On 25/11/2022 18.26, Daniel Migault wrote:
So let me know how we came to this lines and I suspect we do share some similar concerns. A recurrent question and reticence we receive from MNO and ISPs regarding DNSSEC is that they are really scared about having the cache with incoherent RRsets in their cache that causes the validation to fail and in many cases they imagine a mechanism to prevent and address such incoherent data in the cache. One of the intentions of this draft is to prevent such mechanisms to be implemented - mostly as it is likely to generate errors that DNSSEC experts would not be able to catch or understand - as generated by the home made solutions.  As a result we wanted  to minimize the change to the DNSSEC mechanic and only rely on very simple and standard  mechanisms. 4033 provided one way to limit some incoherencies, and we also thought of a similar mechanism that was   like the one described in I-D.ietf-dnsop-ns-revalidation which as we saw it ensures something like a mechanism that refreshes the chain of trust.

I get that in countries with low validation rates [1] it may be difficult to explain to resolver operators that it should be only the authoritative side who worries that they "do DNSSEC wrong". Maybe I'm also personally biased against putting much work to work around mistakes done on the other side of the protocol.

[1] https://stats.labs.apnic.net/dnssec


What we expect is that the validator proposes this option and as such the DRO selects that option in the validator if present.

Well, OK.



    Well yes, I'm in favor of keeping the supported-algorithm set
    centralized internet-wide, instead of trying to start deploying a
    decentralized mechanism.
    [...]

    I mainly wanted to dissuade from early algorithm deprecation on
    validator side. [...]

I got your point and agree it might be counter productive to encourage a mechanism that is not reliable. I propose to remove the text below:
[...]

OK.

I don't see the part about extended errors as problematic (RFC 8914).  It really seems to be getting into (open-source) implementations and it can help with debugging in some cases, though deploying it is probably not very important either.



Oh! sure for the TA. My understanding of the text is that it recommends 5011 for running instances, but that new instances are configured with up-to-date TA that in most cases are updated by software update. So yes I agree and will check this appears clearly.

I don't think 5011 is worth doing at all.  Maybe in some exceptional use cases.  Well, I haven't heard much about deployment experience with non-root TAs, so perhaps I just don't know those well.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to