In the .se zone dnssec penetration is quite high (approx. 50%). And validation 
is high in Sweden too, all major ISPs validate.
Government agencies and government owned companies in Sweden are required to 
sign their zones. Not all do it - yet, but we are working on it.
Our goal is to drive .se to become 100% signed. 

100% signed would mean unsigned zones do not get delegated, going insecure is 
no longer an option.
I would like the protocol to be able to handle that case. 

The “easy” solution is to require lax-validation. It doesn’t make a zone less 
secure and allows to transfer zones between operators using different 
algorithms.

/Ulrich



> 
> 
> 
>> On 1 Mar 2021, at 14:14, Joe Abley <jab...@hopcount.ca 
>> <mailto:jab...@hopcount.ca>> wrote:
>> 
>> Hi Ulrich,
>> 
>> On Mar 1, 2021, at 05:43, Ulrich Wisser <ulr...@wisser.se 
>> <mailto:ulr...@wisser.se>> wrote:
>> 
>>> On 25 Feb 2021, at 16:11, Joe Abley <jab...@hopcount.ca 
>>> <mailto:jab...@hopcount.ca>> wrote:
>> 
>>> 
>> 
>>>> On Feb 25, 2021, at 06:53, Ulrich Wisser 
>>>> <ulrich=40wisser...@dmarc.ietf.org 
>>>> <mailto:ulrich=40wisser...@dmarc.ietf.org>> wrote:
>> 
>>> 
>>>>> But this is a real world problem, one that is holding DNSSEC back.
>>>>> If you buy DNS operations the operator will usually tell you what 
>>>>> algorithm they use, you have no choice in that.
>>>> 
>>>> This feels like one of those areas where more specificity is needed. "DNS 
>>>> operations" is is over-broad; what you mean, I think, is "if you outsource 
>>>> zone-signing". If you sign yourself and distribute your zone to external 
>>>> DNS operators then you can add and drop vendors without worrying about key 
>>>> rollovers, for example.
>>> 
>>> Ok, I can be more specific. 
>>> 
>>> As a small business owner you have no way to move your hosting company to 
>>> change their DNSSEC configuration. (Besides that you most probably have no 
>>> idea that it exists.) You should be able to switch hosting providers 
>>> without thinking about security, a secure transition should be guaranteed 
>>> by the hosting companies, who can only do it if it is enabled by the 
>>> protocol.
>> 
>> Even this really requires more specificity. What is a "hosting company"?
>> 
>> I think a lot of the problems we face with these kinds of scenarios is that 
>> various functionally-overlapping industries have sprung up without DNSSEC 
>> being much more than an afterthought in the way that products are structured 
>> and sold. It's perhaps unremarkable that the mechanics of offering these 
>> services are not a great fit.
>> 
>> We can try harder and harder to shoe-horn DNSSEC into products that don't 
>> easily accommodate it, for sure. However, there's an attendant risk that by 
>> doing so all we really achieve is making DNSSEC more operationally complex 
>> than it already is, and I think there's an argument that such an outcome 
>> would not make it easier to deploy.
>> 
>>> As a larger entity you might have compliance requirements for dnssec.
>> 
>> [As an entity large enough to pay significant fees for enterprise DNS 
>> service, the reality today is that you probably don't use DNSSEC at all.]
>> 
>>>> DNSSEC is normally part of a layered set of defences. In such an 
>>>> architecture relaxing one layer for a period in order to fix a problem or 
>>>> avoid a more complicated transition can be a perfectly acceptable answer. 
>>>> Going insecure for a short period in that context is not necessarily a 
>>>> cop-out; it could well be smart thinking.
>>> 
>>> I totally disagree. When has switching off security ever been a smart 
>>> option?
>> 
>> If security was the only consideration, then nobody would connect anything 
>> to a network in the first place.
>> 
>>> It is only considered smart because the process of moving is so complex and 
>>> error prone. 
>>> And that is a “feature” of the protocol design. It’s not a law of nature.
>>> We could change the design to allow for secure transfer.
>> 
>> ... and by doing so we could increase the complexity somewhere else.
>> 
>> I'm really just pushing back on the idea that going insecure for a planned, 
>> controlled period of time is necessarily a terrible idea. I often see these 
>> kinds of reactions from people seeing particular security measures as binary 
>> options, instead of taking a more holistic and risk-based approach, which is 
>> why my knee is jerking (I'm not suggesting that you are one of them).
>> 
>> If I rely upon a DNS vendor to sign my zone and I want to change vendors for 
>> some business reason, being able to switch easily at the cost of going 
>> insecure for 6 hours might be a much better answer than not being able to 
>> switch at all, or even having the cost of switching amplified by 100 
>> person-hours of planning, or dealing with the risk of going dark to users 
>> downstream of 8.8.8.8 when it turns out that the change triggers another 
>> corner-case in Google's code base.
>> 
>> To the end-user, I can see why having a protocol element designed to make 
>> this easier and avoid the practical need to go insecure seems highly 
>> attractive, but we're really just shifting the cost of dealing with what 
>> might very well be a somewhat rare corner case to the developers, operators 
>> and users of every DNS server that supports DNSSEC. Even if the costs are 
>> low in the latter case, I think it's reasonable to say they are non-zero and 
>> universal, which means they might not be so low in aggregate.
>> 
>> In this context, the determination of what is smart and what is silly seems 
>> a little more grey to me than your message ("totally") suggests.
>> 
>> 
>> Joe
> 

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to