[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-generalized-notify-06: (with COMMENT)

2025-02-27 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-generalized-notify-06: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-generalized-notify/



--
COMMENT:
--

Thank you to Peter E. Yee for the GENART Review.

** Section 6.2.

   The expert review should validate that the RRtype and
   Scheme do not conflict with any existing allocations.

Is this the totality of the guidance for the expert reviewer, lack of 
duplication?

Is more detail required given the size of the code point space?



___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-compact-denial-of-existence-06: (with COMMENT)

2025-02-15 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-compact-denial-of-existence-06: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-compact-denial-of-existence/



--
COMMENT:
--

Thank you to Elwyn Davies for the GENART review.

** Section 10.  Be more precise with the registry names (i.e., using their
actual names)

OLD
   Allocate a new DNS Resource Record type code for NXNAME in the DNS
   parameters registry, from the meta type range.
NEW
Allocate a new DNS Resource Record type code for NXNAME from the "Resource
Record (RR) TYPEs" registry in the "DNS parameters" registry group, from the
meta type range.

OLD
   Allocate the "Compact Answers OK" flag in the EDNS header, as
   described in Section 5.1.

NEW
Allocate the "Compact Answers OK" flag in the "EDNS Header Flags (16 bits)
registry in the "Domain Name System (DNS) Parameters" registry group.  Set the
Flag field to "CO".

OLD
   Allocate a code point for the "Invalid Query Type" Extended DNS Error
   in the DNS parameters registry, as described in Section 3.5.
NEW
Allocate a code point for the "Invalid Query Type" in the "Extended DNS Error
Codes" registry in the "Domain Name System (DNS) Parameters" registry group, as
described in Section 3.5.



___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-zoneversion-08: (with COMMENT)

2024-06-18 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-zoneversion-08: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-zoneversion/



--
COMMENT:
--

idnits reports:

  ** The abstract seems to contain references ([RFC5001]), which it
 shouldn't.  Please replace those with straight textual mentions of the
 documents in question.

  -- Obsolete informational reference (is this intentional?): RFC 8499
 (Obsoleted by RFC 9499)



___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-qdcount-is-one-03: (with COMMENT)

2024-06-16 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-qdcount-is-one-03: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-qdcount-is-one/



--
COMMENT:
--

** idnits says

  == The 'Updates: ' line in the draft header should list only the _numbers_
 of the RFCs which will be updated by this document (if approved); it
 should not include the word 'RFC' in the list.

** Section 4.
   Firewalls that process DNS messages in order to eliminate unwanted
   traffic SHOULD treat messages with OPCODE = 0 and QDCOUNT > 1 as
   malformed traffic and return a FORMERR response as described above.
   Such firewalls MUST NOT treat messages with OPCODE = 0 and QDCOUNT =
   0 as malformed.  See Section 4 of [RFC8906] for further guidance.

(Editorial) Should the term “firewall” be generalized to “middle box” (or
something similar)?  I ask because I’m wondering if DNS proxies, UTMs, or IPSs
should also follow this advice?



___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Roman Danyliw's No Objection on draft-ietf-dnsop-dnssec-bootstrapping-08: (with COMMENT)

2024-05-12 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-dnssec-bootstrapping-08: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-bootstrapping/



--
COMMENT:
--

Thank you to Peter Yee for the GENART review.

** Section 6.  Editorial.
   The level of rigor in Section 4.2 is needed to prevent publication of
   a half-baked DS RRset

Is “half-baked DS RRset” a term-of-art?  To improve readability, I recommend
not using an idiomatic expression.

** Section 7.  Editorial. Per the reference to
[draft-ietf-dnsop-dnssec-bootstrapping], this should likely be something like
“[This RFC]” and subsequent comment of that string being replaced by the RFC
Editor.

** idnits reports:
  ** Obsolete normative reference: RFC 8499 (Obsoleted by RFC 9499)



___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-avoid-fragmentation-16: (with COMMENT)

2024-01-03 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-avoid-fragmentation-16: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-avoid-fragmentation/



--
COMMENT:
--

Thank you to Donald Eastlake for his SECDIR review.  Please review his proposed
text on including clarifying language around the applicability of TSIG.

I support Martin Duke and Rob Wilton’s DISCUSS positions.

** Section 7.2
   This would indicate prior
   reliance upon IP fragmentation, which is universally considered to be
   harmful to both the performance and stability of applications,
   endpoints, and gateways.

Is there a reference that can be cited to substantiate this “universal”
position?



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-glue-is-not-optional-08: (with COMMENT)

2023-06-07 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-glue-is-not-optional-08: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-glue-is-not-optional/



--
COMMENT:
--

** Consider if RFC2119 keywords are appropriate in the abstract

** Section 2.4. Machine produced tool output is provided in this section (from
dig).  Please formally cite what generated it.



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-alt-tld-23: (with COMMENT)

2023-04-26 Thread Roman Danyliw
Hi Warren!

Thanks for the explanations to my feedback.

From: Warren Kumari 
Sent: Wednesday, April 26, 2023 11:49 AM
To: Roman Danyliw 
Cc: The IESG ; draft-ietf-dnsop-alt-...@ietf.org; 
dnsop-cha...@ietf.org; dnsop@ietf.org; suzworldw...@gmail.com
Subject: Re: Roman Danyliw's No Objection on draft-ietf-dnsop-alt-tld-23: (with 
COMMENT)





On Tue, Apr 25, 2023 at 4:54 PM, Roman Danyliw 
mailto:nore...@ietf.org>> wrote:
Roman Danyliw has entered the following ballot position for 
draft-ietf-dnsop-alt-tld-23: No Objection
When responding, please keep the subject line intact and reply to all email 
addresses included in the To and CC lines. (Feel free to cut this introductory 
paragraph, however.)
Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.
The document, along with other ballot positions, can be found here: 
https://datatracker.ietf.org/doc/draft-ietf-dnsop-alt-tld/
-- COMMENT:
--
Thank you to Linda Dunbar for the SECDIR review.
** Section 2.
Currently deployed projects and protocols that are using pseudo-TLDs are 
recommended to move under the .alt pseudo-TLD, but this is not a requirement.
I don’t understand the basis of this recommendation. Projects and protocols 
using pseudo-TLDs (outside of https://www.iana.org/domains/reserved) are 
already not following published guidance. Why is there an expectation that this 
document can change behavior?

It's not really an expectation, more of an invitation/suggestion. At one point 
this had text along the lines of "may choose to", but that was felt to be a bit 
weak. There was some discussion about making this "are RECOMMENDED to move", 
but that was felt to be too strong (and who the hell are we to tell 'em what to 
do anyway?!). This was the happy medium we settled on.
Good enough?

[Roman] Yes.  I figured there long deliberation on a few set of words.

Section 3.2. Item #3. Editorial. s/Writers of name resolution APIs/Creators of 
name resolution APIs/. Or “developers”, “implementers, or “designers”

Thank you - I've updated this to be "Developers" in Pull Request #46.

Backstory:
This section "answers" the questions from RFC6761, and Q 3 was phrased as:
"3.  Name Resolution APIs and Libraries:
   Are writers of name resolution APIs and libraries expected to make their 
software recognize these names as special and treat them differently?  If so, 
how?"
We'd just sort of followed along from the language.


** Section 3.2. Item #7
7. DNS registries/registrars for the global DNS will never register names in 
the .alt pseudo-TLD because .alt will not exist in the global DNS root.
Items #4 – 6 on this list use RFC2119 language to make the expected behavior 
clear. This text seems to be written in an aspiration form describing what 
registries/registrars will do, without explicitly prohibiting them with 
normative language. Is there a reason for that?


Yup, actually 2 reasons:
1: .alt will not exist in the DNS, and so it's not possible for DNS registries 
and registrars to register DNS names. We don't tell pigs that they MUST NOT 
fly, and so telling registries and registrars that they MUST NOT do something 
that they are unable to  seemed odd. But, Paul Wouters also pointed at this 
text in his ballot, and that it is unclear, so I've suggested (in PR  46) this 
instead:
"7. It is not possible for DNS registries/registrars to register DNS names
  in the .alt pseudo-TLD as the .alt will not exist in the global DNS root."

2: there is some sensitivity here. ICANN regulates registries and registrars, 
and I was trying to be extra careful to not accidentally step on toes and imply 
that the IETF was telling 'em what to do…

[Roman] Understood.

Roman


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-alt-tld-23: (with COMMENT)

2023-04-25 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-alt-tld-23: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-alt-tld/



--
COMMENT:
--

Thank you to Linda Dunbar for the SECDIR review.

** Section 2.
   Currently deployed projects and protocols that are using pseudo-TLDs
   are recommended to move under the .alt pseudo-TLD, but this is not a
   requirement.

I don’t understand the basis of this recommendation.  Projects and protocols
using pseudo-TLDs (outside of https://www.iana.org/domains/reserved) are
already not following published guidance.  Why is there an expectation that
this document can change behavior?

Section 3.2.  Item #3. Editorial.  s/Writers of name resolution APIs/Creators
of name resolution APIs/.  Or “developers”, “implementers, or “designers”

** Section 3.2.  Item #7
   7.  DNS registries/registrars for the global DNS will never register
   names in the .alt pseudo-TLD because .alt will not exist in the
   global DNS root.

Items #4 – 6 on this list use RFC2119 language to make the expected behavior
clear.  This text seems to be written in an aspiration form describing what
registries/registrars will do, without explicitly prohibiting them with
normative language.  Is there a reason for that?



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-dns-catalog-zones-08: (with COMMENT)

2022-12-30 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-dns-catalog-zones-08: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-catalog-zones/



--
COMMENT:
--

Thank you to Catherine Meadows for the SECDIR review.

I support Murray Kucherawy DISCUSS position.

** Section 3.
Catalog consumers MUST ignore any RR in the catalog zone which is
   meaningless to or otherwise not supported by the implementation.

Can “meaningless” be more formally described?  Are there specific RR which
shouldn’t be in the catalog?

** Section 3.  Editorial.

The content of catalog zones may not be
   accessible from any recursive nameserver.

Can the intent of this be clarified?  Is it saying that the “contents of the
catalog zone may _not necessarily_ be accessible from _all or some_ recursive
nameservers”? or the “contents of the catalog zone _should not be/must not be_
accessible from any recursive nameserver”?



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's Discuss on draft-ietf-dnsop-rfc5933-bis-12: (with DISCUSS and COMMENT)

2022-11-29 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-rfc5933-bis-12: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc5933-bis/



--
DISCUSS:
--

(updated ballot)

The IETF has steered away from publishing protocol mechanisms with dependencies
on national cryptography as we do not have the ability to validate their
security properties ourselves.  IETF stream documents typically rely on
documents published in the Crypto Forum Research Group (CFRG) [1]; an open and
peer-reviewed vetting process; or a review by the IRTF Crypto Panel [2] to give
us confidence in cryptographic algorithm choices. Since the described GOST
mechanism doesn’t fit into these vetting criteria and the WG (based on the
shepherd’s report) has not provided alternative analysis, it is not appropriate
to publish this document in the IETF stream.

11/28/2022: Suggested resolution per mailing list discussion:
https://mailarchive.ietf.org/arch/msg/dnsop/XZoakWUDruPXylJ2wLIS4l4vevo/


--
COMMENT:
--

Thank you to Mohti Sethi for the SECDIR review.

I have no insight into the deliberations in 2010 that resulted in RFC5933 being
published.  However, as the shepherd’s report notes, with the publication of
RFC6014 (in 2010) and RFC9157 (in 2021), the relevant IANA DNSSEC registries
[4] [5] provide sufficient flexibility to assign code points with an RFC
outside of the IETF stream (a situation that didn’t exist in 2010).  Such
flexible policies in DNSSEC registries have also been made for TLS and IPsec
registries to avoid the IETF having to render judgement on cryptography,
national or otherwise, while still providing code points -- the exact situation
we find ourselves in.  Similar GOST-related protocol mechanisms have
successfully been submitted to the Independent Submission Stream (ISE) [3]
(e.g., RFC 9189, draft-smyslov-ike2-gost, and
draft-smyshlyaev-tls13-gost-suites).  It seems possible to follow the same
approach here.

[1] https://datatracker.ietf.org/rg/cfrg/about/
[2] https://trac.ietf.org/trac/irtf/wiki/Crypto%20Review%20Panel
[3] https://www.rfc-editor.org/about/independent/
[4]
https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml#dns-sec-alg-numbers-1
[5] https://www.iana.org/assignments/ds-rr-types/ds-rr-types.xhtml



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] Roman Danyliw's Discuss on draft-ietf-dnsop-rfc5933-bis-12: (with DISCUSS and COMMENT)

2022-11-28 Thread Roman Danyliw
Hi!

> -Original Message-
> From: iesg  On Behalf Of Paul Hoffman
> Sent: Thursday, November 17, 2022 7:06 PM
> To: Roman Danyliw 
> Cc: The IESG ; draft-ietf-dnsop-rfc5933-...@ietf.org; dnsop-
> cha...@ietf.org; dnsop@ietf.org; Tim Wicinski 
> Subject: Re: [Ext] [DNSOP] Roman Danyliw's Discuss on draft-ietf-dnsop-
> rfc5933-bis-12: (with DISCUSS and COMMENT)
> 
> On Nov 17, 2022, at 3:02 PM, Roman Danyliw via Datatracker
>  wrote:
> > --
> > DISCUSS:
> > --
> >
> > The IETF has steered away from publishing protocol mechanisms with
> dependencies
> > on national cryptography as we do not have the ability to validate their
> > security properties ourselves.  IETF stream documents typically rely on
> > documents published in the Crypto Forum Research Group (CFRG) [1]; an
> open and
> > peer-reviewed vetting process; or a review by the IRTF Crypto Panel [2] to
> give
> > us confidence in cryptographic algorithm choices. Since the described GOST
> > mechanism doesn’t fit into these vetting criteria and the WG (based on the
> > shepherd’s report) has not provided alternative analysis, it is not 
> > appropriate
> > to publish this document in the IETF stream.
> >

[snip]

> It feels like this DISCUSS ballot is asking for a non-IETF-stream RFC to 
> obsolete
> an IETF-stream RFC. Yuck. Instead, it might be better to publish this in the 
> IETF
> stream; separately, the IESG could then publish a statement that future
> national algorithm documents should not come through the IETF stream.

I agree that we need to be careful on what a non-IETF stream document would do 
to an IETF-stream document.  As a counter proposal, I would recommend that we 
use the flexibility afforded by RFC6014 and RFC9157 to address our current 
situation, and split the document.

The document has several components:

(a) Specification of and guidance for new DNSKEY and RRSIG behavior using GOST 
R 34.10-2012 and GOST R 34.11-2012 (i.e., Section 2 - 6, 9)

(b) Guidance to obsolete/update previous RFC5933/RFC8624 behavior per (a) 
(i.e., Section 7, 8)

(c) Request new IANA registry entries for (a) (i.e., Section 10)

(d) Request updates to IANA registries to deprecate older GOST code points 
specified by IETF-stream documents (i.e., Section 10)

Components (a) and (c) could be extracted from this document and added to a new 
document published by the ISE.  This text is the new national crypto that the 
WG cannot render judgement on per my DISCUSS.  The remaining text, components 
(b) and (d), would be the reduced draft-ietf-dnsop-rfc5933-bis document and 
would reference this new ISE document with the appropriate caveats on the 
confidence the WG in this new ISE reference.  This reduced 
draft-ietf-dnsop-rfc5933-bis document would be the compromise where an 
IETF-stream document is needed to redefine previously specified behavior so 
that an ISE-stream document wouldn't have to obsolete an IETF-stream one.  If 
(when) GOST R 34.10-2012/GOST R 34.11-2012 is superseded (and assuming it 
remains national crypto), algorithm revisions can be handled entirely by the 
ISE.

Regards,
Roman
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's Discuss on draft-ietf-dnsop-rfc5933-bis-12: (with DISCUSS and COMMENT)

2022-11-17 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-rfc5933-bis-12: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc5933-bis/



--
DISCUSS:
--

The IETF has steered away from publishing protocol mechanisms with dependencies
on national cryptography as we do not have the ability to validate their
security properties ourselves.  IETF stream documents typically rely on
documents published in the Crypto Forum Research Group (CFRG) [1]; an open and
peer-reviewed vetting process; or a review by the IRTF Crypto Panel [2] to give
us confidence in cryptographic algorithm choices. Since the described GOST
mechanism doesn’t fit into these vetting criteria and the WG (based on the
shepherd’s report) has not provided alternative analysis, it is not appropriate
to publish this document in the IETF stream.


--
COMMENT:
--

Thank you to Mohti Sethi for the SECDIR review.

I have no insight into the deliberations in 2010 that resulted in RFC5933 being
published.  However, as the shepherd’s report notes, with the publication of
RFC6014 (in 2010) and RFC9157 (in 2021), the relevant IANA DNSSEC registries
[4] [5] provide sufficient flexibility to assign code points with an RFC
outside of the IETF stream (a situation that didn’t exist in 2010).  Such
flexible policies in DNSSEC registries have also been made for TLS and IPsec
registries to avoid the IETF having to render judgement on cryptography,
national or otherwise, while still providing code points -- the exact situation
we find ourselves in.  Similar GOST-related protocol mechanisms have
successfully been submitted to the Independent Submission Stream (ISE) [3]
(e.g., RFC 9189, draft-smyslov-ike2-gost, and
draft-smyshlyaev-tls13-gost-suites).  It seems possible to follow the same
approach here.

[1] https://datatracker.ietf.org/rg/cfrg/about/
[2] https://trac.ietf.org/trac/irtf/wiki/Crypto%20Review%20Panel
[3] https://www.rfc-editor.org/about/independent/
[4]
https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml#dns-sec-alg-numbers-1
[5] https://www.iana.org/assignments/ds-rr-types/ds-rr-types.xhtml



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-dnssec-bcp-05: (with COMMENT)

2022-10-17 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-dnssec-bcp-05: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-bcp/



--
COMMENT:
--

Thank you to Catherine Meadows for the SECDIR review.

** Section 1.1
   Recent estimates are that fewer than
   10% of the domain names used for web sites are signed, and only
   around a third of queries to recursive resolvers are validated.

Since this is a point-in-time measurement, this document would age better with
a reference to these figures.

** Section 1.1
   However, this low level of implementation does not affect whether
   DNSSEC is a best current practice; it just indicates that the value
   of deploying DNSSEC is often considered lower than the cost.
   Nonetheless, the significant deployment of DNSSEC beneath some top-
   level domains (TLDs), and the near-universal deployment of DNSSEC for
   the TLDs in the DNS root zone, demonstrate that DNSSEC is suitable
   for implementation by both ordinary and highly sophisticated domain
   owners.

Editorial style.  The first sentence states that most of the Internet doesn’t
see the value of DNSSEC relative to the cost.  The second sentence suggests
that it is “suitable for … ordinary domain owners.”  I might have used the word
“applicable for …” because for me, part of suitability is that it is that the
cost is acceptable for many in the target population (which the first sentence
suggests it is not)

** Section 2.
   Earlier iterations have not been deployed on a significant scale.

Consider if the text can qualify the differences in scale from the one posed on
Section 1.1 (i.e., <10% of the domain).

** Section 3.
   Cryptography improves over time, and new algorithms get adopted by
   various Internet protocols.

Consider rephrasing this statement.  Overtime, existing cryptographic
algorithms typically weaken as computing power and new cryptoanalysis emerges.



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-nsec3-guidance-08: (with COMMENT)

2022-05-10 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-nsec3-guidance-08: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-nsec3-guidance/



--
COMMENT:
--

** I support Paul Wouter’s DISCUSS position.  Like Alvaro and Francesca also
commented, this document appears to be changing the behavior of RFC5155.  It
should formally update it in the meta data.  Specifically:

-- The language in Section 3.2. appears to “weaken” the guidance in Section
10.3 of RFC5155

-- Section 3.2 also seems to explicitly say it is updating RFC5155 with “[n]ote
that this specification updates [RFC5155] …”

** Section 2.
   The following sections describe recommendations for setting
   parameters for NSEC3 and NSEC3PARAM.

I don’t believe this is accurate.  There are few tangible recommendations about
iterations or salts in this section.  That’s in Section 3.

** Section 2.2.
   In general, NSEC3 with the Opt-Out flag enabled
   should only be used in large, highly dynamic zones with a small
   percentage of signed delegations.  Operationally, this allows for
   fewer signature creations when new delegations are inserted into a
   zone.  This is typically only necessary for extremely large
   registration points providing zone updates faster than real-time
   signing allows or when using memory-constrained hardware

Qualitative scales such as “large … dynamic zones” and “extremely large
registration points” used.  Can the operational experience informing these
statements be cited to suggest the scale?

** Section 3.1.
   Operators are encouraged to forgo using a salt entirely by using a
   zero-length salt value instead (represented as a "-" in the
   presentation format).

Section 2.4 seemed to take a stronger position on the lack of utility of the
salt.  Is there a reason normative language isn’t being used?



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-svcb-https-08: (with COMMENT)

2022-02-28 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-svcb-https-08: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-svcb-https/



--
COMMENT:
--

Thanks to Kyle Rose for the security feedback in the TSVART review.

** Section 2.1.  Per the ABNF (with the caveat that my manual review of such
syntax might be rusty):

--  What role does “value = *OCTET” play in the specification of SvcParams?  It
doesn’t appear to be used or explained.

-- Should a top-level ‘SvcParams’ rule be defined (i.e., define the formal
syntax of the entire parameter which is a list of SvcParam)?

-- (Editorial) To make it clear that “char-string” is defined in Appendix A, it
would be helpful to:

OLD
SvcParamValue = char-string

NEW
SvcParamValue = char-string; per Appendix A

** Section 3.1.  Recommend explicit saying which connection should be abandoned
– s/the client SHOULD abandon the connection attempt/the client SHOULD abandon
the connection attempt to the target service/

** Section 7.4.  Unpacking the first paragraph for easier commentary:

(a)   The "ipv4hint" and "ipv6hint" keys convey IP addresses that clients
   MAY use to reach the service.

(b) If A and  records for TargetName
   are locally available, the client SHOULD ignore these hints.

(c) Otherwise, clients SHOULD perform A and/or  queries for
   TargetName as in Section 3, and clients SHOULD use the IP address in
   those responses for future connections.

(a) seems to be saying that the value of the SrcParamValue is going to return
an IP address associated with a TargetName. (b) seems to be saying that if the
client already has an IP address for the TargetName in the cache, then ignore
the hints.  Per (c), why would A/ queries need to be performed to resolve
TargetName?  Isn’t the hint the associated IP address?

** Section 9.3.  Editorial.  s/the the/the/

** Section 10.  Editorial.  s/the value of the parameter is an ECHConfigList
[ECH]/ the value of the parameter is an ECHConfigList per Section 4 of [ECH]

** Section 10.  Editorial. s/ProtocolNameList in Section 7.1/ ProtocolNameList
in Section 7.1.2/

** Section 10.2. s/smaller SvcPriority/lower SvcPriority value/

** Section A.1  Per the ABNF:
-- What role does “item” rule play?  It’s not referenced or explained.  (see
below)

-- It would be useful to state somewhere which ABNF rule corresponds to which
form of the list.  Perhaps something like:

OLD
   For implementations that allow "," and "\" in item values, the
   following escaping syntax applies:

NEW
For implementations that allow "," and "\" in item values, the  
‘comma-separated’ rule for the escaping syntax applies.  For those that do not
required escaping, the ‘item’ syntax rule applies.



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Roman Danyliw's Discuss on draft-ietf-dnsop-dns-tcp-requirements-13: (with DISCUSS and COMMENT)

2021-11-02 Thread Roman Danyliw
Hi Duane!

> -Original Message-
> From: iesg  On Behalf Of Wessels, Duane
> Sent: Thursday, October 28, 2021 5:58 PM
> To: Roman Danyliw 
> Cc: draft-ietf-dnsop-dns-tcp-requireme...@ietf.org; dnsop@ietf.org; Suzanne
> Woolf ; dnsop-cha...@ietf.org; The IESG
> 
> Subject: Re: Roman Danyliw's Discuss on draft-ietf-dnsop-dns-tcp-
> requirements-13: (with DISCUSS and COMMENT)
> 
> Hi Roman, thanks for the review.  My responses are inline.
> 
> > On Oct 25, 2021, at 3:02 PM, Roman Danyliw via Datatracker
>  wrote:
> >
> >
> >
> > --
> > DISCUSS:
> > --
> >
> > This document has a dedicated section for DNS over TLS, makes a number
> > of configuration recommendations for DoT, and notes it in the Privacy
> > Considerations.  However, there is no mention of DNS over HTTPS (DoH).
> > It seems like DoH should get similar treatment.
> 
> Speaking only for myself, I am reluctant to include DoH in this draft.  I 
> feel that
> TCP and TLS are similar enough that it makes sense to cover both, but DoH is
> quite a bit different.

No argument that DoH is a bit unlike the others.

> If there is a concern that mentioning DoT is unfair and DoH should get equal
> time then I would be in favor of discussing encrypted DNS transports more
> generally, or perhaps even cutting back on encrypted transport references.

I believe that if this draft is going to be the BCP to discuss DNS over TCP, 
all of the flavors of DNS over TCP need to be covered.  I think it would be a 
disservice to the existing guidance to cut out discussion of encrypted 
transport.  As you propose, I don't see a reason why the different encrypted 
transports couldn't be discussed together.  I leave it to the deep expertise in 
the WG to ensure that nuances between DoT and DoH, when relevant, are called 
out.

> But if Im in the minority here and the working group and IESG would like to 
> see
> DoH included then we can figure out what to say.
> 
> >
> >
> > --
> > COMMENT:
> > --
> >
> > Thank you to Alan DeKok for the SECDIR review.
> >
> > ** Section 2.2.
> >   Yet, defying some expectations, DNS over TCP remained little-used in
> >   real traffic across the Internet around this time.
> >
> > This section doesn’t define a time period to associate with “… around
> > this time”.
> 
> Does “…in the late 1990s” work for you?

Yes, thanks.

> 
> >
> > ** Section 2.2.
> >   Around the time
> >   DNSSEC was first defined, another new feature helped solidify UDP
> >   transport dominance for message transactions.
> >
> > Is that “new feature” EDNS(0) per Section 2.3?
> 
> Yes, its a lead-in to the next section.  Do you think the text needs to be
> different here?

No, you can leave the text as is.

> >
> > ** Section 2.5
> >   Today, the majority of the DNS community expects, or at least has a
> >   desire, to see DNS over TCP transactions occur without interference.
> >
> > Is there a citation for this assertion?
> 
> How about the 2020 DNS flag day?  Https://dnsflagday.net/2020/

Works for me.

> > ** Section 2.5.  Per the use of [CHES94] and [DJBDNS] to motivate the
> > position that DNS over TCP is not needed, are there more modern
> > references?  The former is from 1994, and the latter appears to be last
> updated in 2002.
> 
> I’m not aware of any newer, better references.  It does show how long held
> these beliefs are.

No problem.  I wanted to check.

> >
> > ** Section 3.
> >   Lastly, Section 1 of [RFC1536] is updated to eliminate the
> >   misconception that TCP is only useful for zone transfers.
> >
> > With what text is Section 1 of [RFC1536] updated?
> 
> I suppose my suggestion would be to strike this sentence:
> 
>UDP is, therefore, the chosen protocol for communication
>though TCP is used for zone transfers.
> 
> Later in section 1 there is a "Since UDP is used," which could be changed to
> "When UDP is used," if necessary.

Could you make it cleared exactly what is the old and new text relative to 
RFC1536.

> 
> >
> > ** Section 4.1.  Consider adding a reference of SYN cookies.
> 
> I added a reference to https://en.wikipedia.org/wiki/SYN_cookies

I would recommend using Section 3.6 of RFC4987 instead.

Everything else below looks good.  Thanks.

Regards,
Roman

> >
> > ** 

Re: [DNSOP] John Scudder's No Objection on draft-ietf-dnsop-dns-tcp-requirements-13: (with COMMENT)

2021-10-28 Thread Roman Danyliw
Hi John!

> -Original Message-
> From: iesg  On Behalf Of John Scudder via Datatracker
> Sent: Thursday, October 28, 2021 9:42 AM
> To: The IESG 
> Cc: draft-ietf-dnsop-dns-tcp-requireme...@ietf.org; dnsop@ietf.org; dnsop-
> cha...@ietf.org; suzworldw...@gmail.com
> Subject: John Scudder's No Objection on draft-ietf-dnsop-dns-tcp-requirements-
> 13: (with COMMENT)
> 
> John Scudder has entered the following ballot position for
> draft-ietf-dnsop-dns-tcp-requirements-13: No Objection
> 
> When responding, please keep the subject line intact and reply to all email
> addresses included in the To and CC lines. (Feel free to cut this introductory
> paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
> for more information about how to handle DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-tcp-requirements/
> 
> 
> 
> --
> COMMENT:
> --

[snip]
 
> 3. Section 6 says applications should perform “full TCP segment reassembly”.
> What does that mean? A quick google search doesn’t suggest it’s a well-known
> term of art. I'm guessing that what you mean is that the applications should
> capture (and log, etc) the bytestream that was segmented and transmitted by
> TCP?

I'll let the authors speak to this, but I think this means full TCP stream 
reassembly -- that is analyze, the reassembled stream, not the individual 
packets.  There is a long history of evasion attacks in network security 
analysis tools when individual fragments/packets are analyzed instead of the 
reassembled streams.

Roman
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's Discuss on draft-ietf-dnsop-dns-tcp-requirements-13: (with DISCUSS and COMMENT)

2021-10-25 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-dns-tcp-requirements-13: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-tcp-requirements/



--
DISCUSS:
--

This document has a dedicated section for DNS over TLS, makes a number of
configuration recommendations for DoT, and notes it in the Privacy
Considerations.  However, there is no mention of DNS over HTTPS (DoH).  It
seems like DoH should get similar treatment.


--
COMMENT:
--

Thank you to Alan DeKok for the SECDIR review.

** Section 2.2.
   Yet, defying some expectations, DNS over TCP remained little-used in
   real traffic across the Internet around this time.

This section doesn’t define a time period to associate with “… around this
time”.

** Section 2.2.
   Around the time
   DNSSEC was first defined, another new feature helped solidify UDP
   transport dominance for message transactions.

Is that “new feature” EDNS(0) per Section 2.3?

** Section 2.5
   Today, the majority of the DNS community expects, or at least has a
   desire, to see DNS over TCP transactions occur without interference.

Is there a citation for this assertion?

** Section 2.5.  Per the use of [CHES94] and [DJBDNS] to motivate the position
that DNS over TCP is not needed, are there more modern references?  The former
is from 1994, and the latter appears to be last updated in 2002.

** Section 3.
   Lastly, Section 1 of [RFC1536] is updated to eliminate the
   misconception that TCP is only useful for zone transfers.

With what text is Section 1 of [RFC1536] updated?

** Section 4.1.  Consider adding a reference of SYN cookies.

** Section 5.1.  Does the term “DNS Wedgie” have to be used here given its use
in American English as the name for a bullying practice?  Judging from a google
search (https://www.google.com/search?q="dns+wedgie";), this document appears to
be inventing the term in the context of DNS.

** Section 6.  Per “Furthermore, as with real TCP, …”, what is “real TCP”?

** Section 9.
   Because TCP is somewhat more complex than UDP, some characteristics
   of a TCP conversation may enable fingerprinting and tracking that is
   not possible with UDP.

Recommend being clearer on who is being fingerprinted – s/fingerprinting/DNS
client fingerprinting/

** Section 9.  The text “DNS over TLS or DTLS is the recommended way to achieve
DNS privacy” seems rather soft on recommending encrypted DNS of any flavor. 
Was there any WG conversation to same something stronger?

** Section 9.  The text mentions that TCP is more susceptible to
fingerprinting.  It would be also be worth mentioned that using DoH reduces
susceptibility to traffic analysis.



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-iana-class-type-yang-03: (with COMMENT)

2021-06-04 Thread Roman Danyliw
Hi Lada!

> -Original Message-
> From: Ladislav Lhotka 
> Sent: Friday, June 4, 2021 3:20 AM
> To: Roman Danyliw ; The IESG 
> Cc: draft-ietf-dnsop-iana-class-type-y...@ietf.org; dnsop-cha...@ietf.org;
> dnsop@ietf.org; be...@nlnetlabs.nl; be...@nlnetlabs.nl
> Subject: Re: Roman Danyliw's No Objection on draft-ietf-dnsop-iana-class-type-
> yang-03: (with COMMENT)
> 
> Hi Roman,
> 
> thanks for your comments, please see below.
> 
> Roman Danyliw via Datatracker  writes:
> 
> ...
> 
> > --
> > COMMENT:
> > --
> >
> > Thank you to Valery Smyslov for the SECDIR review.
> >
> > I applaud the clever use of XSLT to autogenerate and keep the YANG
> > module up to date.
> >
> > ** Section 5.  Recommend refining the security considerations to defer
> > security issues to the modules that use import the data types defined in 
> > this
> document.
> > Roughly:
> >
> > OLD
> > This documents translates two IANA registries into YANG data types
> >and otherwise introduces no technology or protocol.  Consequently,
> >there are no security issues to be considered for this document.
> >
> > NEW
> >
> > This document translates two IANA registries into YANG data types for
> > use by other YANG modules.  When imported and used, the resultant
> > module schema will have data nodes that can be writable or readable
> > via a network management protocol.  Access or modification to such
> > data nodes may be considered sensitive in some network environments,
> > and this risk should be evaluated by the importing module.
> >
> 
> The iana-dns-class-rr-type module only defines data types, so it doesn't
> contribute any data nodes when imported or used. I suggest to use the
> following formulation, adopted from RFC 6991:
> 
> NEW
>   This documents translates two IANA registries into YANG data types and
>   otherwise introduces no technology or protocol. The definitions themselves
>   have no security impact on the Internet, but their use in concrete YANG
>   modules might have. The security considerations spelled out in the YANG
>   specification [RFC7950] apply for this document as well.
> 
> Is it sufficient?

Works for me!  Thanks for the improvement.

Regards,
Roman

> Thanks, Lada
> 
> >
> >
> 
> --
> Ladislav Lhotka
> Head, CZ.NIC Labs
> PGP Key ID: 0xB8F92B08A9F76C67

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-iana-class-type-yang-03: (with COMMENT)

2021-06-02 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-iana-class-type-yang-03: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-iana-class-type-yang/



--
COMMENT:
--

Thank you to Valery Smyslov for the SECDIR review.

I applaud the clever use of XSLT to autogenerate and keep the YANG module up to
date.

** Section 5.  Recommend refining the security considerations to defer security
issues to the modules that use import the data types defined in this document. 
Roughly:

OLD
This documents translates two IANA registries into YANG data types
   and otherwise introduces no technology or protocol.  Consequently,
   there are no security issues to be considered for this document.

NEW

This document translates two IANA registries into YANG data types for use by
other YANG modules.  When imported and used, the resultant module schema will
have data nodes that can be writable or readable via a network management
protocol.  Access or modification to such data nodes may be considered
sensitive in some network environments, and this risk should be evaluated by
the importing module.



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-nsec-ttl-04: (with COMMENT)

2021-05-17 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-nsec-ttl-04: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-nsec-ttl/



--
COMMENT:
--

Thank to Tiru Reddy for the SECDIR review.

Section 5.  Per:

An attacker can prevent future records from appearing in a cache by
   seeding the cache with queries that cause NSEC or NSEC3 responses to
   be cached, for aggressive use purposes.  This document reduces the
   impact of that attack in cases where the NSEC or NSEC3 TTL is higher
   than the zone operator intended.

Shouldn’t this text read s/An attacker can prevent future records/An attacker
can delay future records/?  Per Section 9 of RFC8198, “If the resolver is
making aggressive use of NSEC/NSEC3, one successful attack would be able to
suppress many queries for new names, up to the negative TTL."  If the timing is
right, this delay could be indefinite.  Isn't the mitigation provided here that
the attacker needs to seed the cache more often?



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-server-cookies-04: (with COMMENT)

2020-12-15 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-server-cookies-04: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-server-cookies/



--
COMMENT:
--

Thank you to Stephen Farrell for the SECDIR review
(https://mailarchive.ietf.org/arch/msg/secdir/TV4Qw2ionRmJ8skKzgUWzRTeDtw/) and
the discussion around the appropriateness of SipHash, the associated reference
and the arithmetic around the timestamp.   A few comments on this thread
relevant as COMMENTs:

* Please do make clarifying editorial fixes noted here
https://mailarchive.ietf.org/arch/msg/secdir/eGSBMIwkaJjOy9EXtw5lqcgrZRM/

* Thanks for exploring URLs for the normative reference for for SipHash, but
pointing to a personal website is not appropriate (despite it providing a
direct link to the relevant paper).  Please use an authoritative citation in
Section 4.4.  I recommend (something to the effect of):

Aumasson JP., Bernstein D.J. SipHash: A Fast Short-Input PRF. Progress in
Cryptology - INDOCRYPT 2012. Lecture Notes in Computer Science, vol 7668.
Springer.  https://doi.org/10.1007/978-3-642-34931-7_28.

As an aside, while I concur with the sentiment that all crypto algorithms used
in standards track protocols should be reviewed by CRFG
(https://mailarchive.ietf.org/arch/msg/secdir/wZq9M2c3hrd5SpOc1KAM3TuPH0w/) as
a standard practice, this isn’t where we are as a community as of yet.  This
needed review of SipHash can be decoupled from this document. Additionally:

** Please also be clear on the notation that SipHash2.4.  Since the normative
reference uses the notation “SipHash-2-4” (with the dashes), please use that or
provide explicit text to explain it.

** Section 7.  For future agility, should a “recommended” column be
sub-registry just as was added to
https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4
or is the thinking that there will only be serial updates of the cookie
algorithm where concurrent use is not expected?



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Roman Danyliw's Discuss on draft-ietf-dnsop-dns-zone-digest-12: (with DISCUSS and COMMENT)

2020-10-14 Thread Roman Danyliw
Hi Duane!

> -Original Message-
> From: iesg  On Behalf Of Wessels, Duane
> Sent: Wednesday, October 14, 2020 8:28 AM
> To: Roman Danyliw 
> Cc: draft-ietf-dnsop-dns-zone-dig...@ietf.org; Tim Wicinski
> ; dnsop-cha...@ietf.org; dnsop@ietf.org; Wessels, Duane
> ; The IESG 
> Subject: Re: Roman Danyliw's Discuss on draft-ietf-dnsop-dns-zone-digest-12:
> (with DISCUSS and COMMENT)
> 
> 
> 
> > On Oct 12, 2020, at 9:24 AM, Roman Danyliw  wrote:
> >
> > Hi Duane!
> >
> > Thanks for the extensive changes in -13.  They address my concerns.  I have
> left one remaining comment about clarifying "provably secure" with a
> reference.  Otherwise, I've cleared my ballot.
> 
> Thanks Roman,
> 
> Instead of "provably secure," how does this look to you:
> 
>1.  The verifier MUST first determine whether or not to expect DNSSEC
>records in the zone.  By examining locally configured trust
>anchors, and, if necessary, querying for and validating DS RRs in
>the parent zone, the verifier knows whether or not the zone to be
>verified should include DNSSEC keys and signatures.  For zones
>where signatures are not expected, or if DNSSEC validation is not
>performed, digest verification continues at step 4 below.
> 
>2.  For zones where signatures are expected, the existence of the
>apex ZONEMD record MUST be validated.  If the DNSSEC data proves
>the ZONEMD RRSet does not exist, digest verification cannot
>occur.  If the DNSSEC data proves the ZONEMD does exist, but is
>not found in the zone, digest verification MUST NOT be considered
>successful.
> 
>3.  For zones where signatures are expected, the SOA and ZONEMD
>RRSets MUST have valid signatures, chaining up to a trust anchor.
>If DNSSEC validation of the SOA or ZONEMD RRSets fails, digest
>verification MUST NOT be considered successful.

This language looks good to me and is even better than a reference.  Thanks for 
clarifying the text further.

Roman

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Roman Danyliw's Discuss on draft-ietf-dnsop-dns-zone-digest-12: (with DISCUSS and COMMENT)

2020-10-12 Thread Roman Danyliw
Hi Duane!

Thanks for the extensive changes in -13.  They address my concerns.  I have 
left one remaining comment about clarifying "provably secure" with a reference. 
 Otherwise, I've cleared my ballot.

Regards,
Roman

> -Original Message-
> From: iesg  On Behalf Of Wessels, Duane
> Sent: Friday, October 9, 2020 2:40 PM
> To: Roman Danyliw 
> Cc: draft-ietf-dnsop-dns-zone-dig...@ietf.org; Tim Wicinski
> ; dnsop-cha...@ietf.org; dnsop@ietf.org; Wessels, Duane
> ; The IESG 
> Subject: Re: Roman Danyliw's Discuss on draft-ietf-dnsop-dns-zone-digest-12:
> (with DISCUSS and COMMENT)
> 
> 
> 
> > On Oct 7, 2020, at 1:52 PM, Roman Danyliw  wrote:
> >
> >
> > In that case (where no assumptions are made about the transport), it seems
> that only these scenarios from the list above apply:
> >
> > With an on-path attacker (and trusted server hosting the zone file)
> >
> > ** No DNSSEC  = integrity: NO; authenticity = NO
> > ** DNSSEC = integrity: YES; authenticity = YES
> >
> > With a rogue server hosting the zone file (but is not the operator of the 
> > zone)
> >
> > ** No DNSSEC = integrity: NO; authenticity = NO
> > ** DNSSEC = integrity: YES; authenticity = YES
> >
> > Or more succinctly, without DNSSEC, the two stated security properties 
> > aren't
> provided.
> >
> > I'm not sure of what the best way is to resolve this mismatch based on the
> use cases.  I can see (at least) two paths to resolution:
> >
> > (1) Specify that ZONEMD records MUST only be used with DNSSEC -- this will
> preserve the authenticity and integrity properties described in Section 1.1. 
> and
> 6.  An additional step or two might be needed to the verification process in
> Section 4.  Does this impact the planned use cases or workflows?
> >
> > (2) Provide appropriate caveats that ZONEMD information may not mean
> what you think it means depending on whether DNSSEC is used.  This likely
> means: the motivational goal in Section 1.1 may need to be weakened; the
> analysis of alternatives in Section 1.2 won't make sense (for the non-DNSSEC
> case); and an appropriate applicability-like statement might also be necessary
> to describe how to use an insecure checksum.  Section 6 would needs
> additional language to capture the difference between the DNSSEC vs. non-
> DNSSEC deployment.  Editorially, clearer words like checksum might also help.
> 
> Thanks Roman, I see your point.  With the help of my coauthors we have made
> some edits that I think will address your concerns.
> Rather than try to include them all here, it will probably be easier to read 
> the
> diff of the next revision that we hope to
> submit later today.  Alternatively I can give you a github pull request link
> showing the changes if that would be helpful.
> 
> DW

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Roman Danyliw's Discuss on draft-ietf-dnsop-dns-zone-digest-12: (with DISCUSS and COMMENT)

2020-10-07 Thread Roman Danyliw
Hi Duane,

> -Original Message-
> From: iesg  On Behalf Of Wessels, Duane
> Sent: Wednesday, October 7, 2020 3:55 PM
> To: Roman Danyliw 
> Cc: draft-ietf-dnsop-dns-zone-dig...@ietf.org; Tim Wicinski
> ; dnsop@ietf.org; dnsop-cha...@ietf.org; The IESG
> 
> Subject: Re: Roman Danyliw's Discuss on draft-ietf-dnsop-dns-zone-digest-12:
> (with DISCUSS and COMMENT)
> 
> Hi Roman, thanks for the detailed review and comments.  My responses are
> inline.
> 
> 
> > On Oct 5, 2020, at 7:47 PM, Roman Danyliw via Datatracker
>  wrote:
> >
> > Roman Danyliw has entered the following ballot position for
> > draft-ietf-dnsop-dns-zone-digest-12: Discuss
> >
> > When responding, please keep the subject line intact and reply to all
> > email addresses included in the To and CC lines. (Feel free to cut this
> > introductory paragraph, however.)
> >
> >
> > Please refer to https://secure-
> web.cisco.com/1PmgI5C3eeSLOyMacI0tFtTZ2Xp1ZVDLlBYygPBOj1Q0bVtLkzLw
> mmN5ldjjcypZn5nnasJsm9E5GpsNMDvWdtGaM2kaFHhp7jZlEgufkzdln1LmRT84
> DKcbrePOUdtgU2M4UwQqhJ69IT0KBrKkQNN1OLFRMyYwhXs48zGHMkPxAOQ
> 9L2Je4TLpCoWGXIqZExBn5ErrQBYfVsEcz2xB1L-
> eKHO_l_zDzfiAHtMP8zHJQ_7GCF6YPn4OTvYHtKq1TL85oSNMxkc-
> a9TwIaBuzcEx2aRPzSqAPypDs7bIbFPs/https%3A%2F%2Fwww.ietf.org%2Fiesg%
> 2Fstatement%2Fdiscuss-criteria.html
> > for more information about IESG DISCUSS and COMMENT positions.
> >
> >
> > The document, along with other ballot positions, can be found here:
> > https://secure-
> web.cisco.com/1In2W1aOUrhepme0YYTCWi_KVrjzwPz6gRHK3wqiBh8JhXsVPR-
> caNTg-
> liKbKCksx5Y35akHQwb5BB41XUadJT3by_ZmHTxwdiSU3QpC4eNTBAE42Pw2m
> ywlUcsCxUsDMgrwL3ph93cdoIxfnYKlbiF9GQp0v74iO_IcfqqkdmjHCiFqNSIrWIJsj
> sae_FUkueb3LzXcJ3Ine0GDo664s3xd60kYguQsCr17CZmEHlHTLEzHiGGXW8IrEm
> 4JcgBjaAU2ABRPZ-
> bfBv0LsmZR0Q/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-
> dnsop-dns-zone-digest%2F
> >
> >
> >
> > --
> > DISCUSS:
> > --
> >
> > Section 6.1.   My read of the text is that the security properties are 
> > intended
> > to be independent of the transport protocol.  With that assumption and the
> > validation procedures in Section 4, I need help understanding the security
> > properties the client can rely on in the absence of DNSSEC.  Consider the
> > following scenarios and attacker types; and the assurances a client could 
> > have
> > when retrieving the zone file from the server:
> >
> > With an on-path attacker (and trusted server hosting the zone file)
> >
> > ** No DNSSEC; No Secure transport = integrity: NO; authenticity = NO
> >
> > ** No DNSSEC; Secure transport = integrity: YES (from the on-path attacker);
> > authenticity = NO
> >
> > ** DNSSEC = integrity: YES; authenticity = YES
> >
> > With a rogue server hosting the zone file (but is not the operator of the 
> > zone)
> >
> > ** No DNSSEC; No Secure transport = integrity: NO; authenticity = NO
> >
> > ** No DNSSEC/Secure transport = integrity: NO; authenticity = NO
> >
> > ** DNSSEC = integrity: YES; authenticity = YES
> >
> > The text states that:
> >
> > The zone digest allows the recipient of a zone to verify its
> >  integrity.  In conjunction with DNSSEC, the recipient can
> >  authenticate that it is as published by the zone originator.
> >
> > Can the means to realize integrity without DNSSEC unless there is a reliance
> on
> > transport security of some form be clarified.  Minimally, it seems like this
> > section needs cautionary text (likely with normative language) to the 
> > effect of
> > “ZONEMD information from zone files lacking DNSSEC support or that were
> shared
> > over ‘unsecure transport’ cannot be relied upon for cryptographic integrity
> > assurance.”
> 
> You are correct that we intend the security properties to be independent of
> any transport protocol.   I'm reluctant to suggest in this document that
> a recipient could rely on ZONEMD for integrity because it came over a secure
> transport.  Although that might be true, I have to think that the secure
> transport itself provides the integrity assurance, and not the ZONEMD record.

In that case (where no assumptions are made about the transport), it seems that 
only these scenarios from the list above apply:

 With an on-path attacker (and trusted server hosting the zone file)

** No DNSSEC  = integrity: NO; authenticity = NO
** DNSSEC = integrity: YES; authenticity = YES

With a rogue serv

[DNSOP] Roman Danyliw's Discuss on draft-ietf-dnsop-dns-zone-digest-12: (with DISCUSS and COMMENT)

2020-10-05 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-dns-zone-digest-12: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-zone-digest/



--
DISCUSS:
--

Section 6.1.   My read of the text is that the security properties are intended
to be independent of the transport protocol.  With that assumption and the
validation procedures in Section 4, I need help understanding the security
properties the client can rely on in the absence of DNSSEC.  Consider the
following scenarios and attacker types; and the assurances a client could have
when retrieving the zone file from the server:

With an on-path attacker (and trusted server hosting the zone file)

** No DNSSEC; No Secure transport = integrity: NO; authenticity = NO

** No DNSSEC; Secure transport = integrity: YES (from the on-path attacker);
authenticity = NO

** DNSSEC = integrity: YES; authenticity = YES

With a rogue server hosting the zone file (but is not the operator of the zone)

** No DNSSEC; No Secure transport = integrity: NO; authenticity = NO

** No DNSSEC/Secure transport = integrity: NO; authenticity = NO

** DNSSEC = integrity: YES; authenticity = YES

The text states that:

The zone digest allows the recipient of a zone to verify its
   integrity.  In conjunction with DNSSEC, the recipient can
   authenticate that it is as published by the zone originator.

Can the means to realize integrity without DNSSEC unless there is a reliance on
transport security of some form be clarified.  Minimally, it seems like this
section needs cautionary text (likely with normative language) to the effect of
“ZONEMD information from zone files lacking DNSSEC support or that were shared
over ‘unsecure transport’ cannot be relied upon for cryptographic integrity
assurance.”


--
COMMENT:
--

Thank you for addressing the SECDIR review (and thank you to Donald Eastlake
for performing the review).

** Section 1.  s/allowing verification of the zone/allowing verification of the
integrity of the zone/

** Section 1.2.  In the discussion about alternatives, it seems like the two
competing designs are “channel security” vs. “data security”?  Is the latter
the equivalent to “object security”, a term with which I’m more familiar?  That
is, the data itself carries a set of security properties independent of the
channel or session exchanging it.

** Section 1.3.  Clarifying language.
OLD
As specified herein, the digest is re-calculated over the
   entire zone content each time

NEW
As specified herein, the digest is re-calculated over the
   entire zone content each time the zone is updated.

** Section 1.3.  Editorial.  The sentence “It is, however, extensible so future
schemes to support incremental zone digest algorithms (e.g. using Merkle trees)
can be accommodated” didn’t parse for me.

** Section 2.  Per the support of multiple ZONEMD RRs, what is meant by
“rollovers”?  There are no keys here.  It seems like multiple ZONEMD would be
there for algorithm agility (mentioned) and scheme agility.

** Section 2.0.
When multiple ZONEMD RRs are present, each
   must specify a unique Scheme and Hash Algorithm tuple

Would a normative MUST be more appropriate here?

** Section 4.  The numbered list calls zones “provably insecure” and “provable
secure”.  What is the precise definition of those terms.  Unless there were
formal methods involved, I’d recommend against using those words.

** Section 4.
If multiple ZONEMD RRs are
   present in the zone, e.g., during an algorithm rollover, a match
   using any one of the recipient's supported Schemes and Hash
   Algorithms is sufficient to verify the zone.

It would likely be worth mentioning in Section 6 that when multiple algorithms
are used, the overall security rests with the weakest one.

** Section 5.2 and 5.3  Shouldn’t there be a request for a sub-registry, not  a
web page?

For Section 5.2:
OLD
   IANA is requested to create a new registry on the "Domain Name System
   (DNS) Parameters" web page as follows:

NEW
   IANA is requested to create a new sub-registry in the "Domain Name System
   (DNS) Parameters" registry as follows:

** Section 5.2.  It would likely be helpful to clarify the purpose of the
fields (e.g., it wasn’t obvious to me initially that “Implementati

[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-extended-error-14: (with COMMENT)

2020-04-21 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-extended-error-14: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-extended-error/



--
COMMENT:
--

** Thanks for responding to the SECDIR review (and thanks Catherine Meadows for
the review).  I recommend applying the proposed text (suggested by Wes) to the
Security Considerations that resulted from the discussion.  For me, it strikes
a balance.

** Section 4.5.  Code = 4 (Forged answer) rolls up into a single code a number
of rationales as to why the answer was forged (e.g., legal vs. malware). 
However, when the request is blocked via blacklist, separate codes are not
defined to convey the rationale.  Why isn’t there symmetry?

** Section 6.  Per the example of [RFC2845] and [RFC8094] as being approaches
where DNS answer could be authenticated, consider adding RFC8484 to the list
too.

** Editorial Nits:
-- Section 1.  Typo. s/These extended  DNS error codes described in this
document and can be used … /These extended DNS error codes described in this
document can be used …/

-- Section 2.  Typo. s/ The INFO-CODE serves as an index into the "Extended DNS
 Errors" registry Section 5.1./ The INFO-CODE serves as an index into the
"Extended DNS Errors" registry defined in Section 5.1./

-- Section 4.  s/… in the "Extended DNS Errors" registry Section 5.1 ./ … in
the "Extended DNS Errors" registry defined in Section 5.1 ./

-- Section 4.9. s/but but/but/

-- Section 4.4. Typo. s/serever/server/

-- Section 7.  “One author also wants to thank the band …”, is this really
needed in an archival document?



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-multi-provider-dnssec-04: (with COMMENT)

2020-04-08 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-multi-provider-dnssec-04: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-multi-provider-dnssec/



--
COMMENT:
--

Thank you for responding to the SECDIR review by Daniel Migault (and thanks for
doing the review Daniel!)  The proposed clarifications would be helpful.

** Per Section 6.1, “Provider A would generate a new ZSK and communicate their
intent to perform a rollover …”, how is that communication done? Just as the
Security Considerations already talks about API security, is there an analogous
thing to say here in Section 12?

** Section 12.  As key generation is invoked as a step in a number of these
procedures, provide a pointer good practices for this step would be helpful,
say Section 3.4.4 of RFC6781.

** Editorial Nits:
-- A few places.  Typo. s/Authentiated/ Authenticated/g

-- Section 5.1.  Typo. s/prefered/preferred/

-- Section 5.2. Typo. s/Aggresive/Aggressive/



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-no-response-issue-20: (with COMMENT)

2020-04-07 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-no-response-issue-20: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-no-response-issue/



--
COMMENT:
--

Thanks for this document – it is allows for a very approachable way to verify
conformance.

** Section 2. Per “Working around issues due to non-compliance with RFCs is not
sustainable”, this seems like a bold statement.  What is the basis for it?

** Section 4.  This section repeats several times that firewall should not drop
DNS traffic with unknown parameters and such traffic should not be construed as
an attack.  In the general case with “normal clients”, this is good advice. 
However, for certain highly controlled enclaves where a white-list-style
approach to traffic is taken, this is not realistic.  The presence of
unexpected classes of new DNS traffic would be a bad sign (e.g., of compromise,
a new software load whose features were not understood, or a configuration
which was not validated)

** Section 8.  For completeness, per “The test below use dig from BIND 9.11.0”,
please provide a reference.

** Section 8 dig examples.  It would be worth explaining $zone and $server.

** Section 10.  Per “Testing protocol compliance can potentially result in
false reports of attempts to break services from Intrusion Detection Services
and firewalls.”, thanks for calling this out.  I would recommend tuning this
language:

-- s/break services/attack services/

-- to acknowledge that uncommon DNS protocol fields or traffic (from this test
regime) might trigger anomaly-detection/profile-based IDS alerts too

** Editorial Nits:

-- Section 8. s/is know/is known/



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-rfc2845bis-07: (with COMMENT)

2020-03-10 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-rfc2845bis-07: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc2845bis/



--
COMMENT:
--

** Section 1.3.  Per “In 2017, two nameservers  strictly following that
document (and the related [RFC4635]) were discovered to have security problems
related to this feature”, consider providing a reference to the published
vulnerabilities (i.e., CVE-2017-3142 and CVE-2017-3143)

** Section 6.  Per “SHA-1 collisions have been demonstrated so the MD5 security
considerations apply to SHA-1 in a similar manner.  Although support for
hmac-sha1 in TSIG is still mandatory for compatibility reasons, existing uses
should be replaced with hmac-sha256 or other SHA-2 digest algorithms
[FIPS180-4], [RFC3874], [RFC6234].

-- It’s worth repeating those MD5 security considerations here

-- (from Magnus Nystrom’s SECDIR review, thanks Magnus!) it’s worth including
references to the recent SHA-1 cryptoanalysis provided in the SECDIR review

-- The SHA-2 family should be a normative SHOULD (or RECOMMENDED).

** Section 10.  Per “For all of the message authentication code algorithms
listed in this document, those producing longer values are believed to be
stronger”, as noted in Magnus’s SECDIR review, this could be misconstrued as
the algorithm choice not the digest length provides the security.  Recommend
rephrasing (or making some statement

** Editorial
-- Section 4.3.2.  Per “When verifying an incoming message, this is the message
after the TSIG RR and been removed and the ARCOUNT field has been
decremented.”, this sentence doesn’t parse (is missing a word).

-- Section 4.3.2.  Per “A whole and complete DNS message in wire format.”, this
isn’t a sentence.



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-serve-stale-09: (with COMMENT)

2019-12-03 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-serve-stale-09: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-serve-stale/



--
COMMENT:
--

* I agree with Mirja, Section 8 is more informative than what is alluded to the
paragraph starting with “Several recursive resolvers …” in Section 3, and IMO
is worth keeping.  I struck me as odd to call out the operation practice of a
particular vendor (Akamai).  We might want to check if this reference is ok –
Ben?

* A few reference nits:
- Section 6.  Per the mention to DNS-OARC, please provide a citation.
- Section 6 and 9.  The text references “during discussions in the IETF”.  What
is that specifically – WG deliberation?

* Thanks for covering the attacker use cases of stale data in Section 10.


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-obsolete-dlv-01: (with COMMENT)

2019-10-29 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-obsolete-dlv-01: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-obsolete-dlv/



--
COMMENT:
--

** Section 1.  Is there a reference that can be cited to support the metric
that 1389 of 1531 TLDs have secure delegation?

** Editorial.  From idnits: The document seems to lack a both a reference to
RFC 2119 and the recommended RFC 2119 boilerplate, even if it appears to use
RFC 2119 keywords.
 RFC 2119 keyword, line 117: '...he DLV mechanism SHOULD NOT be impleme...'

** Editorial -- The Table of Contents doesn’t appear to have generated the
Section-to-Page Number mapping


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-algorithm-update-08: (with COMMENT)

2019-04-12 Thread Roman Danyliw
Hi!

From: Paul Wouters [mailto:pwout...@redhat.com]
Sent: Wednesday, April 10, 2019 12:49 PM
To: Roman Danyliw 
Cc: The IESG ; draft-ietf-dnsop-algorithm-upd...@ietf.org; Tim 
Wicinski ; dnsop-cha...@ietf.org; dnsop@ietf.org
Subject: Re: Roman Danyliw's No Objection on 
draft-ietf-dnsop-algorithm-update-08: (with COMMENT)

Thanks for the review!

On Wed, Apr 10, 2019 at 5:30 PM Roman Danyliw via Datatracker 
mailto:nore...@ietf.org>> wrote:

--
COMMENT:
--

(1) Abstract.  Nit.  There is a reference, [RFC6944], in the abstract which
isn’t permitted.

Hmm, it is really just giving a clickable reference to the document we are 
obsoleting. It's kind of nice to have there. But I guess you are right that it 
is not allowed, so I've made the text without a reference.

[Roman] Thanks.


(2) Section 1.2, Per “This document only provides recommendations with respect
to mandatory-to-implement algorithms or algorithms so weak that recommendation
cannot be recommended”

** Editorial:
s/algorithms so weak that recommendation cannot be recommended/
algorithms so weak that they cannot be recommended/

Was fixed in -08

[Roman] Thanks.

** The first part of the sentence doesn’t appear to be consistent with the
RFC2119 words in the Section 3.1 Table which also includes RECOMMENDED/MAY
(which is neither MTI or NOT RECOMMENDED)

It is recommended in lower case, not in 2119 meaning?

[Roman] Ok.  I didn’t read it like that.

(3) Section 1.3, Typo, s/from from/from/

(4) Section 3.1, Typo, s/cryptographics/cryptographic/

Were already fixed.


(5) Section 3.1, ED448 appears to be the only algorithm that doesn’t have
treatment in even briefly describing its designated implementation
recommendation.

It does get mentioned in the beginning of the paragraph. But there isn't much 
to say really. It's there but just slightly stronger than 25519, so not really 
worth the effort. I think it is okay to leave it as motsly uninteresting, but 
if someone has some text, I'm fine with that too.


(6) Section 3.1, The sentence “It is expected that ED25519 will become the
future RECOMMENDED default algorithm …” is clear on the future.  However,
looking back at the table in this section, it wasn’t clear what the current
default algorithm is.

I've changed it a little bit to indicate this by adding a sentence here:

  RSASHA256 is in wide use and considered strong. It has been the 
default
  algorithm for a number of years and is now slowly being replaced with
  ECDSAP256SHA256 due to its shorter key and signature size, resulting 
in
  smaller DNS packets.


[Roman] This is clearer.  Thanks.


(7) Section 3.2, The sentence “Operation recommendation for new and existing
deployments.” Seems to stand alone or is missing some words.  Should it be
something along the lines of “This section provides operational recommendations
…”

I've removed the sentence.


(8) Section 3.2, Typo, s/is RECOMMENDED/is the RECOMMENDED/

(9) Section 3.4, Editorial, s/The SHA-256/SHA-256/

Were already fixed in -08.


(10) Section 4, Typo, s/seciton/section/

Fixed.

(11) Section 5, Editorial, s/for the use of DNSSEC/for use in DNSSEC/

Fixed.

The -09 should appear shortly with these fixes.

[Roman]  Thanks so much for closing the loop on these and making the changes.

Thanks!

Paul


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-algorithm-update-08: (with COMMENT)

2019-04-10 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-dnsop-algorithm-update-08: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-algorithm-update/



--
COMMENT:
--

(1) Abstract.  Nit.  There is a reference, [RFC6944], in the abstract which
isn’t permitted.

(2) Section 1.2, Per “This document only provides recommendations with respect
to mandatory-to-implement algorithms or algorithms so weak that recommendation
cannot be recommended”

** Editorial:
s/algorithms so weak that recommendation cannot be recommended/
algorithms so weak that they cannot be recommended/

** The first part of the sentence doesn’t appear to be consistent with the
RFC2119 words in the Section 3.1 Table which also includes RECOMMENDED/MAY
(which is neither MTI or NOT RECOMMENDED)

(3) Section 1.3, Typo, s/from from/from/

(4) Section 3.1, Typo, s/cryptographics/cryptographic/

(5) Section 3.1, ED448 appears to be the only algorithm that doesn’t have
treatment in even briefly describing its designated implementation
recommendation.

(6) Section 3.1, The sentence “It is expected that ED25519 will become the
future RECOMMENDED default algorithm …” is clear on the future.  However,
looking back at the table in this section, it wasn’t clear what the current
default algorithm is.

(7) Section 3.2, The sentence “Operation recommendation for new and existing
deployments.” Seems to stand alone or is missing some words.  Should it be
something along the lines of “This section provides operational recommendations
…”

(8) Section 3.2, Typo, s/is RECOMMENDED/is the RECOMMENDED/

(9) Section 3.4, Editorial, s/The SHA-256/SHA-256/

(10) Section 4, Typo, s/seciton/section/

(11) Section 5, Editorial, s/for the use of DNSSEC/for use in DNSSEC/


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop