On Tue, 8 Jul 2014, Olafur Gudmundsson wrote:
On Jul 8, 2014, at 7:40 AM, ? Roy Arends <r...@dnss.ec> wrote:
Hiya,
I really like this idea. Many ISPs already do this, (including some high
profile public recursives, like Google and OpenDNS), because it simply makes
sense: It reduces latency for the end user, reduces outbound traffic overhead,
eliminates an attack vector.
(possibly some more questions or variations for the draft to consider)
How can I as a user ensure that what Google does in the name of moi, can
be verified to be an untampered copy of the root zone?
How do I as a user know if there's a stale copy of the root zone being
slaved^H^H^H^H^H^H^H supplied by my ISP? (is not being able to reach
wyle.e.coyote.acme enough to give me that hint?)
How do I know if my ISP, etc. are running a local copy of the zone? Can I
call RSACC to complain about an outage?
(In other words, what are the mechanisms for someone to figure this out
before calling the helpdesk, or, should the draft say to call if you
suspect something is wrong? They'd probably do it anyways...maybe. Yes,
I'm rhetorical here, DNSSEC etc for mitigation, etc.)
Roy
Roy
you hit the nail on the head, this is a no brainer as a BCP.
The contents of this draft may or may not be right at this point but we need a
BCP that explains how to do this and the pitfalls to be aware off.
BCP or informational (cautionary tales)?
For an DNS resolution provider that elects to there are two ways to do it,
forward zone
local authoritative zone.
both should be allowed, this document seems ?bind? specific that it assumes
that the recursive resolver can be both authoritative and recursive which is
not a requirement.
There is no need that every recursive resolver at a Resolution Provider have a
copy of the root zone only that the resolvers know the ?local root servers?.
I see mentions of 'Resolution Provider'. Is this a BCP for only them, or
can anyone join the local auth zone party at their own risk/pleasure, at
which point it's informational or still BCP? What is the litmus test?
In my mind this is not that far off from Anycast root servers i.e. additional
server placed closer to the query generators.
The big difference is in management and control.
There were good intentions behind the Cymru bogon list. Every once in a
while, we start to see complaints of former bogons being unreachable
because they're no longer bogons. Is there a similar risk for that here
and should it be identified?
The root server operators believe (correctly) that they provide valuable
service and are critical to the operation of the internet, They also believe
that having
close control over all root servers is essential.
A number of people over the years have said that the current model is not the
only possible way to provide the same service just as well,
further diversification of root server services is enabled by DNSSEC.
The open question is does the promotion of this type of service create any NEW
attacks agains the CONTENT of the root zone,
i.e. would this have made the it possible/easier for Turkey to restrict access
to Google and Twitter?
The technical question that needs to be answered what is the safest way to
distribute the root zone and locally validate it before making it available on
the
?local root servers?. In my mind the answer Notify and incremental XFR with
stronger protections.
I think the answer is NO thus I support the promotion of a BCP on ?locally
provided root servers?.
Olafur
On 04 Jul 2014, at 21:50, Paul Hoffman <paul.hoff...@vpnc.org> wrote:
Greetings. Warren and I have done a major revision on this draft, narrowing the
design goals, and presenting more concrete proposals for how the mechanism
would work. We welcome more feedback, and hope to discuss it in the WG in
Toronto.
--Paul Hoffman
Begin forwarded message:
From: internet-dra...@ietf.org
Subject: I-D Action: draft-wkumari-dnsop-dist-root-01.txt
Date: July 3, 2014 at 2:17:46 PM PDT
To: i-d-annou...@ietf.org
Reply-To: internet-dra...@ietf.org
A New Internet-Draft is available from the on-line Internet-Drafts directories.
Title : Securely Distributing the DNS Root
Authors : Warren Kumari
Paul Hoffman
Filename : draft-wkumari-dnsop-dist-root-01.txt
Pages : 9
Date : 2014-07-03
Abstract:
This document recommends that recursive DNS resolvers get copies of
the root zone, validate it using DNSSEC, populate their caches with
the information, and also give negative responses from the validated
zone.
[[ Note: This document is largely a discussion starting point. ]]
The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-wkumari-dnsop-dist-root/
There's also a htmlized version available at:
http://tools.ietf.org/html/draft-wkumari-dnsop-dist-root-01
A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-wkumari-dnsop-dist-root-01
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
wfms
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop