-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Op 04-03-13 18:16, Joe Abley schreef: > Hi Antoin,
Hi Joe > It's clear that we have different opinions on this, and I don't > want to argue for the sake of noisemaking. However, I have a couple > of clarifying questions (see below). And I'm shouting a bit too acting as a devil's advocate. Please don't get me wrong in that I'm not trying to see your points. I just think that a tree is either experimental or production, but it's unwise to be both. The discussion is on where the subtree starts. > How is it safer for the operator of a parent zone to generate DS > RRSets from supplied DNSKEY RRSets (constrained to only those > algorithms the parent has blessed) than to accept any DS RRSets > from children? There are some parents that check/verify the RDATA in their zone. As a service to help children notice their mistakes or misconfigurations. This service is often appreciated, except for children that willingly want to be able to enter invalid data into the parent zone, and want to force the parent to accept that. For a parent to be able to validate, they need to understand and have implemented the algorithm in their validation software. If the parent generates the DS, he knows he understands that algorithm, so there's one less thing to worry about. Creating the DS yourself is easier than trying to verify a DS and refusing the ones that are not understood. And when we want to change the algorithm in the future with one that is more secure or cheaper for our zone, we can do that ourselves without a painful migration process that involves all our child operators. > So, to clarify, can the operator of a child zone who prefers to use > an algorithm 14 DNSKEY send you that key, confident that you will > accept it? What about algorithm 253? No. If the child prefers to use an experimental algorithm as a SEP for it's own experiment, he can happily enter that into his DNSKEY RRset. And he can generate or accept DSes for all the children under that zone that want to experiment with that algorithm in that tree. The chain of trust for that experiment starts at that subtree. But we don't accept that algorithm for the delegation in our chain of trust that starts at the root until that algorithm is widely deployed in the validating resolvers we serve. That's our local policy. We do DNSSEC because we want all end users be able to validate the delegations we make. DNSSEC is only adopted if it works and is reliable. Our zone is not (partly) experimental. So we validate delegations, and receive validation errors from ISP's that we distribute to the registrars so they can fix their errors. We currently accept a wide range of algorithms we know are implemented in most of the validating resolvers. Using an algorithm we know is not widely implemented will cause validation errors in the majority of resolvers we serve, and we feel responsible that at least our zone and the delegations we make work. What happens in trees below is the responsibility of the delegated party and their local policy. We wouldn't have seen the gigantic uptake of DNSSEC under .nl if we didn't guarantee to our constituency that we would actively make DNSSEC work for at least our zone. Our zone is not experimental anymore, it's production. > Rather than "historical" I would have said "common practice > today". Yes, I must agree if you count number of registries and not the number of delegations. I must say we could have lived with the "sending DS" with the knowledge we had 5-10 years ago. We then thought that sending DS was less error sensitive because of the shorter string, and we would still be verifying DS submission over the phone. But our recent experience with DNSSEC, where automation has improved, shows that this is hardly an issue. More errors are being made within smaller incapable operators creating and matching their DS from a DNSKEY then when they just send in their DNSKEY and we create the DS for them. So I also have a bias towards "sending DNSKEY" out of experience and not theory. But our major motivation for "sending DNSKEY" is the secure DNS operator change I mentioned. This has not been implemented yet by these registries, so there's no real world experience with most of the registries that now only accept DS. Sending a key format for a DNS operator change, and a DS format for a delegation request makes matters complex for the child operators. That's why we accept key format for all. - -- Antoin Verschuren Technical Policy Advisor SIDN Meander 501, PO Box 5022, 6802 EA Arnhem, The Netherlands P: +31 26 3525500 M: +31 6 23368970 Mailto: antoin.verschu...@sidn.nl XMPP: antoin.verschu...@jabber.sidn.nl HTTP://www.sidn.nl/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQEcBAEBAgAGBQJRNcgkAAoJEDqHrM883AgnepAIAJIMwS3Yp49KkXLt8IyZKsRJ mpXsYy9Z3eKUELc50uCXoAWI2eHhuHTwxS5lhj2/UBfLF5qLCgBeJmJ47Zkn0Jr3 MBM+jdASp31/mR1/dU3jkfDINo0nIZ59OAQEu/rMUDjrnf8lovHXLQ2OJeFwLhIf Czsaqc0ywRlO0gEIuy4yKsuC1mIgsQAV08lhOOrpZhbZaYdYxDQySRjgN+jvHhyB GNILrEuBcNdCxowo3TN0kYYY29Vy1/eIboJzmHKQpS7N58vj2HUJAPZVNLOeUEjG WbemKk2gY2hiNX6/wgjmS0wTE7PN+pQIX5OsK+Ej2OXWrPD9CdI/jQAKIo84T0I= =RwKJ -----END PGP SIGNATURE----- _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop