Re: [DNSOP] Call for Adoption: draft-hardaker-dnsop-nsec3-guidance

2021-05-10 Thread Paul Wouters

On Mon, 10 May 2021, Benno Overeinder wrote:

Now we will start a period of two weeks for the call for adoption of 
draft-hardaker-dnsop-nsec3-guidance on the mailing list.


The draft is available here: 
https://datatracker.ietf.org/doc/draft-hardaker-dnsop-nsec3-guidance/.


Please review this draft to see if you think it is suitable for adoption by 
DNSOP, and comments to the list, clearly stating your view.


Please adopt. Willing to review and contribute text.

I think what is missing is a discussion of online signing with nsec3
white lies - it does make it harder to brute force since you can't
grab the full chain of hashed names.

Paul

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] ZONEMD was Re: [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Mark Andrews


> On 11 May 2021, at 09:20, Paul Hoffman  wrote:
> 
> On May 10, 2021, at 4:14 PM, Mark Andrews  wrote:
>> Actually, the process problem is that record format keeps changing AFTER the 
>> code point has been assigned and the record format THEORETICALLY been FIXED.
> 
> Mark makes an excellent point, one that people in the DNS world routinely 
> forget.

Just for reference ZONEMD switched two fields between 
draft-wessels-dns-zone-digest-05.txt and
RFC 8976.  "Digest Type | Reserved” -> "Scheme | Hash Algorithm”.  This 
resulted in BIND rejecting
zones with ZONEMD records using SHA-512 digests (digest field has the wrong 
length for Digest Type 1).
Renaming fields is fine.  Reordering/repurposing non reserved isn’t as it 
breaks stuff.  Now we are
making BIND compatible with RFC 8976 but we should never have been put in this 
position.

> --Paul Hoffman___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Brian Dickson
On Mon, May 10, 2021 at 9:58 AM Ben Schwartz  wrote:

> I don't support breaking the SvcParams into separate RRs across the
> RRSet.  This would be an extremely inefficient encoding in wire format, and
> would conflict with the usual understanding of resource records as
> independently meaningful alternatives.
>
> [snip]


> To see why I favor two-pass, consider a SvcParam whose wire format value
> is defined to be CBOR, represented as JSON in the zone file.  JSON is
> defined as UTF-16, and allows strings containing any character from the
> Basic Multilingual Plane.  It also allows various kinds of backslash
> escaping including " \" " for quotes within strings, and "\uD834\uDD1E"
> for extended unicode codepoints.  A one-pass parser must somehow integrate
> this into the flow of zone file parsing.  The easiest way is to simply
> disable all RFC1035-style escapes and line-breaks for the duration of the
> SvcParamValue, but this is a major breach of standard zone file practice,
> and raises questions about how to store UTF-16 characters in a zone file.
> Alternatively, we could somehow combine both RFC1035 and JSON escaping, but
> if this is even possible, it would seem to require writing a new
> RFC1035+JSON hybrid parser.  I also think these behaviors would be
> confusing to users, who would have to try to understand how this new
> integrated escaping works in order to author zone files containing either
> kind of escape.
>

[snip]

Let me ask what is probably a really leading question, in terms of the
semantics for SVCB (and HTTPS).
If I understand the draft in its current form, the goal is to be able to
encode and parse some DNS RRset in such a way as it lets you obtain, in one
fell swoop (but possibly multiple passes for parsing) everything needed to
obtain:
- A well-ordered list of one or more targets, where each target has a set
of attributes.
- The examples currently show RRsets with multiple distinct Priority values
- However, the words indicate that it is permissible for two RRs in the set
to have the same Priority value.
- The effect is having an array of objects, each of which has a priority,
name, and optional set of key/value pairs (where values can be lists).

So, I have a proposed solution that will make the parsing, and generation
of post-parsing JSON objects as close to trivial as possible.
This borrows heavily from what Joe Abley already wrote. I'm just taking the
concept to its (il)logical conclusion.

Encode everything using the following mechanism:
Priority Enumeration Key Value
One of the "Keys" would be Target, with a corresponding Value of FQDN.
All of the records with the same value for "enumeration" belong together,
and form a single SvcParameter list.
For the AliasForm, both the Priority and Enumeration would be 0, and only a
single Target,Value pair are permitted.

To take one example from the draft, and re-encode it thusly:
 $ORIGIN svc.example. ; A hosting provider.
pool  7200 IN HTTPS 1 h3pool alpn=h2,h3 ech="123..."
  HTTPS 2 .  alpn=h2 ech="abc..."
pool   300 IN A192.0.2.2
   2001:db8::2
h3pool 300 IN A192.0.2.3
   2001:db8::3

This would become (for brevity, encoding just a list of RDATA values for
all of the "pool HTTPS" records):
1 1 target "h3pool"
1 1 alpn "h2,h3"
1 1 ech "123..."
2 2 target "."
2 2 alpn "h2"
2 2 ech "abc..."


I think this is likely a lot easier to parse, and to convert into whatever
form your ALPN-handling stuff wants (including JSON).
I is also very close to trivial to write a JSON -> Zone File
transliterator, so user input in JSON (which meets the JSON structure
expected) can be handled, and even bidirectionally allow Zone File -> JSON
for user editing of already-existent entries.

For the example above;
If the priority of both of the above were the same, they would be all "1 1
..." and "1 2 ..." instead of "1 1 ..." and "2 2 ...".
If my JSON isn't horribly bad, I think this would get converted into:
 [ { "name" : "h3pool", "priority" : 1, "SvcParams" : { "alpn" : "h2,h3",
"ech" : "123..." } }, ...]

IMNSHO, it'll be faster to discard any existing parsing code, and embrace
this as the Zone File format (and wire format) going forward.

Hope this is helpful to the discussion.

Brian
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Paul Hoffman
On May 10, 2021, at 4:14 PM, Mark Andrews  wrote:
> Actually, the process problem is that record format keeps changing AFTER the 
> code point has been assigned and the record format THEORETICALLY been FIXED.

Mark makes an excellent point, one that people in the DNS world routinely 
forget. 

--Paul Hoffman

smime.p7s
Description: S/MIME cryptographic signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Mark Andrews



> On 11 May 2021, at 08:46, Paul Hoffman  wrote:
> 
> On May 10, 2021, at 9:56 AM, Ben Schwartz 
>  wrote:
>> 
>> I don't support breaking the SvcParams into separate RRs across the RRSet.  
>> This would be an extremely inefficient encoding in wire format, and would 
>> conflict with the usual understanding of resource records as independently 
>> meaningful alternatives.  
> 
> Fully agree. It is a large change in the DNS protocol for a receiver to have 
> to internally group multiple RRs based on matching (priorty | target) tuples 
> and make security decisions based on the group, not on the record.
> 
>> It would also require a dramatic rewrite of a specification that is now 
>> widely deployed.
> 
> Er, screw that. The fact that some developers deployed this even though it 
> hadn't even completed WG last call, much less had a wider IETF review, is a 
> problem for those developers to solve.

Actually, the process problem is that record format keeps changing AFTER the 
code point has been assigned and the record format THEORETICALLY been FIXED.  
When you go down the template route for code point assignment that FIXES
the wire and presentation formats.

A. Submission Date:  2020-06-18

B.1 Submission Type:  [ X ] New RRTYPE  [ ] Modification to RRTYPE
B.2 Kind of RR:  [ X ] Data RR  [ ] Meta-RR

C. Contact Information for submitter (will be publicly posted):
   Name: Erik Nygren
   Email Address: erik+ietf&nygren.org
   International telephone number:  +1 617 444 3938
   Other contact handles:

D. Motivation for the new RRTYPE application.
   Please keep this part at a high level to inform the Expert and
   reviewers about uses of the RRTYPE.  Most reviewers will be DNS
   experts that may have limited knowledge of your application space.

   The "HTTPS" DNS RR type facilitates the lookup of information
   needed to make connections for origin resources, such as for HTTPS
   URLs.  HTTPS RRs allow an origin to be served from multiple network
   locations, each with associated parameters (such as transport
   protocol configuration and keys for encrypting the TLS
   ClientHello).  They also enable aliasing of apex domains, which is
   not possible with CNAME.  By providing more information to the
   client before it attempts to establish a connection, these records
   offer potential benefits to both performance and privacy.
   For example, the presence of an HTTPS RR indicates that clients
   should upgrade insecure "http" URLs to secure "https" URLs prior
   to establishing a connection.
   

E. Description of the proposed RR type.
   This description can be provided in-line in the template, as an
   attachment, or with a publicly available URL.

   See https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-svcb-https-00
   
F. What existing RRTYPE or RRTYPEs come closest to filling that need
   and why are they unsatisfactory?

   (from I-D.draft-ietf-dnsop-svcb-https-00 #appendix-A)

   The SRV record [RFC2782] can perform a similar function to the SVCB
   record, informing a client to look in a different location for a
   service.  However, there are several differences:
   o  SRV records are typically mandatory, whereas clients will always
  continue to function correctly without making use of HTTPS RRs.
   o  SRV records cannot instruct the client to switch or upgrade
  protocols, whereas HTTPS RRs can signal such an upgrade (e.g.. to
  HTTP/2).
   o  SRV records are not extensible, whereas HTTPS RRs can be
  extended with new parameters, such as for
  TLS Encrypted Client Hello keys.

G. What mnemonic is requested for the new RRTYPE (optional)?

   HTTPS

H. Does the requested RRTYPE make use of any existing IANA registry
   or require the creation of a new IANA subregistry in DNS
   Parameters?  If so, please indicate which registry is to be used
   or created.  If a new subregistry is needed, specify the
   allocation policy for it and its initial contents.  Also include
   what the modification procedures will be.

   Yes, per I-D.draft-ietf-dnsop-svcb-https-00#section-12:

   * Create a new "Service Binding (SVCB) Parameter Registry"
 with an initial population of entries.  This would
 be shared with the SVCB RR type.
   * Add an _https entry to the  DNS Underscore
 Global Scoped Entry Registry.

I. Does the proposal require/expect any changes in DNS
   servers/resolvers that prevent the new type from being processed
   as an unknown RRTYPE (see [RFC3597])?

   No.  While DNS servers and resolvers may perform performance
   optimizations described in the I-D, these are optional
   and do not preclude processing as an unknown RRTYPE.

J. Comments:

   The plan is to bring draft-ietf-dnsop-svcb-https to Working Group
   Last Call during Summer 2020.  A early code point allocation
   for the SVCB RRtype and HTTPS RRtype is requested to enable interop
   testing between multiple implementations that are in-progress.


>> As for the question of commas, I contin

Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Stephen Farrell


Hiya,

Without commenting on the rest of the discussion (though
I do agree with those who made the point that optimising
for those writing zone files here is better than for
those parsing zone files)...

On 10/05/2021 17:56, Ben Schwartz wrote:

It would also require a dramatic rewrite of a
specification that is now widely deployed.


I'm not aware this is widely deployed. To be fair I mostly
care about deployments that support ECH and so far I know
of 2 of those. There may be more doing HTTPS or SVCB but
not ECH I guess. If so, I'd find it valuable to see a list
of those so I can get a sense of the variability to be
seen in HTTPS/SVCB deployments.

So - can you provide some backup for that claim of being
widely deployed that might help me see how folks are choosing
to deploy?

Thanks,
S.



OpenPGP_0x5AB2FAF17B172BEA.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Paul Hoffman
On May 10, 2021, at 9:56 AM, Ben Schwartz  
wrote:
> 
> I don't support breaking the SvcParams into separate RRs across the RRSet.  
> This would be an extremely inefficient encoding in wire format, and would 
> conflict with the usual understanding of resource records as independently 
> meaningful alternatives.  

Fully agree. It is a large change in the DNS protocol for a receiver to have to 
internally group multiple RRs based on matching (priorty | target) tuples and 
make security decisions based on the group, not on the record.

> It would also require a dramatic rewrite of a specification that is now 
> widely deployed.

Er, screw that. The fact that some developers deployed this even though it 
hadn't even completed WG last call, much less had a wider IETF review, is a 
problem for those developers to solve.

> As for the question of commas, I continue to believe that the current text is 
> preferable.  I believe that the behavior Dick is advocating for is in fact 
> the one that was present in the draft until -02 [1], changed here [2].  We 
> changed this text after receiving complaints from WG members that the 
> algorithm as specified was too complicated, along with my own experiences 
> attempting to implement it in multiple codebases that apply char-string 
> decoding during or before tokenization.

This is central to the problem of SVCB: it is more complex than traditional DNS 
RRtypes, and different developers have different views of what would make it 
simpler for them to implement and/or simpler for zone operators to type into 
zone files.

I hope Dick's proposed simple addition is useful. I'm not a developer, and I 
don't write into zones very often, but I suspect that "it's all in one record 
that has an addition to the parsing" will be easier and safer to implement than 
"the receiver has to handle groups of records in a new way".

--Paul Hoffman

smime.p7s
Description: S/MIME cryptographic signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Mark Andrews



> On 11 May 2021, at 02:56, Ben Schwartz  
> wrote:
> 
> I don't support breaking the SvcParams into separate RRs across the RRSet.  
> This would be an extremely inefficient encoding in wire format, and would 
> conflict with the usual understanding of resource records as independently 
> meaningful alternatives.  It would also require a dramatic rewrite of a 
> specification that is now widely deployed.
> 
> As for the question of commas, I continue to believe that the current text is 
> preferable.  I believe that the behavior Dick is advocating for is in fact 
> the one that was present in the draft until -02 [1], changed here [2].  We 
> changed this text after receiving complaints from WG members that the 
> algorithm as specified was too complicated, along with my own experiences 
> attempting to implement it in multiple codebases that apply char-string 
> decoding during or before tokenization.
> 
> The key question is: how is the zone file parsing supposed to work?  I see 
> two main options:
> 
> One-pass (draft-02):
> 1. Read the key name up to an "="
> 2. Load a parser whose behavior depends on the key name
> 3. Feed this parser characters from the zone file until it declares 
> completion or error
> 
> Two-pass (more recent drafts):
> 1. Read the key name up to an "="
> 2. Parse the value as a char-string
> 3. Pass the char-string parser output to the a key-specific parser for deeper 
> processing
> 
> In one-pass parsing, comma-separated value (CSV) lists are like dot-separated 
> domain names: first-class entities whose delimiter escaping is fully 
> integrated into the parsing.  In two-pass parsing, CSV format is an 
> implementation detail of particular SvcParam registrations, encoded as data 
> inside plain char-strings in the zone file.
> 
> To see why I favor two-pass, consider a SvcParam whose wire format value is 
> defined to be CBOR, represented as JSON in the zone file.  JSON is defined as 
> UTF-16, and allows strings containing any character from the Basic 
> Multilingual Plane.  It also allows various kinds of backslash escaping 
> including " \" " for quotes within strings, and "\uD834\uDD1E" for extended 
> unicode codepoints.  A one-pass parser must somehow integrate this into the 
> flow of zone file parsing.  The easiest way is to simply disable all 
> RFC1035-style escapes and line-breaks for the duration of the SvcParamValue, 
> but this is a major breach of standard zone file practice, and raises 
> questions about how to store UTF-16 characters in a zone file.  
> Alternatively, we could somehow combine both RFC1035 and JSON escaping, but 
> if this is even possible, it would seem to require writing a new RFC1035+JSON 
> hybrid parser.  I also think these behaviors would be confusing to users, who 
> would have to try to understand how thi
 s new integrated escaping works in order to author zone files containing 
either kind of escape.

Yet you fail to mention that the following

3. Encoding
   
   JSON text SHALL be encoded in Unicode.  The default encoding is
   UTF-8.

The UTF-16 JSON strings values are encoded as UTF-8.  UTF-8 in zone files 
usually ends up being \DDD for non-ASCII and ASCII control octets once it has 
gone from text -> wire -> text to put everything into ASCII printable.  Zone 
files are ASCII documents.  If you are using the values in other contexts you 
may convert the
wire forms differently.

> In two-pass parsing, this is trivial.  One simply parses the value as a 
> char-string, and feeds the output to a JSON parser.  The resulting 
> double-escaping may be unattractive, but is commonplace when working with 
> structured data inside a string.
> 
> Another point in favor of two-pass parsing: it makes unknown keys "value 
> errors" instead of "syntax errors".  In one-pass parsing, when the parser 
> encounters an unrecognized SvcParamKey, it must stop and fail immediately.  
> It cannot proceed, because it cannot even continue tokenizing.
> 
> [1] 
> https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-svcb-https-02#appendix-A.1
> [2] https://github.com/MikeBishop/dns-alt-svc/pull/282
> 
> 
> On Mon, May 10, 2021 at 8:35 AM Joe Abley  wrote:
> Hi Pieter,
> 
> On 10 May 2021, at 11:23, Pieter Lexis  wrote:
> 
>> You then invite the following issues:
>> 
>> Clients need to match the tuple (ownername + prio + target) and get all
>> data from all matched rrsets, whereas now you get all that data in one
>> piece of rdata.
> 
> Inviting that issue is also a potential benefit, but I agree that the 
> implication exists. For example, the ability to publish sets of SvcParams 
> with long TTLs ought to increase the probability of cache hits for that data 
> and reduce SVCB response sizes.
> 
>> A client also can't figure out (if not doing DNSSEC valdiation
>> themselves) if you have received all the SVC data for a certain name.
> 
> A client can't figure out without DNSSEC whether anything they have received 
> is correct in, in general. So setting a

Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Paul Wouters

On Mon, 10 May 2021, Ben Schwartz wrote:


It would also require a dramatic rewrite of a specification that is now widely 
deployed.


The IETF is not a rubber-stamp factory for corporate proposals though.

The tendency for corporation to bring up something at the IETF that is
"too far gone" for modifications during the IETF process as a trend
is worrying, and does make me personally feel less sympathetic towards
those kind of deployments.

Did you reach out to SecDir for an early review request? I cannot find
anything in the SecDir archives related to HTTPSVC or SVCB.

DNS records have been using _prefix labels for a while now to split up
RR information to be more specific related to targetted DNS requests.
This RR type is unfortunately not using that, and thus the complexity
and securtity issues are popping up now.


To see why I favor two-pass, consider a SvcParam whose wire format value is 
defined to be CBOR, represented as JSON in the zone file.  JSON is defined as 
UTF-16, and allows strings
containing any character from the Basic Multilingual Plane.  It also allows various kinds of backslash 
escaping including " \" " for quotes within strings, and "\uD834\uDD1E" for
extended unicode codepoints.  A one-pass parser must somehow integrate this 
into the flow of zone file parsing.  The easiest way is to simply disable all 
RFC1035-style escapes


Or to simply disable all JSON/COBR/UTF-16 et all ? Do we really need
emoticons in our transport definitions ?


I also think these behaviors would be confusing to users, who would have to try 
to understand how this new integrated escaping works in order to author zone 
files


If that is the main argument, what's wrong with plain ascii limitations?

Anyway, I think this issue deserves a full discussion, without taking
into account the current wide deployment. Also bacause everything out
there that does not support SVCB also continues to work, so it is not
the end of the world if SVCB needs to go through some changes. But
as Mr.Abley said (and I paraphrase) "we can burn an RR type allocation
easilly".

Paul

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of new EDNS opcode "rrserial"

2021-05-10 Thread Peter van Dijk
On Mon, 2021-05-10 at 22:09 +0100, Tony Finch wrote:
> Peter van Dijk  wrote:
> > Also in section 3.2, I do not think responding with the option should
> > be limited to NOERROR. Specifically, I'd very much also want it to work
> > for NXDOMAIN,
> 
> Isn't the SOA record usually present in a negative response?

Good point! In that case, I retract most of that and suggest the draft
points out that in those cases, a serial can be extracted anyway. That
said, I'm not sure that's a reason to skip including the option in the
response.

> and I can imagine some cases of it being useful even in SERVFAIL cases
> > (at least in database-driven name servers like PowerDNS, where
> > individual records inside a zone can be broken).
> 
> Perhaps also in cases where the server has a copy of zone serial number
> NNN but it has expired.

+1
 
Kind regards,
-- 
Peter van Dijk
PowerDNS.COM BV - https://www.powerdns.com/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of new EDNS opcode "rrserial"

2021-05-10 Thread Tony Finch
Peter van Dijk  wrote:
>
> Also in section 3.2, I do not think responding with the option should
> be limited to NOERROR. Specifically, I'd very much also want it to work
> for NXDOMAIN,

Isn't the SOA record usually present in a negative response?

> and I can imagine some cases of it being useful even in SERVFAIL cases
> (at least in database-driven name servers like PowerDNS, where
> individual records inside a zone can be broken).

Perhaps also in cases where the server has a copy of zone serial number
NNN but it has expired.

Tony.
-- 
f.anthony.n.finchhttps://dotat.at/
Viking, North Utsire: Cyclonic 6 to gale 8, becoming southerly 3 to 5.
Moderate or rough, becoming moderate in North Utsire. Rain, fog
patches. Moderate or good, occasionally very poor.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Paul Wouters

On Mon, 10 May 2021, Joe Abley wrote:


   $ORIGIN example.com
   @   SVCB   1 foo
key6="\032\001\013\184\000\000\000\000\000\000\000\000,\000"
   ; a.k.a.   ipv6hint=2001:db8::5c5c:2c00


A zone owner/editor would never even think of typing in IP addresses
like that.


Right, but an attacker who wants to take advantage of the impact of that 
observation in the construction of some parser might, which is why it's a 
security concern.


Some DN / RDN / CN parsing tools have hthis issue too and some allow a
comma with an additional masking comma, eg  OU=testing,,security, O=Mayhem

Then other code can just never ever allow masking, double masking,
backslshing, single or double quotes or what not.

Paul

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Call for Adoption: draft-hardaker-dnsop-nsec3-guidance

2021-05-10 Thread Paul Wouters

On Mon, 10 May 2021, Olafur Gudmundsson wrote:

I guess I support the document but would like it to say 
“Please do not use NSEC3 but if you have to use NSEC3 use it use these settings”


The document should point how trivial it is to expose most names in NSEC3 
signed zone using Graphics cards and dictionaries.


But it should also then say something about opt-out, which might be
harder to agree on (imho: "really, we have the RAM/CPU/SSD/DISK now, you
should not use opt-out")

Paul

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of new EDNS opcode "rrserial"

2021-05-10 Thread Peter van Dijk
On Mon, 2021-05-10 at 12:37 -0400, Hugo Salgado wrote:
> Hello everyone. Thanks for the comments, I just uploaded an unchanged
> version (just to revive it) at:
>   https://datatracker.ietf.org/doc/draft-salgado-dnsop-RRSERIAL/

Thanks Hugo, that is useful.

In section 3.2, 'the resource record of the ANSWER section' is
ambiguous. The answer section can contain many resource record
(s/sets). I suggest a reference to 'QNAME (original)' from RFC8499, or
a careful copy of the words in that definition.

Also in section 3.2, I do not think responding with the option should
be limited to NOERROR. Specifically, I'd very much also want it to work
for NXDOMAIN, and I can imagine some cases of it being useful even in
SERVFAIL cases (at least in database-driven name servers like PowerDNS,
where individual records inside a zone can be broken).

> I agree RRSERIAL doesn't have much relevance in zones that don't give
> serial versioning a meaning to its content. We can add a paragraph
> about it, to make the applicability more clear.

I agree, and I do not think this is a reason to not have this feature.

> I also don't think we
> should start to "deprecate" the SOA serial meaning at this point.
> One can say that "modern" implementations using complex backends makes
> SOA serials irrelevant, but there's certainly a use case for classic
> and mainly static behavior. Just as NSID adds an "infrastructure"
> identification dimension to a response, RRSERIAL adds the data
> versioning dimension.

+1

> And responding to the comment that having multi-queries is better, is
> something that is long overdue, and would certainly make this hack
> obsolete. 

Multi-query has not happened. I doubt it will happen. And in fact,
mapping this specific use case onto it would limit implementations. I
can imagine multi-query being implemented in some proxy/frontend, that
sends out parallel queries to 'simpler' auths that do not even know
about multi-query, and then the atomicity is gone.

> Other issues that I think need more analysis is deciding whether it
> makes any sense to expose RRSERIAL in resolvers. The original idea was
> only in authoritatives, but it might make some sense to debug in
> resolvers as well, to somehow identify the "data source" of a cached
> record. In this sense, I fear an increase in cache requirements of
> resolvers, which should somehow maintain the extra data; and also
> in traffic and option availability for upstream auths.

To expose it in resolvers, resolvers would have to set the option on
all their outgoing queries, so that they can remember the serial
involved in each RRset that they got. I don't think this puts a big
burden on storage requirements, but adding EDNS options to all your
resolver-to-auth traffic is always a gamble, finding out which auths
will suddenly return SERVFAIL, or REFUSED, or just drop your query -
or, in some observed cases, tell you NXDOMAIN because they're confused.
Now, those auths are wrong, and should not exist, but I trust there
will be some reluctance in deployments.

That said, supporting this feature in resolvers does not require any
changes to the protocol itself; the EDNS option, as your draft
currently defines it, looks fine to me. Of course, if the document does
want to support the resolver case, it should explain what that means.

(Unrelated to anything above, I can see reasons to put the whole SOA in
there instead of just the serial; this also reinvokes the 'why not put
it in AUTHORITY or ADDITIONAL' question, but I really like the short
EDNS option that does not change the processing of any RRsets from a
query response.)

Kind regards,
-- 
Peter van Dijk
PowerDNS.COM BV - https://www.powerdns.com/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Call for Adoption: draft-hardaker-dnsop-nsec3-guidance

2021-05-10 Thread Brian Dickson
On Mon, May 10, 2021 at 12:07 PM Peter van Dijk 
wrote:

> On Mon, 2021-05-10 at 10:55 +0200, Benno Overeinder wrote:
> > The draft is available here:
> > https://datatracker.ietf.org/doc/draft-hardaker-dnsop-nsec3-guidance/.
> >
> > Please review this draft to see if you think it is suitable for adoption
> > by DNSOP, and comments to the list, clearly stating your view.
> >
> > Please also indicate if you are willing to contribute text, review, etc.
>
> I support adoption of this draft, and am willing to review and
> contribute text (in fact, I have already done so at small scale).
>
> I think the draft really deserves some text on when not to use NSEC3 at
> all (i.e. when to pick NSEC instead) and I would be happy to contribute
> that too, if nobody beats me to it.
>
>
I support adoption of this draft, and concur with what Peter says
(regarding NSEC).

I'm willing to review and as time permits, contribute text.

Brian
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Peter van Dijk
On Mon, 2021-05-10 at 16:43 +0200, Pieter Lexis wrote:
> Hi Dick,
> 
> On 5/10/21 1:02 PM, Dick Franks wrote:
> > My objection is narrowly focussed on the escape mechanism, nothing
> > more.  Changing the delimiter is neither necessary nor relevant.
> > 
> > I am happy to contribute the necessary words.
> 
> If you have the words to fix this issue that would need to changes the
> code but clears everything up, do it :).

I would like to clarify that Pieter meant 'need no changes to the code'.

:-)
 
Kind regards,
-- 
Peter van Dijk
PowerDNS.COM BV - https://www.powerdns.com/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Call for Adoption: draft-hardaker-dnsop-nsec3-guidance

2021-05-10 Thread Olafur Gudmundsson
I guess I support the document but would like it to say 
“Please do not use NSEC3 but if you have to use NSEC3 use it use these settings”

The document should point how trivial it is to expose most names in NSEC3 
signed zone using Graphics cards and dictionaries. 

Olafur



> On May 10, 2021, at 1:20 PM, Tony Finch  wrote:
> 
> Benno Overeinder  wrote:
>> 
>> https://datatracker.ietf.org/doc/draft-hardaker-dnsop-nsec3-guidance/.
> 
> Yes, this is a helpful document that should be adopted by dnsop. I'm happy
> to review etc.
> 
> Tony.
> -- 
> f.anthony.n.finchhttps://dotat.at/
> Biscay: Southwest 3 to 5 increasing 5 to 7. Rough, occasionally
> moderate in east, becoming very rough in west. Thundery showers. Good,
> occasionally poor.
> 
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Call for Adoption: draft-hardaker-dnsop-nsec3-guidance

2021-05-10 Thread Peter van Dijk
On Mon, 2021-05-10 at 10:55 +0200, Benno Overeinder wrote:
> The draft is available here: 
> https://datatracker.ietf.org/doc/draft-hardaker-dnsop-nsec3-guidance/.
> 
> Please review this draft to see if you think it is suitable for adoption 
> by DNSOP, and comments to the list, clearly stating your view.
> 
> Please also indicate if you are willing to contribute text, review, etc.

I support adoption of this draft, and am willing to review and
contribute text (in fact, I have already done so at small scale).

I think the draft really deserves some text on when not to use NSEC3 at
all (i.e. when to pick NSEC instead) and I would be happy to contribute
that too, if nobody beats me to it.

Kind regards,
-- 
Peter van Dijk
PowerDNS.COM BV - https://www.powerdns.com/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Call for Adoption: draft-hardaker-dnsop-nsec3-guidance

2021-05-10 Thread Vladimír Čunát
I like the document, but the section on validators recommends not to 
follow requirements from RFC 5155, so I don't expect that best-practice 
track is sufficient.  And I do think we need a similar update to 5155, 
be it in this document or a separate one.


I'd also expect something on limits accepted by secondaries.  And some 
details are probably up to further discussion (e.g. particular numbers 
and SERVFAIL), but I don't think such details would block adoption.


--Vladimir | knot-resolver.cz


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Call for Adoption: draft-hardaker-dnsop-nsec3-guidance

2021-05-10 Thread Daniel Migault
I support the adoption of the document.
Yours,
Daniel

On Mon, May 10, 2021 at 1:21 PM Tony Finch  wrote:

> Benno Overeinder  wrote:
> >
> > https://datatracker.ietf.org/doc/draft-hardaker-dnsop-nsec3-guidance/.
>
> Yes, this is a helpful document that should be adopted by dnsop. I'm happy
> to review etc.
>
> Tony.
> --
> f.anthony.n.finchhttps://dotat.at/
> Biscay: Southwest 3 to 5 increasing 5 to 7. Rough, occasionally
> moderate in east, becoming very rough in west. Thundery showers. Good,
> occasionally poor.
>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>


-- 
Daniel Migault
Ericsson
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Call for Adoption: draft-hardaker-dnsop-nsec3-guidance

2021-05-10 Thread Tony Finch
Benno Overeinder  wrote:
>
> https://datatracker.ietf.org/doc/draft-hardaker-dnsop-nsec3-guidance/.

Yes, this is a helpful document that should be adopted by dnsop. I'm happy
to review etc.

Tony.
-- 
f.anthony.n.finchhttps://dotat.at/
Biscay: Southwest 3 to 5 increasing 5 to 7. Rough, occasionally
moderate in east, becoming very rough in west. Thundery showers. Good,
occasionally poor.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Joe Abley
Hi Ben,

On 10 May 2021, at 12:56, Ben Schwartz  wrote:

> I don't support breaking the SvcParams into separate RRs across the RRSet.  
> This would be an extremely inefficient encoding in wire format,

I think that assertion may well be worth challenging, and...

> and would conflict with the usual understanding of resource records as 
> independently meaningful alternatives.

... I think we disagree about how we usually interpret the use of RRSets with 
more than one member RR.

>  It would also require a dramatic rewrite of a specification that is now 
> widely deployed.

However, this seems clear (see my earlier horse/sailed comment). Given that the 
draft semantics of SVCB have already seen some implementation, any new 
semantics would need a new RRType (SVCC? :-)

I admit I have a certain aesthetic bias here since I find the entire concept of 
embedding a list of parameters inside a single RR to be very un-DNS-like. 
However, I found Mr Wouter's concerns (paraphrasing, "perhaps we should 
pre-allocate a set of CVE numbers for this") worth considering, and would hope 
that if there is a reason to burn the current RRType on security grounds (or 
any grounds more compelling than aesthetic) that we would do so.


Joe


signature.asc
Description: Message signed with OpenPGP
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of new EDNS opcode "rrserial"

2021-05-10 Thread Mauricio Vergara Ereche
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

I agree with what Hugo said

I would also like to point out that this draft spirit is aiming to be a
debugging tool to be used by humans and not in between servers. If we start
introducing all these new use cases in-between servers (like authoritatives
signaling secondaries or resolvers storing new data) it would add an
inmense amount of complexity that might be out of scope at the moment.

Would it be simpler to progress with this as a read-only way to query an
authoritative server in an atomic way for what's the current status of a
record? I guess if we agree on that, we could expand on a better
description or explanation to reflect such intention.

Mauricio

- --
Mauricio Vergara Ereche
keybase.io/mave

On 2021-05-10 at 16:37, hsalg...@nic.cl wrote:
> Hello everyone. Thanks for the comments, I just uploaded an unchanged
> version (just to revive it) at:
>   https://datatracker.ietf.org/doc/draft-salgado-dnsop-RRSERIAL/
>
> I agree RRSERIAL doesn't have much relevance in zones that don't give
> serial versioning a meaning to its content. We can add a paragraph
> about it, to make the applicability more clear. I also don't think we
> should start to "deprecate" the SOA serial meaning at this point.
> One can say that "modern" implementations using complex backends makes
> SOA serials irrelevant, but there's certainly a use case for classic
> and mainly static behavior. Just as NSID adds an "infrastructure"
> identification dimension to a response, RRSERIAL adds the data
> versioning dimension.
>
> And responding to the comment that having multi-queries is better, is
> something that is long overdue, and would certainly make this hack
> obsolete. But I think the multi-query issues are so complex that it's
> worth moving forward incrementally in the meantime. For the same
> reason, I think we could aim for it to have "experimental" status at
> the start, and after a few years we measure it to see its use and we
> can adapt or change it to standard or deprecate it in favor of another
> qtype.
>
> Other issues that I think need more analysis is deciding whether it
> makes any sense to expose RRSERIAL in resolvers. The original idea was
> only in authoritatives, but it might make some sense to debug in
> resolvers as well, to somehow identify the "data source" of a cached
> record. In this sense, I fear an increase in cache requirements of
> resolvers, which should somehow maintain the extra data; and also
> in traffic and option availability for upstream auths.
>
> Hugo
>
>
> On 12:47 07/05, Hugo Salgado wrote:
> > I'll upload a new version to revive it, and ask for a slot
> > in IETF111 for further discussion!
> >
> > Thanks,
> >
> > Hugo
> >
> > On 22:02 06/05, Mauricio Vergara Ereche wrote:
> > > Hi Hugo,
> > >
> > > I just want to bring back to life this topic as it solves an issue
that
> > > several operators (like me) seem to be in need to solve while
debugging
> > > issues.
> > >
> > > Mauricio
> > >
> > > On Mon, Jan 27, 2020 at 7:09 AM Hugo Salgado  wrote:
> > >
> > > > Dear DNSOPers, as an operator I tend to have this need to couple
> > > > an answer for a query to an auth server, with the actual "SOA zone
> > > > version" used. So I think it'll be valuable to have an EDNS option
> > > > for it.
> > > >
> > > > Here I'm proposing it with this new draft. The 'camel index' for
> > > > its implementation/hack/proof-of-concept is about 37 lines in
> > > > NSD 4.1 (more details in Appendix A).
> > > >
> > > > I've asked some operators and they see value on it. Is there any
> > > > support for adoption in DNSOP?
> > > >
> > > > -
> > > > Name:   draft-salgado-rrserial
> > > > Revision:   01
> > > > Title:  The "RRSERIAL" EDNS option for the SOA serial of a
RR's
> > > > zone
> > > > Document date:  2020-01-27
> > > > Group:  Individual Submission
> > > > Pages:  5
> > > > URL:
> > > > https://www.ietf.org/internet-drafts/draft-salgado-rrserial-01.txt
> > > > Status:
https://datatracker.ietf.org/doc/draft-salgado-rrserial/
> > > > Htmlized:
https://tools.ietf.org/html/draft-salgado-rrserial-01
> > > > Htmlized:
> > > > https://datatracker.ietf.org/doc/html/draft-salgado-rrserial
> > > > Diff:
> > > > https://www.ietf.org/rfcdiff?url2=draft-salgado-rrserial-01
> > > >
> > > > Abstract:
> > > >The "RRSERIAL" EDNS option allows a DNS querier to ask a DNS
> > > >authoritative server to add a EDNS option in the answer of such
query
> > > >with the SOA serial number field of the origin zone which
contains
> > > >the answered resource record.
> > > >
> > > >This "RRSERIAL" data allows to debug problems and diagnosis by
> > > >helping to recognize the origin of an answer, associating this
answer
> > > >with a respective zone version.
> > > > -
> > > >
> > > > Best,
> > > >
> > > > Hugo Salgado
> > > >
> > > > ___
> > > > DNSOP mailing list
> > > > DNSOP

Re: [DNSOP] Adoption of new EDNS opcode "rrserial"

2021-05-10 Thread Joe Abley
Hi Vladimir,

On 10 May 2021, at 04:32, Vladimír Čunát  wrote:

> On 10. 05. 21 10:19, Petr Špaček wrote:
>> I think the proper solution should be a real multi-query option, which 
>> incidentally provides a superset of RRSERIAL capabilities.
> 
> If multi-queries require the records being in sync (if from the same zone), I 
> really dislike the implications of them being sent to resolvers, especially 
> for many questions at once.  Caching, in particular.

Yes, I agree with that. Perhaps we could specify that a request for an RRSERIAL 
MUST only be satisfied for a response with AA=1, so that only servers that are 
able to provide an authoritative response to the original query will return it.

In contrast, I think there are probably use cases for a server that can't 
provide an authoritative response (e.g. a recursive server) to process a more 
generic multi-question query. So this seems like a reason to consider the two 
problem statements separately. I don't know exactly what use cases Petr had in 
mind for that though, so I'm guessing slightly.


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of new EDNS opcode "rrserial"

2021-05-10 Thread Hugo Salgado
Hello everyone. Thanks for the comments, I just uploaded an unchanged
version (just to revive it) at:
  https://datatracker.ietf.org/doc/draft-salgado-dnsop-RRSERIAL/

I agree RRSERIAL doesn't have much relevance in zones that don't give
serial versioning a meaning to its content. We can add a paragraph
about it, to make the applicability more clear. I also don't think we
should start to "deprecate" the SOA serial meaning at this point.
One can say that "modern" implementations using complex backends makes
SOA serials irrelevant, but there's certainly a use case for classic
and mainly static behavior. Just as NSID adds an "infrastructure"
identification dimension to a response, RRSERIAL adds the data
versioning dimension.

And responding to the comment that having multi-queries is better, is
something that is long overdue, and would certainly make this hack
obsolete. But I think the multi-query issues are so complex that it's
worth moving forward incrementally in the meantime. For the same
reason, I think we could aim for it to have "experimental" status at
the start, and after a few years we measure it to see its use and we
can adapt or change it to standard or deprecate it in favor of another
qtype.

Other issues that I think need more analysis is deciding whether it
makes any sense to expose RRSERIAL in resolvers. The original idea was
only in authoritatives, but it might make some sense to debug in
resolvers as well, to somehow identify the "data source" of a cached
record. In this sense, I fear an increase in cache requirements of
resolvers, which should somehow maintain the extra data; and also
in traffic and option availability for upstream auths.

Hugo


On 12:47 07/05, Hugo Salgado wrote:
> I'll upload a new version to revive it, and ask for a slot
> in IETF111 for further discussion!
> 
> Thanks,
> 
> Hugo
> 
> On 22:02 06/05, Mauricio Vergara Ereche wrote:
> > Hi Hugo,
> > 
> > I just want to bring back to life this topic as it solves an issue that
> > several operators (like me) seem to be in need to solve while debugging
> > issues.
> > 
> > Mauricio
> > 
> > On Mon, Jan 27, 2020 at 7:09 AM Hugo Salgado  wrote:
> > 
> > > Dear DNSOPers, as an operator I tend to have this need to couple
> > > an answer for a query to an auth server, with the actual "SOA zone
> > > version" used. So I think it'll be valuable to have an EDNS option
> > > for it.
> > >
> > > Here I'm proposing it with this new draft. The 'camel index' for
> > > its implementation/hack/proof-of-concept is about 37 lines in
> > > NSD 4.1 (more details in Appendix A).
> > >
> > > I've asked some operators and they see value on it. Is there any
> > > support for adoption in DNSOP?
> > >
> > > -
> > > Name:   draft-salgado-rrserial
> > > Revision:   01
> > > Title:  The "RRSERIAL" EDNS option for the SOA serial of a RR's
> > > zone
> > > Document date:  2020-01-27
> > > Group:  Individual Submission
> > > Pages:  5
> > > URL:
> > > https://www.ietf.org/internet-drafts/draft-salgado-rrserial-01.txt
> > > Status: https://datatracker.ietf.org/doc/draft-salgado-rrserial/
> > > Htmlized:   https://tools.ietf.org/html/draft-salgado-rrserial-01
> > > Htmlized:
> > > https://datatracker.ietf.org/doc/html/draft-salgado-rrserial
> > > Diff:
> > > https://www.ietf.org/rfcdiff?url2=draft-salgado-rrserial-01
> > >
> > > Abstract:
> > >The "RRSERIAL" EDNS option allows a DNS querier to ask a DNS
> > >authoritative server to add a EDNS option in the answer of such query
> > >with the SOA serial number field of the origin zone which contains
> > >the answered resource record.
> > >
> > >This "RRSERIAL" data allows to debug problems and diagnosis by
> > >helping to recognize the origin of an answer, associating this answer
> > >with a respective zone version.
> > > -
> > >
> > > Best,
> > >
> > > Hugo Salgado
> > >
> > > ___
> > > DNSOP mailing list
> > > DNSOP@ietf.org
> > > https://www.ietf.org/mailman/listinfo/dnsop
> > >
> > 
> > 
> > -- 
> > Mauricio Vergara Ereche
> > keybase.io/mave



> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop



signature.asc
Description: PGP signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Last Call: (YANG Types for DNS Classes and Resource Record Types) to Proposed Standard

2021-05-10 Thread The IESG


The IESG has received a request from the Domain Name System Operations WG
(dnsop) to consider the following document: - 'YANG Types for DNS Classes and
Resource Record Types'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2021-05-24. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document introduces the YANG module "iana-dns-class-rr-type"
   that contains derived types reflecting two IANA registries: DNS
   CLASSes and Resource Record (RR) TYPEs.  These YANG types are
   intended as a minimum basis for future data modeling work.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-dnsop-iana-class-type-yang/



No IPR declarations have been submitted directly on this I-D.





___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Joe Abley
Hi Pieter,

On 10 May 2021, at 11:23, Pieter Lexis  wrote:

> You then invite the following issues:
> 
> Clients need to match the tuple (ownername + prio + target) and get all
> data from all matched rrsets, whereas now you get all that data in one
> piece of rdata.

Inviting that issue is also a potential benefit, but I agree that the 
implication exists. For example, the ability to publish sets of SvcParams with 
long TTLs ought to increase the probability of cache hits for that data and 
reduce SVCB response sizes.

> A client also can't figure out (if not doing DNSSEC valdiation
> themselves) if you have received all the SVC data for a certain name.

A client can't figure out without DNSSEC whether anything they have received is 
correct in, in general. So setting aside that more general authentication 
problem, I don't think it's correct to say that a client cannot tell whether 
they have received a complete RRSet in the answer section of a response. It's 
either there and complete or it's absent (and perhaps TC=1 if the reason for 
its absence is message truncation).

There should be no response possible in an implementation that adheres to the 
protocol in which a truncated RRSet appears in the answer section. If we're 
widening the net to implementations that don't follow the rules then I agree 
anything is possible.


Joe___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Pieter Lexis
Hi Joe,

On 5/10/21 1:42 AM, Joe Abley wrote:
> On May 9, 2021, at 19:27, Paul Hoffman  wrote:
> 
>> If I'm wrong about this being as good as it can be, there must be an item 
>> delimiter that is better than a comma. I am not thinking creatively enough 
>> to figure out what might be better than a comma. I'd be happy to hear 
>> proposals for a better item delimiter. 
> 
> I am quite behind on this topic, but I presume there's a reason to put all 
> these key-value pairs in a list in one RR?
> 
> If we compare the two fictional RRTypes EG1 and EG2 illustrated below:
> 
> example.com. EG1 key1=value1,key2=value2,...
> 
> example.com. EG2 key1 value1
> example.com. EG2 key2 value2
> 
> It seems to me that EG2 avoids the need for delimiters at all. There's a bit 
> of overhead resulting from the need for a larger RRSet but it's not obvious 
> that that's a proble>
> If the SvcParams field of the SVCB RR was a domain name rather than an 
> explicit list this would all look a lot more DNS-like as far as parsing goes. 
> This would also allow a single set of SvcParams key-value pairs to be 
> included in different service bindings without having to be sent each time or 
> to be bound to something provided a service provider (SVB in customer.org 
> zone that refers to SvcParams.provider.com) giving the provider some ability 
> to maintain some aspects of the service).

You then invite the following issues:

Clients need to match the tuple (ownername + prio + target) and get all
data from all matched rrsets, whereas now you get all that data in one
piece of rdata.

A client also can't figure out (if not doing DNSSEC valdiation
themselves) if you have received all the SVC data for a certain name.

Cheers,

Pieter

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-nsec3-guidance

2021-05-10 Thread Paul Hoffman
I support the adoption of this document as a starting point for NSEC3 guidance. 
It will be useful for people who help operators when those operators ask "why 
didn't you tell us what were good choices for the values?".

--Paul Hoffman

smime.p7s
Description: S/MIME cryptographic signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Pieter Lexis
Hi Dick,

On 5/10/21 1:02 PM, Dick Franks wrote:
> My objection is narrowly focussed on the escape mechanism, nothing
> more.  Changing the delimiter is neither necessary nor relevant.
> 
> I am happy to contribute the necessary words.

If you have the words to fix this issue that would need to changes the
code but clears everything up, do it :).

Cheers,

Pieter

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Dick Franks
On Mon, 10 May 2021 at 00:28, Paul Hoffman  wrote:
>
> On May 9, 2021, at 11:26 AM, Paul Wouters  wrote:
> > This is all pretty terrible. I agree with Tim that we should not inflict 
> > this onto the users. Or perhaps we can already pre-allocate some CVE 
> > numbers for the security issues this will generate.
> >
> > Keep the record simple, we are not going for Turing complete here. I 
> > recommend to authors take this discussion as advise to improve / simplify 
> > this aspect of the draft.
>
> I don't think this request is actually doable. The requirements for the SVCB 
> Rdata are:
> 1. Must be entered by the zone operator as ASCII text (not all a jumble of 
> hex values)
> 2. Is a list of key/value pairs
> 3. Values are likely to be a list of items
>

It is very much doable.
BIND, NSD, and PowerDNS can already parse values containing '\,'
escapes, and each of these has a substantial installed base.

My objections can be entirely satisfied by modest changes to reconcile
the document with RFC1035.


> Given these three things, it seems that there will *always* be an escaping 
> problem for the item delimiter in #3. In the current draft, the item 
> delimiter is a comma, so there has to be a way to escape a comma that is in 
> an item. Few types of items would ever need a comma in their values. If a 
> different character is chosen for the item delimiter, it too will need to be 
> escaped.
>
> If I'm wrong about this being as good as it can be, there must be an item 
> delimiter that is better than a comma. I am not thinking creatively enough to 
> figure out what might be better than a comma. I'd be happy to hear proposals 
> for a better item delimiter.

My objection is narrowly focussed on the escape mechanism, nothing
more.  Changing the delimiter is neither necessary nor relevant.

I am happy to contribute the necessary words.



--Dick

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Joe Abley
On May 10, 2021, at 05:42, Pieter Lexis  wrote:

>> On 5/9/21 2:01 PM, Dick Franks wrote:
>> Pre-processing of '\\,' into the RFC1035 standard '\,' is
>> superficially attractive, but also fraught with danger.
>> 
>> A parser could have some fun with this one:
>> 
>>$ORIGIN example.com
>>@   SVCB   1 foo
>> key6="\032\001\013\184\000\000\000\000\000\000\000\000,\000"
>>; a.k.a.   ipv6hint=2001:db8::5c5c:2c00
> 
> A zone owner/editor would never even think of typing in IP addresses
> like that.

Right, but an attacker who wants to take advantage of the impact of that 
observation in the construction of some parser might, which is why it's a 
security concern. 


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Pieter Lexis
Hi Dick,

On 5/9/21 2:01 PM, Dick Franks wrote:
> Pre-processing of '\\,' into the RFC1035 standard '\,' is
> superficially attractive, but also fraught with danger.
> 
> A parser could have some fun with this one:
> 
> $ORIGIN example.com
> @   SVCB   1 foo
> key6="\032\001\013\184\000\000\000\000\000\000\000\000,\000"
> ; a.k.a.   ipv6hint=2001:db8::5c5c:2c00

A zone owner/editor would never even think of typing in IP addresses
like that. And no decoder should ever write that out (and if it does,
would a zone-owner read it?). Also, when using the generic format, the
full value should be the 'wire' format so there's comma delimiter
between values. For ALPN you'd have [value1 len][value 1][value2
len][value2] and for key6 [encoded first ipv6 address bytes][encoded
second ipv6 address bytes].

> The spec only needs to say that a comma needs to be escaped  ( \, ) in
> order to be disregarded as a separator.

> BIND, NSD, Net::DNS, and PowerDNS can all do this, so there is little
> mileage in claiming that it is not possible.
> 
> The "impossible" can be made possible by doing the right things in the
> correct order.
> Selecting the right things and the correct order is left as an
> exercise for the student.
>From what I gather, this is the case? With the caveat that there is a
2-step process for parsing the values for keys defined as paramlists.

Cheers,

Pieter

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] I-D Action: draft-ietf-dnsop-svcb-https-05.txt

2021-05-10 Thread Dick Franks
On Mon, 10 May 2021 at 00:42, Joe Abley  wrote:
>
> On May 9, 2021, at 19:27, Paul Hoffman  wrote:
>
> > If I'm wrong about this being as good as it can be, there must be an item 
> > delimiter that is better than a comma. I am not thinking creatively enough 
> > to figure out what might be better than a comma. I'd be happy to hear 
> > proposals for a better item delimiter.
>
> I am quite behind on this topic, but I presume there's a reason to put all 
> these key-value pairs in a list in one RR?
>
> If we compare the two fictional RRTypes EG1 and EG2 illustrated below:
>
> example.com. EG1 key1=value1,key2=value2,...
>
> example.com. EG2 key1 value1
> example.com. EG2 key2 value2
>
> It seems to me that EG2 avoids the need for delimiters at all. There's a bit 
> of overhead resulting from the need for a larger RRSet but it's not obvious 
> that that's a problem.

The current draft can reach the finishing line without tearing it to pieces.

>8

>
> Perhaps this horse has already sailed but I thought I'd mention it.

Perhaps this horse needs to be tested for banned substances!


--Dick

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Call for Adoption: draft-hardaker-dnsop-nsec3-guidance

2021-05-10 Thread Benno Overeinder

Hi all,

As a follow-up to the presentation by Wes Hardaker at the IETF 110 DNSOP 
meeting, we want to start a call for adoption of 
draft-hardaker-dnsop-nsec3-guidance on the mailing list.


With the presentation at the DNSOP meeting on IETF 110, there was a 
sufficient general support in the (virtual) room to adopt the draft as a 
working group document.


Now we will start a period of two weeks for the call for adoption of 
draft-hardaker-dnsop-nsec3-guidance on the mailing list.


The draft is available here: 
https://datatracker.ietf.org/doc/draft-hardaker-dnsop-nsec3-guidance/.


Please review this draft to see if you think it is suitable for adoption 
by DNSOP, and comments to the list, clearly stating your view.


Please also indicate if you are willing to contribute text, review, etc.

This call for adoption ends: 24 May 2021


Thanks,

-- Benno

DNSOP co-chair

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of new EDNS opcode "rrserial"

2021-05-10 Thread Vladimír Čunát

On 10. 05. 21 10:19, Petr Špaček wrote:
I think the proper solution should be a real multi-query option, which 
incidentally provides a superset of RRSERIAL capabilities.


If multi-queries require the records being in sync (if from the same 
zone), I really dislike the implications of them being sent to 
resolvers, especially for many questions at once.  Caching, in particular.


--Vladimir | knot-resolver.cz


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of new EDNS opcode "rrserial"

2021-05-10 Thread Petr Špaček

On 27. 01. 20 16:08, Hugo Salgado wrote:

Dear DNSOPers, as an operator I tend to have this need to couple
an answer for a query to an auth server, with the actual "SOA zone
version" used. So I think it'll be valuable to have an EDNS option
for it.

Here I'm proposing it with this new draft. The 'camel index' for
its implementation/hack/proof-of-concept is about 37 lines in
NSD 4.1 (more details in Appendix A).

I've asked some operators and they see value on it. Is there any
support for adoption in DNSOP?

-
Name:   draft-salgado-rrserial
Revision:   01


...


This "RRSERIAL" data allows to debug problems and diagnosis by
helping to recognize the origin of an answer, associating this answer
with a respective zone version.


I think it needs more thought. Here's why:

Extending TTLs
==
First, people in this thread have floated ideas about using SOA serial 
for extending TTLs.


I think it's a bad idea because:
a) It would be pretty complex to implement right.
b) There are no guarantees that the SOA serial did not overflow in the 
meanwhile. As an extreme example, auth server can legally increment SOA 
value by 2^29 for each update, thus rolling SOA serial over very frequently.



Debugging
=
Secondly, let's consider just the "debugging" use-case, which removes 
the requirement to make the proposed mechanism 100 % reliable:


In practice, this RRSERIAL option is a specialized way to conflate two 
queries into one:

- First query specified by the standard (qclass, qtype, qname)
- Second query with hardcoded qtype=SOA, qclass derived from the primary 
qclass in question section, and SOA name derived from qname in the 
question section.


To me, this sounds like a crude hack, and I think the proper solution 
should be a real multi-query option, which incidentally provides a 
superset of RRSERIAL capabilities.


A multi-query option would also work multi-master architectures that 
cannot rely on SOA serial but on some other (presumably queriable) 
information.



Epilogue

Generally, I think SOA serial design was fine in 1985 but is ill-fitted 
for 2021. (I have to admit I'm biased because I'm implemented 
multi-master auth in topologies with tens of DNS servers, all accepting 
dynamic updates at the same time.)


For this reason, I think the DNS protocol should be gradually getting 
rid of the dependency on SOA serial, not increasing it.


--
Petr Špaček

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop