On Sun, 10 Jul 2022, Dmitry Belyavsky wrote:

Sorry for a very=C2=A0long delay, as your review was the only one I thoug=
ht there was not enough interest in
this document.

It escaped my attention. I have done a review now, and the document
looks okay, but still needs some changes I think.


      The algorithm number is specified as 23 here and other places, and that's 
so that the examples
      could be calculated, but if the IANA doesn't issue them 23 as the number 
(and they probably
      won't) most of the examples will have to be redone with the final 
values.=C2=A0 This is a cart/horse
      problem and I'd recommend that the IANA do an early=C2=A0 assignment of 
the signature and digest
      algorithm values and that the document be redone with the final values 
prior to IESG submission
      to prevent a round trip during RFC publication.

I agree. The document adoption already signaled the non-technical
issues, eg whether or not the IETF should add GOST algorithms. Since
we are now at the implementation stage, I think an Early Allocation is
the right way forward. If not doing this, please add a notes in [square
brackets] about this assumed calculation so it won't be forgotten in
future versions. (I see this was done now already, thanks)

      Section 6.1 - huh?=C2=A0 In any case, we generally don't have single 
subheader sections - move the
      text up.=C2=A0=C2=A0 I think this is supposed to be "The support of this 
cryptographic suite in
      DNSSEC-aware systems is OPTIONAL.=C2=A0 Systems that do not support these 
algorithms may ignore the
      RRSIG, DNSKEY and DS records created with them."

I think giving directions here about what to do when not supported is
wrong. It should at most point to the generic DNSSEC handling of unknown
algorithms, as this is not a special case. eg point to
https://datatracker.ietf.org/doc/html/rfc6840#section-5.2


Setion 2.1 says:

   The signature is calculated from the hash according to the GOST R
   34.10-2012 standard, and its wire format is compatible with RFC 7091
   [RFC7091].

I find the use of "compatible" a bit strange. Is it the wire format or
isn't it?

   Note: The ECC-GOST12 signature algorithm uses random data, so the
   actual computed signature value will differ between signature
   calculations.

Do common libraries not support a method where this data is static, to
facilitate testing code with static test vectors? That would really be
needed to be able to verify an implementtion with provided test vectors.

Section 4.1 prob should use TBD1 and not 23, until we have an Early Code
assignment.

Setion 5, we usually don't use "Deployment Considerations" but use
"Operational Considerations", and then look at RFC 5706 for guidance
on its content.

Section 6:

   The support of this cryptographic suite in DNSSEC-aware systems is
   OPTIONAL.  Systems that do not support these algorithms may ignore
   the RRSIG, DNSKEY and DS records created with them.

Maybe point to https://datatracker.ietf.org/doc/html/rfc6840#section-5.2


It would be good if Section 7 and/or 8 could give a more informative
instruction to developers. My understanding is that GOST R 34.10-2001
GOST R 34.11-94 are not deployed anywhere, so the advise could be along
the lines of:

   As GOST R 34.10-2001 and GOST R 34.11-94 are not used in
   production deployments, these deprecated algorithms MUST NOT be
   implemented or used for DNSSEC signing or DNSSEC validation.


I think Section 9 needs a little work. A protocol implementer doesn't
really need to know the cryptogrpahic strength. I think it is far more
valuable to give some advise on deploying this too soon, without
widespread support, and having your domain being handled as unsigned.

Perhaps recommend a dual KSK/algorithm signed zone at first until these
algorithms are more widely supported so those who want to use GOST have
a migration path towards those algorithms?

Section 10:

   Value  Algorithm         Mnemonic  Signing Sec.  References   Status
   TBA1   GOST R 34.10-2012 ECC-GOST12    Y   *     RFC TBA     OPTIONAL

There is no Status column in this registry (they should prob be one,
but right now it doesn't have one).

   The entry for the Algorithm "GOST R 34.10-2001", number 12 should be
   updated as such: Description field should be changed to "GOST R
   34.10-2001 (deprecated, see TBA1" and Zone Signing field should be
   changed to "N".

I don't think the Zone Signing field should be updated. This field
basically means "For use with DNSSEC" (not SIG0), which the entries
were defined for. It is not used to convey "is currently okay to use
for zone signing".


NITS:

I would not use "according to RFC-xxxx" but perhaps just place the RFC
link there (but not to the entire document but straight into the
relevant section)

Paul

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to