Hi all,

I've read the thread multiple times, and can definitely see both sides of
the conversation. As Paul W is wearing both an AD hat and the DE hat, he
has asked me to make the decision and instruct him.

While I really don't love it, I believe that it makes sense to stick with
_signal.

Reasons against:
1: It is very generic. It's not at all clear that
foo.bar.baz._signal.example.com has anything to do with DNSSEC (although
_dsboot.foo.bar.baz._signal.example.com is clearer)

Reason for:
1: It is very generic - it another scheme happens to be able to fit well
under _signal, they can use it; _cheese.foo.bar.baz._signal.com **might**
be good if a parent wants to inform someone about their children's cheese
preferences)

2: Strings are cheap - if another scheme happens to not fit will under
_signal, they can choose another one (hopefully less generic next time!) —
_flavor.foo.bar._cheese.example.com.

3: It happens to already be some what deployed - and we cannot (easily)
tell who all has done so. Yes, CloudFlare presumably has this baked into a
variable somewhere and  it would be trivial to s/_signal/_dnssec-boot/, but
someone might also have already done this manually. Yes, I fully agree that
people shouldn't kvetch if they implemented from a draft and have to change
— which is why I only used this as a tie-breaker.

This was one of those "there is no perfect answer" situations, and at least
some set of people will be unhappy (sorry!), but I think that sticking with
the draft is the lesser of the two evils…

W



On Wed, May 15, 2024 at 4:49 PM, Peter Thomassen <pe...@desec.io> wrote:

> Hi David,
>
> The DNSOP chairs have told me that the document is no longer a WG document
> as it's with the IESG, so a consensus call here is not applicable.
>
> Given the discussion here, we'll leave it to the IESG to decide. If I hear
> any news, I'll post them here.
>
> Thanks,
> Peter
>
> On 5/15/24 00:03, David Dong via RT wrote:
>
> Hi all,
>
> Following up on this. Please let us know how we should proceed for this.
> Thank you.
>
> Best regards,
>
> David Dong
> IANA Services Sr. Specialist
>
> On Thu May 09 09:39:29 2024, pe...@desec.io wrote:
>
> [another (last) attempt of reposting this as it did not get delivered to
> dnsop@ietf.org on May 7, as evidenced by the list archive]
>
> Hi,
>
> On 5/2/24 19:59, David Dong via RT wrote:
>
> Following up on this; does the group agree that "_dnssec" is OK?
>
> Looking at what's been said in this thread:
> - Two people have proposed to change the label, current proposal:
> _dnssec
> - Two implementers have said they'd make the change but don't seem
> convinced
> - The authors (hats off, but also implementers and authors of current
> drafts using the mechanism) are not convinced
>
> The authors don't feel comfortable declaring consensus in either direction
> (neither do we know whether that's our role), and we're not sure how to
> proceed. Perhaps the DNSOP chairs could weigh in, as the discussion is
> happening on the WG list although the document is technically out of the
> door ...
>
> I've been reluctant adding the following argument as to not seem
> insisting; OTOH it may have its own technical merit, so here is.
>
> The "_dnssec" label implies that the mechanism is not suitable for
> signaling unrelated to DNSSEC. That's an artificial limitation, and it's
> unclear why to impose the restriction. An operator could very well want to
> publish other things, like
>
> - TXT at _abuse.example.com._signal.ns1.provider.net for an abuse
> address,
> - PTR at _catalog.example.com._signal ... for catalog zone membership,
> - ...
>
> If the signaling method is generic, I believe it should have a short
> generic label. Any specificity to determine the kind of signal can go into
> the first label.
>
> I have no specific preference for "_signal" other than I don't know what a
> good alternative would be. Narrowing the scope with "_dnssec" doesn't seem
> to improve the situation.
>
> Thanks,
> Peter
> + Nils (for the "we"/author statements)
>
> Thank you.
>
> Best regards,
>
> David Dong
> IANA Services Sr. Specialist
>
> On Mon Apr 22 11:42:15 2024, scott.r...@nist.gov wrote:
>
> On 20 Apr 2024, at 19:38, Paul Wouters wrote:
>
> On Sat, 20 Apr 2024, Peter Thomassen wrote:
>
> The authors certainly don't insist, but we'd need to pick a suitable
> replacement for the "_signal" label.
>
> John proposed "_dnssec-signal" elsewhere in this thread.
>
> The authors would like to note that adding "_dnssec-" eats up 8 more
> bytes, increasing chances that bootstrapping will fail due to the
> _dsboot.<domain-name>._dnssec-signal.<nsname> length limitation. Other
> than this (unnecessary?) use case narrowing, this choice seems
> fine.
>
> That said, does this choice address your concerns?
>
> It would, but I would also be okay if it is just _dnssec.
>
> If the concern is that the label is too generic, “_dnssec” might be too
> generic as well. If it is to be more precise, go with _ds-boot or
> something more specific to the use case. I don’t have an implementation in
> the mix, so it this isn’t a strong opinion. If the
> group agrees _dnssec is fine, then I am fine with it too.
>
> Scott
>
> =====================================
> Scott Rose
> NIST/CTL/WND
> scott.r...@nist.gov
> ph: 301-975-8439
> GoogleVoice: 571-249-3671
> =====================================
>
> _______________________________________________
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-le...@ietf.org
>
> --
> Like our community service? 💛
> Please consider donating at
>
> https://desec.io/
>
> deSEC e.V.
> Kyffhäuserstr. 5
> 10781 Berlin
> Germany
>
> Vorstandsvorsitz: Nils Wisiol
> Registergericht: AG Berlin (Charlottenburg) VR 37525
>
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to