Hello Jody
________________________________________
Von: Jody Kolker [jkol...@godaddy.com]
Gesendet: Montag, 16. Juli 2018 21:48
An: Martin Casanova; Patrick Mevzek; regext@ietf.org
Betreff: RE: [regext] Poll messages with unhandled namespaces (was Re: I-D 
Action: draft-ietf-regext-change-poll-07.txt)
Hi Martin,

<<
As a matter of fact we will have to over think this rule now because with CDS 
DNSSec Data can be configured by the DNS-Operator of a domain as well (which 
does not need to be the registrar) . So a domain of a non DNSSec accredited 
registrar could end up with  DNSSec data. In case he is DNSSec accredited he 
might be interested to keep his DNSSec Data synchronized with the data at the 
registry originated by CDS. That is exactly our use case where we want to use 
the change poll extension.
>>

How does DNSSEC data get configured by the DNS-Operator of a domain if the 
DNS-Operator is not the registrar?  Is the DNSSEC data set without the 
registrar knowing it was added?  If so, how?

M: This done by the polling specific DNS Records (CDS) from the configured name 
servers of a domains. (RFC-7344 and RFC-8078) which we are currently 
implementing. It could be and will be often the case that the DNS-Operator and 
the registrar are the same entity but its not a must.
"We support RFC-7344 and RFC-8078 for automated DNSSEC delegation trust 
maintenance. Enable fully automated DNSSEC bootstraping, key rollover or 
removal in your favourite name server software. Once a day your name servers 
will be checked for new CDS signaling records. Changes in CDS signaling records 
are accepted and published in our .ch or .li zone after a delay of 3 working 
days if our acceptance criterias are met. "


Thanks,
Jody Kolker
Martin Casanova


-----Original Message-----
From: regext <regext-boun...@ietf.org> On Behalf Of Martin Casanova
Sent: Monday, July 16, 2018 2:09 PM
To: Patrick Mevzek <p...@dotandco.com>; regext@ietf.org
Subject: Re: [regext] Poll messages with unhandled namespaces (was Re: I-D 
Action: draft-ietf-regext-change-poll-07.txt)

Patrick

To be clear the domain info response will be sent just without the DNSSec part. 
Therefore a not DNSSec interested registrar will just not see the DNSSec 
configuration but all the rest of the domain info resData. I don't see a 
problem with that.

In our case a registrar currently needs to be accredited by us (DNSEC_ENABLED) 
in order to successfully login with DNSSec extension configured and he will 
only be able to transfer a DNSSec domain to him if the configured DNSSec at 
login.

In case he is DNSSec enabled but still logs in without this extension he will 
get a failure with error message similar to  "Not allowed to transfer DNSSec 
Domain" when trying to transfer a DNSSec domain to him.

So actually there is a way to know why it didn't work for him.

As a matter of fact we will have to over think this rule now because with CDS 
DNSSec Data can be configured by the DNS-Operator of a domain as well (which 
does not need to be the registrar) . So a domain of a non DNSSec accredited 
registrar could end up with  DNSSec data. In case he is DNSSec accredited he 
might be interested to keep his DNSSec Data synchronized with the data at the 
registry originated by CDS. That is exactly our use case where we want to use 
the change poll extension.

Martin
________________________________________
Von: regext [regext-boun...@ietf.org]&quot; im Auftrag von &quot;Patrick Mevzek 
[p...@dotandco.com]
Gesendet: Montag, 16. Juli 2018 20:31
An: regext@ietf.org
Betreff: Re: [regext] Poll messages with unhandled namespaces (was Re: I-D 
Action: draft-ietf-regext-change-poll-07.txt)

On Mon, Jul 16, 2018, at 19:58, Gould, James wrote:
> I believe that the login
> services defines what the server can return to the client, so if the
> client does not support the DNSSEC extension it is completely
> reasonable for the server not to return it.  If a client wants to see
> the DNSSEC information returned they should include the URI in their
> login services.

James, please, again, take into account some real life examples that happen 
today:

registries restrict the use of secDNS at login for only the registrars having 
passed a specific accreditation test (trying to login with it without prior 
registry vetting triggers an authentication error, so the registrar can only do 
its business if it removes this extension from list at login) thus, in your 
case (just removing the content), a registrar not wanting to do DNSSEC and not 
wanting to transfer to him a currently DNSSEC-enabled domain will have no way 
to know that.

And saying to registrars: "then pass registry accreditation tests to be able to 
login with secDNS and see **others** domain names with secDNS data while you do 
not want to do any DNSSEC related stuff", is certainly not going to fly...

As long as we take into account only some cases and not others we will never be 
able to deliver an extension used by multiple registries.
Also, before anything happen I will be very interested by intention of support 
(which means deployment) from registries.

Otherwise, like I said, this problem exists since EPP started so it is not new, 
and it seems the current status quo fits most of the player (due to the number 
of people having participated here), so we are maybe devoting resources to 
trying to design something perfect... that noone will then use :-(

--
  Patrick Mevzek

_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to