Re: [DNSOP] [Ext] Compact DoE sentinel choice

2023-07-31 Thread Edward Lewis
On 7/28/23, 1:48 PM, "DNSOP on behalf of Viktor Dukhovni" 
 wrote:

>We rolled out NSEC3 by introducing new algorithm code points, and
>eventually these weere widely enough deployed to allow zones to be
>signed with 7/8/10/13/14 without being seen as insecure by a significant
>fraction of resolvers.  I don't expect CDoE to wait for the ~5 years or
>more that this would take.

"Minimally Covering NSEC Records and DNSSEC On-line Signing" is referenced in 
the Compact Denial of Existence draft, it was published in 2004 (aka RFC 4470). 
 I can't determine which internet draft led to that document so I can't tell 
when discussions on this topic began.  Suffice it to say, this has been hanging 
around a very long time - enough time for a person to be born, raised and 
graduate from public schools (~18 years).  Persuasively I'll claim that this is 
the result of trying to be pragmatic when updating a protocol.  (Meaning - 
"what's another few years"?.)

I also think that software is updated more quickly, when motivated.  That's one 
lesson from the 2018 root zone KSK roll.  But I won't concentrate on that here.

What's pragmatic for protocol engineering may not be suitable for operations.  
I'm concerned with the low deployment of DNSSEC, 25 years since the first 
meeting to spur adoption.  Having sat through years of messaging that 
"operators need to be informed" and "we need to present the business case" 
without much success has led me to think inward.  My hypothesis 
(note-hypothesis) is that DNSSEC is not (entirely) suitable for operations.  My 
theory is that we need to be driving towards a simpler protocol, and as part of 
that, we need to avoid trying to retrofit "what is needed in the world now" 
into "what was designed for the world we anticipated in 1990."

This is the reason I'm objecting to this approach.

One of my objections is that this approach will make names that are 
non-existent (per the definition in "The Role of Wildcards in the Domain Name 
System") and reply to queries with records owned by the name.  In replies 
without DNSSEC records, the response code would be NXDOMAIN and in replies with 
DNSSEC records, the answer appears to be a no error but no data response.  This 
means the zone would be seen differently depending on whether the recipient 
reads DNSSEC or not.

Another objection is in the redefining of fields.  While the implementation of 
signing and validation may be able to accommodate using "dummy resource record 
types" (such as meta types designed to be in the range 128-255), whether 
management tools will be able to keep up needs to be kept in mind as well as 
the increasing skillset needed by the operations staff (who will be called in 
when customers do not get what they expect).

E.g., while preparing this message I tried these two dig messages:

dig somename.cloudflare.com a @ns3.cloudflare.com.
and
dig somename.cloudflare.com a

The first returned NXDOMAIN, the later NoError/NoData.  If I were a human 
trying to figure out a problem with a wildcard not matching, the difference 
between these two responses would be significant.  (The reason existence is 
defined in the wildcard document is that existence matters when applying the 
synthesis rules.)

I encourage updating DNSSEC to fit into the modern world.  The result ought to 
lead towards higher adoption - by making DNSSEC a "no brainer" to deploy and 
operate.  I'm urging that this be done in the (unquantified here) right way.  I 
have my doubts that fitting new meanings into old formats is the way to go.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] I-D Action: draft-ietf-dnsop-zoneversion-03.txt

2023-07-31 Thread Peter Thomassen

Thank you; I think the changes look good. Just one nit: "COULD" is not an RFC 
2119 key word.

Also, I like the new expansion of the SOA record in the abstract ("Star Of 
Authority") ;-)

Best,
Peter

On 7/31/23 03:24, Hugo Salgado wrote:

Dear Group.
Here's the last version of Zoneversion draft.
The most important change is to add a new field "number of labels", to
disambiguate the name of the zone that the serial refers to. With this
we believe that the comments of a few months ago by Joe and Brian are
resolved. Thanks for the feedback.

There are also text improvements and expansion of some abbreviations,
according to DNS directorate feedback. Regarding a comment in IETF-LC
that this document should update 1035 and/or 6891, we also understand
that this is not the case and we'll talk with the commenter to see if
any clarification is necessary in the text.

The unofficial NSD implementation was updated with the latest changes,
with its live server, and we'll be updating the rest of the libraries
and clients in these weeks.

Thanks and regards,

Hugo

On 18:09 30/07, internet-dra...@ietf.org wrote:


A New Internet-Draft is available from the on-line Internet-Drafts
directories. This Internet-Draft is a work item of the Domain Name System
Operations (DNSOP) WG of the IETF.

Title   : The "ZONEVERSION" EDNS option for the version token of a 
Resource Record's zone
Authors : Hugo Salgado
  Mauricio Vergara Ereche
Filename: draft-ietf-dnsop-zoneversion-03.txt
Pages   : 11
Date: 2023-07-30

Abstract:
The "ZONEVERSION" EDNS option allows a DNS querier to request a DNS
authoritative server to add an EDNS option in the answer of such
query with a token field representing the version of the zone which
contains the answered Resource Record, such as the Star Of Authority
("SOA") serial field in zones when this number corresponds to the
zone version.

This "ZONEVERSION" data allows to debug and diagnose problems by
helping to recognize the data source of an answer in an atomic single
query, by associating the response with a respective zone version.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-zoneversion/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-dnsop-zoneversion-03.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-dnsop-zoneversion-03

Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


--
Like our community service? 
Please consider donating at

https://desec.io/

deSEC e.V.
Kyffhäuserstr. 5
10781 Berlin
Germany

Vorstandsvorsitz: Nils Wisiol
Registergericht: AG Berlin (Charlottenburg) VR 37525

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop