Mike,

On Jul 20, 2015, at 6:02 PM, Michael StJohns <m...@nthpermutation.com> wrote:
> Basically, the major benefit from this is not to the clients who have to 
> implement the "query occasionally so the root knows what I know", but to the 
> root operators (or not even them maybe).

Presumably, the clients who have not yet migrated would see some benefit if the 
old KSK is kept around until they get around to updating it. My understanding 
of Warren's draft is that it provides a way for the root trust anchor authority 
to have a clue about how many people have moved to the new key.

> I believe that this will need to be manually turned on by the resolver owner 
> to deal with the possible data leaking threat rather than just being on once 
> you update. And I almost say "no" to "do you want to help improve our 
> software" types of prompts]

This seems to be an odd way of viewing the approach Warren is proposing. The 
client is sending a query asking what the trust anchor is and if it has 
changed. A side effect of that query is an indication to the server operator of 
who is using what trust anchor. I'd view it more like the queries most 
operating systems send to see if they have any updates waiting.

As to a "data leak", I'm curious as to the threat model you're imagining. 
AFAICT, the leaked information would be the keyid of the resolver. For this to 
be of value, it would suggest the attacker would (a) either be at a root server 
(instance) or be in the path of the query and (b) have compromised the key 
reflected by the keyid.  Am I missing something?

> Then there's the root operator problem and the data reduction problem.

AFAIK, the root server operators all, to some extent or another, collect/reduce 
data about what queries are hitting their system (whether they make that 
information known outside their organization is a different question). For 
those root server operators that are collecting data, I would hope the root 
server operators would be willing to answer a question along the lines of "what 
percentage of queries are still using the old trust anchor?" from the root 
trust anchor authority.

> All of these operation concerns need at least tentative buy in from the Root 
> zone ops

Yes. Perhaps something like RSSAC-002?

> and probably an assignment of resources at ICANN for the data reduction.

You mean like https://github.com/dns-stats/hedgehog/wiki/About?

> (And someone noted privacy issues at the microphone).


I am unclear how Warren's draft alters the privacy profile of the root servers 
in any way.

> Then there's what do you do with the data when you get it? Considering 
> there's no hope at all that everyone will implement this, we will ALWAYS get 
> an answer that says "someone hasn't done everything they need to do to roll 
> the root" of some vague size.

Very true. It then turns into a policy question of how much breakage is enough 
to not risk rolling the root. However, I personally believe having at least 
some data in order to inform policy questions is better than none, and if 
nothing else, Warren's draft would set a lower bound on potential breakage.

A serious question: how does one monitor the progress of resolvers migrating to 
the new KSK via 5011 rollover?

Thanks,
-drc

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to