On 7/21/2015 4:32 AM, David Conrad wrote:
Mike,

On Jul 21, 2015, at 9:07 AM, Michael StJohns <m...@nthpermutation.com> wrote:
The decision with respect to "clients ... would see some benefit..."  has to be 
based on what the servers know.
Yes, and the information provided by the mechanism described by Warren's draft 
would provide at least some information to the servers as to state of the 
clients.

And that's the point. It's not a benefit to the client. It's a benefit to the server.
Causing a client to emit something that isn't necessary to get the service is 
generally considered a requirement for opt-in type of consideration.
Do you disable "Software Update"-like probes on your operating system(s) and 
applications?

On about half of them I disable things. I never, ever allow them to automatically install software. But the key point is that I personally decide whether or not to allow the software to send the probes in the first place - e.g. OPT IN as I indicated above. I pretty much say "NO" to "do you want to help us improve the product by sending blinded data" questions and I'm pretty sure that's not an unusual approach for other IETF attendees.

You cannot assume that every single new installation of modified client code to do Warren's stuff will agree that sending the root this data is of use to them, and they may not agree to enable the protocol. I pretty much believe you need to give them the option to say no.



and probably an assignment of resources at ICANN for the data reduction.
You mean like https://github.com/dns-stats/hedgehog/wiki/About?
Tools are cool.  I assume you're going to fund the people?
Me? No.

However, if you're asking if ICANN would fund the people, you might want to 
look at who funded Hedgehog in the first place. Since ICANN runs a root server, 
I think it safe to assume we'll support continued development of features we 
need.

Fund the people to do the actual data reduction and report back to the community the result of your experiments....????


I am unclear how Warren's draft alters the privacy profile of the root servers 
in any way.
It doesn't.  It alters the privacy profile of the clients.
Sorry for being unclear.

Today, everyone trusts the root servers and a vast amount of (meta) data is available to 
anyone at or in the path of the root servers (this is the "privacy profile of the 
root servers" I was mentioning). Warren's draft enables the root server operators 
(and anyone in the path to the root servers) to be able to see the keyids the resolvers 
are using, presumably for validation. Given the information already available to the root 
servers, et al., and the fact that the querying systems that are leaking the information 
are (generally) not end user systems, I personally do not see any significant increase in 
privacy exposure risk. YMMV.

You may not.  The resolver operators may.  YMMV.

A serious question: how does one monitor the progress of resolvers migrating to 
the new KSK via 5011 rollover?
To answer your question (and mine)- "statistically" and with great difficulty.
And what data do you use to measure '"statistically" and with great difficulty' 
the progress of resolvers migrating to the new KSK via 5011 rollover?

You're going to have classes of devices that you can look at to see what they 
would *normally* do and you'll use that to reason about the actual ones in the 
wild (e.g. the home premise stuff or DNS in a box stuff);
Statistically speaking, the number of machines ICANN, as the IANA Function operator and 
the entity responsible for managing the KSK, can look at "to see what they would 
*normally* do" is and will always be insignificant.

Not if you go buy a few of these... or ask various people to run a set of tools or to describe what the various boxes do.

Hence "statistically".

Mostly, I'm unclear why we're worrying about it.
Because the root of the DNS is seen as critical infrastructure and I believe 
the Root Management Partners would prefer to have more information rather than 
less regarding how much of the Internet we're going to break.

We told the community what we were going to do, they are adults.
We told a bunch of DNS protocol geeks, network operators, and a few others what 
we're going to do.

I'm sad you believe this. If this were the case, then we would tell exactly them as they would be the only ones who actually implemented DNSSEC.



Being adults and having a bit of responsibility, I don't believe the Root 
Management Partners have the luxury of being cavalier about breaking critical 
infrastructure.



  They were told this was going to happen within 5 years and that it would be 
5011.
Actually, I believe we said "after 5 years" and we did not specify the 
technology by which the key would be rolled.

ublic key delivery

   The public component of a Trust Anchor will be distributed in a
   secure fashion to preclude substitution attacks.

   Acceptable methods for delivery and validation of Trust Anchors
   include, but are not limited to:

   o  In-band as zone data in DNSKEY RRset, with proof traceable to the
      previous Trust Anchor as described in RFC 5011 [RFC5011].
   o  Publication of the Trust Anchor on ICANN's web site, protected and
      authenticated via TLS/SSL, while also providing detached OpenPGP
      [RFC4880], S/MIME [RFC5751] and other signatures traceable to
      ICANN and optionally other parties.
   o  Proof distributed out-of-band directly to the witnesses
      participating at the key ceremony, whereas distribution to their
      respective communities is at the witness' own discretions.



At this point, implementing new functionality is pretty much a non-starter.
I do not believe DNS software will be frozen after the first key roll.

Regards,
-drc
(ICANN CTO, but speaking only for myself)


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to