[DNSOP] Éric Vyncke's No Objection on draft-ietf-dnsop-rfc5933-bis-12: (with COMMENT)

2022-11-28 Thread Éric Vyncke via Datatracker
Éric Vyncke has entered the following ballot position for
draft-ietf-dnsop-rfc5933-bis-12: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc5933-bis/



--
COMMENT:
--


# Éric Vyncke, INT AD, comments for draft-ietf-dnsop-rfc5933-bis-12

CC @evyncke

Thank you for the work put into this document.

Please find below some non-blocking COMMENT points (but replies would be
appreciated even if only for my own education). I share Roman's feeling about
the ISE stream rather than the IETF stream, especially since 'informative' is
enough.

Special thanks to Tim Wicinski for the shepherd's detailed write-up including
the WG consensus *but* missing the justification of the intended status (even
if the write-up alludes to informational is enough).

Thanks to Jim Reid and Scott Rose who did the DNS directorate reviews of this
document (even if the expectation of DNS directorate is to focus on documents
from non DNS WGs):

*
https://datatracker.ietf.org/doc/review-ietf-dnsop-rfc5933-bis-10-dnsdir-lc-reid-2022-10-16/
*
https://datatracker.ietf.org/doc/review-ietf-dnsop-rfc5933-bis-12-dnsdir-telechat-rose-2022-11-02/

Alas no public reaction by the authors...

I hope that this review helps to improve the document,

Regards,

-éric

## COMMENTS

### Consensus boilerplate

It is missing ;-)

### Section 2.2

Suggest to add a RFC editor note with a request to update the text when the
official allocation is known (and redo the math of course). Last paragraph of
section 10 should be more detailed.

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues.

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-validator-requirements

2022-11-28 Thread Vladimír Čunát

On 25/11/2022 18.26, Daniel Migault wrote:
So let me know how we came to this lines and I suspect we do share 
some similar concerns. A recurrent question and reticence we receive 
from MNO and ISPs regarding DNSSEC is that they are really scared 
about having the cache with incoherent RRsets in their cache that 
causes the validation to fail and in many cases they imagine a 
mechanism to prevent and address such incoherent data in the cache.
One of the intentions of this draft is to prevent such mechanisms to 
be implemented - mostly as it is likely to generate errors that DNSSEC 
experts would not be able to catch or understand - as generated by the 
home made solutions.  As a result we wanted  to minimize the change to 
the DNSSEC mechanic and only rely on very simple and standard  
mechanisms. 4033 provided one way to limit some incoherencies, and we 
also thought of a similar mechanism that was   like the one described 
in I-D.ietf-dnsop-ns-revalidation which as we saw it ensures 
something like a mechanism that refreshes the chain of trust.


I get that in countries with low validation rates [1] it may be 
difficult to explain to resolver operators that it should be only the 
authoritative side who worries that they "do DNSSEC wrong". Maybe I'm 
also personally biased against putting much work to work around mistakes 
done on the other side of the protocol.


[1] https://stats.labs.apnic.net/dnssec


What we expect is that the validator proposes this option and as such 
the DRO selects that option in the validator if present.


Well, OK.




Well yes, I'm in favor of keeping the supported-algorithm set
centralized internet-wide, instead of trying to start deploying a
decentralized mechanism.
[...]

I mainly wanted to dissuade from early algorithm deprecation on
validator side. [...]

I got your point and agree it might be counter productive to encourage 
a mechanism that is not reliable. I propose to remove the text below:

[...]


OK.

I don't see the part about extended errors as problematic (RFC 8914).  
It really seems to be getting into (open-source) implementations and it 
can help with debugging in some cases, though deploying it is probably 
not very important either.




Oh! sure for the TA. My understanding of the text is that it 
recommends 5011 for running instances, but that new instances are 
configured with up-to-date TA that in most cases are updated by 
software update. So yes I agree and will check this appears clearly.


I don't think 5011 is worth doing at all.  Maybe in some exceptional use 
cases.  Well, I haven't heard much about deployment experience with 
non-root TAs, so perhaps I just don't know those well.


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-thomassen-dnsop-mske: DNSKEYs in non-apex

2022-11-28 Thread Peter Thomassen

Hi Vladimir,

Thanks for your feedback! Please see below.

On 11/11/22 19:01, Vladimír Čunát wrote:

It's not a major thing in your design, but I see a risk that DNSKEYs at 
non-apex might have trouble validating, so at some point I'd expect your 
proposal to choose a different approach (e.g. allocate a new identical RR type) 
or at least confirm that it won't be a major problem.


I agree that this would be a significant risk if the consumers of these records 
were the general public, who generally use whatever resolver without paying 
specific attention or controlling any of the moving pieces.

However, the records would only be processed by supporting DNS operators, and 
it is entirely in their hands to use a resolver that would allow such 
validation. As such, I don't see any risk that would not be exposed immediately 
during implementation/testing, and the fix is also trivial.

IMO, this means that nothing needs to be done about it on the spec side.

What do other think about the significance of that risk?

Thanks,
Peter

--
https://desec.io/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-thomassen-dnsop-mske: DNSKEYs in non-apex

2022-11-28 Thread Vladimír Čunát
I didn't explain why, so let me add just a short pointer.  No need to go 
deeper here at this point of the draft, I think.


On 28/11/2022 19.26, Peter Thomassen wrote:
As such, I don't see any risk that would not be exposed immediately 
during implementation/testing, and the fix is also trivial. 


Triviality of a fully correct fix may depend on the particular 
implementation.  Note the implications for caching, etc.  These DNSKEYs 
will be DNSSEC-validated but must not be used for validation of other 
signatures.


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] Roman Danyliw's Discuss on draft-ietf-dnsop-rfc5933-bis-12: (with DISCUSS and COMMENT)

2022-11-28 Thread Roman Danyliw
Hi!

> -Original Message-
> From: iesg  On Behalf Of Paul Hoffman
> Sent: Thursday, November 17, 2022 7:06 PM
> To: Roman Danyliw 
> Cc: The IESG ; draft-ietf-dnsop-rfc5933-...@ietf.org; dnsop-
> cha...@ietf.org; dnsop@ietf.org; Tim Wicinski 
> Subject: Re: [Ext] [DNSOP] Roman Danyliw's Discuss on draft-ietf-dnsop-
> rfc5933-bis-12: (with DISCUSS and COMMENT)
> 
> On Nov 17, 2022, at 3:02 PM, Roman Danyliw via Datatracker
>  wrote:
> > --
> > DISCUSS:
> > --
> >
> > The IETF has steered away from publishing protocol mechanisms with
> dependencies
> > on national cryptography as we do not have the ability to validate their
> > security properties ourselves.  IETF stream documents typically rely on
> > documents published in the Crypto Forum Research Group (CFRG) [1]; an
> open and
> > peer-reviewed vetting process; or a review by the IRTF Crypto Panel [2] to
> give
> > us confidence in cryptographic algorithm choices. Since the described GOST
> > mechanism doesn’t fit into these vetting criteria and the WG (based on the
> > shepherd’s report) has not provided alternative analysis, it is not 
> > appropriate
> > to publish this document in the IETF stream.
> >

[snip]

> It feels like this DISCUSS ballot is asking for a non-IETF-stream RFC to 
> obsolete
> an IETF-stream RFC. Yuck. Instead, it might be better to publish this in the 
> IETF
> stream; separately, the IESG could then publish a statement that future
> national algorithm documents should not come through the IETF stream.

I agree that we need to be careful on what a non-IETF stream document would do 
to an IETF-stream document.  As a counter proposal, I would recommend that we 
use the flexibility afforded by RFC6014 and RFC9157 to address our current 
situation, and split the document.

The document has several components:

(a) Specification of and guidance for new DNSKEY and RRSIG behavior using GOST 
R 34.10-2012 and GOST R 34.11-2012 (i.e., Section 2 - 6, 9)

(b) Guidance to obsolete/update previous RFC5933/RFC8624 behavior per (a) 
(i.e., Section 7, 8)

(c) Request new IANA registry entries for (a) (i.e., Section 10)

(d) Request updates to IANA registries to deprecate older GOST code points 
specified by IETF-stream documents (i.e., Section 10)

Components (a) and (c) could be extracted from this document and added to a new 
document published by the ISE.  This text is the new national crypto that the 
WG cannot render judgement on per my DISCUSS.  The remaining text, components 
(b) and (d), would be the reduced draft-ietf-dnsop-rfc5933-bis document and 
would reference this new ISE document with the appropriate caveats on the 
confidence the WG in this new ISE reference.  This reduced 
draft-ietf-dnsop-rfc5933-bis document would be the compromise where an 
IETF-stream document is needed to redefine previously specified behavior so 
that an ISE-stream document wouldn't have to obsolete an IETF-stream one.  If 
(when) GOST R 34.10-2012/GOST R 34.11-2012 is superseded (and assuming it 
remains national crypto), algorithm revisions can be handled entirely by the 
ISE.

Regards,
Roman
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop