Re: [DNSOP] .alt filtering in recursive servers

2022-11-11 Thread Wessels, Duane
I find the latest alt-tld draft to be inconsistent when it first
says “[alt names] should not be looked up in a DNS context” and
"DNS stub and recursive resolvers do not need to look them up in
the DNS context” but then later "Caching DNS servers will treat
[alt names] just as they would any other name whose TLD does not
appear in the global DNS root.”  Since caching servers lookup names
with non existent TLDs in the DNS, then of course alt names will
also be looked up in the DNS context.

I'm also struck how radically different the special use considerations
for .onion (RFC 7868) and .alt are.  onion has multiple MUST-level
requirements for not leaking queries into the global DNS.

IMO we should write requirements to describe the behavior we want.
Even though we know from experience that not all implementations
will adhere to the requirements it is appropriate to say that alt names
MUST NOT or (at least SHOULD NOT) not leak.

And even if we don't end up with strong anti-leaking requirements,
then we should at least openly acknowledge that leaked queries
will happen (i.e., to root name servers).

Lastly, I'd like to see the special use considerations for .alt
formatted more like the examples given in that RFC 6761 and the one
in RFC 7686.

I’d like to propose this new/updated text for the alt-tld draft:

==

   1.  Users: Human users might or might not recognize that names
   in the .alt pseudo-TLD are special.

   2.  Application Software: Applications that use alternative
   namespaces in .alt MUST have their own processing
   rules for their own names, probably in specialized resolver
   APIs, libraries, and/or application software.

   3.  Name Resolution APIs and Libraries: Resolvers MUST NOT resolve
   .alt names in a DNS context.  They MAY respond to
   queries for such names with NXDOMAIN.

   4.  Caching DNS Servers: Caching servers MUST [or SHOULD] NOT
   attempt to resolve .alt names in the global DNS root.  They
   MAY respond to queries for such names with NXDOMAIN [or
   REFUSED?].

   5.  Authoritative DNS Servers: Authoritative servers MUST respond to
   queries for .alt names with NXDOMAIN.

   6.  DNS Server Operators: Operators MUST NOT configure an
   authoritative DNS server to answer queries for .alt.

   7.  DNS Registries/Registrars: Registries and Registrars MUST
   NOT register .alt names because .alt will not exist in the
   global DNS root.  All such requests MUST be denied.

Note that despite the requirements given here, it is generally expected
that queries for .alt names will "leak" into the global DNS.  The root
name servers [RFC 7720?] will receive leaked queries and respond with
NXDOMAIN.  Techniques such as qname minimization, aggressive NSEC caching,
and root-on-loopback can reduce the amount of leaked queries received by
root name servers.

==

DW


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] .alt filtering in recursive servers

2022-11-11 Thread Mark Andrews

> On 11 Nov 2022, at 09:48, Wessels, Duane 
>  wrote:
> 
> I find the latest alt-tld draft to be inconsistent when it first
> says “[alt names] should not be looked up in a DNS context” and
> "DNS stub and recursive resolvers do not need to look them up in
> the DNS context” but then later "Caching DNS servers will treat
> [alt names] just as they would any other name whose TLD does not
> appear in the global DNS root.”  Since caching servers lookup names
> with non existent TLDs in the DNS, then of course alt names will
> also be looked up in the DNS context.
> 
> I'm also struck how radically different the special use considerations
> for .onion (RFC 7868) and .alt are.  onion has multiple MUST-level
> requirements for not leaking queries into the global DNS.
> 
> IMO we should write requirements to describe the behavior we want.
> Even though we know from experience that not all implementations
> will adhere to the requirements it is appropriate to say that alt names
> MUST NOT or (at least SHOULD NOT) not leak.
> 
> And even if we don't end up with strong anti-leaking requirements,
> then we should at least openly acknowledge that leaked queries
> will happen (i.e., to root name servers).
> 
> Lastly, I'd like to see the special use considerations for .alt
> formatted more like the examples given in that RFC 6761 and the one
> in RFC 7686.
> 
> I’d like to propose this new/updated text for the alt-tld draft:
> 
> ==
> 
>   1.  Users: Human users might or might not recognize that names
>   in the .alt pseudo-TLD are special.
> 
>   2.  Application Software: Applications that use alternative
>   namespaces in .alt MUST have their own processing
>   rules for their own names, probably in specialized resolver
>   APIs, libraries, and/or application software.
> 
>   3.  Name Resolution APIs and Libraries: Resolvers MUST NOT resolve
>   .alt names in a DNS context.  They MAY respond to
>   queries for such names with NXDOMAIN.
> 
>   4.  Caching DNS Servers: Caching servers MUST [or SHOULD] NOT
>   attempt to resolve .alt names in the global DNS root.  They
>   MAY respond to queries for such names with NXDOMAIN [or
>   REFUSED?].

   Caching servers MUST NOT intercept DO=1 queries as the client
   will not be able to validate such responses.  The caching
   recursive server MAY synthesise a provable NXDOMAIN response as
   per RFC 8198.  Caching servers SHOULD perform QNAME minimisation
   as per RFC 7816 for the .alt namespace by default.  Querying for
   alt/DS or alt/NS will achieve this without leaking the query type.

>   5.  Authoritative DNS Servers: Authoritative servers MUST respond to
>   queries for .alt names with NXDOMAIN.
> 
>   6.  DNS Server Operators: Operators MUST NOT configure an
>   authoritative DNS server to answer queries for .alt.
> 
>   7.  DNS Registries/Registrars: Registries and Registrars MUST
>   NOT register .alt names because .alt will not exist in the
>   global DNS root.  All such requests MUST be denied.
> 
> Note that despite the requirements given here, it is generally expected
> that queries for .alt names will "leak" into the global DNS.  The root
> name servers [RFC 7720?] will receive leaked queries and respond with
> NXDOMAIN.  Techniques such as qname minimization, aggressive NSEC caching,
> and root-on-loopback can reduce the amount of leaked queries received by
> root name servers.
> 
> ==
> 
> DW
> 
> 
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] .alt filtering in recursive servers

2022-11-11 Thread libor.peltan



Dne 11. 11. 22 v 10:48 Wessels, Duane napsal(a):

5.  Authoritative DNS Servers: Authoritative servers MUST respond to
queries for .alt names with NXDOMAIN.


I don't like to repeat myself, but I still consider this requirement 
proposal inproper and I disagree with it.


The reasons have been already stated.

Libor

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Minutes from IETF115

2022-11-11 Thread Tim Wicinski
All

Thanks everyone for attending (and apologies for my bad audio from multiple
devices it seems).   Thanks also to Paul Hofman for taking minutes.
I merged my notes and added some Chairs Actions (still being discussed),
and uploaded them:

https://datatracker.ietf.org/meeting/115/materials/minutes-115-dnsop-00

If anyone feels their comments are recording incorrectly, please let us
know so we can fix.

As a bonus, the chatlogs are now being included in the meeting materials

https://datatracker.ietf.org/doc/chatlog-115-dnsop-202211080930/

thanks
tim

DNSOP WG
IETF 115
2022-11-08
Chairs: Benno Overeinder, Suzanne Woolf, Tim Wicinski
Notes here are only what happened at the mic, not on the slides
Minutes taken by Paul Hoffman

Chairs' slides

https://datatracker.ietf.org/meeting/115/materials/slides-115-dnsop-chairs-slides

The ALT Special Use Top Level Domain
draft-ietf-dnsop-alt-tld, Paul Hoffman

Wes Hardaker: Root Server Operator. Add should not forward statement.
Preference is "Should"

Anthony Somerset: Does not AS112.  Leakage from root operators?
Do not need to do anything.

Eliot Lear:  Many thanks, GNS relies on this

Paul Wouters: AS112 wrong tool for this

Ben Schwartz:  Queries to the root.  wants DNSSEC vaidated.
"DNS Context" is confusuing

Rob Wilton: Thanks for working on this, could this now focus on stub 
resolvers.
Recommends Standards Track not Infomational.
**Chairs Action: Time for WGLC**


Hackathon at IETF 115
Willem Toorop presented on the Hackathon results
Perl libraries for DNS error reporting
Encrypted Client Hello was also implented by one implementer

DNS Error Reporting
draft-ietf-dnsop-dns-error-reporting, Roy Arends
Viktor Dukhovni: Should a resolver behind a forwarder do something 
different:
Roy: Could cause cascading
Will add language regarding forwarders, or clients who don't do 
error detecting

Negative Caching of DNS Resolution Failures
draft-ietf-dnsop-caching-resolution-failures, Duane Wessels
Peter Thomassen: Partitioning of the cache is up to the implementers, but 
the ECS breaks that
Duane: If an implementation normally has different caches based on the 
ECS, the cache can blow up
Peter: Could go into "protect yourself" section
Peter Koch: Resolution is not DNSSEC protected; add this to Security 
Considerations
Ralf Weber: It would be great to ignore ECS, but doing so would be hard
Leave up to the implementation

Control Options For DNS Client Proxies
draft-homburg-add-codcp, Philip Homburg
Benno: Wants to know if the WG wants this
Ralf: Is this local-only, or can you extend it?
Only between two programs
Why not do this as an API
Philip: Wants to do this within the DNS protocol
Outside the DNS community if we do an API
Ralf: Prefers API for on-machine, DNS for off-machine
Viktor: DANE/PKIX is either no mention or mandatory: this is fragile
This ignores opportunistic DANE
Philip: Set both bits to zero to get that operation
Can clarify the language to use DANE
Benjamin: Disagrees that we don't stanardize APIs
This feels like an API
Browsers have rapidly-evolving requirements for how they do DNS lookups
This is a new protocol between two parties
Philip: The client has a probing query is already there

Consistency for CDS/CDNSKEY and CSYNC is Mandatory
draft-thomassen-dnsop-cds-consistency, Peter Thomassen
Wes: Supports this
Likes mandating checking everywhere
Ralf: Supports this
Can't ask "all" servers in anycast
What if you don't get a response
Peter: Ask each provider
Is willing to add in wording about unresponses 
Paul Wouters: This wasn't in CSYNC, our bug
Viktor: Concern was hidden masters and nameservers that are gone and are 
never going to come back
**Chairs Action: CfA**

Multi-Signer Key-Exchange (MSKE)
draft-thomassen-dnsop-mske, Peter Thomassen
Viktor: What about ongoing ZSK rollovers, particularly timing
Peter: If one provider does a ZSK rollover unilaterally: unsafe
Needs to think more about it

Structured Data for Filtered DNS
draft-wing-dnsop-structured-dns-error-page, Tirumal Reddy
Lots of industry interest
**Chairs Action: CfA**

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] .alt filtering in recursive servers

2022-11-11 Thread Paul Hoffman
On Nov 11, 2022, at 9:48 AM, Wessels, Duane 
 wrote:
> 
> I find the latest alt-tld draft to be inconsistent when it first
> says “[alt names] should not be looked up in a DNS context” and
> "DNS stub and recursive resolvers do not need to look them up in
> the DNS context” but then later "Caching DNS servers will treat
> [alt names] just as they would any other name whose TLD does not
> appear in the global DNS root.”  Since caching servers lookup names
> with non existent TLDs in the DNS, then of course alt names will
> also be looked up in the DNS context.

The first quote, “[alt names] should not be looked up in a DNS context”, is 
clearly meant to be about applications that act as stub resolvers or actual 
stub resolvers. That is, not that "it is bad to $x so don't do it", but "it is 
not designed to $x so don't do it". That should be made clearer in the text.

The second quote, "DNS stub and recursive resolvers do not need to look them up 
in the DNS context” does not conflict with "Caching DNS servers will treat [alt 
names] just as they would any other name whose TLD does not appear in the 
global DNS root.”
- A DNS stub or recursive resolver that knows about one alt name does not need 
to look up names from that namespace in the DNS context because it will look 
them up in the special context. 
- A DNS stub or recursive resolver that knows about one alt name does not need 
to look up names from an alt namespace it does not recognize in the DNS context 
because it can treat it like a DNS name if it wants to; it could also treat it 
as an inherently unknown name (due to alt) if it wants. In the latter case, it 
needs to follow DNSSEC processing rules.

> I'm also struck how radically different the special use considerations
> for .onion (RFC 7868) and .alt are.  onion has multiple MUST-level
> requirements for not leaking queries into the global DNS.

The authors (and some of the WG) felt that the current wording was an 
improvement, so hopefully it would not strike you too hard.

> IMO we should write requirements to describe the behavior we want.

Yes.

> Even though we know from experience that not all implementations
> will adhere to the requirements it is appropriate to say that alt names
> MUST NOT or (at least SHOULD NOT) not leak.

That is only true if you weigh the cost of reducing leakage against the benefit.

> And even if we don't end up with strong anti-leaking requirements,
> then we should at least openly acknowledge that leaked queries
> will happen (i.e., to root name servers).

Yes.

> Lastly, I'd like to see the special use considerations for .alt
> formatted more like the examples given in that RFC 6761 and the one
> in RFC 7686.

Again, the current wording is considered an improvement over the requirements 
of RFC 6761 and the worked-out example in RFC 7686.

If the WG wants the enumeration, we should be more careful about it.

> I’d like to propose this new/updated text for the alt-tld draft:
> 
> ==
> 
>   1.  Users: Human users might or might not recognize that names
>   in the .alt pseudo-TLD are special.
> 
>   2.  Application Software: Applications that use alternative
>   namespaces in .alt MUST have their own processing
>   rules for their own names, probably in specialized resolver
>   APIs, libraries, and/or application software.

This seems very wrong. I think it should be allowed, but definitely not 
required, for applications to have special processing rules. It is quite 
conceivable that naive applications would work fine if the special processing 
is done in the stub resolver they talk to.

>   3.  Name Resolution APIs and Libraries: Resolvers MUST NOT resolve
>   .alt names in a DNS context.  They MAY respond to
>   queries for such names with NXDOMAIN.
> 
>   4.  Caching DNS Servers: Caching servers MUST [or SHOULD] NOT
>   attempt to resolve .alt names in the global DNS root.  They
>   MAY respond to queries for such names with NXDOMAIN [or
>   REFUSED?].

See above. To me, it is natural to do the processing in a stub resolver, not in 
the applications. (Note that RFC 6761 doesn't talk about stub resolvers at all, 
so I'm assuming it would consider a stub resolver here not in #3.)

For upstream recursive resolvers, saying "MUST" seems wrong because there is no 
significant effect if a resolver does not follow the specification. Saying 
"SHOULD" without explaining the exception is bad form.

Further, Mark Andrews' observation about queries with DO set should bring pause 
to anyone wanting a MUST NOT for resolvers here.

>   5.  Authoritative DNS Servers: Authoritative servers MUST respond to
>   queries for .alt names with NXDOMAIN.
> 
>   6.  DNS Server Operators: Operators MUST NOT configure an
>   authoritative DNS server to answer queries for .alt.
> 
>   7.  DNS Registries/Registrars: Registries and Registrars MUST
>   NOT register .alt names 

[DNSOP] draft-thomassen-dnsop-mske: DNSKEYs in non-apex

2022-11-11 Thread Vladimír Čunát

Hello.

It's not a major thing in your design, but I see a risk that DNSKEYs at 
non-apex might have trouble validating, so at some point I'd expect your 
proposal to choose a different approach (e.g. allocate a new identical 
RR type) or at least confirm that it won't be a major problem.


--Vladimir | knot-resolver.cz
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] .alt filtering in recursive servers

2022-11-11 Thread Paul Vixie




Mark Andrews wrote on 2022-11-11 02:26:



...

   4.  Caching DNS Servers: Caching servers MUST [or SHOULD] NOT
   attempt to resolve .alt names in the global DNS root.  They
   MAY respond to queries for such names with NXDOMAIN [or
   REFUSED?].


Caching servers MUST NOT intercept DO=1 queries as the client
will not be able to validate such responses.  The caching
recursive server MAY synthesise a provable NXDOMAIN response as
per RFC 8198.  Caching servers SHOULD perform QNAME minimisation
as per RFC 7816 for the .alt namespace by default.  Querying for
alt/DS or alt/NS will achieve this without leaking the query type.


i'm comfortable with either. a query for anything.ALT appearing on any 
wire is a sign of misconfiguration. dropping it, answering insecurely, 
answering servfail, or letting qname minimization from the root zone 
happen and sending secure nxdomain, are all in-scope here. as long as we 
are protecting the root zone from .ALT query storms, we're good. no 
other predictable or reliable response should be specified. makers and 
operators who allow .ALT queries to appear on the wire should learn fear 
and should live in fear. being liberal in how we receive those queries 
is in absolutely nobody's best interests.


--
P Vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop