On Mon, 9 Nov 2015, Shumon Huque wrote:
I've read this document and think it proposes a useful capability.
Thanks for your feedback Shumon! (I think you read -03 and not -04)
Some other quick comments: > This document specifies an EDNS0 extension that allows a validating > Resolver running as a Forwarder to open a TCP connection to another > Resolver and request a DNS chain answer using one DNS query/answer > pair. The definition of "Forwarder" being used here conflicts with the definition in existing DNS protocol documents (e.g. RFC2308) and also in the new draft-ietf-dnsop-dns-terminology document.
I've changed the text to: This document defines an EDNS0 extension that can be used by a security-aware validating Resolver configured to use a Forwarder to send a single query, requesting a complete validation path along with the regular query answer. (the text was already somewhat changed from before)
> Closest Trust Point, a variable length FDQN of the requested start > point of the chain. FDQN --> FQDN. But it is probably worth being more explicit. I assume you mean a fully qualified domain name in DNS wire format.
Done.
To follow-up on in-person discussion that happened at the last dnsop meeting, this last sentence seems to imply an ordered sequence of RRsets in the authority section comprising the chain. Since consensus is against introducing ordering of RRsets in DNS message sections, this should probably be reworded.
Added: The added RRsets MAY be added in matching hierarchical order but a DNS client MUST NOT depend on the order of the added RRsets for validation.
> A DNS query that contains the CHAIN option MUST also have the DNSSEC > OK bit set. If this bit is not set, the CHAIN option received MUST > be ignored. What is the expected behavior if the requestor sets the CD bit?
Text changed to: A DNS query that contains the CHAIN option MUST also have the DNSSEC OK ("OK") bit set. If this bit is not set, or if the Checking Disabled ("CD") bit is set, the CHAIN option received MUST be ignored.
> missing NS records. Therefore, CHAIN responses MUST include the NS > RRset from the child zone, including the RRSIG records required for > validation. What is meant by "the NS RRset from the child zone"? Should this be the NS RRset of the zone containing the queried name?
The NS RRset lives at the child (authoritative and signed) and at the parent (unsigned glue). We want the signed set, not the unsigned set. I've changed the text.
I understand the stated rationale for including NS RRsets. On the other hand this makes it less likely that the TLS chain extension would use this message format (because of size considerations) rather than its current format of a sequence of RRsets (a discussion that is happening around that draft).
Okay, I've reworded it and loosened the MUST to a SHOULD unless space considerations are important: CHAIN responses SHOULD include the NS RRset from the zone itself including the RRSIG records required for validation. It MUST NOT include the NS RRset from parent zone, as this RRset is not signed. If the size of the answer is an important factor, the NS RRset MAY be omited. Paul _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop