On Wed, Sep 26, 2018 at 10:12:08AM -0700, Warren Kumari wrote:
> On Wed, Sep 26, 2018 at 8:16 AM Benjamin Kaduk <ka...@mit.edu> wrote:
> 
> > Benjamin Kaduk has entered the following ballot position for
> > draft-ietf-dnsop-kskroll-sentinel-15: Discuss
> >
> > When responding, please keep the subject line intact and reply to all
> > email addresses included in the To and CC lines. (Feel free to cut this
> > introductory paragraph, however.)
> >
> >
> > Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> > for more information about IESG DISCUSS and COMMENT positions.
> >
> >
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/draft-ietf-dnsop-kskroll-sentinel/
> >
> >
> >
> > ----------------------------------------------------------------------
> > DISCUSS:
> > ----------------------------------------------------------------------
> >
> > Thanks for preparing this document and mechanism; it is good to have more
> > data about the expected impact of the root KSK roll.  That said, I have two
> > Discuss-worthy points, albeit both fairly minor.
> >
> > The first one may just be something that I missed, but does this document
> > actually say anywhere that there needs to be a real zone with real
> > configured A and/or AAAA records for the query names used for these tests?
> > The Appendix sort-of-mentions it, but I feel like there needs to be a
> > mention in the main body text.
> >
> >
> No hats (OMG, everyone will see I'm going bald...)
> 
> Ok, fair. This was actually a source of confusion when we first started
> discussing the document -- we explained it on-list / at mics / in person,
> but it became so well understood that we didn't notice that it is not
> actually specified in the document. I'll try figure out text.

Thanks.

It eventually became pretty clear to me from things like "return the A or
AAAA response unchanged" that there was supposed to be a valid response
provisioned so that it could be returned, but I don't want to rely on all
readers making the same inference.

> 
> > The other point basically is a procedural one, in that we are in effect
> > claiming a couple of leaf name prefixes in all domains to exhibit "weird
> > and surprising behavior" (that is, for parties unaware of this
> > specification).  We generally try to avoid this sort of namespace
> > squatting, preferring (e.g.) /.well-known for HTTP requests, various
> > underscore-prefixed tricks for the DNS, etc.  I see in the changelog that
> > initial attempts did use an underscore prefix but ran into implementation
> > difficulty, and acknowledge that using a "magic" name is much easier to get
> > deployed than (e.g.) a new RR type.  But I do not want the IESG to
> > implicitly approve a namespace claim like this; it's better to be explicit
> > about it if this is the best way to go.
> >
> 
> 
> Ok, I see your point. We've actually done something similar in RFC8145
> where we "reserved" (caused funny behavior) for _ta-XXXX.example.com, but
> this is subtly different. There was some discussion on this and the fact
> that could cause "unexpected" behavior. Unfortunately underscore labels
> really don't work for us -- for example, Android (and some unix machines)
> will not follow / fetch a link of the form http://_foo.example.com.  The
> labels that we are chose (after a huge amount of discussion) are
> "root-key-sentinel-is-ta-XXXX"
> and "root-key-sentinel-not-ta-XXXX". These labels seem sufficiently long
> and obtuse that we don't expect them to be used for anything else (e.g:
> risk of people happening to choose to name a machine
> root-key-sentinel-is-ta-1234.example.com and then being surprised) is
> vanishingly small.

I agree that it's vanishingly small, and the "magic" behavior is just to
return a SERVFAIL, something that in theory could happen at arbitrary times
anyway, so the practical effect is not something I'm especially concerned
about.  (Hey, I did say it was a procedural point!)

> But, yes, this does let let the camel's nose into the tent - we are
> co-opting some names.
> 
> Do you have any suggested text that you could provide to help us explain
> this?

I didn't have anything in particular in mind when I balloted, no (and in
fact I wasn't entirely sure that any new text would be needed, depending on
how we felt about it).  But you're probably right that we should describe
that this is exceptional behavior of a spec, why the impact is minimal, and
why alternative approaches were not suitable.  Feel free to ping me again
about proposing concrete text ... after the telechat.

-Benjamin

> >
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > Other than my Discuss points, I just have a number of essentially editorial
> > nits.
> >
> > Abstract
> >
> >                                 This document specifies a mechanism that
> >    will allow an end user and third parties to determine the trusted key
> >    state for the root key of the resolvers that handle that user's DNS
> >    queries.  [...]
> >
> > This wording feels confusing to me; I think what it's trying to say is "the
> > root key(s) that are in use by the resolver" but am having a hard time
> > grouping these words to achieve that meaning.  (Is "trust" really necessary
> > to mention, here?)
> >
> > Section 1
> >
> >                RRSIG RRs contain a Key Tag field whose value is equal to
> >    the Key Tag of the DNSKEY RR that was used to generate the
> >    corresponding signature.
> >
> > nit: Is the RR used to generate the signature, or just the key?
> >
> >    o  Users may wish to ascertain whether their DNS resolution
> >       environment resolvers is ready for an upcoming root KSK rollover.
> >
> > nit: I think there's a singular/plural mismatch or similar here, maybe
> > "environment's resolver"?
> >
> >    o  Researchers want to perform Internet-wide studies about the
> >       proportion of users who will be negatively impacted an upcoming
> >       root KSK rollover.
> >
> > nit: "by an upcoming"
> >
> >    If a browser or operating system is configured with multiple
> >    resolvers, and those resolvers have different properties (for
> >    example, one performs DNSSEC validation and one does not), the
> >    sentinel test described in this document can still be used, but it
> >
> > nit: this usage of "but" feels a bit misplaced to me, as the thing being
> > warned about is more that the test may produce indeterminate or
> > inconsistent results.  Or perhaps that the assumptions it makes may not
> > necessarily hold in the specific environments being described (i.e., "these
> > environments").
> >
> >    makes a number of assumptions about DNS resolution behaviour that may
> >    not necessarily hold in all environments.  If these assumptions do
> >    not hold (such as, for example, requiring the stub resolver to query
> >    the next recursive resolver in the locally configured set upon
> >    receipt of a SERVFAIL response code) then this test may produce
> >    indeterminate or inconsistent results.  In some cases where these
> >    assumptions do not hold, repeating the same test query set may
> >    generate different results.
> >
> > Section 1.1
> >
> > Please use the RFC 8174 boilerplate.
> >
> > Section 3
> >
> > I'll note without further comment that we had a long thread on ietf@
> > relevant to the term "slave resolver".
> >
> > Section 3.1
> >
> >    If the resolver is non-validating, and it has a single forwarder,
> >    then the resolver will presumably mirror the capabilities of the
> >    forwarder target resolver.
> >
> > Perhaps this is just me misreading the previous paragraph's introduction to
> > what is clearly a more widely known term of art, but in "has a single
> > forwarder" is the thing of which there is only one the "one or more other
> > resolvers" that the "forwarder" is relaying queries to?  It's just weird
> > for the word "forwarder" mean a different protocol participant when used as
> > a noun vs. adjective.  Or perhaps this is meant to be possessive; the
> > "forwarder's target resolver"?
> >
> > As noted in the directorate review, "use the CD bit" needs disambiguation.
> >
> > Section 4
> >
> > nit: missing trailing 'r' in the section title
> >
> > Section 4.3
> >
> > Maybe call out that these are the same general categories of query as in
> > Section 3 but the key tag used is different for some queries?
> >
> > It's also a bit weird to use new notation for this section as opposed to
> > consistent notation between the different types of test.
> >
> >
> >
> 
> -- 
> I don't think the execution is relevant when it was obviously a bad idea in
> the first place.
> This is like putting rabid weasels in your pants, and later expressing
> regret at having chosen those particular rabid weasels and that pair of
> pants.
>    ---maf

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to