On 7/20/2015 2:02 PM, David Conrad wrote:
Mike,
On Jul 20, 2015, at 6:02 PM, Michael StJohns <m...@nthpermutation.com> wrote:
Basically, the major benefit from this is not to the clients who have to implement the
"query occasionally so the root knows what I know", but to the root operators
(or not even them maybe).
Presumably, the clients who have not yet migrated would see some benefit if the
old KSK is kept around until they get around to updating it. My understanding
of Warren's draft is that it provides a way for the root trust anchor authority
to have a clue about how many people have moved to the new key.
You presume wrong. You grabbed the question from the wrong end.
There are 4 states a client can be in: a) not running the protocol and
not up to date, b) not running protocol and up to date, c) running the
protocol and not up to date, and d) running the protocol and up to date.
The server can only detect three different states - a) not running the
protocol, b) running and no up to date, c) running and up to date.
The decision with respect to "clients ... would see some benefit..."
has to be based on what the servers know. And I would assume an (a -
not running the protocol) is going to counted as "we don't know so we
have to assume that they aren't up to date". Transitioning from (a) to
(b) still gives you "not up to date" and acts as a no vote to updating
the KSK (just like not implementing the protocol). Transitioning from
(a) to (c) gives the root an indication that it *can* transition, but
that's not really a "benefit to the client".
I believe that this will need to be manually turned on by the resolver owner to deal with the
possible data leaking threat rather than just being on once you update. And I almost say
"no" to "do you want to help improve our software" types of prompts]
This seems to be an odd way of viewing the approach Warren is proposing. The
client is sending a query asking what the trust anchor is and if it has
changed. A side effect of that query is an indication to the server operator of
who is using what trust anchor. I'd view it more like the queries most
operating systems send to see if they have any updates waiting.
As to a "data leak", I'm curious as to the threat model you're imagining.
AFAICT, the leaked information would be the keyid of the resolver. For this to be of
value, it would suggest the attacker would (a) either be at a root server (instance) or
be in the path of the query and (b) have compromised the key reflected by the keyid. Am
I missing something?
Causing a client to emit something that isn't necessary to get the
service is generally considered a requirement for opt-in type of
consideration. The fact that this is limited to the set of trust
anchors doesn't make it less sensitive.
Then there's the root operator problem and the data reduction problem.
AFAIK, the root server operators all, to some extent or another, collect/reduce data
about what queries are hitting their system (whether they make that information known
outside their organization is a different question). For those root server operators that
are collecting data, I would hope the root server operators would be willing to answer a
question along the lines of "what percentage of queries are still using the old
trust anchor?" from the root trust anchor authority.
So would I. But its still an issue until its resolved.
All of these operation concerns need at least tentative buy in from the Root
zone ops
Yes. Perhaps something like RSSAC-002?
Actually, not this but maybe the next version after you get buy in for
additional work.
and probably an assignment of resources at ICANN for the data reduction.
You mean like https://github.com/dns-stats/hedgehog/wiki/About?
Tools are cool. I assume you're going to fund the people?
(And someone noted privacy issues at the microphone).
I am unclear how Warren's draft alters the privacy profile of the root servers
in any way.
It doesn't. It alters the privacy profile of the clients.
Then there's what do you do with the data when you get it? Considering there's no hope at
all that everyone will implement this, we will ALWAYS get an answer that says
"someone hasn't done everything they need to do to roll the root" of some vague
size.
Very true. It then turns into a policy question of how much breakage is enough
to not risk rolling the root. However, I personally believe having at least
some data in order to inform policy questions is better than none, and if
nothing else, Warren's draft would set a lower bound on potential breakage.
A serious question: how does one monitor the progress of resolvers migrating to
the new KSK via 5011 rollover?
Serious question - how does one monitor the progress of resolvers
actually implementing DNSSEC validation? Note that merely querying for
DNSSEC data does not actually reveal how the resolver is using the data,
nor does it reveal the current set of trust anchors.
To answer your question (and mine)- "statistically" and with great
difficulty. You're going to have classes of devices that you can look
at to see what they would *normally* do and you'll use that to reason
about the actual ones in the wild (e.g. the home premise stuff or DNS in
a box stuff); you're going to have large providers like Comcast that
don't do 5011, but have a centrally managed system that affects millions
of end users and who are prepared to update when the new keys come out;
and you're going to have middle of the pack organizations who are
running their own resolvers, who may or may not have reasonable IT
departments - and you can reason about them by how many generations of
servers behind they are (e.g. via server fingerprinting).
Mostly, I'm unclear why we're worrying about it. We told the community
what we were going to do, they are adults. They were told this was
going to happen within 5 years and that it would be 5011. That I believe
was told to them before the root was signed? (I'm not clear of the
timing). We can't hand hold everyone and the longer it takes to roll
the root, the harder it will be.
At this point, implementing new functionality is pretty much a
non-starter. It's 6 months to RFC, 18 months or more to resolver and
server implementation, 36-54 months to deployment and configuration and
60 months to gaining enough data. And then another 2 years before you
actually decide what to do with respect to the root. Call it 2022. I
may be wrong about timing, but its unclear that I'm wrong in the
direction of too much time.
Later, Mike
Thanks,
-drc
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop