On Jul 8, 2014, at 10:28 AM, William F. Maton Sotomayor <wma...@ottix.net> wrote:
> > On Tue, 8 Jul 2014, Olafur Gudmundsson wrote: > >> >> On Jul 8, 2014, at 7:40 AM, ? Roy Arends <r...@dnss.ec> wrote: >> >>> Hiya, >>> >>> I really like this idea. Many ISPs already do this, (including some high >>> profile public recursives, like Google and OpenDNS), because it simply >>> makes sense: It reduces latency for the end user, reduces outbound traffic >>> overhead, eliminates an attack vector. > > (possibly some more questions or variations for the draft to consider) > > How can I as a user ensure that what Google does in the name of moi, can be > verified to be an untampered copy of the root zone? > > How do I as a user know if there's a stale copy of the root zone being > slaved^H^H^H^H^H^H^H supplied by my ISP? (is not being able to reach > wyle.e.coyote.acme enough to give me that hint?) > > How do I know if my ISP, etc. are running a local copy of the zone? Can I > call RSACC to complain about an outage? > > (In other words, what are the mechanisms for someone to figure this out > before calling the helpdesk, or, should the draft say to call if you suspect > something is wrong? They'd probably do it anyways...maybe. Yes, I'm > rhetorical here, DNSSEC etc for mitigation, etc.) > >>> Roy >> >> Roy >> you hit the nail on the head, this is a no brainer as a BCP. >> >> The contents of this draft may or may not be right at this point but we need >> a BCP that explains how to do this and the pitfalls to be aware off. > > BCP or informational (cautionary tales)? too early to tell. The former if possible, but that may need protocol work a better zone transfer mechanism, a zone consistency check built into the system (something like SIG(AXFR) from RFC2065 but better) > >> For an DNS resolution provider that elects to there are two ways to do it, >> forward zone >> local authoritative zone. >> both should be allowed, this document seems ?bind? specific that it assumes >> that the recursive resolver can be both authoritative and recursive which is >> not a requirement. >> >> There is no need that every recursive resolver at a Resolution Provider have >> a copy of the root zone only that the resolvers know the ?local root >> servers?. > > I see mentions of 'Resolution Provider'. Is this a BCP for only them, or can > anyone join the local auth zone party at their own risk/pleasure, at which > point it's informational or still BCP? What is the litmus test? > Litmus test, why? Root zone is not special from a serving point of view, only from fetching it and maintaining it. If I’m a Resolution Provider who can I hurt by messing up? Only my customers. >> In my mind this is not that far off from Anycast root servers i.e. >> additional server placed closer to the query generators. >> The big difference is in management and control. > > There were good intentions behind the Cymru bogon list. Every once in a > while, we start to see complaints of former bogons being unreachable because > they're no longer bogons. Is there a similar risk for that here and should > it be identified? All risks and benefits we can think of should be documented. A guide to monitoring the service should be provided > >> The root server operators believe (correctly) that they provide valuable >> service and are critical to the operation of the internet, They also believe >> that having >> close control over all root servers is essential. >> A number of people over the years have said that the current model is not >> the only possible way to provide the same service just as well, >> further diversification of root server services is enabled by DNSSEC. >> >> The open question is does the promotion of this type of service create any >> NEW attacks agains the CONTENT of the root zone, >> i.e. would this have made the it possible/easier for Turkey to restrict >> access to Google and Twitter? >> >> The technical question that needs to be answered what is the safest way to >> distribute the root zone and locally validate it before making it available >> on the >> ?local root servers?. In my mind the answer Notify and incremental XFR with >> stronger protections. >> >> I think the answer is NO thus I support the promotion of a BCP on ?locally >> provided root servers?. >> >> Olafur >> >> >>> >>>> On 04 Jul 2014, at 21:50, Paul Hoffman <paul.hoff...@vpnc.org> wrote: >>>> >>>> Greetings. Warren and I have done a major revision on this draft, >>>> narrowing the design goals, and presenting more concrete proposals for how >>>> the mechanism would work. We welcome more feedback, and hope to discuss it >>>> in the WG in Toronto. >>>> >>>> --Paul Hoffman >>>> >>>> Begin forwarded message: >>>> >>>>> From: internet-dra...@ietf.org >>>>> Subject: I-D Action: draft-wkumari-dnsop-dist-root-01.txt >>>>> Date: July 3, 2014 at 2:17:46 PM PDT >>>>> To: i-d-annou...@ietf.org >>>>> Reply-To: internet-dra...@ietf.org >>>>> >>>>> >>>>> A New Internet-Draft is available from the on-line Internet-Drafts >>>>> directories. >>>>> >>>>> >>>>> Title : Securely Distributing the DNS Root >>>>> Authors : Warren Kumari >>>>> Paul Hoffman >>>>> Filename : draft-wkumari-dnsop-dist-root-01.txt >>>>> Pages : 9 >>>>> Date : 2014-07-03 >>>>> >>>>> Abstract: >>>>> This document recommends that recursive DNS resolvers get copies of >>>>> the root zone, validate it using DNSSEC, populate their caches with >>>>> the information, and also give negative responses from the validated >>>>> zone. >>>>> >>>>> [[ Note: This document is largely a discussion starting point. ]] >>>>> >>>>> >>>>> The IETF datatracker status page for this draft is: >>>>> https://datatracker.ietf.org/doc/draft-wkumari-dnsop-dist-root/ >>>>> >>>>> There's also a htmlized version available at: >>>>> http://tools.ietf.org/html/draft-wkumari-dnsop-dist-root-01 >>>>> >>>>> A diff from the previous version is available at: >>>>> http://www.ietf.org/rfcdiff?url2=draft-wkumari-dnsop-dist-root-01 >>>> >>>> _______________________________________________ >>>> DNSOP mailing list >>>> DNSOP@ietf.org >>>> https://www.ietf.org/mailman/listinfo/dnsop >>> >>> _______________________________________________ >>> DNSOP mailing list >>> DNSOP@ietf.org >>> https://www.ietf.org/mailman/listinfo/dnsop >> >> _______________________________________________ >> DNSOP mailing list >> DNSOP@ietf.org >> https://www.ietf.org/mailman/listinfo/dnsop >> > > wfms Olafur _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop