[DNSOP] Re: I-D Action: draft-ietf-dnsop-avoid-fragmentation-19.txt

2024-09-20 Thread Štěpán Němec
Some minor (editorial) issues I noticed in the current (19) draft:

  3.1

  R4.  If the UDP responder detects an immediate error indicating that
  the UDP packet cannot be sent beyond the path MTU size, the UDP
  responder may recreate response packets fit in the path MTU size, or
  with the TC bit set.

s/packets fit/packets that fit/ ? Or perhaps "to fit"?

I also find "the UDP packet cannot be sent beyond the path
MTU size" hard to interpret (specifically the "sending
beyond the path MTU size" part), do you mean "packet exceeds
the path MTU size"?

  3.2.  Proposed Recommendations for UDP requestors

  R5.  UDP requestors should limit the requestor's maximum UDP payload
  size that fit in the minimum of the interface MTU, the network MTU
  value configured by the knowledge of the network operators, and the
  RECOMMENDED maximum DNS/UDP payload size 1400.  A smaller limit may
  be allowed.  (See Appendix A for more information.)

s/that fit/to fit/ ?
s/by the knowledge of the network operators/by the network operators/ ?
Or perhaps "according to the knowledge of the network" (not operators)?

  4.  Proposed Recommendations for DNS operators

  Large DNS responses are typically the result of zone configuration.
  People who publish information in the DNS should seek configurations,
  resulting in small responses. 

The comma makes no sense here (should be dropped).

  7.1.  On-path fragmentation on IPv4

  If the Don't Fragment (DF) bit is not set, on-path fragmentation may
  happen on IPv4, and be vulnerable, as shown in Section 7.3.  To avoid
  this, recommendation R6 need to be used to discard the fragmented
  responses and retry by TCP.

s/be vulnerable/lead to vulnerabilities/ ?
s/R6 need/R6 needs/ (or "should")

  7.3.  Weaknesses of IP fragmentation

  [...]
  "Domain Validation++ For MitM-Resilient PKI" [Brandt2018] proposed
  that off-path attackers can intervene in the path MTU discovery
  [RFC1191] to perform intentionally fragmented responses from
  authoritative servers.

I didn't manage to obtain free access to the paper in the
limited time I was willing to spend on the matter, but the
way such papers are usually written is they describe attacks
and propose solutions, not the other way round (and the
abstract[1] seems to confirm that prejudice), so:

s/proposed/noted/ ?

And perhaps also rather "cause authoritative servers to
return/produce fragmented responses"?

  [...]
  due to the small amount of entropy provided by UDP port
  numbers and DNS message identifiers, each of which being only 16 bits
  in size, and both likely being in the first fragment of a packet if
  fragmentation occurs.

s/each of which/both/

  7.5.  Possible actions for resolver operators
  [...]
  Specifically, config the firewall functions before the full-service
  resolver to discard incoming DNS response packets

s/config/configure/
s/before/in front of/ ?  Or "protecting", to avoid any
spacial vs. temporal ambiguity?

  Appendinx A.
  [...]
  in the interior of the
  Internet between recursive resolvers and authoritative servers the
  prevailing MTU is at 1,500

I realize this comes verbatim from the report text[2], but
for consistency/PoLA I suggest s/is at 1,500/is 1500/ (with
all the numbers and plus/minus/maximum/at least flying
around in the document I was at first wondering if "least"
might be missing after "at", and the comma is distracting at
best).  Failing that, add quotation marks so that it is
clear that this is a quote from another document (following
different style).

Thank you,

  Štěpán

[1] https://dl.acm.org/doi/10.1145/3243734.3243790#abstract

[2] 
https://indico.dns-oarc.net/event/37/contributions/806/attachments/782/1366/2021-02-04-dns-flag.pdf
p. 27:
"Our measurements suggest that in the “interior” of the Internet between 
recursive
resolvers and authoritative servers the prevailing MTU is at 1,500."

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP] Document Action: 'DNSSEC Trust Anchor Publication for the Root Zone' to Informational RFC (draft-ietf-dnsop-rfc7958bis-06.txt)

2024-09-20 Thread The IESG
The IESG has approved the following document:
- 'DNSSEC Trust Anchor Publication for the Root Zone'
  (draft-ietf-dnsop-rfc7958bis-06.txt) as Informational RFC

This document is the product of the Domain Name System Operations Working
Group.

The IESG contact persons are Warren Kumari and Mahesh Jethanandani.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc7958bis/




Technical Summary

   The root zone of the Domain Name System (DNS) is cryptographically
   signed using DNS Security Extensions (DNSSEC).

   In order to obtain secure answers from the root zone of the DNS using
   DNSSEC, a client must configure a suitable trust anchor.  This
   document describes the format and publication mechanisms IANA uses to
   distribute the DNSSEC trust anchors.

   This document obsoletes RFC 7958.

Working Group Summary

There was some concern expressed at the time of adoption that the document
should go to the Independent Stream, since it documents established practices,
deployed by IANA at their discretion. It wasn’t clear to everyone what added
value would come from taking it through WG adoption and consensus. However,
documenting established practices in Informational RFCs is nothing new for
DNSOP, and consensus tends to be that clear, understandable documentation of
such fixed “facts of life” helps real-world interoperability of the DNS.
 

Document Quality

   The mechanisms described in this document are in daily use for distributing 
the
DNSSEC root zone trust anchor for DNS operators across the Internet. 7958bis
reflects experience gained since RFC 7958, published in 2016, including
dropping distribution mechanisms that turned out to be less useful. In
addition, 7958 was published on the Independent Stream, but 7958bis has been a
WG document. It's clearly written, understandable, and technically accurate.


Personnel

   Suzanne Woolf is DS.
   Warren "Ace" Kumari is RAD1!!11!111!!!

___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org