnsop.]

 On Thu, Oct 23, 2014 at 10:21:57AM -0700,
 David Conrad d...@virtualized.org wrote

 http://www.google.com/patents/EP266A1?cl=en

importantly, google's policy is to use patents only in defense. i've
requested that they make that explicit in the case of this particular
patent, but, that's a small detail. i believe that query minimization
should proceed as though this patent did not exist, for the good of the
internet economy. (if it fails to reach consensus that's a different
matter, but, let it not be because of this patent.)

-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [dns-privacy] Qname minimization IPR

2014-10-25 Thread Phillip Hallam-Baker
Paul,

It is a VeriSign patent, its just being shown on the Google patent serach
engine

On Sat, Oct 25, 2014 at 1:53 PM, Paul Vixie p...@redbarn.org wrote:



   Stephane Bortzmeyer bortzme...@nic.fr
  Saturday, October 25, 2014 2:24 AM
 [Copy to dnsop since the qname minimisation draft is now a WG item at
 dnsop.]

 On Thu, Oct 23, 2014 at 10:21:57AM -0700,
 David Conrad d...@virtualized.org d...@virtualized.org wrote

 http://www.google.com/patents/EP266A1?cl=en


 importantly, google's policy is to use patents only in defense. i've
 requested that they make that explicit in the case of this particular
 patent, but, that's a small detail. i believe that query minimization
 should proceed as though this patent did not exist, for the good of the
 internet economy. (if it fails to reach consensus that's a different
 matter, but, let it not be because of this patent.)

 --
 Paul Vixie

 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [dns-privacy] Qname minimization IPR

2014-10-25 Thread Paul Hoffman
On Oct 25, 2014, at 10:53 AM, Paul Vixie p...@redbarn.org wrote:
 http://www.google.com/patents/EP266A1?cl=en 
 http://www.google.com/patents/EP266A1?cl=en
 
 importantly, google's policy is to use patents only in defense. i've 
 requested that they make that explicit in the case of this particular patent, 
 but, that's a small detail.

1) It is a patent application, not a patent.
2) The application was filed by Verisign, not Google.

--Paul Hoffman
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Possible slower response with minimization

2014-10-25 Thread Paul Vixie


 Stephane Bortzmeyer mailto:bortzme...@nic.fr
 Saturday, October 25, 2014 9:05 AM
 On Tue, Oct 21, 2014 at 02:14:49PM +0900,
  Masataka Ohta mo...@necom830.hpcl.titech.ac.jp wrote 
  a message of 27 lines which said:


 Right, NXDOMAIN returned by some broken implementation to
 empty non-terminals MUST NOT be interpreted that the
 terminals does not exist.

i disagree with this. broken implementations who emit NXDOMAIN for empty
non-terminals cannot be used as an excuse not to develop and deploy
correct protocol and software enhancements. the internet has hundreds of
years to run yet, and these broken implementations are (a) shrinking not
growing, and (b) subject to rapid replacement when they start to
encounter problems with correct enhancements to their habitat.

 Full agreement again and I suggest everyone to consider
 draft-vixie-dnsext-resimprove-00, section 3 (an useful thing for qname
 minimisation but also against current random qnames attacks
 https://indico.dns-oarc.net//contributionDisplay.py?contribId=37sessionId=3confId=20).

stephane, i believe you misunderstood the sense of ohta-san's remarks.


-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [dns-privacy] Qname minimization IPR

2014-10-25 Thread Paul Vixie


 Paul Hoffman mailto:paul.hoff...@vpnc.org
 Saturday, October 25, 2014 11:06 AM

 1) It is a patent application, not a patent.
 2) The application was filed by Verisign, not Google.

 --Paul Hoffman

thanks. however, i was told google also has one on Q-M. that's the one i
thought this thread referred to.

if verisign tries to enforce their patent against google, i will buy
popcorn, sit back, and watch.

i do not believe that verisign's interests are aligned with enforcement
of a patent like this one.

verisign should be asked to place a defense-only status on this patent.
i think they will do so.

-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Possible slower response with minimization

2014-10-25 Thread Stephane Bortzmeyer
On Sat, Oct 25, 2014 at 06:05:16PM +0200,
 Stephane Bortzmeyer bortzme...@nic.fr wrote 
 a message of 24 lines which said:

  Right, NXDOMAIN returned by some broken implementation to
  empty non-terminals MUST NOT be interpreted that the
  terminals does not exist.
 
 Full agreement again 

Paul Vixie was right, I've read your sentence too fast. I focused on
the broken implementation part (on which we agree, these
implementations are awfully broken) and missed the meaning of the
double negation. So, to rephrase it, my opinion is:

NXDOMAIN returned by some broken implementation to empty non-terminals
is a bug. A NXDOMAIN MUST be interpreted as the node in the domain
tree, AND ALL ITS SUBNODES, do not exist.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Fwd: New Version Notification for draft-livingood-dnsop-negative-trust-anchors-01.txt

2014-10-25 Thread Warren Kumari
On Sat, Oct 25, 2014 at 3:30 PM, Paul Ebersman list-dn...@dragon.net wrote:

 dougb It's not just a philosophical objection, it's an operational
 dougb one. When DNSSEC fails for a domain there are 2 main
 dougb reasons. Operator error, and an actual MITM or similar attack. If
 dougb the operators of validating resolvers simply turn off validation
 dougb for domains that should be validating but are not,* it kicks the
 dougb door open for the exact problem that DNSSEC was designed to
 dougb solve.

 Have you actually read through the new draft? It specifically prohibits
 automatic installation of NTAs and says that you should have folks
 familiar with operating DNS servers making any decisions.

 That isn't painless. It means that this skips past all 1st tier and gets
 to senior engineers. Don't know about you but I hate getting on-call
 problems caused by someone else that I have no direct way to fix but
 that my customers beat me for.

... or that your customers move away because of...
http://forums.comcast.com/t5/Basic-Internet-Connectivity-And/Re-Weather-Gov-DNS/td-p/1175625
http://www.dslreports.com/forum/remark,25180845?hilite=dns
http://forums.comcast.com/t5/Basic-Internet-Connectivity-And/Comcast-DNS-can-t-won-t-find-state-gov-sites-How-do-I-report/td-p/1824503



 And that's way more expensive than standard help desk...

 But it is a good way to make sure that this isn't a constant and knee
 jerk reaction but an operationally sane one.

 dougb The other problem is that this feature is only really useful in
 dougb the DNSSEC ramp-up period. Sure, mistakes are more common now,
 dougb software is immature, etc. etc. But if DNSSEC is successful, the
 dougb software will get better (it already is a lot better than even a
 dougb few years ago), and mistakes will be less common (both on an
 dougb absolute, and on a percentage basis). But once you introduce a
 dougb feature like this, you cannot remove it.



... but you don't have to remove it. If  DNSSEC is successful, the
software will get better (it already is a lot better than even a
few years ago), and mistakes will be less common then there will be
no need to install NTAs.


 Sure. It will only be temporary/fast. Like rolling out IPv6. Or getting
 all the broken CPEs using old dnsmasq and being open resolvers. Or
 getting folks to roll out BCP38.

 How long have we been trying to get folks to use DNSSEC?

... a long time...

 How far are we?

not far enough...

 And why do we keep insisting that only by painful and expensive
 suffering will we do it correctly?

Not a clue. This is like saying that airbags and selt-belts are a bad
idea in cars -- if we didn't have them, people would learn to drive
more carefully[0]. This is potentially true, but... seriously...

W

[0]: This inserted somewhat so that I can trot out my current favorite quote:
Analogies are like bicycles: It doesn’t matter how many marbles it takes to
fill the outhouse, telco execs will always be making silly metaphors
 — Patrik Gilmore.





 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop