Re: [DNSOP] A new draft on SM2 digital signature algorithm for DNSSEC

2022-04-12 Thread zhangcuiling

Many thanks for reading the draft.

> from: "Paul Wouters"  on Mon, 2022-04-11
> to: zhangcuiling 
> cc: dnsop 
> subject: Re: [DNSOP] A new draft on SM2 digital signature algorithm for DNSSEC
> 
> On Mon, 11 Apr 2022, zhangcuiling wrote:
> 
> > And the main purpose is to improve the diversity of DNSSEC algorithms, and 
> > to make it convenient for people who want to use SM2
> > digital signature algorithm as an alternative for DNSSEC.
> 
> We actually want to prevent as much diversity as we can, to avoid
> creating more new long tails of deployment of algorithms. So a new

That sounds reasonable. It does need additional work to support 
SM2 Digital Signature Algorithm for DNS software implementation. 
The good news is that Openssl has supported it since version 1.1.1. 
And I think Openssl is widely used among DNS software.

> algorithm should really offer something the others do not. Also having
> a number of ECC based algorithms would likely mean if one ends up
> broken, all of them end up broken.
> 
> So based on:
> 
>   Due to the similarity between SM2 and ECDSA with curve P-256, some
>   of the material in this document is copied liberally from RFC 6605
>   [RFC6605].
> 
> I don't see a strong reason to adopt another ECC type of algorithm.

Sorry that maybe I didn't make it clear. 

About SM2 and ECDSA:
SM2 and ECDSA are similar in the following aspects: the length of the 
private key (32 octets), public key (64 octets) and the signature 
(64 octets) are the same. 
But there is an important difference between these two algorithms, 
which is the process of signature calculation. So SM2 is a different 
algorithm from ECDSA.
By the way, compared to a totally different algorithm, 
the similarity between SM2 and ECDSA can reduce the complication of 
supporting SM2 to some extent.

About the security of ECC-based algorithms:
As far as I know, the security of ECC-based algorithms is strongly 
influenced by the curve it uses. Sometimes it's hard to say which 
curve is much safer. Elliptic curve secp256r1 (for DNSSEC) and 
secp256k1 (for blockchain) are relatively popular for ECDSA. 

SM2 uses a different curve and has different process with the signature
generation and validation, so I'd like to consider it as an alternative
to ECDSA.

> 
> Additionally, in this case SM2/SM3 seems to be ISO standards that are
> not freely available, so these are additionally problematic.
> 

I agree with you. I should specify a document that could be downloaded freely.
Here is another one introducing SM2/SM3 in detail:
"Information security technology --- Public key cryptographic algorithm 
SM2 based on elliptic curves --- Part 2: Digital signature algorithm"
http://www.gmbz.org.cn/upload/2018-07-24/1532401673138056311.pdf
It's written in English, but unfortunately it's not an international standard.
I will keep on trying to find a more proper document.

Thank you again for your time and your helpful comment.

Best regards,

Cathy Zhang
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] introducing a couple of RRTypes (CRC/CRS) for B2B applications

2022-04-12 Thread Eugène Adell
Hello,

thanks for your constructive comments. My answers are just below, with
an updated document (from Duane's remarks, Mark's ones will follow
later).

1.
Beyond the technical aspects, there are several different persons to
think about in our case : the DNS administrator obviously, the
decision maker buying (or not) a secured online service, and the CISO.
It looks more simple to have dedicated RR types to let them
communicate together, without any information distortion. It's
necessary to explain that the CRS record can play two roles : of
course being involved during the authorization mechanism, and as an
information for existing or potential customers checking this
mechanism support before subscribing to a new service. In that case,
any decision maker or CISO can check by himself without sorting all
the TXT records found.

@Mark : I am just discovering the APL RR now as I didn't notice it
when checking what could be reused. It fits the needs of the CRC, with
a different syntax, and likely it's still potentially easier to
identify when building an inventory of what CRC-CRS contracts an
organization has.


2.
I updated for compliance with RFC2606 & RFC5737

3.
Updated so

4.
After your comments and correcting a typo, it gives
ftp.example.com_21.example.net
Such domain name for sure doesn't exist and uses the underscore
character as separator. It has to be considered as storing data
establishing a kind of contract between the two organizations
involved.

5.
I give some explanation in the answer 1 but I will rephrase. The CRS
record can be used before subscribing to a service (typically any
storage/log system/SIEM) as an indicator that this service provides
the kind of authorization process described in the document. More
importantly, it can be checked by the application during the
authentication to know if the client CRC must be checked or not.
However, if an application doesn't want to rely on the CRS RR, it also
can use a parameter in its configuration file. Maybe adding a schema
would help ? At least, I tested all that prior to sending my first
email, with NSD and a modified Apache Tomcat, and I got the results I
wanted.






Internet Engineering Task Force E. Adell
Internet-Draft 12 April 2022
Intended status: Informational
Expires: 14 October 2022


 Client Roaming Control
 draft-adell-client-roaming-00

Abstract

   This document specifies the Client Roaming Control (CRC) DNS Resource
   Record allowing an organization to better control the access to
   third-party applications over Internet.  The applications
   implementing an authorization mechanism to honor the CRC, publish on
   their side the Client Roaming Support (CRS) Resource Record to inform
   of this support.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 14 October 2022.

Copyright Notice

   Copyright (c) 2022 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.



AdellExpires 14 October 2022[Page 1]

Internet-Draft   Client Roaming Control   April 2022


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Conventions Used in This Document . . . . . . . . . . . . . .   3
   3.  The CRC Resource Record . . . . . . . . . . . . . . . . . . .   4
 3.1.  RR name field . . . . . . . . . . . . . . . . . . . . . .   4
 3.2.  CRC RDATA Wire Format . . . . . . . . . . . . . . . . . .   4
 3.3.  CRC Presentation Format . . . . . . . . . . . . . . . . .   4
   4.  The CRS Resource Record . . . . . . . . . . . . . . . . . . .   5
 4.1.  CRS RDATA Wire Format . . . . . . . . . . . . . 

Re: [DNSOP] introducing a couple of RRTypes (CRC/CRS) for B2B applications

2022-04-12 Thread Paul Wouters

On Tue, 12 Apr 2022, Eugène Adell wrote:


Beyond the technical aspects, there are several different persons to
think about in our case : the DNS administrator obviously, the
decision maker buying (or not) a secured online service, and the CISO.


Why should this information exchange happen via DNS?


It looks more simple to have dedicated RR types to let them
communicate together


It seems a REST API using some .well-known HTTPS link seems a better
fit ?


After your comments and correcting a typo, it gives
ftp.example.com_21.example.net
Such domain name for sure doesn't exist and uses the underscore
character as separator. It has to be considered as storing data
establishing a kind of contract between the two organizations
involved.


It should have a dot in between, eg ftp.example.com._21.example.net.
Then, the underscore name should be uniquely identifying to split it
from other DNS records. eg _crs or something. Have a look at other
documents at 
https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#underscored-globally-scoped-dns-node-names


5.
I give some explanation in the answer 1 but I will rephrase. The CRS
record can be used before subscribing to a service (typically any
storage/log system/SIEM) as an indicator that this service provides
the kind of authorization process described in the document.


I still wonder if DNS is really the right fit for this.


  This document specifies the Client Roaming Control (CRC) DNS Resource
  Record allowing an organization to better control the access to
  third-party applications over Internet.  The applications
  implementing an authorization mechanism to honor the CRC, publish on
  their side the Client Roaming Support (CRS) Resource Record to inform
  of this support.


There is a big overlap here with MUD, see 
https://datatracker.ietf.org/doc/html/rfc8520

It also seems the source of authorization depends on the DNS name, but
how do you ensure a device would not be lying about their name? Would
this only work on zones with static DNS entries? If so, how would that
scale?

What would be the mechanism to authorize the publishing of CRS/CRC
records, and why can that provisioning protocol not also be used
to query/signal this data?

Paul___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] introducing a couple of RRTypes (CRC/CRS) for B2B applications

2022-04-12 Thread Eugène Adell
Hi Paul,

in the implementation I suggested, the new DNS RR types are not used
for making people (administrator, decision-maker, CISO) communicating
together but as an information source that is simple enough to be
understood by everyone without the need of filtering and sorting data.
I commented that to explain why new types are necessary, although CRC
can be replaced with APL.

Why use DNS at all ? Likely many server software can be modified to
use the implementation suggested, while creating dependencies to
another protocol not already supported by the server looks worse. For
example, it's maybe not a good idea to update an FTP or LDAP server to
support HTTP only to download a text file containing these networks
allowed. And they would probably still need to start by a DNS request
to find that file.

If the Client DNS (CRC) is lying or not configured as asked by the
CISO, the client organization might expose data and it's an internal
threat to this organization. If the server DNS (CRS) is lying, the
client organization might complain as the contract (if any) is not
honored. If all is implemented/configured correctly and one client is
lying on its identity (wrong information sent during the
authentication for example), there is a mismatch between its real and
expected IP addresses, and no authorization at the end.

The use-case I'm thinking about is indeed for static entries handled
manually. In my past experience, I would say each company I worked for
would have benefited of some similar entries (5~10) without thinking
"big". The mechanism to authorize these records is somewhat
administrative for the CRC (the decision-maker asks the CISO who in
turns asks the DNS admin to add a record), and limited for the CRS (a
new application is brought online, with its own domain name, and an
associated CRS record). As it's intended for Business-to-business,
both parts still agree by another kind of contract, and I don't any
necessity to have something more for the provisioning.


E.A.



Le mar. 12 avr. 2022 à 14:28, Paul Wouters  a écrit :
>
> On Tue, 12 Apr 2022, Eugène Adell wrote:
>
> > Beyond the technical aspects, there are several different persons to
> > think about in our case : the DNS administrator obviously, the
> > decision maker buying (or not) a secured online service, and the CISO.
>
> Why should this information exchange happen via DNS?
>
> > It looks more simple to have dedicated RR types to let them
> > communicate together
>
> It seems a REST API using some .well-known HTTPS link seems a better
> fit ?
>
> > After your comments and correcting a typo, it gives
> > ftp.example.com_21.example.net
> > Such domain name for sure doesn't exist and uses the underscore
> > character as separator. It has to be considered as storing data
> > establishing a kind of contract between the two organizations
> > involved.
>
> It should have a dot in between, eg ftp.example.com._21.example.net.
> Then, the underscore name should be uniquely identifying to split it
> from other DNS records. eg _crs or something. Have a look at other
> documents at 
> https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#underscored-globally-scoped-dns-node-names
>
> > 5.
> > I give some explanation in the answer 1 but I will rephrase. The CRS
> > record can be used before subscribing to a service (typically any
> > storage/log system/SIEM) as an indicator that this service provides
> > the kind of authorization process described in the document.
>
> I still wonder if DNS is really the right fit for this.
>
> >   This document specifies the Client Roaming Control (CRC) DNS Resource
> >   Record allowing an organization to better control the access to
> >   third-party applications over Internet.  The applications
> >   implementing an authorization mechanism to honor the CRC, publish on
> >   their side the Client Roaming Support (CRS) Resource Record to inform
> >   of this support.
>
> There is a big overlap here with MUD, see 
> https://datatracker.ietf.org/doc/html/rfc8520
>
> It also seems the source of authorization depends on the DNS name, but
> how do you ensure a device would not be lying about their name? Would
> this only work on zones with static DNS entries? If so, how would that
> scale?
>
> What would be the mechanism to authorize the publishing of CRS/CRC
> records, and why can that provisioning protocol not also be used
> to query/signal this data?
>
> Paul

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] IANA Policy for SVCB

2022-04-12 Thread Erik Nygren
I think Expert Review makes sense (with the expert reviewing the SHOULD
around the specification).

On Tue, Mar 22, 2022 at 8:34 PM Martin Thomson  wrote:

> I agree with Tommy.
>
> Selecting an expert who is able to recognize when wider review might help
> is a far lower bar than the one Ray suggests might be necessary.
>
> On Wed, Mar 23, 2022, at 05:29, Tommy Pauly wrote:
> > If this space is not extensible from non-IETF RFCs, we’ll have missed
> > the mark. The space is designed to be large (65K) to allow new work to
> > easily use this extensibility. We don’t need to be too conservative
> > with this space.
> >
> > I disagree that there wouldn’t be good experts — we have authors of the
> > document who have seen it through, and we have more people using this
> > RR and gaining expertise.
> >
> > Expert review is the right balance here.
> >
> > Tommy
> >
> >> On Mar 22, 2022, at 9:24 AM, Murray S. Kucherawy 
> wrote:
> >>
> >> On Tue, Mar 22, 2022 at 9:10 AM Ray Bellis  wrote:
> >>> I am concerned that the set of Expert Reviewers necessary to handle
> SVCB
> >>> needs to have both expert DNS experience *and* detailed knowledge of
> the
> >>> SVCB model for this to work.
> >>>
> >>> I am not sure there's anybody who fits that criteria.
> >>
> >> Specification Required also assumes a community that can produce them,
> which presumably contains the right experts.
> >>
> >> Are we actually moving toward IETF Review here?
> >>
> >> -MSK
> >> ___
> >> DNSOP mailing list
> >> DNSOP@ietf.org
> >> https://www.ietf.org/mailman/listinfo/dnsop
> >
> > ___
> > DNSOP mailing list
> > DNSOP@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsop
>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] IANA Policy for SVCB

2022-04-12 Thread Eric Orth
I'm happy as long as things are still fast and easy enough to support
new/experimental/prototype usage.  I think Expert Review with the proposed
stuff for that expert to review is all reasonable for that goal.  If we
start getting into stricter bars than Expert Review, that's where we'd have
to start discussing the complexity of breaking off separate private-use and
experimental blocks with a lower bar.

On Tue, Apr 12, 2022 at 3:10 PM Erik Nygren  wrote:

> I think Expert Review makes sense (with the expert reviewing the SHOULD
> around the specification).
>
> On Tue, Mar 22, 2022 at 8:34 PM Martin Thomson  wrote:
>
>> I agree with Tommy.
>>
>> Selecting an expert who is able to recognize when wider review might help
>> is a far lower bar than the one Ray suggests might be necessary.
>>
>> On Wed, Mar 23, 2022, at 05:29, Tommy Pauly wrote:
>> > If this space is not extensible from non-IETF RFCs, we’ll have missed
>> > the mark. The space is designed to be large (65K) to allow new work to
>> > easily use this extensibility. We don’t need to be too conservative
>> > with this space.
>> >
>> > I disagree that there wouldn’t be good experts — we have authors of the
>> > document who have seen it through, and we have more people using this
>> > RR and gaining expertise.
>> >
>> > Expert review is the right balance here.
>> >
>> > Tommy
>> >
>> >> On Mar 22, 2022, at 9:24 AM, Murray S. Kucherawy 
>> wrote:
>> >>
>> >> On Tue, Mar 22, 2022 at 9:10 AM Ray Bellis  wrote:
>> >>> I am concerned that the set of Expert Reviewers necessary to handle
>> SVCB
>> >>> needs to have both expert DNS experience *and* detailed knowledge of
>> the
>> >>> SVCB model for this to work.
>> >>>
>> >>> I am not sure there's anybody who fits that criteria.
>> >>
>> >> Specification Required also assumes a community that can produce them,
>> which presumably contains the right experts.
>> >>
>> >> Are we actually moving toward IETF Review here?
>> >>
>> >> -MSK
>> >> ___
>> >> DNSOP mailing list
>> >> DNSOP@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/dnsop
>> >
>> > ___
>> > DNSOP mailing list
>> > DNSOP@ietf.org
>> > https://www.ietf.org/mailman/listinfo/dnsop
>>
>> ___
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
>>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] IANA Policy for SVCB

2022-04-12 Thread Tim Wicinski
Also let's ensure there are several experts like we have for new RR Types.

On Tue, Apr 12, 2022 at 4:06 PM Eric Orth  wrote:

> I'm happy as long as things are still fast and easy enough to support
> new/experimental/prototype usage.  I think Expert Review with the proposed
> stuff for that expert to review is all reasonable for that goal.  If we
> start getting into stricter bars than Expert Review, that's where we'd have
> to start discussing the complexity of breaking off separate private-use and
> experimental blocks with a lower bar.
>
> On Tue, Apr 12, 2022 at 3:10 PM Erik Nygren  wrote:
>
>> I think Expert Review makes sense (with the expert reviewing the SHOULD
>> around the specification).
>>
>> On Tue, Mar 22, 2022 at 8:34 PM Martin Thomson  wrote:
>>
>>> I agree with Tommy.
>>>
>>> Selecting an expert who is able to recognize when wider review might
>>> help is a far lower bar than the one Ray suggests might be necessary.
>>>
>>> On Wed, Mar 23, 2022, at 05:29, Tommy Pauly wrote:
>>> > If this space is not extensible from non-IETF RFCs, we’ll have missed
>>> > the mark. The space is designed to be large (65K) to allow new work to
>>> > easily use this extensibility. We don’t need to be too conservative
>>> > with this space.
>>> >
>>> > I disagree that there wouldn’t be good experts — we have authors of
>>> the
>>> > document who have seen it through, and we have more people using this
>>> > RR and gaining expertise.
>>> >
>>> > Expert review is the right balance here.
>>> >
>>> > Tommy
>>> >
>>> >> On Mar 22, 2022, at 9:24 AM, Murray S. Kucherawy 
>>> wrote:
>>> >>
>>> >> On Tue, Mar 22, 2022 at 9:10 AM Ray Bellis  wrote:
>>> >>> I am concerned that the set of Expert Reviewers necessary to handle
>>> SVCB
>>> >>> needs to have both expert DNS experience *and* detailed knowledge of
>>> the
>>> >>> SVCB model for this to work.
>>> >>>
>>> >>> I am not sure there's anybody who fits that criteria.
>>> >>
>>> >> Specification Required also assumes a community that can produce
>>> them, which presumably contains the right experts.
>>> >>
>>> >> Are we actually moving toward IETF Review here?
>>> >>
>>> >> -MSK
>>> >> ___
>>> >> DNSOP mailing list
>>> >> DNSOP@ietf.org
>>> >> https://www.ietf.org/mailman/listinfo/dnsop
>>> >
>>> > ___
>>> > DNSOP mailing list
>>> > DNSOP@ietf.org
>>> > https://www.ietf.org/mailman/listinfo/dnsop
>>>
>>> ___
>>> DNSOP mailing list
>>> DNSOP@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dnsop
>>>
>> ___
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
>>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop