Re: [DNSOP] [EXT] Re: [Technical Errata Reported] RFC7686 (6761)

2021-11-30 Thread libor.peltan

Hi John,
If a query for a special use name, whether it's foo.onion or 
7.8.9.10.in-addr.arpa, leaks to an authoritative server, NXDOMAIN is 
the right answer.


not really. First of all, in-addr.arpa. zone is normal part of DNS tree 
and various authoritative (depends for which zone) servers answer with 
proper delegations on it. Sure, 9.10.in-addr.arpa. is already an 
NXDOMAIN (according to auth servers for 10.in-addr.arpa. , but none 
others!) since 10.0.0.0/8 is a private address space.


On the other hand, onion. zone does not exist in DNS, therefore, the 
root servers (authoritative for ".") answer such queries as NXDOMAIN, 
whereas all other authoritative servers (for example, authoritative for 
zone example.com.) answer it with REFUSED, because it's out of their scope.


The requirement that all authoritative servers must answer onion. (or 
any subdomains) with NXDOMAIN does not make sense:

1) all (AFAIK) auth server implementations to date do not comply
2) would be an unnecessary exceptional behavior, possibly confusing things
3) would be probably in conflict with other DNS RFCs
4) it's not clear how such answers would be DNSSEC'ed

I suggest to remove any specific errcode (NXDOMAIN, REFUSED) mentions 
from such requirement. In the future, those errcodes and their names may 
be altered. I quite like the Peter's original proposal, though any 
wording can always be slightly improved. I don't dare to suggest any 
wording though.


Libor

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] DNSOPI-D Action: draft-ietf-dnsop-nsec3-guidance-02.txt

2021-11-30 Thread Vladimír Čunát

On 26/11/2021 12.32, Petr Špaček wrote:
You are right right, I did not consider "crack names which do not 
exist yet" scenario and focused only on dictionary reuse across zones.


Do you have specific proposals for draft text? 


No, I don't have any ideas for improvements.  The current salt section 
reads nice to me.


--Vladimir

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [EXT] Re: [Technical Errata Reported] RFC7686 (6761)

2021-11-30 Thread Paul Vixie




libor.peltan wrote on 2021-11-30 01:11:

...

I suggest to remove any specific errcode (NXDOMAIN, REFUSED) mentions 
from such requirement. In the future, those errcodes and their names may 
be altered. I quite like the Peter's original proposal, though any 
wording can always be slightly improved. I don't dare to suggest any 
wording though.


a query for example.onion or even "onion" has no business being sent to 
an authority server to which this domain has not been delegated. so 
there is a right answer and it is generally not NXDOMAIN since that 
would be a knowledge signal (end to end) and the server can have no 
knowledge. obviously the root servers have and can signal such knowledge 
so NXDOMAIN would be the right answer from them.


the right answer is likewise not REFUSED since that's a policy signal 
and we won't be asking that server implementers hard code "onion" or 
other special-use names, nor that server operators configure such names. 
there are too many servers, and the list of special-use domains will 
change over time. a policy signal for special-use names cannot scale. 
this also rules out "don't answer at all" which is also a policy signal.


for any non-root server, an RD=0 question for example.onion should be 
answered with SERVFAIL. this is a condition signal, and the condition is 
"since i'm hearing this query, someone thinks i'm holding a delegation, 
and i'm not, so i might be lame for some zone, so the server (me, this 
authority server) has failed."


vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [EXT] Re: [Technical Errata Reported] RFC7686 (6761)

2021-11-30 Thread Robert Edmonds
Peter van Dijk wrote:
> I don't think we should be prescribing extra code paths in
> authoritative servers in this document, and I think non-authoritative
> NXDOMAINs would be very confusing. In particular, resolvers would not
> believe them anyway.
> 
> That all said, I can certainly see that other texts than my suggestion
> could make sense.

If the goal is to avoid mandating extra code paths in typical
authoritative servers, I would suggest something like the following
which narrowly answers only the questions asked in 6761 ("Are developers
of authoritative domain name servers expected to make their
implementations recognize these names as special and treat them
differently?  If so, how?"):

Original Text
-
   5.  Authoritative DNS Servers: Authoritative servers MUST respond to
   queries for .onion with NXDOMAIN.

Corrected Text
--
   5.  Authoritative DNS Servers: Authoritative servers SHOULD NOT
   recognize .onion names as special and MUST NOT treat queries for
   .onion names differently from other queries.

Splitting the "recognize ... treat" conjunction between "SHOULD NOT"
and "MUST NOT" would, for instance, allow an authoritative server to
log a warning message if an operator intentionally configured an
"onion." zone in the server.

A slight expansion of the text might read:

Corrected Text
--
   5.  Authoritative DNS Servers: Authoritative servers SHOULD NOT
   recognize .onion names as special and MUST NOT treat queries for
   .onion names differently from other queries.  By default,
   authoritative servers MUST NOT respond authoritatively to
   queries for .onion names.

The "By default" qualifier covers the case of a non-default
configuration (such as being configured to serve the root zone) where an
authoritative server would need to respond authoritatively for .onion
names.

-- 
Robert Edmonds

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] How Slack didn't turn on DNSSEC

2021-11-30 Thread John Levine
This blog post has been making the rounds. Since it is about a
sequence of DNS operational failures, it seems somewhat relevant here.

https://slack.engineering/what-happened-during-slacks-dnssec-rollout/

tl;dr first try was rolled back due to what turned out to be an unrelated 
failure at some ISP

second try was rolled back when they found they had a CNAME at a zone
apex, which they had never noticed until it caused DNSSEC validation
errors.

third try was rolled back when they found random-looking failures that
they eventually tracked down to bugs in Amazon's Route 53 DNS server.
They had a wildcard with A but not  records. When someone did an
 query, the response was wrong and said there were no records at
all, not just no  records. This caused failures at 8.8.8.8 clients
since Google does aggressive NSEC, not at 1.1.1.1 because Cloudflare
doesn't.

They also got some bad advice, e.g., yes the .COM zone adds and
deletes records very quickly, but that doesn't mean you can unpublish
a DS and just turn off DNSSEC because its TTL is a day. Their tooling
somehow didn't let them republish the DNSKEY at the zone apex that
matched the DS, only a new one that didn't.

It is clear from the blog post that this is a fairly sophisticated
group of ops people, who had a reasonable test plan, a bunch of test
points set up in dnsviz and so forth.  Neither of these bugs seem
very exotic, and could have been caught by routine tests.

Can or should we offer advice on how to do this better, sort of like
RFC 8901 but one level of DNS expertise down?

R's,
John

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [EXT] Re: [Technical Errata Reported] RFC7686 (6761)

2021-11-30 Thread libor.peltan

Hi Paul,


for any non-root server, an RD=0 question for example.onion should be 
answered with SERVFAIL. this is a condition signal, and the condition 
is "since i'm hearing this query, someone thinks i'm holding a 
delegation, and i'm not, so i might be lame for some zone, so the 
server (me, this authority server) has failed."


from what I've observed so far, there seem to be a consensus among the 
authoritative servers out there :) They all answer out-of-bailiwick 
queries with REFUSED. I haven't met any that would say SERVFAIL or 
NOTAUTH or anything else. If you propose to normatively change this, 
with the idea that it would make more sense, then OK, but dunno if it 
has any benefit.


$ kdig @d.in-addr-servers.arpa. nonexistent-tld. +nordflag +noall +header
;; ->>HEADER<<- opcode: QUERY; status: REFUSED; id: 2834
;; Flags: qr; QUERY: 1; ANSWER: 0; AUTHORITY: 0; ADDITIONAL: 0
$ kdig @a.ns.nic.cz. nonexistent-tld. +nordflag +noall +header
;; ->>HEADER<<- opcode: QUERY; status: REFUSED; id: 63681
;; Flags: qr; QUERY: 1; ANSWER: 0; AUTHORITY: 0; ADDITIONAL: 0
$ kdig @a0.org.afilias-nst.info. nonexistent-tld. +nordflag +noall +header
;; ->>HEADER<<- opcode: QUERY; status: REFUSED; id: 45946
;; Flags: qr; QUERY: 1; ANSWER: 0; AUTHORITY: 0; ADDITIONAL: 0

If you propose that onion. TLD (non-existing) and its subtree shall be 
an exception (for very all auth servers) and answered differently than 
other non-existent TLDs, then OK, but I simply don't like the idea.


Libor

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] RFC 9157 on Revised IANA Considerations for DNSSEC

2021-11-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 9157

Title:  Revised IANA Considerations for DNSSEC 
Author: P. Hoffman
Status: Standards Track
Stream: IETF
Date:   November 2021
Mailbox:paul.hoff...@icann.org
Pages:  5
Updates:RFC 5155, RFC 6014, RFC 8624

I-D Tag:draft-ietf-dnsop-dnssec-iana-cons-05.txt

URL:https://www.rfc-editor.org/info/rfc9157

DOI:10.17487/RFC9157

This document changes the review requirements needed to get DNSSEC
algorithms and resource records added to IANA registries. It updates
RFC 6014 to include hash algorithms for Delegation Signer (DS)
records and NextSECure version 3 (NSEC3) parameters (for Hashed
Authenticated Denial of Existence). It also updates RFCs 5155 and
6014, which have requirements for DNSSEC algorithms, and updates RFC
8624 to clarify the implementation recommendation related to the
algorithms described in RFCs that are not on the standards track. The
rationale for these changes is to bring the requirements for DS
records and hash algorithms used in NSEC3 in line with the
requirements for all other DNSSEC algorithms.

This document is a product of the Domain Name System Operations Working Group 
of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [EXT] Re: [Technical Errata Reported] RFC7686 (6761)

2021-11-30 Thread Ted Lemon
I don’t see how any answer from an authoritative server other than REFUSED
really makes sense for a domain for which that server is not authoritative.
It hasn’t failed. It’s been asked a bogus question. It doesn’t make sense
for it to theorize that it might be misconfigured.

On Tue, Nov 30, 2021 at 15:06 libor.peltan  wrote:

> Hi Paul,
> >
> > for any non-root server, an RD=0 question for example.onion should be
> > answered with SERVFAIL. this is a condition signal, and the condition
> > is "since i'm hearing this query, someone thinks i'm holding a
> > delegation, and i'm not, so i might be lame for some zone, so the
> > server (me, this authority server) has failed."
> >
> from what I've observed so far, there seem to be a consensus among the
> authoritative servers out there :) They all answer out-of-bailiwick
> queries with REFUSED. I haven't met any that would say SERVFAIL or
> NOTAUTH or anything else. If you propose to normatively change this,
> with the idea that it would make more sense, then OK, but dunno if it
> has any benefit.
>
> $ kdig @d.in-addr-servers.arpa. nonexistent-tld. +nordflag +noall +header
> ;; ->>HEADER<<- opcode: QUERY; status: REFUSED; id: 2834
> ;; Flags: qr; QUERY: 1; ANSWER: 0; AUTHORITY: 0; ADDITIONAL: 0
> $ kdig @a.ns.nic.cz. nonexistent-tld. +nordflag +noall +header
> ;; ->>HEADER<<- opcode: QUERY; status: REFUSED; id: 63681
> ;; Flags: qr; QUERY: 1; ANSWER: 0; AUTHORITY: 0; ADDITIONAL: 0
> $ kdig @a0.org.afilias-nst.info. nonexistent-tld. +nordflag +noall +header
> ;; ->>HEADER<<- opcode: QUERY; status: REFUSED; id: 45946
> ;; Flags: qr; QUERY: 1; ANSWER: 0; AUTHORITY: 0; ADDITIONAL: 0
>
> If you propose that onion. TLD (non-existing) and its subtree shall be
> an exception (for very all auth servers) and answered differently than
> other non-existent TLDs, then OK, but I simply don't like the idea.
>
> Libor
>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [EXT] Re: [Technical Errata Reported] RFC7686 (6761)

2021-11-30 Thread Paul Vixie



Ted Lemon wrote on 2021-11-30 17:04:
I don’t see how any answer from an authoritative server other than 
REFUSED really makes sense for a domain for which that server is not 
authoritative. It hasn’t failed. It’s been asked a bogus question. It 
doesn’t make sense for it to theorize that it might be misconfigured.


i only use REFUSED if the same question from some other query source (by 
IP) or signed differently (with TSIG or SIG(0)) could possibly work. for 
out-of-authority requests, the server must fail to answer.


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [EXT] Re: [Technical Errata Reported] RFC7686 (6761)

2021-11-30 Thread Mark Andrews
Authoritative servers should take NO SPECIAL BEHAVIOUR for .onion.

The default behaviour of an authoritative server is fine be it REFUSED,
NOTAUTH, NXDOMAIN (when they have a copy of the root zone) or a referral
to the root.

Recursive servers are a different kettle of fish.

Mark

> On 1 Dec 2021, at 12:10, Paul Vixie  wrote:
> 
> 
> 
> Ted Lemon wrote on 2021-11-30 17:04:
>> I don’t see how any answer from an authoritative server other than REFUSED 
>> really makes sense for a domain for which that server is not authoritative. 
>> It hasn’t failed. It’s been asked a bogus question. It doesn’t make sense 
>> for it to theorize that it might be misconfigured.
> 
> i only use REFUSED if the same question from some other query source (by IP) 
> or signed differently (with TSIG or SIG(0)) could possibly work. for 
> out-of-authority requests, the server must fail to answer.
> 
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] How Slack didn't turn on DNSSEC

2021-11-30 Thread Viktor Dukhovni
> On 30 Nov 2021, at 1:38 pm, John Levine  wrote:
> 
> Can or should we offer advice on how to do this better, sort of like
> RFC 8901 but one level of DNS expertise down?

The main advice that comes to mind is to use a DNS hosting provider
with a proven (multi-year) record of doing DNSSEC reliably.

If the DNS hosting provider where Cloudflare, Google, OVH, one.com,
TransIP, ... the implementation would have been correct.

Clearly Route 53 wasn't quite ready for prime time.  It is not clear
how we can help customers know which providers have solid implementations.
I don't know of any mainstream certification programs that would do the
job.

-- 
Viktor.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] How Slack didn't turn on DNSSEC

2021-11-30 Thread Philip Homburg
>It is clear from the blog post that this is a fairly sophisticated
>group of ops people, who had a reasonable test plan, a bunch of test
>points set up in dnsviz and so forth.  Neither of these bugs seem
>very exotic, and could have been caught by routine tests.

It not clear to whether or not they did ZSK and KSK key rollovers
on test zones and on minor zones. If they didn't, thats a good way to
get in trouble later on.

The main lesson learned from this incident seems to be to always create
a test zone with content identical to that of the main zone and fully
test that zone.

A common lesson, also not mentioned, is to have low TTLs for stuff you
control. It would not have helped with the DS record. But the discussion
about the ZSK being lost would have been helped with a low TTL in the DNSKEY
RR set.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] How Slack didn't turn on DNSSEC

2021-11-30 Thread Mark Andrews
Add tests to DNSVIZ to catch this sort of error. There is an open issue for 
this. 

-- 
Mark Andrews

> On 1 Dec 2021, at 05:38, John Levine  wrote:
> 
> This blog post has been making the rounds. Since it is about a
> sequence of DNS operational failures, it seems somewhat relevant here.
> 
> https://slack.engineering/what-happened-during-slacks-dnssec-rollout/
> 
> tl;dr first try was rolled back due to what turned out to be an unrelated 
> failure at some ISP
> 
> second try was rolled back when they found they had a CNAME at a zone
> apex, which they had never noticed until it caused DNSSEC validation
> errors.
> 
> third try was rolled back when they found random-looking failures that
> they eventually tracked down to bugs in Amazon's Route 53 DNS server.
> They had a wildcard with A but not  records. When someone did an
>  query, the response was wrong and said there were no records at
> all, not just no  records. This caused failures at 8.8.8.8 clients
> since Google does aggressive NSEC, not at 1.1.1.1 because Cloudflare
> doesn't.
> 
> They also got some bad advice, e.g., yes the .COM zone adds and
> deletes records very quickly, but that doesn't mean you can unpublish
> a DS and just turn off DNSSEC because its TTL is a day. Their tooling
> somehow didn't let them republish the DNSKEY at the zone apex that
> matched the DS, only a new one that didn't.
> 
> It is clear from the blog post that this is a fairly sophisticated
> group of ops people, who had a reasonable test plan, a bunch of test
> points set up in dnsviz and so forth.  Neither of these bugs seem
> very exotic, and could have been caught by routine tests.
> 
> Can or should we offer advice on how to do this better, sort of like
> RFC 8901 but one level of DNS expertise down?
> 
> R's,
> John
> 
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop