[On request from Olaf, also dnsop is included:ed]

I think this discussion have derailed a bit, while on the other hand explained somewhat to me what things are really creating problems.

We have a problem when "a domain changes hands" and the private DS key in some way is changed, should be changed, and sometimes is not changed as it should. We all agree that could lead to a blackout, but in many cases the blackout is not more serious than a normal blackout when NS is changed.

First a description on the issues:

1. We have three different kinds of changes that can happen:

1.1. Change of Registrar
1.2. Change of Registrant
1.3. Change of Domain Manager (DNS Hosting Provider)

2. We have when using epp some limited number of commands available

2.1. Transfer (change of registrar)
2.2. Update of holder in the domain object (change of Registrant)
2.3. Update of host in the domain object (change of nameservers)
2.4. Update of IP address in host object (change of IP address of nameservers) 2.5. Update of techc in the domain object (change of Techc) [rarely used even in thick registry situations]

First conclusion is that we see that the operations under (1) does not match operations under (2), and specifically, there is in (2) not anything that maps clearly with (1.3) which might be the key operation when we know the DS for the zone should change.

I started the discussion because I have seen problems in .SE in these two cases:

A. The domain is transferred (1.1) to a registrar that does NOT handle DNSSEC B. The domain is transferred (1.3) to a Domain Manager that does NOT Handle DNSSEC

I also pointed out I have (just like Patrik Wallström) seen cases where:

C. The Registrar and Domain Operator are different entities, and although the registrar do handle DNSSEC operations, the Domain Operator is not using it.

Conclusion of the main portion of the discussion I thinks about the simple cases:

A change like any of the above that implies change of DS is for the parties that know what they are doing, "just like" any key rollover. Further, the key rollover can, just like change of NS, happen regardless of what kind of change we deal with (1.1, 1.2, 1.3) with a minimum involvement of the donating registrar and Domain Manager:

  1 New Nameservers are set up
  2 Old zone is served on new nameservers
  3 Old zone is signed on new nameservers
  4 Domain is transferred to new registrar
  5 New Domain Operator is adding new DS to the old DS set
  6 New Domain Operator is adding new NS
  7 New Domain Operator is removing old NS
  8 New Domain Operator is removing old DS

Or similar. The only problem I might see is that in step 2, the old zone must be available for the new domain operator (nothing new, this has always been a problem). In step 4, a notification is sent to old registrar, and if the old registrar is also the old domain manager, the zone is often ripped from the old nameservers (without any delay), and a blackout is happening.

This is old news for many parties, and only the DS is adding some complexity to this, and of course finding that there are some errors is a new thing if there is such blackout (but I can tell you you learn fast ;-) ). This scenario is also independent of whether the gaining Domain Operator is the same or different organisation as the gaining Registrar.


The problems I started the discussion with still exists though. And my suggestions for fixes I think are still on the table. I have still not contacted Patrik Wallström to see how bad the situation is in .SE, but we will do that as soon as we can.

To fix A, which I think is serious, because DS operations can _NOT_ be made with the registry if the registrar is not handling DNSSEC operations with DNSSEC.

I only see three possible solutions:

A.1 Have as a new requirement on accredited registrars that they MUST be able to handle DNSSEC operations with epp. In .SE we had as a requirement that they MUST be able to remove DS (but not add), but I claim that is not enough.

A.2. Transfer the domain (again) during the blackout to a new registrar that do handle DNSSEC (hopefully at least one exists...see the RSTEP review of .ORG request on using DNSSEC.

A.3. Have the registry remove DS implicitly if domain is transferred to registrar that does NOT handle DNSSEC.

My suggestion is that we look carefully on option A.3. This does not imply any changes to any pieces of the protocol, deployed operation or such. And A.2 is still possible to fix the problem if the registrant want DNSSEC on their domain.


To fix B, we have a larger problem from a registry/registrar perspective, because it is impossible in epp to know when the domain operator is changed. There are some experimentation in some TLDs on defining Domain Operator as a special role/contact, but epp already today have problems with incompatibe handling of contacts so that scares me a bit. I do think we MUST reach some conclusions here. In the discussions on the list, people unfortunately (I think) talked too much about the special case when one of the Domain Operators (specifically the gaining one) is a registrar, but if so, we have a "case A". And for me that is not so interesting (it is a different problem).

The good thing with case B is that it is still possible for the registrant to remove the DS, if not the domain is moved again to some Domain Operator that can handle DNSSEC.

My suggestion for fixing B is that (we will test this in .SE) the registry is going through all DS in the zone, and detect what DS are bad, what are "category B" and then notify the domain holder and registrar. We'll see on the details, but "handle just like lame delegations" is probably the best option.


To fix C, we need a protocol so that registrars can give a better interface than "point and click" for update of the DS. Some registrars in Sweden (at least two) are working on ideas on such protocols. Still too early for IETF work on this. Until this is fixed, each Domain Operator will most certainly either be the same organisation as registrars, or be friend with one registrar that have a special API that they use.


Is this summary at least partially correct?

    Patrik


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to