OK, thanks.  The changes are certainly improvements, in my eyes.  Below I'll further clarify what I meant.

4033 indicates it does not make much sense to keep a RRSIG whose validity period has expired ( TTL > Validity period).

Yes, I should stress that I do agree with trimming TTL of whole RRset by expiration of RRSIG that's used to validate it, and there are good reasons for that.  I even had implemented that some time ago for Knot Resolver.

As I wrote (perhaps unclearly), I was puzzled mainly by the recommendation that followed.  I'm failing to really understand what it meant exactly, and by what mechanism it's meant to ensure coherence (in some cases?).  And perhaps, how a validator operator could enforce such conditions without forking their validator. The line:

RRsets TTL SHOULD NOT exceed the DS, KSK or ZSK initial TTL value, that TTL SHOULD trigger delegation revalidation as described in {{!I-D.ietf-dnsop-ns-revalidation}}.



I agree we need to ensure good practice with 8624.
I do agree this might not be very very useful today, but the reason we recommended this is also to ease communication between the resolvers and authorities. My impression is that it is hard to change the signature scheme on the authoritative side as we do not know what resolver will support it.
Recommendations for authoritatives are a bit tangential here.  I believe that RFCs (8624 or others) currently don't give a good idea about internet-wide support of resolvers for the algorithms, but you can find good measurements if you pay attention around IETF, OARC, etc.  Alg. 13 is widely used for some time, even on TLDs, but 15 seems unfortunately still rather "risky" (or recently was): https://www.potaroo.net/ispcol/2021-06/eddi.html



The question seems whether we should use such recommendations to improve communication between authoritative and resolvers or favor a more centralized approach where all software is more sticking to one document 8624. That latter approach seems to me to have too long cycles and I wished that we could benefit from new crypto ed25519 earlier than when all resolvers are updated.
Well yes, I'm in favor of keeping the supported-algorithm set centralized internet-wide, instead of trying to start deploying a decentralized mechanism.

Validators don't need to talk to *authoritative* servers.  I believe it's quite common to have more than one layer of resolvers/caches, in which case an EDNS0 signal is just a bad mechanism, even if we somehow managed to deploy it widely.  (which wouldn't be easy, kinda similarly to widely deploying EdDSA validation)

I mainly wanted to dissuade from early algorithm deprecation on validator side.  Validator operators might not understand that instead of validating a zone with a (supposedly) weak algorithm, they won't validate it at all.  So the only improvement is the AD=1 bit which gets stricter by that, but most use cases don't even look at that bit and only rely on the protection by SERVFAILs.



I am surprised  you would not recommend RFC 5011

5011 needs persistent state, a thing that resolvers/validators often don't need at all otherwise (cache is safe to delete).  5011 doesn't always work, so you need to combine with some fallback mechanism(s) anyway - for new installations and for stale ones (missed rotation).  Root rollover has happened only once in history, non-root TAs aren't that common, and 5011 algorithm isn't very simple, so the code can easily get some bugs without anyone noticing until it's too late.

Lots of down-sides, so I rather put the TAs into SW updates, for the root TA case at least.  I'd recommend trying to avoid non-root TAs, but if I had to choose, I'd put them into configuration. Again a thing that I have to provision *anyway*, so I get the occasional TA updates basically for free, without needing to worry about those 5011 disadvantages.  (occasional = 5011 defaults to requiring 30 days of overlap)


--Vladimir
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to