In message <CAH1iCioEAfgS-Efj1OYsL1vG4STnwod=arrtekwshymczrd...@mail.gmail.com>, Brian Dickso n writes: > --===============2842493287922721238== > Content-Type: multipart/alternative; boundary=94eb2c0685ce434e95054b30c544 > > --94eb2c0685ce434e95054b30c544 > Content-Type: text/plain; charset=UTF-8 > Content-Transfer-Encoding: quoted-printable > > > Hi, > > The INT Area Director who oversees the homenet WG, Terry Manderson, has > > asked DNSOP participants to review > > https://www.ietf.org/id/draft-ietf-homenet-dot-03.txt, "Special Use Top > > Level Domain '.homenet=E2=80=99=E2=80=9D, with the following aspects in m= > ind: > > 1) in terms of RFC6761 > > 2) in terms of the _operational_ position of an unsigned entry in the roo= > t > > zone as requested in this document, to break the chain of trust for local > > DNS resolution of .homenet names. > > > > I'd like to ask some questions about homenet and the TLD. > > These are mostly clarification questions, but might (together) lead to an > alternative solution. > > > 1. The homenet TLD is intended to be used in such a way that queries > should never reach the root servers. Is this correct?
No. Homenet DS are expected to reach the root. > 2. The main issue driving the request for the insecure delegation, is > the ability to have a proof of insecurity anchored at the ICANN > root-of-trust, aka the KSK for the root zone. Is this correct? Proof the the homenet exists as a zone and that it is insecurely delegated. > 3. Resolvers doing "homenet" need to be able to serve current "proof" > responses, whose signatures' validity periods are "current". Is this > correct? > 4. What is required for the above, is generation of DNSSEC records > including RRSIG(NS), NSEC, and RRSIG(NSEC), for "homenet" TLD. NSEC and RRSIG(NSEC). The NS records at the delegation are unsigned. There also need to be servers that respond with NXDOMAIN for names below homenet and return NS and SOA RRsets for homenet that the delegating NS records for homenet point to. Below is invalid as it is built on a incorrect set of assumptions. > Since the queries are never meant to reach the root servers, the presence > or absence of "homenet" in the root is mostly moot. > > The only technical requirement is that suitable DNSSEC records be > generated, and that the special-purpose homenet DNS resolvers are able to > have up-to-date copies of these DNSSEC records. > > As a technical matter, this does not require publishing these records in > the root zone, although that would be one way of achieving the necessary > requirement. > > Perhaps the homenet WG folks could talk to the ICANN folks about ways of > accomplishing the above, without the need for publishing the unsigned > delegation in the root zone? > > The benefit of not publishing, is that any queries that do hit the root > servers, would get a signed NXDOMAIN, which IMHO is a more correct response= > . > > (It also prevents the problem of what NS values would need to be used on > the unsigned delegation.) > > Brian > > > > > This document is the product of the homenet WG, which has asked the IESG > > to approve it for publication, so our comments are strictly advisory to t= > he > > IESG. There was some discussion of the draft on this list shortly after i= > t > > appeared, in November 2016, but it=E2=80=99s always the AD=E2=80=99s prer= > ogative to ask for > > additional review. > > > > > > thanks, > > Suzanne & Tim > > --94eb2c0685ce434e95054b30c544 > Content-Type: text/html; charset=UTF-8 > Content-Transfer-Encoding: quoted-printable > > <div dir=3D"ltr"><table width=3D"100%" style=3D"color:rgb(0,0,0);font-famil= > y:times;font-size:medium"><tbody><tr><td><blockquote class=3D"gmail_quote" = > style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pa= > dding-left:1ex">Hi,<br class=3D"gmail-">The INT Area Director who oversees = > the homenet WG, Terry Manderson, has asked DNSOP participants to review=C2= > =A0<a rel=3D"nofollow" href=3D"https://www.ietf.org/id/draft-ietf-homenet-d= > ot-03.txt" class=3D"gmail-">https://www.ietf.org/id/draft-ietf-homenet-dot-= > 03.txt</a>, "Special Use Top Level Domain '.homenet=E2=80=99=E2=80= > =9D, with the following aspects in mind:<br class=3D"gmail-">1) in terms of= > RFC6761<br class=3D"gmail-">2) in terms of the _operational_ position of a= > n unsigned entry in the root zone as requested in this document, to break t= > he chain of trust for local DNS resolution of .homenet names.<br class=3D"g= > mail-"></blockquote><div><br></div><div>I'd like to ask some questions = > about homenet and the TLD.</div><div><br></div><div>These are mostly clarif= > ication questions, but might (together) lead to an alternative solution.</d= > iv><div><br></div><div><ol><li>The homenet TLD is intended to be used in su= > ch a way that queries should never reach the root servers. Is this correct?= > </li><li>The main issue driving the request for the insecure delegation, is= > the ability to have a proof of insecurity anchored at the ICANN root-of-tr= > ust, aka the KSK for the root zone. Is this correct?</li><li>Resolvers doin= > g "homenet" need to be able to serve current "proof" re= > sponses, whose signatures' validity periods are "current". Is= > this correct?</li><li>What is required for the above, is generation of DNS= > SEC records including RRSIG(NS), NSEC, and RRSIG(NSEC), for "homenet&q= > uot; TLD.</li></ol><div>Since the queries are never meant to reach the root= > servers, the presence or absence of "homenet" in the root is mos= > tly moot.</div></div><div><br></div><div>The only technical requirement is = > that suitable DNSSEC records be generated, and that the special-purpose hom= > enet DNS resolvers are able to have up-to-date copies of these DNSSEC recor= > ds.</div><div><br></div><div>As a technical matter, this does not require p= > ublishing these records in the root zone, although that would be one way of= > achieving the necessary requirement.</div><div><br></div><div>Perhaps the = > homenet WG folks could talk to the ICANN folks about ways of accomplishing = > the above, without the need for publishing the unsigned delegation in the r= > oot zone?</div><div><br></div><div>The benefit of not publishing, is that a= > ny queries that do hit the root servers, would get a signed NXDOMAIN, which= > IMHO is a more correct response.</div><div><br></div><div>(It also prevent= > s the problem of what NS values would need to be used on the unsigned deleg= > ation.)</div><div><br></div><div>Brian</div><div><br></div><div>=C2=A0</div= > ><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border= > -left:1px solid rgb(204,204,204);padding-left:1ex">This document is the pro= > duct of the homenet WG, which has asked the IESG to approve it for publicat= > ion, so our comments are strictly advisory to the IESG. There was some disc= > ussion of the draft on this list shortly after it appeared, in November 201= > 6, but it=E2=80=99s always the AD=E2=80=99s prerogative to ask for addition= > al review.<br class=3D"gmail-"><br class=3D"gmail-"><br class=3D"gmail-">th= > anks,<br>Suzanne & Tim</blockquote></td></tr></tbody></table></div> > > --94eb2c0685ce434e95054b30c544-- > > > --===============2842493287922721238== > Content-Type: text/plain; charset="us-ascii" > MIME-Version: 1.0 > Content-Transfer-Encoding: 7bit > Content-Disposition: inline > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > > --===============2842493287922721238==-- > -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop