[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-21 Thread John R Levine
Actually, we are developing an unrelated scheme that has need of the same 
zone structure for signaling but not involving DNSSEC itself, and would see 
some advantage in utilizing the same standard top level underscore naming for 
signaling use in general.


Would you want to put the signal info in the same zones with the DNSSEC 
stuff?  If not, you don't want the same tag.


Regards,
John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-21 Thread Peter Thomassen

[another (last) attempt of reposting this as it did not get delivered to 
dnsop@ietf.org on May 7, as evidenced by the list archive]


Hi,

On 5/2/24 19:59, David Dong via RT wrote:

Following up on this; does the group agree that "_dnssec" is OK?


Looking at what's been said in this thread:
- Two people have proposed to change the label, current proposal: _dnssec
- Two implementers have said they'd make the change but don't seem convinced
- The authors (hats off, but also implementers and authors of current drafts 
using the mechanism) are not convinced

The authors don't feel comfortable declaring consensus in either direction 
(neither do we know whether that's our role), and we're not sure how to 
proceed. Perhaps the DNSOP chairs could weigh in, as the discussion is 
happening on the WG list although the document is technically out of the door 
...


I've been reluctant adding the following argument as to not seem insisting; 
OTOH it may have its own technical merit, so here is.

The "_dnssec" label implies that the mechanism is not suitable for signaling 
unrelated to DNSSEC. That's an artificial limitation, and it's unclear why to impose the 
restriction. An operator could very well want to publish other things, like

- TXT at _abuse.example.com._signal.ns1.provider.net for an abuse address,
- PTR at _catalog.example.com._signal ... for catalog zone membership,
- ...

If the signaling method is generic, I believe it should have a short generic 
label. Any specificity to determine the kind of signal can go into the first 
label.

I have no specific preference for "_signal" other than I don't know what a good 
alternative would be. Narrowing the scope with "_dnssec" doesn't seem to improve the 
situation.

Thanks,
Peter
+ Nils (for the "we"/author statements)



Thank you.

Best regards,

David Dong
IANA Services Sr. Specialist

On Mon Apr 22 11:42:15 2024, scott.r...@nist.gov wrote:

On 20 Apr 2024, at 19:38, Paul Wouters wrote:


On Sat, 20 Apr 2024, Peter Thomassen wrote:


The authors certainly don't insist, but we'd need to pick a suitable
replacement for the "_signal" label.

John proposed "_dnssec-signal" elsewhere in this thread.

The authors would like to note that adding "_dnssec-" eats up 8 more
bytes, increasing chances that bootstrapping will fail due to the
_dsboot.._dnssec-signal. length limitation.
Other than this (unnecessary?) use case narrowing, this choice seems
fine.

That said, does this choice address your concerns?


It would, but I would also be okay if it is just _dnssec.



If the concern is that the label is too generic, “_dnssec” might be
too generic as well. If it is to be more precise, go with _ds-boot or
something more specific to the use case. I don’t have an
implementation in the mix, so it this isn’t a strong opinion.   If the
group agrees _dnssec is fine, then I am fine with it too.

Scott

=
Scott Rose
NIST/CTL/WND
scott.r...@nist.gov
ph: 301-975-8439
GoogleVoice: 571-249-3671
=




--
Like our community service? 
Please consider donating at

https://desec.io/

deSEC e.V.
Kyffhäuserstr. 5
10781 Berlin
Germany

Vorstandsvorsitz: Nils Wisiol
Registergericht: AG Berlin (Charlottenburg) VR 37525

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-21 Thread Peter Thomassen

Hi,

On 5/2/24 19:59, David Dong via RT wrote:

Following up on this; does the group agree that "_dnssec" is OK?


Looking at what's been said in this thread:
- Two people have proposed to change the label, current proposal: _dnssec
- Two implementers have said they'd make the change but don't seem convinced
- The authors (hats off, but also implementers and authors of current drafts 
using the mechanism) are not convinced

The authors don't feel comfortable declaring consensus in either direction 
(neither do we know whether that's our role), and we're not sure how to 
proceed. Perhaps the DNSOP chairs could weigh in, as the discussion is 
happening on the WG list although the document is technically out of the door 
...


I've been reluctant adding the following argument as to not seem insisting; 
OTOH it may have its own technical merit, so here is.

The "_dnssec" label implies that the mechanism is not suitable for signaling 
unrelated to DNSSEC. That's an artificial limitation, and it's unclear why to impose the 
restriction. An operator could very well want to publish other things, like

- TXT at _abuse.example.com._signal.ns1.provider.net for an abuse address,
- PTR at _catalog.example.com._signal ... for catalog zone membership,
- ...

If the signaling method is generic, I believe it should have a short generic 
label. Any specificity to determine the kind of signal can go into the first 
label.

I have no specific preference for "_signal" other than I don't know what a good 
alternative would be. Narrowing the scope with "_dnssec" doesn't seem to improve the 
situation.

Thanks,
Peter
+ Nils (for the "we"/author statements)



Thank you.

Best regards,

David Dong
IANA Services Sr. Specialist

On Mon Apr 22 11:42:15 2024, scott.r...@nist.gov wrote:

On 20 Apr 2024, at 19:38, Paul Wouters wrote:


On Sat, 20 Apr 2024, Peter Thomassen wrote:


The authors certainly don't insist, but we'd need to pick a suitable
replacement for the "_signal" label.

John proposed "_dnssec-signal" elsewhere in this thread.

The authors would like to note that adding "_dnssec-" eats up 8 more
bytes, increasing chances that bootstrapping will fail due to the
_dsboot.._dnssec-signal. length limitation.
Other than this (unnecessary?) use case narrowing, this choice seems
fine.

That said, does this choice address your concerns?


It would, but I would also be okay if it is just _dnssec.



If the concern is that the label is too generic, “_dnssec” might be
too generic as well. If it is to be more precise, go with _ds-boot or
something more specific to the use case. I don’t have an
implementation in the mix, so it this isn’t a strong opinion.   If the
group agrees _dnssec is fine, then I am fine with it too.

Scott

=
Scott Rose
NIST/CTL/WND
scott.r...@nist.gov
ph: 301-975-8439
GoogleVoice: 571-249-3671
=




--
Like our community service? 
Please consider donating at

https://desec.io/

deSEC e.V.
Kyffhäuserstr. 5
10781 Berlin
Germany

Vorstandsvorsitz: Nils Wisiol
Registergericht: AG Berlin (Charlottenburg) VR 37525

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-21 Thread Peter Thomassen

[reposting as it did not get delivered to dnsop@ietf.org, as evidenced by the 
list archive]


Hi,

On 5/2/24 19:59, David Dong via RT wrote:

Following up on this; does the group agree that "_dnssec" is OK?


Looking at what's been said in this thread:
- Two people have proposed to change the label, current proposal: _dnssec
- Two implementers have said they'd make the change but don't seem convinced
- The authors (hats off, but also implementers and authors of current drafts 
using the mechanism) are not convinced

The authors don't feel comfortable declaring consensus in either direction 
(neither do we know whether that's our role), and we're not sure how to 
proceed. Perhaps the DNSOP chairs could weigh in, as the discussion is 
happening on the WG list although the document is technically out of the door 
...


I've been reluctant adding the following argument as to not seem insisting; 
OTOH it may have its own technical merit, so here is.

The "_dnssec" label implies that the mechanism is not suitable for signaling 
unrelated to DNSSEC. That's an artificial limitation, and it's unclear why to impose the 
restriction. An operator could very well want to publish other things, like

- TXT at _abuse.example.com._signal.ns1.provider.net for an abuse address,
- PTR at _catalog.example.com._signal ... for catalog zone membership,
- ...

If the signaling method is generic, I believe it should have a short generic 
label. Any specificity to determine the kind of signal can go into the first 
label.

I have no specific preference for "_signal" other than I don't know what a good 
alternative would be. Narrowing the scope with "_dnssec" doesn't seem to improve the 
situation.

Thanks,
Peter
+ Nils (for the "we"/author statements)



Thank you.

Best regards,

David Dong
IANA Services Sr. Specialist

On Mon Apr 22 11:42:15 2024, scott.r...@nist.gov wrote:

On 20 Apr 2024, at 19:38, Paul Wouters wrote:


On Sat, 20 Apr 2024, Peter Thomassen wrote:


The authors certainly don't insist, but we'd need to pick a suitable
replacement for the "_signal" label.

John proposed "_dnssec-signal" elsewhere in this thread.

The authors would like to note that adding "_dnssec-" eats up 8 more
bytes, increasing chances that bootstrapping will fail due to the
_dsboot.._dnssec-signal. length limitation.
Other than this (unnecessary?) use case narrowing, this choice seems
fine.

That said, does this choice address your concerns?


It would, but I would also be okay if it is just _dnssec.



If the concern is that the label is too generic, “_dnssec” might be
too generic as well. If it is to be more precise, go with _ds-boot or
something more specific to the use case. I don’t have an
implementation in the mix, so it this isn’t a strong opinion.   If the
group agrees _dnssec is fine, then I am fine with it too.

Scott

=
Scott Rose
NIST/CTL/WND
scott.r...@nist.gov
ph: 301-975-8439
GoogleVoice: 571-249-3671
=




--
Like our community service? 
Please consider donating at

https://desec.io/

deSEC e.V.
Kyffhäuserstr. 5
10781 Berlin
Germany

Vorstandsvorsitz: Nils Wisiol
Registergericht: AG Berlin (Charlottenburg) VR 37525

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-16 Thread Warren Kumari
Hi all,


I've read the thread multiple times, and can definitely see both sides of
the conversation. As Paul W is wearing both an AD hat and the DE hat, he
has asked me to make the decision and instruct him.

While I really don't love it, I believe that it makes sense to stick with
_signal.

Reasons against:
1: It is very generic. It's not at all clear that
foo.bar.baz._signal.example.com has anything to do with DNSSEC (although
_dsboot.foo.bar.baz._signal.example.com is clearer)

Reason for:
1: It is very generic - it another scheme happens to be able to fit well
under _signal, they can use it; _cheese.foo.bar.baz._signal.com **might**
be good if a parent wants to inform someone about their children's cheese
preferences)

2: Strings are cheap - if another scheme happens to not fit will under
_signal, they can choose another one (hopefully less generic next time!) —
_flavor.foo.bar._cheese.example.com.

3: It happens to already be some what deployed - and we cannot (easily)
tell who all has done so. Yes, CloudFlare presumably has this baked into a
variable somewhere and  it would be trivial to s/_signal/_dnssec-boot/, but
someone might also have already done this manually. Yes, I fully agree that
people shouldn't kvetch if they implemented from a draft and have to change
— which is why I only used this as a tie-breaker.

This was one of those "there is no perfect answer" situations, and at least
some set of people will be unhappy (sorry!), but I think that sticking with
the draft is the lesser of the two evils…

W



On Wed, May 15, 2024 at 4:49 PM, Peter Thomassen  wrote:

> Hi David,
>
> The DNSOP chairs have told me that the document is no longer a WG document
> as it's with the IESG, so a consensus call here is not applicable.
>
> Given the discussion here, we'll leave it to the IESG to decide. If I hear
> any news, I'll post them here.
>
> Thanks,
> Peter
>
> On 5/15/24 00:03, David Dong via RT wrote:
>
> Hi all,
>
> Following up on this. Please let us know how we should proceed for this.
> Thank you.
>
> Best regards,
>
> David Dong
> IANA Services Sr. Specialist
>
> On Thu May 09 09:39:29 2024, pe...@desec.io wrote:
>
> [another (last) attempt of reposting this as it did not get delivered to
> dnsop@ietf.org on May 7, as evidenced by the list archive]
>
> Hi,
>
> On 5/2/24 19:59, David Dong via RT wrote:
>
> Following up on this; does the group agree that "_dnssec" is OK?
>
> Looking at what's been said in this thread:
> - Two people have proposed to change the label, current proposal:
> _dnssec
> - Two implementers have said they'd make the change but don't seem
> convinced
> - The authors (hats off, but also implementers and authors of current
> drafts using the mechanism) are not convinced
>
> The authors don't feel comfortable declaring consensus in either direction
> (neither do we know whether that's our role), and we're not sure how to
> proceed. Perhaps the DNSOP chairs could weigh in, as the discussion is
> happening on the WG list although the document is technically out of the
> door ...
>
> I've been reluctant adding the following argument as to not seem
> insisting; OTOH it may have its own technical merit, so here is.
>
> The "_dnssec" label implies that the mechanism is not suitable for
> signaling unrelated to DNSSEC. That's an artificial limitation, and it's
> unclear why to impose the restriction. An operator could very well want to
> publish other things, like
>
> - TXT at _abuse.example.com._signal.ns1.provider.net for an abuse
> address,
> - PTR at _catalog.example.com._signal ... for catalog zone membership,
> - ...
>
> If the signaling method is generic, I believe it should have a short
> generic label. Any specificity to determine the kind of signal can go into
> the first label.
>
> I have no specific preference for "_signal" other than I don't know what a
> good alternative would be. Narrowing the scope with "_dnssec" doesn't seem
> to improve the situation.
>
> Thanks,
> Peter
> + Nils (for the "we"/author statements)
>
> Thank you.
>
> Best regards,
>
> David Dong
> IANA Services Sr. Specialist
>
> On Mon Apr 22 11:42:15 2024, scott.r...@nist.gov wrote:
>
> On 20 Apr 2024, at 19:38, Paul Wouters wrote:
>
> On Sat, 20 Apr 2024, Peter Thomassen wrote:
>
> The authors certainly don't insist, but we'd need to pick a suitable
> replacement for the "_signal" label.
>
> John proposed "_dnssec-signal" elsewhere in this thread.
>
> The authors would like to note that adding "_dnssec-" eats up 8 more
> bytes, increasing chances that bootstrapping will fail due to the
> _dsboot.._dnssec-signal. length limitation. Other
> than this (unnecessary?) use case narrowing, this choice seems
> fine.
>
> That said, does this choice address your concerns?
>
> It would, but I would also be okay if it is just _dnssec.
>
> If the concern is that the label is too generic, “_dnssec” might be too
> generic as well. If it is to be more precise, go with _ds-boot or
> something more specific to the 

[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-15 Thread Peter Thomassen

Hi David,

The DNSOP chairs have told me that the document is no longer a WG document as 
it's with the IESG, so a consensus call here is not applicable.

Given the discussion here, we'll leave it to the IESG to decide. If I hear any 
news, I'll post them here.

Thanks,
Peter


On 5/15/24 00:03, David Dong via RT wrote:

Hi all,

Following up on this. Please let us know how we should proceed for this. Thank 
you.

Best regards,

David Dong
IANA Services Sr. Specialist

On Thu May 09 09:39:29 2024, pe...@desec.io wrote:

[another (last) attempt of reposting this as it did not get delivered
to dnsop@ietf.org on May 7, as evidenced by the list archive]


Hi,

On 5/2/24 19:59, David Dong via RT wrote:

Following up on this; does the group agree that "_dnssec" is OK?


Looking at what's been said in this thread:
- Two people have proposed to change the label, current proposal:
_dnssec
- Two implementers have said they'd make the change but don't seem
convinced
- The authors (hats off, but also implementers and authors of current
drafts using the mechanism) are not convinced

The authors don't feel comfortable declaring consensus in either
direction (neither do we know whether that's our role), and we're not
sure how to proceed. Perhaps the DNSOP chairs could weigh in, as the
discussion is happening on the WG list although the document is
technically out of the door ...


I've been reluctant adding the following argument as to not seem
insisting; OTOH it may have its own technical merit, so here is.

The "_dnssec" label implies that the mechanism is not suitable for
signaling unrelated to DNSSEC. That's an artificial limitation, and
it's unclear why to impose the restriction. An operator could very
well want to publish other things, like

- TXT at _abuse.example.com._signal.ns1.provider.net for an abuse
address,
- PTR at _catalog.example.com._signal ... for catalog zone membership,
- ...

If the signaling method is generic, I believe it should have a short
generic label. Any specificity to determine the kind of signal can go
into the first label.

I have no specific preference for "_signal" other than I don't know
what a good alternative would be. Narrowing the scope with "_dnssec"
doesn't seem to improve the situation.

Thanks,
Peter
+ Nils (for the "we"/author statements)



Thank you.

Best regards,

David Dong
IANA Services Sr. Specialist

On Mon Apr 22 11:42:15 2024, scott.r...@nist.gov wrote:

On 20 Apr 2024, at 19:38, Paul Wouters wrote:


On Sat, 20 Apr 2024, Peter Thomassen wrote:


The authors certainly don't insist, but we'd need to pick a
suitable
replacement for the "_signal" label.

John proposed "_dnssec-signal" elsewhere in this thread.

The authors would like to note that adding "_dnssec-" eats up 8
more
bytes, increasing chances that bootstrapping will fail due to the
_dsboot.._dnssec-signal. length limitation.
Other than this (unnecessary?) use case narrowing, this choice
seems
fine.

That said, does this choice address your concerns?


It would, but I would also be okay if it is just _dnssec.



If the concern is that the label is too generic, “_dnssec” might be
too generic as well. If it is to be more precise, go with _ds-boot
or
something more specific to the use case. I don’t have an
implementation in the mix, so it this isn’t a strong opinion.   If
the
group agrees _dnssec is fine, then I am fine with it too.

Scott

=
Scott Rose
NIST/CTL/WND
scott.r...@nist.gov
ph: 301-975-8439
GoogleVoice: 571-249-3671
=




___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


--
Like our community service? 
Please consider donating at

https://desec.io/

deSEC e.V.
Kyffhäuserstr. 5
10781 Berlin
Germany

Vorstandsvorsitz: Nils Wisiol
Registergericht: AG Berlin (Charlottenburg) VR 37525

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-15 Thread Tim Wicinski
When I wrote my reply to Peter, I lost my comment about speaking not as the
chair but as a contributor.

The point I was trying to make is that the comments from Paul W as the
Expert Reviewer for the IANA registry is comment/opinion/vibe that should
be considered the most relevant in this discussion.

tim
(just a contributor)


On Thu, May 9, 2024 at 10:29 PM Tim Wicinski  wrote:

> I wrote a note to Peter and his co-author on this discussion and
> we(chairs) feel that Paul W is correct in saying _signal is too generic.
>
> We should not overload any underscore label for multiple purposes.  If
> another type of operator signalling appears, a new label can be acquired.
> Being specific in this situation is a *good* thing.  It is not difficult
> to request a new underscore name, the process was made lightweight.
> The underscore registry is used by application folks as much if not more
> than DNS folks.
>
> Additionally in the Domain Verification Techniques document, there is a
> recommended approach to use application-specific underscore prefix labels
>
>
> https://www.ietf.org/archive/id/draft-ietf-dnsop-domain-verification-techniques-04.html#name-scope-indication
>
> I apologize to the implementers on this.
>
> Unless the working group speaks up, then the advice of Paul Wouters, as
> one of the expert reviewers for the registry, should be the suggestion.
>
> thanks
> tim
>
>
> On Wed, May 8, 2024 at 4:03 PM John Levine  wrote:
>
>> It appears that libor.peltan   said:
>> >Hi all,
>> >
>> >On the other hand, couldn't it actually be beneficial if the signalling
>> >zone name is generic enough, and if (in theory on the future) it is
>> >shared with possibly completely different signals, possibly unrelated to
>> >DNSSEC?
>>
>> It doesn't seem very likely to me that someone would come up with an
>> unrelated scheme that somehow used the same zone structure. And it's
>> not like there's any shortage of potential name strings.
>>
>> _dnssec or maybe _dnssec-signal tell people what the name is used for.
>>
>> R's,
>> John
>>
>> ___
>> DNSOP mailing list -- dnsop@ietf.org
>> To unsubscribe send an email to dnsop-le...@ietf.org
>>
>
___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-14 Thread Peter Thomassen

[reposting as it looks like this did not get delivered during Mailman 
transition last week; original message sent on May 7]


Hi,

On 5/2/24 19:59, David Dong via RT wrote:

Following up on this; does the group agree that "_dnssec" is OK?


Looking at what's been said in this thread:
- Two people have proposed to change the label, current proposal: _dnssec
- Two implementers have said they'd make the change but don't seem convinced
- The authors (hats off, but also implementers and authors of current drafts 
using the mechanism) are not convinced

The authors don't feel comfortable declaring consensus in either direction 
(neither do we know whether that's our role), and we're not sure how to 
proceed. Perhaps the DNSOP chairs could weigh in, as the discussion is 
happening on the WG list although the document is technically out of the door 
...


I've been reluctant adding the following argument as to not seem insisting; 
OTOH it may have its own technical merit, so here is.

The "_dnssec" label implies that the mechanism is not suitable for signaling 
unrelated to DNSSEC. That's an artificial limitation, and it's unclear why to impose the 
restriction. An operator could very well want to publish other things, like

- TXT at _abuse.example.com._signal.ns1.provider.net for an abuse address,
- PTR at _catalog.example.com._signal ... for catalog zone membership,
- ...

If the signaling method is generic, I believe it should have a short generic 
label. Any specificity to determine the kind of signal can go into the first 
label.

I have no specific preference for "_signal" other than I don't know what a good 
alternative would be. Narrowing the scope with "_dnssec" doesn't seem to improve the 
situation.

Thanks,
Peter
+ Nils (for the "we"/author statements)



Thank you.

Best regards,

David Dong
IANA Services Sr. Specialist

On Mon Apr 22 11:42:15 2024, scott.r...@nist.gov wrote:

On 20 Apr 2024, at 19:38, Paul Wouters wrote:


On Sat, 20 Apr 2024, Peter Thomassen wrote:


The authors certainly don't insist, but we'd need to pick a suitable
replacement for the "_signal" label.

John proposed "_dnssec-signal" elsewhere in this thread.

The authors would like to note that adding "_dnssec-" eats up 8 more
bytes, increasing chances that bootstrapping will fail due to the
_dsboot.._dnssec-signal. length limitation.
Other than this (unnecessary?) use case narrowing, this choice seems
fine.

That said, does this choice address your concerns?


It would, but I would also be okay if it is just _dnssec.



If the concern is that the label is too generic, “_dnssec” might be
too generic as well. If it is to be more precise, go with _ds-boot or
something more specific to the use case. I don’t have an
implementation in the mix, so it this isn’t a strong opinion.   If the
group agrees _dnssec is fine, then I am fine with it too.

Scott

=
Scott Rose
NIST/CTL/WND
scott.r...@nist.gov
ph: 301-975-8439
GoogleVoice: 571-249-3671
=




--
Like our community service? 
Please consider donating at

https://desec.io/

deSEC e.V.
Kyffhäuserstr. 5
10781 Berlin
Germany

Vorstandsvorsitz: Nils Wisiol
Registergericht: AG Berlin (Charlottenburg) VR 37525

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-10 Thread John R Levine

On Fri, 10 May 2024, Paul Wouters wrote:

On May 10, 2024, at 05:36, jab...@strandkip.nl wrote:


I'm interested in where this guidance comes from.

RFC 2782 to me is the grandfather of underscore labels, and it pretty much goes 
out of its way to encourage a hierarchy of underscore labels to anchor SRV 
records under, e.g. under _tcp.name and _udp.name.


But if you look at more recent RFCs such as TLSA records, it is narrowed to one 
specific protocol and port, eg _25._tcp.mx.nohats.ca


But this isn't the same thing.  The two tags on SRV and TLSA records are 
consecutive labels on single records.


As you are both surely aware because you have read the draft, in this 
case, the _signal record sits atop an entire subtree, e.g.


 _dsboot.example.co.uk._signal.ns1.example.net
 _dsboot.example.co.uk._signal.ns2.example.org

means that the name servers ns1.example.net and ns2.example.org have 
bootstrap info for example.co.uk.  Since parent scanning for every 
possible combination of NS and domain would be rather slow, the draft has 
suggestions such as putting the _signal name in a separate zone that 
parents can walk with NSEC.  There might be other tags than _dsboot for 
things like synchronizing multi-provider DNS updates, but it's all DNSSEC.


Needless to say, this is quite DNSSEC specific and even someone invents 
some other thing that uses two domain names in a similar way, it's 
unlikely that you'd want to put it all in the same zone.  So I hope we 
agree to call it _dnssec or something like that.


Regards,
John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-10 Thread Paul Wouters
On May 10, 2024, at 05:36, jab...@strandkip.nl wrote:
> 
> I'm interested in where this guidance comes from.
> 
> RFC 2782 to me is the grandfather of underscore labels, and it pretty much 
> goes out of its way to encourage a hierarchy of underscore labels to anchor 
> SRV records under, e.g. under _tcp.name and _udp.name.

But if you look at more recent RFCs such as TLSA records, it is narrowed to one 
specific protocol and port, eg _25._tcp.mx.nohats.ca

> I'm not really arguing with conclusion, but I find the guidance vague. If we 
> really think it's important to make clear statements about this, perhaps we 
> should write something down in a document and talk about it. Personally I'm 
> not convinced it's that important, though.

I am not against that but I also feel there is some common sense that applies 
here. For example, experience has shown TXT record parsing of the APEX can 
cause lots of noisy logging because the TXT at APEX is used by widely different 
things that are not aware of each other.

I think _dsboot or _dnssec or _dns would all be better choices and greatly 
reduce the risk of getting overloaded by something else, and is useful even if 
overloading is mostly harmless.

Paul

(I also liked the suggestion _dasboot , it’s a great intense movie!)
___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-10 Thread jabley
Hi Tim,

On May 10, 2024, at 04:29, Tim Wicinski  wrote:

> I wrote a note to Peter and his co-author on this discussion and we(chairs) 
> feel that Paul W is correct in saying _signal is too generic. 
> 
> We should not overload any underscore label for multiple purposes.  If 
> another type of operator signalling appears, a new label can be acquired.

I'm interested in where this guidance comes from.

RFC 2782 to me is the grandfather of underscore labels, and it pretty much goes 
out of its way to encourage a hierarchy of underscore labels to anchor SRV 
records under, e.g. under _tcp.name and _udp.name.

You could argue that those are not multiple purposes (everything under _tcp is 
TCP, after all) but it feels like the same argument could be made for _signal.

> Being specific in this situation is a *good* thing.

How is

_purpose1._concept.name ...
_purpose2._concept.name ...

less specific than

_purpose1_concept.name ...
_purpose2_concept.name ... ?

> Additionally in the Domain Verification Techniques document, there is a 
> recommended approach to use application-specific underscore prefix labels
> 
> https://www.ietf.org/archive/id/draft-ietf-dnsop-domain-verification-techniques-04.html#name-scope-indication

I'm struggling slightly to see how the advice in that document applies, here. I 
realise underscore labels are used in both cases, but in the domain validation 
case we are trying to avoid collisions in the absence of a registry. That's not 
our situation, here.

I'm not really arguing with conclusion, but I find the guidance vague. If we 
really think it's important to make clear statements about this, perhaps we 
should write something down in a document and talk about it. Personally I'm not 
convinced it's that important, though.


Joe

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-09 Thread Tim Wicinski
I wrote a note to Peter and his co-author on this discussion and we(chairs)
feel that Paul W is correct in saying _signal is too generic.

We should not overload any underscore label for multiple purposes.  If
another type of operator signalling appears, a new label can be acquired.
Being specific in this situation is a *good* thing.  It is not difficult to
request a new underscore name, the process was made lightweight.
The underscore registry is used by application folks as much if not more
than DNS folks.

Additionally in the Domain Verification Techniques document, there is a
recommended approach to use application-specific underscore prefix labels

https://www.ietf.org/archive/id/draft-ietf-dnsop-domain-verification-techniques-04.html#name-scope-indication

I apologize to the implementers on this.

Unless the working group speaks up, then the advice of Paul Wouters, as one
of the expert reviewers for the registry, should be the suggestion.

thanks
tim


On Wed, May 8, 2024 at 4:03 PM John Levine  wrote:

> It appears that libor.peltan   said:
> >Hi all,
> >
> >On the other hand, couldn't it actually be beneficial if the signalling
> >zone name is generic enough, and if (in theory on the future) it is
> >shared with possibly completely different signals, possibly unrelated to
> >DNSSEC?
>
> It doesn't seem very likely to me that someone would come up with an
> unrelated scheme that somehow used the same zone structure. And it's
> not like there's any shortage of potential name strings.
>
> _dnssec or maybe _dnssec-signal tell people what the name is used for.
>
> R's,
> John
>
> ___
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-le...@ietf.org
>
___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters) (fwd)

2024-05-09 Thread John R Levine
Actually, we are developing an unrelated scheme that has need of the same 
zone structure for signaling but not involving DNSSEC itself, and would see 
some advantage in utilizing the same standard top level underscore naming for 
signaling use in general.


Would you want to put the signal info in the same zones with the DNSSEC stuff? 
If not, you don't want the same tag.


Regards,
John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-09 Thread Adam Burns


On 08/05/2024 22:02, John Levine wrote:

It appears that libor.peltan   said:

Hi all,

On the other hand, couldn't it actually be beneficial if the signalling
zone name is generic enough, and if (in theory on the future) it is
shared with possibly completely different signals, possibly unrelated to
DNSSEC?

It doesn't seem very likely to me that someone would come up with an
unrelated scheme that somehow used the same zone structure. And it's
not like there's any shortage of potential name strings.
Actually, we are developing an unrelated scheme that has need of the 
same zone structure for signaling but not involving DNSSEC itself, and 
would see some advantage in utilizing the same standard top level 
underscore naming for signaling use in general.

_dnssec or maybe _dnssec-signal tell people what the name is used for.

Thanks & Regards,

Adam.




OpenPGP_0xE4C76DBFE283909C.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature
___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-08 Thread John Levine
It appears that libor.peltan   said:
>Hi all,
>
>On the other hand, couldn't it actually be beneficial if the signalling 
>zone name is generic enough, and if (in theory on the future) it is 
>shared with possibly completely different signals, possibly unrelated to 
>DNSSEC?

It doesn't seem very likely to me that someone would come up with an
unrelated scheme that somehow used the same zone structure. And it's
not like there's any shortage of potential name strings.

_dnssec or maybe _dnssec-signal tell people what the name is used for.

R's,
John

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-08 Thread libor.peltan

Hi all,

On the other hand, couldn't it actually be beneficial if the signalling 
zone name is generic enough, and if (in theory on the future) it is 
shared with possibly completely different signals, possibly unrelated to 
DNSSEC?


With this in mind, I support the signalling label _signal. Otherwise, I 
would prefer something of comparable (or even lower) length, not like 
_dnssec-signal.


Libor

Dne 21. 04. 24 v 1:38 Paul Wouters napsal(a):

On Sat, 20 Apr 2024, Peter Thomassen wrote:

The authors certainly don't insist, but we'd need to pick a suitable 
replacement for the "_signal" label.


John proposed "_dnssec-signal" elsewhere in this thread.

The authors would like to note that adding "_dnssec-" eats up 8 more 
bytes, increasing chances that bootstrapping will fail due to the 
_dsboot.._dnssec-signal. length limitation. 
Other than this (unnecessary?) use case narrowing, this choice seems 
fine.


That said, does this choice address your concerns?


It would, but I would also be okay if it is just _dnssec.

The main question then is to get implementations updated. I'm thus 
copying a few implementers so they can comment w.r.t. making this 
change in their implementation. I suppose that barring their 
objections, it's fine to go ahead?


I feel less sympathy there because I brought this up a long time ago :)
But also, implementations are all young and new and I think it is still
pretty easy to change.

Paul

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-05-07 Thread Daniel Salzman

Hi,

On 5/7/24 09:33, Peter Thomassen wrote:

Hi,

On 5/2/24 19:59, David Dong via RT wrote:

Following up on this; does the group agree that "_dnssec" is OK?


Looking at what's been said in this thread:
- Two people have proposed to change the label, current proposal: _dnssec
- Two implementers have said they'd make the change but don't seem convinced
- The authors (hats off, but also implementers and authors of current drafts 
using the mechanism) are not convinced

The authors don't feel comfortable declaring consensus in either direction (neither do we know whether that's our role), and we're not sure how to proceed. Perhaps the DNSOP chairs could weigh in, as 
the discussion is happening on the WG list although the document is technically out of the door ...



I've been reluctant adding the following argument as to not seem insisting; 
OTOH it may have its own technical merit, so here is.

The "_dnssec" label implies that the mechanism is not suitable for signaling unrelated to DNSSEC. That's an artificial limitation, and it's unclear why to impose the restriction. An operator could 
very well want to publish other things, like


- TXT at _abuse.example.com._signal.ns1.provider.net for an abuse address,
- PTR at _catalog.example.com._signal ... for catalog zone membership,
- ...


Besides the fact that keeping the current label name is a little bit more 
convenient for our implementation,
I like the idea of a general mechanism for signaling various states in DNS. 
Thus I would prefer staying with '_signal'.

Regards,
Daniel (Knot DNS)



If the signaling method is generic, I believe it should have a short generic 
label. Any specificity to determine the kind of signal can go into the first 
label.

I have no specific preference for "_signal" other than I don't know what a good 
alternative would be. Narrowing the scope with "_dnssec" doesn't seem to improve the 
situation.

Thanks,
Peter
+ Nils (for the "we"/author statements)



Thank you.

Best regards,

David Dong
IANA Services Sr. Specialist

On Mon Apr 22 11:42:15 2024, scott.r...@nist.gov wrote:

On 20 Apr 2024, at 19:38, Paul Wouters wrote:


On Sat, 20 Apr 2024, Peter Thomassen wrote:


The authors certainly don't insist, but we'd need to pick a suitable
replacement for the "_signal" label.

John proposed "_dnssec-signal" elsewhere in this thread.

The authors would like to note that adding "_dnssec-" eats up 8 more
bytes, increasing chances that bootstrapping will fail due to the
_dsboot.._dnssec-signal. length limitation.
Other than this (unnecessary?) use case narrowing, this choice seems
fine.

That said, does this choice address your concerns?


It would, but I would also be okay if it is just _dnssec.



If the concern is that the label is too generic, “_dnssec” might be
too generic as well. If it is to be more precise, go with _ds-boot or
something more specific to the use case. I don’t have an
implementation in the mix, so it this isn’t a strong opinion.   If the
group agrees _dnssec is fine, then I am fine with it too.

Scott

=
Scott Rose
NIST/CTL/WND
scott.r...@nist.gov
ph: 301-975-8439
GoogleVoice: 571-249-3671
=






OpenPGP_signature.asc
Description: OpenPGP digital signature
___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org