On Mon, Jul 22, 2019 at 2:00 PM Dan Mahoney <dmaho...@isc.org> wrote:
> After a hallway conversation with Evan yesterday, I wanted to clarify a > few things that I came across when working on this. Point one is the > use-case of NOTE. Point two is an argument for the general usefulness of > a COVERT record. > > On NOTE: > > I am an admin who uses my zone files as a source of truth -- which > include comments, versioning, and formatting. (I also commit to version > control, and there's a $Id: $ tag in my zonefiles.) > > I'd like the ability to have some degree of human-intended metadata > survive an AXFR, to be able to promote a slave copy of a zone to being > master, promote versioning, and keep my zonefiles readable within my > processes. I am not suggesting NOTE be anything but exactly what its name > implies: not a hook for some kind of inter-server transfers or private > keys, just things like "remove after 1/1/2020" or "allocated to group foo" > or even "generated from config DB on $date". I especially intend to > state, perhaps with stronger language, that NOTE SHOULD NOT used for > things intended to be machine-parsed the way we've overloaded TXT. > > I'm an operator. Among my credentials: I operate personal infrastructure, > ISC's infrastructure, and a nontrivial amount of the infrastructure for > the root zone. This is the operational input I'm told the IETF community > craves and suggests an issue of not getting until after a standard passes.. > > Dan, I think all of this makes sense, what does not make sense is to stuff this into old "AXFR/IXFR" semantics. The draft is already changing how "upstream" deals with "downstream" in this proposal. My suggestion is to take a step back and say we have outgrown AXFR and we need better mechanism to sync various servers. Lets start work on a new "SYNC Name servers" protocol that can meet modern requirements My list of features that I would like to see: -- DNSSEC awareness (MIXFR) -- Long lived TLS connections that allow --- updates of multiple zones -- adding and removing of zones -- Configuring service parameters: online-keys, ACL's, logging status ...... -- even send back logging information This would allow us to get rid of Notify, catalog zones, and few other warts that have been added on over the years. Olafur > Best, > > -Dan > > On Sat, 6 Jul 2019, Evan Hunt wrote: > > > Colleages, > > > > Some years ago, Dan Mahoney and I submitted a draft describing a proposed > > mechanism for storing confidential zone comments alongside normal zone > > data - a NOTE RR, which would be transferrable from primary to secondary > > servers, but not accessible to ordinary DNS queries. It generated some > > iniital interest, but not much momentum, and we let the proposal lapse. > > > > More recently, Witold Krecicki had a very similar idea for a mechanism to > > disseminate private key data between primary and secondary servers. We > > talked it over and decided to expand the NOTE record semantics into a > > generic method for storing and transferring covert in-band zone data. > > > > The generic mechanism is described in draft-krecicki-dns-covert-00. It > > calls for the allocation of a range of "Covert-RR" type code values, > > which would have restrictions on their dissemenination. A primary server > > implementing Covert-RR types must not allow them to queried, nor to be > > transerred to a secondary server unless that server indicates via an EDNS > > option that it *also* understands Covert record semantics and will not > > transfer the data to any peer that doesn't. > > > > The original NOTE RR draft has been shrunk down and rewritten as a > > proposed use case for Covert RR's. Additional use cases will be coming > > in the future; in particular, draft-pusateri-dnsop-update-timeout seems > > like it might be a good candidate. > > > > Details are below. Please have a look. Thanks! > > > > -------- > > Name: draft-krecicki-dns-covert > > Revision: 00 > > Title: Domain Name System (DNS) Resource Record types for > transferring covert information from primary to secondaries > > Document date: 2019-07-06 > > Group: Individual Submission > > Pages: 6 > > URL: > https://www.ietf.org/internet-drafts/draft-krecicki-dns-covert-00.txt > > Status: > https://datatracker.ietf.org/doc/draft-krecicki-dns-covert/ > > Htmlized: https://tools.ietf.org/html/draft-krecicki-dns-covert-00 > > Htmlized: > https://datatracker.ietf.org/doc/html/draft-krecicki-dns-covert > > > > > > Abstract: > > The Domain Name System (DNS) Resource Record TYPEs IANA registry > > reserves the range 128-255 for Q-TYPEs and Meta-TYPEs [RFC6895] - > > Resource Records that can only be queried for or contain transient > > data associated with a particular DNS message. > > > > This document reserves a range of RR TYPE numbers for Covert-TYPEs - > > types that are an integral part of the zone but cannot be accessed > > via a normal QUERY operation. > > > > Uses for such records could include zone comments that are > > transferrable with the zone, expiry times for dynamically updated > > records, or Zone Signing Keys for inline signing. This document, > > however, does not define any specific Covert RR types. > > > > -------- > > Name: draft-hunt-note-rr > > Revision: 02 > > Title: A DNS Resource Record for Confidential Comments > (NOTE RR) > > Document date: 2019-07-06 > > Group: Individual Submission > > Pages: 4 > > URL: > https://www.ietf.org/internet-drafts/draft-hunt-note-rr-02.txt > > Status: https://datatracker.ietf.org/doc/draft-hunt-note-rr/ > > Htmlized: https://tools.ietf.org/html/draft-hunt-note-rr-02 > > Htmlized: https://datatracker.ietf.org/doc/html/draft-hunt-note-rr > > Diff: https://www.ietf.org/rfcdiff?url2=draft-hunt-note-rr-02 > > > > Abstract: > > While the DNS zone master file format has always allowed comments, > > there is no existing mechanism to preserve comments once the zone has > > been loaded into memory or converted to a binary representation. > > This note proposes a new RR type "NOTE", to be allocated from the > > Covert-RR type range proposed in [I-D.krecicki-dns-covert], so that > > confidential comments can be stored alongside zone data, and included > > in zone transfers when Covert semantics are supported by the > > secondary. > > > > _______________________________________________ > > DNSOP mailing list > > DNSOP@ietf.org > > https://www.ietf.org/mailman/listinfo/dnsop > > > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > -- Ólafur Gudmundsson | Engineering Director www.cloudflare.com blog.cloudflare.com
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop