On 18 Feb 2018, at 20:21, Geoff Huston wrote:

Hi John,

thanks for the review of this draft


On 17 Feb 2018, at 4:35 am, John Dickinson <j...@sinodun.com> wrote:

Hi,

I like what this draft is trying to do.

I am a bit concerned about adding a invalid RR in to a otherwise correctly signed zone. It suspect that there may be a variation in how validating resolvers treat authoritative servers that appear to have sent bogus data. Some might retry, retry other auth servers, stop using that server altogether etc etc…

I have been doing this for many years in an ad-based measurement campaign. When a validating resolver is incapable of validating a response it sends back a SERVFAIL response code of course. Some years back “incapable of validating a response” implied an exhaustive search through all NS’s of all parent zones to see if any path exists that can validate the RRSIG - these days many resolvers simply accept the first invalid response and pass back SERVFAIL.

OK great - I just wondered if there was all sorts of strange differences between different implementations.

Obviously the SERVFAIL response will prompt a stub resolver to pass the query tyo any other recursive resolvers that it is configured to query. This is of course the same behaviour as one would expect from a validating recursive resolver that has failed to track a KSK roll. I have not observed any signal that a client resolver accepts a SERVFAIL response from a recursive resolver as anything other than a failure for the query itself.



I suggest that the example A/AAAA RRs on page 4 be written fully qualified so there can be no doubt that this draft does not imply new special names at the root (which is what I first thought).

“example.com” appears four times on page 4 - are you suggesting that this be altered to read “example.com.”?

Or are you suggesting that the 5 instances of the label kskroll-sentinel-(is|not)-ta-2222 which refer to a “resoirce” be edited to read "kskroll-sentinel-(is|not)-ta-2222.example.com"?

Or both?

The second one but only for the 3 examples

      invalid IN AAAA 2001:DB8::1

      kskroll-sentinel-is-ta-2222 IN AAAA 2001:DB8::1

      kskroll-sentinel-not-ta-2222 IN AAAA 2001:DB8::1


regards
John





In the discussion of Charlie’s resolvers I think “from
  this he knows (see the logic below) that he is using legacy, non-
  validating resolvers.”

should have the “non-“ removed.



yes - that’s correct. That was a typo.


regards
John


On 12 Feb 2018, at 20:28, Warren Kumari wrote:

<author hat only>

Hi all,

Sorry it has taken so long to get a new version of this document
posted - you deserve better.

Anyway, we've finally posted an updated version -
https://datatracker.ietf.org/doc/draft-ietf-dnsop-kskroll-sentinel/

This version includes a (hopefully easily understood) description of
how this would actually be used, and not just "here's a protocol, k,
thnx, bye!". I've tried to layout what each party does, and how it all fits together - please let me know if it isn't clear. This section is
towards the top of the document - we will likely make it an Appendix
before publication.

I've also updated it to use the kskroll-sentinel-is-ta-<id> format. It is easy to change again in the future, but this seemed to be what the
working group liked. I also updated my demo implementation
(http://www.ksk-test.net) to use this naming scheme.

This version also clarifies that the test is "Is the Key ID a DNSSEC
root KSK?" Originally my view was that it should be "Is there *any*
key in the trust store with this keyID?", but after running some
numbers I decided that there is a significant chance of false
positives.

As I mentioned, it took an embarrassingly long time to post the update
- please let us know if we missed your comments.

W
--
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
  ---maf

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


John Dickinson

http://sinodun.com

Sinodun Internet Technologies Ltd.
Magdalen Centre
Oxford Science Park
Robert Robinson Avenue
Oxford OX4 4GA
U.K.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


John Dickinson

http://sinodun.com

Sinodun Internet Technologies Ltd.
Magdalen Centre
Oxford Science Park
Robert Robinson Avenue
Oxford OX4 4GA
U.K.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to