Moving the discussion to DNSOP, as requested in Montreal.

I continue to be concerned that the RDBD draft is:

1) Biting off too much. As in the thread below, I think DBOUND failed because it attempted to be all things to all people.

2) Failing to address the full-stack implications. Some use cases I heard at the microphone in Montreal involve automated processing and have security impacts along the stack. Yet the doc admits:

   It is not a goal of this specification to provide a high-level of
   assurance as to whether or not two domains are definitely related,

Data formats are simple.  Processing rules for them are hard.
Specifying the former without the latter leads to breakage. Let's pick one use case and then spec out the logic for satisfying it.

-- Sam


---------- Forwarded message ----------
Date: Fri, 8 Mar 2019 15:30:03 -0500 (EST)
From: Samuel Weiler <wei...@csail.mit.edu>
To: dbo...@ietf.org
Cc: Stephen Farrell <stephen.farr...@cs.tcd.ie>
Subject: Re: [dbound] [art] [DNSOP]  not DNAME,
    was Related Domains By DNS (RDBD) Draft

On Fri, 1 Mar 2019, Suzanne Woolf wrote:

My memories of DBOUND are not reliable but I do recall a distinct sense that people thought they were talking about "the same thing" and repeatedly discovering that maybe they weren’t.

Accordingly, I’d like to see an example or two of how you’d expect an application to use the kind of connection between domains established by the RDBD mechanism.

+1.

Reading back through the end-of-DBOUND discussions from 2016, I'm having these same thoughts.

Digging into two details:

I don't understand the value added by publishing new keys - and signing with a new signature format - when there's no evident way to bootstrap trust in those keys. Could you explain (again) the value being added? (I see value from using DNSSEC, but if we insist on DNSSEC, we don't need these other pieces.)

The DBOUND problem statement draft covered a number of "use cases that seem intuitively similar [but] actually aren't" (quoting Suzanne). Even so, it made a general recommendation in the security considerations section: "In general, positive assertions about another name should never be accepted without querying the other name for agreement." I'm surprised to not see that reflected in this draft. Indeed, the discussion here suggests that this is an explicit non-requirement. So I want to know more about the use case(s) you're tackling and why checking the symmetry of assertions is not necessary.

https://www.ietf.org/archive/id/draft-sullivan-dbound-problem-statement-02.txt

-- Sam
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to