Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Petr Špaček
On 4.4.2018 07:12, Geoff Huston wrote: >>> >>> >>> All of the following conditions must be met to trigger special >>> processing inside resolver code: >>> >>> o The DNS response is DNSSEC validated >>> >>> o The result of validation is “Secure”. >>> >>> o The Checking Disabled (CD) bit in the qu

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Geoff Huston
>> >> >> All of the following conditions must be met to trigger special >> processing inside resolver code: >> >> o The DNS response is DNSSEC validated >> >> o The result of validation is “Secure”. >> >> o The Checking Disabled (CD) bit in the query is not set. >> >> o The QTYPE is eithe

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Mark Andrews
> On 4 Apr 2018, at 2:30 pm, Geoff Huston wrote: > > > >> >> No. Below is self contradictory. Condition 1 requires that >> CD=1 be turned into CD=0 and condition 3 requires that no special >> processing happens for CD=1. >> >> How CD is handled determines what you are testing when you have

Re: [DNSOP] [Doh] [Ext] Re: Alternate proposal for transport indication in draft-ietf-dnsop-dns-wireformat-http

2018-04-03 Thread Davey Song
I'm sorry to hear that. I would like to provide some information as a background if it's useful. dns-wireformat-http draft was originally proposed in DNSOP WG as a experimental draft in early 2016. We focus on the requirement of enhancing DNS availability bypassing the middlebox on the path via HT

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Geoff Huston
> > No. Below is self contradictory. Condition 1 requires that > CD=1 be turned into CD=0 and condition 3 requires that no special > processing happens for CD=1. > > How CD is handled determines what you are testing when you have > resolvers in series. > > Do you want CD=1 to disable special

Re: [DNSOP] [Ext] Re: [Doh] Alternate proposal for transport indication in draft-ietf-dnsop-dns-wireformat-http

2018-04-03 Thread Dave Lawrence
Martin Thomson writes: > Right now, abandon draft-ietf-dnsop-dns-wireformat-http. But I'll > concede that I'm probably missing something. I think that's right. -05 with the original_transport optional parameter accommodates the aims of that other draft. _

Re: [DNSOP] mixfr - issue #10 - Client RRSIG logic simplification

2018-04-03 Thread Joe Abley
On Apr 3, 2018, at 21:32, Frederico A C Neves wrote: >> On Tue, Apr 03, 2018 at 02:37:12PM +0200, Matthijs Mekking wrote: >> Hi Frederico, >> >>> On 03/29/2018 08:45 PM, Frederico A C Neves wrote: >>> I was looking at our server to evaluate the MIXFR implementation and >>> it seams to me that th

Re: [DNSOP] [Ext] Re: [Doh] Alternate proposal for transport indication in draft-ietf-dnsop-dns-wireformat-http

2018-04-03 Thread Martin Thomson
On Tue, Apr 3, 2018 at 11:27 PM, Paul Hoffman wrote: > Martin: Are you saying that you want DOH to remove the optional parameter > from the application/dns-udpwireformat registration? If so, what do you > propose for the DNSOP WG? Right now, abandon draft-ietf-dnsop-dns-wireformat-http. But I'

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Mark Andrews
> On 4 Apr 2018, at 11:17 am, Geoff Huston wrote: > >> On 4 Apr 2018, at 10:59 am, Mark Andrews wrote: >> >> >>> On 4 Apr 2018, at 10:28 am, Geoff Huston wrote: >>> >>> I thought that if the query contained CD = 1 then the DNS response >>> would not be validated, >> >> This ONLY applies if

Re: [DNSOP] [Doh] Alternate proposal for transport indication in draft-ietf-dnsop-dns-wireformat-http

2018-04-03 Thread Davey Song
On 3 April 2018 at 17:58, Martin Thomson wrote: > If I understand your response (not sure that I do), that seems pretty > academic and not at all persuasive. For instance, if a client cared > about testing TCP capabilities, it can always do its own resolution. It's not the emphasis. Peopole ge

Re: [DNSOP] mixfr - issue #10 - Client RRSIG logic simplification

2018-04-03 Thread Frederico A C Neves
Hi Matthijs, On Tue, Apr 03, 2018 at 02:37:12PM +0200, Matthijs Mekking wrote: > Hi Frederico, > > On 03/29/2018 08:45 PM, Frederico A C Neves wrote: > > I was looking at our server to evaluate the MIXFR implementation and > > it seams to me that the current text covering dnssec aware client > >

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Geoff Huston
> On 4 Apr 2018, at 10:59 am, Mark Andrews wrote: > > >> On 4 Apr 2018, at 10:28 am, Geoff Huston wrote: >> >> I thought that if the query contained CD = 1 then the DNS response >> would not be validated, > > This ONLY applies if the answer is NOT ALREADY CACHED. If the answer > is already

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Mark Andrews
> On 4 Apr 2018, at 10:28 am, Geoff Huston wrote: > > I thought that if the query contained CD = 1 then the DNS response > would not be validated, This ONLY applies if the answer is NOT ALREADY CACHED. If the answer is already cached then CD=1 queries will get this processing as the answer ret

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Geoff Huston
I thought that if the query contained CD = 1 then the DNS response would not be validated, and precondition 1 would not be met. But I’m probably wrong, so could you please suggest wording here? regards, Geoff > On 4 Apr 2018, at 10:21 am, Mark Andrews wrote: > > You are effectively saying th

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Mark Andrews
You are effectively saying that the resolver MUST ignore CD=1 for these queries. > On 4 Apr 2018, at 7:36 am, Geoff Huston wrote: > > > >> On 4 Apr 2018, at 7:11 am, Paul Hoffman wrote: >> >> On 3 Apr 2018, at 13:45, Geoff Huston wrote: >> >>> Is the wording “that the resolver has to do DNS

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Geoff Huston
> On 4 Apr 2018, at 7:11 am, Paul Hoffman wrote: > > On 3 Apr 2018, at 13:45, Geoff Huston wrote: > >> Is the wording “that the resolver has to do DNSSEC validation on what it >> gets back from the authoritative server *regardless* of whether the >> originating client requests it?” a clarifi

[DNSOP] Fwd: New Version Notification for draft-wessels-dns-zone-digest-00.txt

2018-04-03 Thread Wessels, Duane
Greetings dnsop, This draft proposes a technique and new RR type for calculating and verifying a message digest over the contents of a zone file. Using this technique, the recipient of a zone containing the new RR type can verify it for completeness and correctness, especially so when the zone

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Paul Hoffman
On 3 Apr 2018, at 13:45, Geoff Huston wrote: Is the wording “that the resolver has to do DNSSEC validation on what it gets back from the authoritative server *regardless* of whether the originating client requests it?” a clarification that updates the validation behaviours as specified in RFC4

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Geoff Huston
> On 3 Apr 2018, at 11:42 pm, Paul Hoffman wrote: > > > On 3 Apr 2018, at 1:34, Geoff Huston wrote: > >> I’ll remove the condition then. > > Will you re-instate what Petr asked for, namely some wording that indicates > that the resolver has to do DNSSEC validation on what it gets back from

Re: [DNSOP] [Doh] Alternate proposal for transport indication in draft-ietf-dnsop-dns-wireformat-http

2018-04-03 Thread Ted Lemon
On Apr 3, 2018, at 1:00 PM, Dave Lawrence wrote: > That testing TCP capabilities part is a distraction from the core > motivation. The request makes sense from a dumb transparent proxy > point of view, where there's a regular DNS resolver on the one end who > just wants to be able to get DNS mess

Re: [DNSOP] [Doh] Alternate proposal for transport indication in draft-ietf-dnsop-dns-wireformat-http

2018-04-03 Thread Dave Lawrence
Martin Thomson writes: > If I understand your response (not sure that I do), that seems pretty > academic and not at all persuasive. For instance, if a client cared > about testing TCP capabilities, it can always do its own resolution. That testing TCP capabilities part is a distraction from the

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Warren Kumari
On Tue, Apr 3, 2018 at 12:12 PM, Evan Hunt wrote: > On Tue, Apr 03, 2018 at 04:08:46PM +, Evan Hunt wrote: >> "dig +noends +noadflag" will produce such a query, if you want to try >> it out. > > +noedns, rather. > > The edns does not justify the means. Awgh W > > -- > Evan Hunt -- e

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Evan Hunt
On Tue, Apr 03, 2018 at 04:08:46PM +, Evan Hunt wrote: > "dig +noends +noadflag" will produce such a query, if you want to try > it out. +noedns, rather. The edns does not justify the means. -- Evan Hunt -- e...@isc.org Internet Systems Consortium, Inc.

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Evan Hunt
On Tue, Apr 03, 2018 at 06:32:49PM +1000, Geoff Huston wrote: > So this text is saying that the AD bit is set if the resolver considers all > RRsets in the Answer section to be authentic. Fair enough. More correctly, the bit is cleared if the resolver *doesn't* consider all RRsets to be validly si

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Paul Hoffman
On 3 Apr 2018, at 1:34, Geoff Huston wrote: I’ll remove the condition then. Will you re-instate what Petr asked for, namely some wording that indicates that the resolver has to do DNSSEC validation on what it gets back from the authoritative server *regardless* of whether the originating c

Re: [DNSOP] mixfr - issue #10 - Client RRSIG logic simplification

2018-04-03 Thread Matthijs Mekking
On 03-04-18 15:22, Mark Andrews wrote: -- Mark Andrews On 3 Apr 2018, at 22:37, Matthijs Mekking wrote: Hi Frederico, On 03/29/2018 08:45 PM, Frederico A C Neves wrote: I was looking at our server to evaluate the MIXFR implementation and it seams to me that the current text covering dnssec

Re: [DNSOP] [Ext] Re: [Doh] Alternate proposal for transport indication in draft-ietf-dnsop-dns-wireformat-http

2018-04-03 Thread Paul Hoffman
On Apr 3, 2018, at 2:58 AM, Martin Thomson wrote: > > If I understand your response (not sure that I do), that seems pretty > academic and not at all persuasive. to you. It was persuasive enough for the DNSOP WG to adopt the document as a WG item. > For instance, if a client cared > abou

Re: [DNSOP] mixfr - issue #10 - Client RRSIG logic simplification

2018-04-03 Thread Mark Andrews
-- Mark Andrews > On 3 Apr 2018, at 22:37, Matthijs Mekking wrote: > > Hi Frederico, > >> On 03/29/2018 08:45 PM, Frederico A C Neves wrote: >> I was looking at our server to evaluate the MIXFR implementation and >> it seams to me that the current text covering dnssec aware client >> logic d

Re: [DNSOP] mixfr - issue #10 - Client RRSIG logic simplification

2018-04-03 Thread Matthijs Mekking
Hi Frederico, On 03/29/2018 08:45 PM, Frederico A C Neves wrote: I was looking at our server to evaluate the MIXFR implementation and it seams to me that the current text covering dnssec aware client logic don't take in account that a posterior record at the addition section, by an MIXFR DNSSEC

Re: [DNSOP] [Doh] Alternate proposal for transport indication in draft-ietf-dnsop-dns-wireformat-http

2018-04-03 Thread Martin Thomson
If I understand your response (not sure that I do), that seems pretty academic and not at all persuasive. For instance, if a client cared about testing TCP capabilities, it can always do its own resolution. On Tue, Apr 3, 2018 at 7:44 PM, Davey Song wrote: > > > On 3 April 2018 at 15:33, Martin

Re: [DNSOP] [Doh] Alternate proposal for transport indication in draft-ietf-dnsop-dns-wireformat-http

2018-04-03 Thread Davey Song
On 3 April 2018 at 15:33, Martin Thomson wrote: > This is intended to do what? Indicate where the response came from? > Why does the client care? To keep the proxy (API client and server) transparent and bypass the middlebox along the path. Without the indicate, the API server has no clue what

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Geoff Huston
> On 3 Apr 2018, at 5:38 pm, Mark Andrews wrote: > > AD is only set or potentially set in the response if DO or AD is set on the > query. > > The condition boils down to testing for AD or DO in the query because the > answer needs to be secure and there can’t be a CNAME or DNAME pointing to

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Geoff Huston
> On 3 Apr 2018, at 4:39 pm, Geoff Huston wrote: > > > >> On 3 Apr 2018, at 1:10 pm, Mark Andrews wrote: >> >> Do we really want to test for AD? How many stub resolvers set DO or AD to >> elicit a AD response? >> > > I’m not sure that we are on the same page here. The precondition is: "

Re: [DNSOP] [Doh] Alternate proposal for transport indication in draft-ietf-dnsop-dns-wireformat-http

2018-04-03 Thread Ray Bellis
On 03/04/2018 08:33, Martin Thomson wrote: > This is intended to do what? Indicate where the response came from? > Why does the client care? I assume that it doesn't apply to > requests, or that would get into draft-bellis-dnsop-xpf territory. I think there's some overlap here, if the intent of

Re: [DNSOP] draft-ietf-dnsop-kskroll-sentinel-10 and AD

2018-04-03 Thread Mark Andrews
AD is only set or potentially set in the response if DO or AD is set on the query. The condition boils down to testing for AD or DO in the query because the answer needs to be secure and there can’t be a CNAME or DNAME pointing to it. About the only way it to not have a AD would be for there t

Re: [DNSOP] [Doh] Alternate proposal for transport indication in draft-ietf-dnsop-dns-wireformat-http

2018-04-03 Thread Martin Thomson
This is intended to do what? Indicate where the response came from? Why does the client care? I assume that it doesn't apply to requests, or that would get into draft-bellis-dnsop-xpf territory. BTW, you really need to drop UDP from the media type name now. application/dns-udpwireformat;original