Re: [Add] some background on split DNS with DNSSEC

Joe Abley <jabley@hopcount.ca> Tue, 09 November 2021 20:28 UTC

Return-Path: <jabley@hopcount.ca>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD1303A10D7 for <add@ietfa.amsl.com>; Tue, 9 Nov 2021 12:28:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hopcount.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cWXOGm5h8xOF for <add@ietfa.amsl.com>; Tue, 9 Nov 2021 12:28:49 -0800 (PST)
Received: from mail-qt1-x836.google.com (mail-qt1-x836.google.com [IPv6:2607:f8b0:4864:20::836]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E6223A10D4 for <add@ietf.org>; Tue, 9 Nov 2021 12:28:49 -0800 (PST)
Received: by mail-qt1-x836.google.com with SMTP id n15so114169qta.0 for <add@ietf.org>; Tue, 09 Nov 2021 12:28:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hopcount.ca; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=TljLouzup30b3P3VRE7Gm9S3lNh9R2vkJ84nawoW2D0=; b=GF/VlWDg/K8HrK/uKFL1gFY7xQ1Zct7b+Wsf/Txd76ZE8bRp2EDd7NJuLUJ4eQg0fW k2koTGjGqkSW7olhXD9vMc7T2V70sNiZDZVnTiwC2eoXOGmMi1vpjB623sDwYI7hvbPg AjEzy5zEZJMwgcnHnusExKZeosvydFDNypASI=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=TljLouzup30b3P3VRE7Gm9S3lNh9R2vkJ84nawoW2D0=; b=PmAKlQNP/3+VshGbaOhfF6s+OL5ziz9cFDQl1tZLrw3ItkL4if5WESzv3dF+hq5QIg 9U3xkqfb6B7c/SFS8MKfyugXpx/8wmNEqRbfeZ1ofbOLLNxipEAUySLlkB+SaPYvVyZf flx0EB1e1AEZ+ELgB5S/yeMhf3nQMSyLUCknfR0YhR84lrMc86GRDV1zXMETJcU+yPPI E6FW+kEzWS1UTjNTyCuqx0bY2PZdfamHHo1tuaG+O87G5FHVHYtxlbWmWt3PUgmLJVu/ S2rwpZ1qts1emzgkidstImY4zV0vb91ulIUJGNSK6auiRGL2IQaVlqxGmJTSneGWJJR5 iM+Q==
X-Gm-Message-State: AOAM533MO0uHWpszC4pAvj5UufdLeVXT2jLZEl3Z65C7L7snZKTAge+x 7oRBcc7sAUeg9nkxvl83wQV8tQ==
X-Google-Smtp-Source: ABdhPJx6ot7KkWAu9P2IZqYCwgdq1x+fgWdNQs6+uBjsPqYyyuwclkdX7OFJ62I12UlINslZPojdJQ==
X-Received: by 2002:ac8:5a8c:: with SMTP id c12mr11539369qtc.222.1636489728073; Tue, 09 Nov 2021 12:28:48 -0800 (PST)
Received: from smtpclient.apple ([2607:f2c0:e784:c7:a4fb:d334:a0a0:cf0f]) by smtp.gmail.com with ESMTPSA id m8sm12830129qkn.118.2021.11.09.12.28.46 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 09 Nov 2021 12:28:47 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_11AAA227-539E-45D5-B93E-396EBA5E2CA3"; protocol="application/pgp-signature"; micalg="pgp-sha1"
Mime-Version: 1.0 (Mac OS X Mail 15.0 \(3693.20.0.1.32\))
From: Joe Abley <jabley@hopcount.ca>
In-Reply-To: <c4c6b8a1-06f4-e628-b5f4-3aa1ccf9a25a@lear.ch>
Date: Tue, 09 Nov 2021 15:28:45 -0500
Cc: Bill Woodcock <woody@pch.net>, "add@ietf org" <add@ietf.org>, Ted Lemon <mellon@fugue.com>
Content-Transfer-Encoding: quoted-printable
Message-Id: <2DE8AA61-6603-437F-88D8-56EF2AC7718B@hopcount.ca>
References: <yblk0hio8pu.fsf@w7.hardakers.net> <28611.1636465525@localhost> <3692CFBF-4D06-4960-9F7C-347A58D2D0A0@apple.com> <aea95242-4e80-e4cb-b5bb-da34105e7ed1@lear.ch> <CAPt1N1kGs851Q_BMq1NDzm80xHbrKLJWwt1JzAmZAtafXeoqPg@mail.gmail.com> <BF4069C2-225D-4BA6-97FC-5CB6B09DA657@pch.net> <b0527e86-9636-1d80-c2cf-526c6b050b90@lear.ch> <418D9CE4-6134-447A-A863-F028C325E4FF@pch.net> <b49bbf0f-dd8f-5592-de8e-96ffd87127bb@lear.ch> <8315C730-CFC2-4BBA-8909-1DD4AEC97352@pch.net> <47958af2-8da7-1c71-bb94-28e4067d54c2@lear.ch> <48763BE7-0E72-4A03-A63A-1A63E7E21AC3@pch.net> <c4c6b8a1-06f4-e628-b5f4-3aa1ccf9a25a@lear.ch>
To: Eliot Lear <lear@lear.ch>
X-Mailer: Apple Mail (2.3693.20.0.1.32)
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/lyunAhA17OVesr39EPgT0KaCocg>
Subject: Re: [Add] some background on split DNS with DNSSEC
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Nov 2021 20:28:54 -0000

Warning! More non-actionable philosophy follows.

https://hitchhikers.fandom.com/wiki/Joo_Janta_200_Super-Chromatic_Peril_Sensitive_Sunglasses

On 9 Nov 2021, at 11:27, Eliot Lear <lear@lear.ch> wrote:

> On 09.11.21 17:13, Bill Woodcock wrote:
>> If what you’re saying is that when we depend upon tools to cover fragile or overly-complicated things with abstraction layers to “solve the problem” that we’re actually adding complexity and fragility, and that that’s a bad idea (“when you’re in a hole, stop digging”), then yes, I agree with that as well.
>> 
>> The biggest problem I see with standards development now is the desire to solve many problems within single monolithic protocols, rather than making small, simple, easily-comprehended modular building blocks that can be put together in different ways to solve different problems.
> 
> While I don't disagree with what you say, what I'm saying is that DNSSEC has had PLENTY of time to diffuse and hasn't done so.  In fact, I would argue that new new impediments have shown up that lend themselves to centralization, which is the risk of amplification attacks that have led secondary services to charge extra.

I don't think DNSSEC is a particularly good example of the more general problem it seems like you're both describing.

DNS is an extraordinarily resilient protocol, by which I mean it is unusually good at hiding things that are broken in ways that end users often don't realise. It seems sometimes like 80% of the DNS could be broken in some way and nobody would notice.

The requirements that DNSSEC intends to solve aren't compatible with that degree of brokenness; the simple facts that signatures have finite validity periods and there's metadata in the form of private keys that exist outside the published data of the DNS make the system more fragile and mean that operational failures that were once invisible now have consequences.

The need for validity periods turns the DNS into a ticking time bomb. The need for private keys means that operational hygiene is more operationally vital than it once was. Neither of these things are the fault of DNSSEC, but rather the fault of the requirements that DNSSEC was intended to implement, combined with the tolerance of the original protocol that allowed bad habits to persist.

The existence or non-existence of a satisfactory toolchain is orthogonal to what I would call a more fundamental problem, a problem that likely doesn't have much of a solution unless we forget about validation. Or perhaps it's not a problem, and rather a useful trigger for errors to be cleaned up, in which case yay DNSSEC!

> And my admittedly snide initial comment was meant to convey that we ought to think of taking another look at naming and security that accommodates mechanisms like split views, rather than simply says, “Those are bad!”

I agree.

Seth Breidbart's famous definition of "The Internet" was concerned with the lie that there is a single Internet from all vantage points. The idea that there is a single namespace, or even the idea that there's a single public namespace conjoined for particular clients with a single private one, is similarly problematic.

The namespace, responses to particular queries and reachability of particular nameservers all vary according to where and how queries are initiated. With transports that provide the potential for authentication, we can add "who" to that list. There are many, many, many namespaces and the problem of recognising and accommodating that simple truism is, I think, broader than a superficial treatment of enterprise "split views" and not something that can be simply stuffed back in the lamp.


Joe