On Wed, May 6, 2020 at 12:16 PM Daniel Migault <mglt.i...@gmail.com> wrote:

>
>
> On Tue, May 5, 2020 at 2:53 PM Bob Harold <rharo...@umich.edu> wrote:
>
>>
>> On Tue, May 5, 2020 at 12:02 PM Daniel Migault <mglt.i...@gmail.com>
>> wrote:
>>
>>> Hi Bob,
>>>
>>> I apology the previous email has just been sent unexpectedly.
>>>
>>> Thanks for the comments. The new version of the file is available here
>>> [1] and a diff is available at [2].
>>>
>>> I propose the following text for clarification. Feel free to let me know
>>> if that addresses your concern.
>>>
>>> OLD:
>>> Not updating the configuration file prevents a failed synchronization to
>>> to the absence of write permission that are hardly in the control of the
>>> software."
>>>
>>> NEW
>>> Avoiding the configuration file to be updated prevents old configuration
>>> file to survive to writing error on read-only file systems.
>>>
>>
>> I understand that we do not want the system to fail due to missing write
>> permissions.  It seems like this could be handled two ways:
>> 1. Just keep in memory, and do not try to write a new configuration.
>> That works, until the old trust anchor is removed, then it fails if the
>> service is restarted.
>> 2. Attempt to write a new configuration, but keep going even if that
>> fails.  If the write succeeds, then this works even after the old trust
>> anchor is removed.
>>
>> I would prefer the second method.  I think that is what some software
>> already does.  (BIND?)
>>
>>
> Thank you for your feed backs, though this may be changed, in the current
> document we encourage to have an instantiation process that performs some
> validation and checks before the service is started. One of these checks is
> to ensure the configuration is up-to-date. With such process in place, we
> expect that every instance of the service is appropriately provisioned. A
> concrete (simple) deployment can always retrieve the service from a repo or
> perform a check for updates.
>
> With that set, 1 or 2 would work the same. The reason I would maybe prefer
> 1) over 2) is that 1 is known to carry the old configuration which will
> force the necessary check at startup. On the other hand 2) works fine
> unless KSK roll over happens and a write error happens. This means that
> most of the time this will work fine and this is what makes it dangerous in
> my opinion.
>
> But again, I am happy to update this with what the WG thinks it mostly
> appropriated. I have raised the following issue:
>
> https://github.com/mglt/draft-mglt-dnsop-dnssec-validator-requirements/issues/1
>
>
>

Thanks for explaining.  I had forgotten about the checks before starting.
In my case I was hoping to only need the root trust anchor, and keep it
updated by just patching regularly.  Might be wishful thinking.

-- 
Bob Harold


>
>
>
>
>
>
>
>> --
>> Bob Harold
>>
>>
>>>
>>> Please inline other comments.
>>>
>>> Yours,
>>> Daniel
>>>
>>> [1]
>>> https://github.com/mglt/draft-mglt-dnsop-dnssec-validator-requirements/blob/master/draft-mglt-dnsop-dnssec-validator-requirements.mkd
>>> [2]
>>> https://github.com/mglt/draft-mglt-dnsop-dnssec-validator-requirements/commit/f8ab674b12442aff6ba3c72a3ca8f795f24b2df9#diff-c7cc8f0bdd4d7cce2082828d70d2bf35
>>>
>>>
>>> On Tue, May 5, 2020 at 11:52 AM Daniel Migault <daniel.migault=
>>> 40ericsson....@dmarc.ietf.org> wrote:
>>>
>>>> Hi Bob,
>>>>
>>>> Thanks for the comments. The new version of the file is available here
>>>> [1] and diff can be seen at [2].
>>>>
>>>> I propose the following text. Does it clarify the concern ?
>>>> Avoiding the configuration file to be updated prevents old
>>>> configuration file to survive to writing error on read-only file systems.
>>>>
>>>>
>>>> "Not updating the configuration file prevents a failed
>>>>    synchronization to to the absence of write permission that are hardly
>>>>    in the control of the software."
>>>>
>>>> <mglt>
>>>> </mglt>
>>>>
>>>> [1]
>>>> https://github.com/mglt/draft-mglt-dnsop-dnssec-validator-requirements/blob/master/draft-mglt-dnsop-dnssec-validator-requirements.mkd
>>>> [2]
>>>> https://github.com/mglt/draft-mglt-dnsop-dnssec-validator-requirements/commit/f8ab674b12442aff6ba3c72a3ca8f795f24b2df9#diff-c7cc8f0bdd4d7cce2082828d70d2bf35
>>>>
>>>> ------------------------------
>>>> *From:* Bob Harold <rharo...@umich.edu>
>>>> *Sent:* Monday, May 4, 2020 4:29 PM
>>>> *To:* Daniel Migault <daniel.miga...@ericsson.com>
>>>> *Subject:* Fwd: [DNSOP] The DNSOP WG has placed
>>>> draft-mglt-dnsop-dnssec-validator-requirements in state "Call For Adoption
>>>> By WG Issued"
>>>>
>>>> Minor nits:
>>>>
>>>> 7.  Trust Anchor Related Recommendations
>>>>
>>>> Last sentence, last few words:
>>>> "in section Section 8" > "in Section 8"
>>>>
>>>> <mglt>
>>>> addressed
>>>> </mglt>
>>>>
>>>> 7.2.1.  Automated Updates to DNSSEC Trust Anchors
>>>>
>>>> "TA updates is" > "TA updates are"
>>>>
>>>> <mglt>
>>>> addressed
>>>> </mglt>
>>>>
>>>> "but due to human" > "due to human"
>>>>
>>>> <mglt>
>>>> addressed
>>>> </mglt>
>>>>
>>>> 7.2.2.  Automated Trust Anchor Check
>>>>
>>>> "Not updating the configuration file prevents a failed
>>>>    synchronization to to the absence of write permission that are hardly
>>>>    in the control of the software."
>>>>
>>>> <mglt>
>>>> I propose the following text. Does it clarify the concern ?
>>>> Avoiding the configuration file to be updated prevents old
>>>> configuration file to survive to writing error on read-only file systems.
>>>> </mglt>
>>>>
>>>> Seems confusing, please rewrite.
>>>>
>>>> "The TA can be queries" > "The TA can be queried"
>>>>
>>>> <mglt>
>>>> addressed
>>>> </mglt>
>>>>
>>>> "does not only concerns" > "does not only concern"
>>>> <mglt>
>>>> addressed
>>>> </mglt>
>>>> "if the mismatch result" > "if the mismatch resulted"
>>>> <mglt>
>>>> addressed
>>>> </mglt>
>>>>
>>>> 8.  Negative Trust Anchors Related Recommendations
>>>>
>>>> "disable the signature check for that key the time" > "disable the
>>>> signature check for that key until the time"
>>>> <mglt>
>>>> addressed
>>>> </mglt>
>>>>
>>>> "This does not prevents" > "This does not prevent"
>>>> <mglt>
>>>> addressed
>>>> </mglt>
>>>> "either an attack or a failure into" > "either an attack or a failure
>>>> in"
>>>> <mglt>
>>>> addressed
>>>> </mglt>
>>>> 10.1.  Automated Reporting
>>>>
>>>> "will take the appropriated steps" > "will take the appropriate steps"
>>>> <mglt>
>>>> addressed
>>>> </mglt>
>>>> --
>>>> Bob Harold
>>>>
>>>>
>>>> ---------- Forwarded message ---------
>>>> From: *Bob Harold* <rharo...@umich.edu>
>>>> Date: Mon, May 4, 2020 at 4:28 PM
>>>> Subject: Re: [DNSOP] The DNSOP WG has placed
>>>> draft-mglt-dnsop-dnssec-validator-requirements in state "Call For Adoption
>>>> By WG Issued"
>>>> To: IETF DNSOP WG <dnsop@ietf.org>
>>>>
>>>>
>>>> Looks useful, I will review.
>>>>
>>>> --
>>>> Bob Harold
>>>>
>>>>
>>>> On Mon, May 4, 2020 at 3:13 PM IETF Secretariat <
>>>> ietf-secretariat-re...@ietf.org> wrote:
>>>>
>>>>
>>>> The DNSOP WG has placed draft-mglt-dnsop-dnssec-validator-requirements
>>>> in
>>>> state Call For Adoption By WG Issued (entered by Tim Wicinski)
>>>>
>>>> The document is available at
>>>>
>>>> https://datatracker.ietf.org/doc/draft-mglt-dnsop-dnssec-validator-requirements/
>>>>
>>>>
>>>
>>> --
>>> Daniel Migault
>>> Ericsson
>>>
>>
>
> --
> Daniel Migault
> Ericsson
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to