Re: [dns-privacy] Adam Roach's No Objection on draft-ietf-dprive-bcp-op-08: (with COMMENT)

Adam Roach <adam@nostrum.com> Thu, 06 February 2020 18:22 UTC

Return-Path: <adam@nostrum.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF8A312011C; Thu, 6 Feb 2020 10:22:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.403
X-Spam-Level:
X-Spam-Status: No, score=-1.403 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, KHOP_HELO_FCRDNS=0.275, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=nostrum.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id phyyeTI9ssOT; Thu, 6 Feb 2020 10:22:12 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B044412010C; Thu, 6 Feb 2020 10:22:12 -0800 (PST)
Received: from Zephyrus.local (99-152-146-228.lightspeed.dllstx.sbcglobal.net [99.152.146.228]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id 016IM9El034126 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Thu, 6 Feb 2020 12:22:10 -0600 (CST) (envelope-from adam@nostrum.com)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nostrum.com; s=default; t=1581013331; bh=2IiynYiZrs0BRfjljVg+BWSaY60NjftFZmJ9OAtO8ds=; h=Subject:To:Cc:References:From:Date:In-Reply-To; b=qV2ivIw0ALZZdGfEOdgdN3pgfkVzljtlZmuIgzr+KyEA5aCKO441ZK3TSVF9pewsz ls9zjTaxnxToIHgsfMTVfculcHn4on0fKrG2vafz4dyfDnu+yUSuAWVDjPb9tSDXH0 xkdPqZteFEQ4EjOnmoPmLnt3mStnO9usNshGcWh4=
X-Authentication-Warning: raven.nostrum.com: Host 99-152-146-228.lightspeed.dllstx.sbcglobal.net [99.152.146.228] claimed to be Zephyrus.local
To: Brian Dickson <brian.peter.dickson@gmail.com>
Cc: Tim Wicinski <tjw.ietf@gmail.com>, draft-ietf-dprive-bcp-op@ietf.org, dns-privacy@ietf.org, The IESG <iesg@ietf.org>, dprive-chairs@ietf.org
References: <158096547226.30514.2103023305468871108.idtracker@ietfa.amsl.com> <CAH1iCiqLwP8UOJe_vWQAr7iu8j7LF2Y4+386XNimM+3wJ-2RzQ@mail.gmail.com> <9fe99917-347b-ab79-7a9c-3e8da67a5246@nostrum.com> <364cf548-9114-fcb3-52b6-a73be08b55c4@nostrum.com> <CAH1iCirzvzQUAcbctzC4Bete_mDicT7MYJL5vnaSFZnVNAUbPg@mail.gmail.com>
From: Adam Roach <adam@nostrum.com>
Message-ID: <9104d41b-2c78-0216-3262-4ed50f389ea7@nostrum.com>
Date: Thu, 06 Feb 2020 12:22:04 -0600
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <CAH1iCirzvzQUAcbctzC4Bete_mDicT7MYJL5vnaSFZnVNAUbPg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------708C0A608D8C0E28BA4DAD02"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/qD9kk76DQ1npT6nh-aAa7qkK2Qw>
Subject: Re: [dns-privacy] Adam Roach's No Objection on draft-ietf-dprive-bcp-op-08: (with COMMENT)
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Feb 2020 18:22:14 -0000

Top-posting because I agree with the facts as you present them. I just 
reach a different conclusion based on these facts. To be clear, I think 
a belt-and-suspenders approach is generally preferable. I am merely 
suggesting that the "must" statement I cite may be stronger than is 
actually advisable given that such an approach is merely a small 
increment of security for protocols that are otherwise secured (e.g., 
HTTP, which is the example the document chooses), rather than the sole 
defense, as may be the case with other protocols.

My top-line suggestion here is to choose a different example than HTTP.

Secondary to that is a suggestion that the "must" statement really only 
makes sense when it is a sole counter-measure, and that a softer 
recommendation ("should") makes more sense otherwise.

These are non-blocking comments, so I'm going to reiterate that the WG 
can ignore them -- I just wanted to make sure they were considered. It 
would be nice to hear from other folks on the topic as well.

/a

On 2/6/20 11:57, Brian Dickson wrote:
>
>
> On Thu, Feb 6, 2020 at 9:31 AM Adam Roach <adam@nostrum.com 
> <mailto:adam@nostrum.com>> wrote:
>
>     On 2/6/20 09:08, Adam Roach wrote:
>     >
>     > For the specific example chosen, it's been made pretty clear
>     over the
>     > years that at least the clients for the specific service you
>     cite have
>     > no interest in incurring this additional cost. If that's the
>     working
>     > group consensus, then I have no interest in over-riding it. But
>     > ignoring operational realities seems kind of ivory tower-ish, which
>     > feels like the kind of thing that undermines the general
>     credibility
>     > of the rest of the document.
>     >
>
>
> Could you please be more specific?
>
> When you say "for the specific service", do you mean DNSSEC?
>
> And do you mean the signing of DNS zones using DNSSEC, when you refer 
> to clients of that service?
>
> Perhaps you missed my microphone comments at the last IETF?
>
> Specifically that GoDaddy will be turning on DNSSEC for the vast 
> majority of its DNS hosting customers?
>
> This represents about 40% of the DNS zones on the Internet.
> (The exact time frame is not set in stone, but we expect this to be 
> done in the first half of 2020.)
>
> Given that this significantly alters the calculus, I don't think that 
> is a good enough reason to object in and of itself anymore.
>
> The other aspect of this is the asymmetry involved in the defenses 
> against impersonation:
>
>   * The choice to sign a DNS zone is under control of the zone owner
>   * The choice to deploy RPKI on routes (to protect against BGP
>     hijacking) is under control of the IP prefix holder
>   * Both methods rely on third parties to cooperate to achieve the
>     protections offered
>   * RPKI routing filters are now widely deployed, and RPKI
>     registrations are substantial
>   * The remaining issue is DNSSEC validation; many (most?) of the
>     public recursive operators do this already
>
> The logic should be, defend against all feasible attacks, rather than 
> justifying the non-defense in one area (DNSSEC for DNS) based on the 
> assertion that another area is not being defended (RPKI for BGP).
>
> Brian
>
>
>     I realize that my editing made one of the pronoun antecedents here go
>     away. The second sentence should have said something more like "If
>     keeping the current text is the working group consensus..."
>
>     /a
>