On Thu, 24 Sep 2020, Ben Schwartz wrote:
I would certainly be concerned about such a scenario, but I don't understand
how it's relevant to Peter's proposal.
Couldn't this already be done today, by simply including such a hypothetical "parent
opinion" record in the glue?
For the scenario you're describing, the present lack of DNSSEC authentication
would not seem to be an obstacle.
middlewhere (voluntarilly or mandated) would not be able to trust glue
for security decisions. where as they might be able to trust parental
signed data.
Of course, any goverment party can publish a list of directives in their
publications and law books, but if those are technically weak or even
formally unprovable, implementation and enforcement will be impossible.
You can also look at it from the reverse way. If the parent wants to
publish anything about the child, even if it received it from the
child, it can already do so using a prefix in its own zone, eg:
_nohats._parentalguidance.ca. IN DNSKEY <blob>
_nohats._parentalguidance.ca. IN DS <blob>
_nohats._parentalguidance.ca. IN TXT <blob>
No DNS infastructure or protocol changes are required for this.
Paul
On Thu, Sep 24, 2020 at 10:53 PM Paul Wouters <p...@nohats.ca> wrote:
[added hrpc to CC: list]
On Thu, 24 Sep 2020, Peter van Dijk wrote:
> When talking to Petr Spacek about this, he came up with the following:
> -if-, long enough ago, besides DS, a range of RRtype numbers would have
> been reserved with the same processing rules, i.e. these types live in
> the -parent- and not on the -child-, then both DSPKI and NS2T could
> become parent side records through the simple act of requesting an
> IANA allocation from that special range.
That is an incredibly dangerous idea. It is basically a wildcard from
the parent to make claims about the child, that the child cannot
control. You can imagine many kind of RRTYPEs that be be used, eg:
ADULT_CONTENT
POLITICAL_SPEECH
GOVERNMENT_BLOCKED
MONITOR_USERS
GEOGRAPHIC_CONSTRAINT
Of course, governments can already dictate that ISPs do any of these
things, but with this proposal you are giving them an awesome censorship
tool. And anyone not complying to the RFCs implementing these, could be
in clear violation of the working of the internet and should be punished.
Letting the parent make arbitrary statements about the DNS child is too
dangerous a tool to roll out.
Partially this can be mitigated by making the registry Internet Standard
Required, but that would put a lot of pressure on IETF and DNSOP later
on - pressure that is not technical in nature, but political.
I understand the desire for "if we need the parent to say something
about the child in the future, we would already have the infrastructure
running". Indeed, it is a neat idea. But too dangerous.
Paul
> Name: draft-peetterr-dnsop-parent-side-auth-types
> Revision: 00
> Title: Parent-side authoritative DNS records for enhanced
delegation
> Document date: 2020-09-24
> Group: Individual Submission
> Pages: 5
> URL:
https://www.ietf.org/id/draft-peetterr-dnsop-parent-side-auth-types-00.txt
> Status:
https://datatracker.ietf.org/doc/draft-peetterr-dnsop-parent-side-auth-types/
> Html:
https://www.ietf.org/id/draft-peetterr-dnsop-parent-side-auth-types-00.html
> Htmlized:
https://tools.ietf.org/html/draft-peetterr-dnsop-parent-side-auth-types-00
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop