Re: [Add] I-D Action: draft-reddy-add-enterprise-split-dns-08.txt

Ted Hardie <ted.ietf@gmail.com> Mon, 24 January 2022 15:54 UTC

Return-Path: <ted.ietf@gmail.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 916453A1076 for <add@ietfa.amsl.com>; Mon, 24 Jan 2022 07:54:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vm88QBXE-6Wp for <add@ietfa.amsl.com>; Mon, 24 Jan 2022 07:54:24 -0800 (PST)
Received: from mail-io1-xd36.google.com (mail-io1-xd36.google.com [IPv6:2607:f8b0:4864:20::d36]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 845413A107F for <add@ietf.org>; Mon, 24 Jan 2022 07:54:24 -0800 (PST)
Received: by mail-io1-xd36.google.com with SMTP id h23so19960167iol.11 for <add@ietf.org>; Mon, 24 Jan 2022 07:54:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=sbvUEE9zMtDc6kaXGe1Yd+CwRQllevnT8MuBP0+4RAo=; b=e0urp+3nrzPe7WA58lyPEp0PbDLPjD7CWLC8m5RLqnUBA0Unt/94I7MpdHiOlQDH1j 0E1CV/z5W1XcpdcaQGJG9ZMhmjm/TwGb93ghgmG/NOhJmfAhcyBhmC/fL6V1Y9ULJ+Qa bO5zW6LtpiGMAblgdAWJKsu1B7YW1px1GynKRXSNrE6Lf08ditQ5ZvN0w12xyHDO9qVP mKFp1zFLOvEn4/pvI3VsLvG02TbdQRUVj/OkNl28PyhDeY3yEwrfCeKfyUrnftrsKuMV 6lQ2NSMHZj9okmvTMkojFYL8h9b8EBvi8oBLbD1DuxbtVV70BQ8MPJcyEcMTWVsZrIb2 sI4g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=sbvUEE9zMtDc6kaXGe1Yd+CwRQllevnT8MuBP0+4RAo=; b=QgQoS6/g4GfxQB+4KkTUnk9rsgxiJjFnBYjgY2MTvFwzyMJKx7CepJIIiMsoTO6//f mXMkTaEmMmNX+4Zb7Jgz7BnaCVEZNoPn0wcPlUrWgHcccisV6PPLmkpvsb0o/EedGHE2 RapByCTwvJQVAEyCm5tRDB6IiLEN8fY50NvH59aYxt4mLP4nLEfXYUSB280Yazy4gaee FcMre6eSEyNeMU6s7020eE4zCeCBJzBMFxPSaxT+16XHk+GPNP3hFzySE8UmTRVoXnj2 FYhljzOZzZvOQglqnNDyxlU23FiscLZz13o1nHdtQ/8AbFslvBRfSFp5eJeBHt2De+2N POEw==
X-Gm-Message-State: AOAM5332OBfH3MvSzOXhq3eZTv034R/shQQXI3V7u2XBh6MP+7hHYrAO RDpoZLl/zepRvx2CR5ubMng6iLFP/6v1toatNWA=
X-Google-Smtp-Source: ABdhPJx4pFivtK7RGWOnP5CmH9SWlYVJz3iL2iPVwkHXmm0nz1ShaUEBDj3ThlAejWfVSf+5h1UL3vBu0sqm8dwyX8A=
X-Received: by 2002:a05:6638:304e:: with SMTP id u14mr7108589jak.283.1643039662699; Mon, 24 Jan 2022 07:54:22 -0800 (PST)
MIME-Version: 1.0
References: <164273967921.28045.13105308218406662743@ietfa.amsl.com> <CAFpG3geerJH+jWEZpZnHJpEFcOr+81WyOFvWoAaHmR6N4jBZyg@mail.gmail.com> <4182fe-1e8-ef1-d3e5-75b17da23b9e@nohats.ca> <CAHbrMsBvy6F05y+rXzS+KtpOCn4+RCcJnjLdduHfdz8ENCOQzw@mail.gmail.com> <15222769-7BD4-49D4-AC67-DAD86191DB6E@fl1ger.de> <CAHbrMsDDjvkBBAQnANPC0ENktNdsuf7yuVRu9W43y9UNqZP1fw@mail.gmail.com> <8DA1814C-FA1C-49DD-986D-315865D44E5C@fl1ger.de>
In-Reply-To: <8DA1814C-FA1C-49DD-986D-315865D44E5C@fl1ger.de>
From: Ted Hardie <ted.ietf@gmail.com>
Date: Mon, 24 Jan 2022 15:53:56 +0000
Message-ID: <CA+9kkMBDEatZXg1nF5noqkviz0TTUZL1qdqsLHj_mn6noGYVsg@mail.gmail.com>
To: Ralf Weber <dns@fl1ger.de>
Cc: Ben Schwartz <bemasc=40google.com@dmarc.ietf.org>, Paul Wouters <paul@nohats.ca>, ADD Mailing list <add@ietf.org>, tirumal reddy <kondtir@gmail.com>
Content-Type: multipart/alternative; boundary="00000000000072767f05d655fb0c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/r3V34Si9rpUHqepktm0_yPG9iQY>
Subject: Re: [Add] I-D Action: draft-reddy-add-enterprise-split-dns-08.txt
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Jan 2022 15:54:30 -0000

On Mon, Jan 24, 2022 at 3:45 PM Ralf Weber <dns@fl1ger.de> wrote:

> Moin!
>
> On 24 Jan 2022, at 16:20, Ben Schwartz wrote:
> > I think this is fine.  You just publish DS records for both the internal
> > and external DNSKEYs.  Validation will then succeed for records signed by
> > either key.
> But then I give away that corp.example.com exists and that it has a
> DNSKEY.
>
>
If this concerns you, you can mint  a wide variety of domains and assign
them DNSKEYs, using only a fraction.  Is the well-used domain
fleen.example.com?  bumblebridge.example.com?  or even
daffy-down-dilly.example.com?

Of course, if you use a string like corp, there is no point in pretending
that it is a secret, as it is so common as to be the first or second
guess.  There's not much worry about giving that away, at least in my
personal opinion.

regards,

Ted



> >> Also keep in mind that if
> >>         corp.example.com
> >> is NXDomain externally you need a special/different
> >>         example.com
> >> internally to delegate corp.example.com.
> >>
> >
> > Agreed.  The claimed zone (which could be "example.com" or "
> corp.example.com")
> > must resolve differently internally and externally, or you haven't
> actually
> > "split" anything.
> I have. example.com is different externally then internally. Externally
> it is
> missing the corp.example.com delegation.
>
> >> I’ve always envisioned DNSSEC split horizon needing an internal trust
> anchor
> >> because of this ideally in the recursive resolver and stub resolver.
> >>
> >
> > I don't think there's any need for a separate trust anchor.
> In the above example there is, as corp.example.com does not exist in
> public space
> or are you saying that the case I described is not split DNS?
>
> So long
> -Ralf
> ——-
> Ralf Weber
>
> --
> Add mailing list
> Add@ietf.org
> https://www.ietf.org/mailman/listinfo/add
>