Re: WGLC: draft-ietf-dnsext-nsec3-09

Roy Arends <roy@nominet.org.uk> Sun, 11 February 2007 23:20 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HGNzU-000791-I7; Sun, 11 Feb 2007 18:20:16 -0500
Received: from psg.com ([147.28.0.62]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HGNzJ-0004NM-R5; Sun, 11 Feb 2007 18:20:16 -0500
Received: from majordom by psg.com with local (Exim 4.63 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1HGNqj-000AFb-Cm for namedroppers-data@psg.com; Sun, 11 Feb 2007 23:11:13 +0000
X-Spam-Checker-Version: SpamAssassin 3.1.7 (2006-10-05) on psg.com
X-Spam-Level:
X-Spam-Status: No, score=-2.5 required=5.0 tests=AWL, BAYES_00, OPTING_OUT_CAPS autolearn=ham version=3.1.7
Received: from [213.248.199.23] (helo=mx3.nominet.org.uk) by psg.com with esmtp (Exim 4.63 (FreeBSD)) (envelope-from <roy@nominet.org.uk>) id 1HGNqg-000AFA-Hh for namedroppers@ops.ietf.org; Sun, 11 Feb 2007 23:11:12 +0000
Received: from unknown (HELO notes1.nominet.org.uk) ([213.248.197.128]) by mx3.nominet.org.uk with ESMTP; 11 Feb 2007 23:11:07 +0000
X-IronPort-AV: i="4.13,311,1167609600"; d="scan'208"; a="7131898:sNHT52600484"
In-Reply-To: <20070209200907.GA4570@zephyr.verisignlabs.com>
To: Matt Larson <mlarson@verisign.com>
Cc: Ben Laurie <ben@algroup.co.uk>, David Blacka <davidb@verisignlabs.com>, Geoff Sisson <Geoffrey.Sisson@nominet.org.uk>, IETF DNSEXT WG <namedroppers@ops.ietf.org>, "Olaf M. Kolkman" <olaf@NLnetLabs.nl>, Roy Arends <roy@dnss.ec>
Subject: Re: WGLC: draft-ietf-dnsext-nsec3-09
MIME-Version: 1.0
X-Mailer: Lotus Notes Build V702MAC_11052006 November 05, 2006
Message-ID: <OF574B6D64.458E7FB5-ON8025727F.00576670-C125727F.007F5B0E@nominet.org.uk>
From: Roy Arends <roy@nominet.org.uk>
Date: Mon, 12 Feb 2007 00:11:05 +0100
X-MIMETrack: Serialize by Router on notes1/Nominet(Release 7.0.1FP1 | May 25, 2006) at 11/02/2007 11:11:05 PM, Serialize complete at 11/02/2007 11:11:05 PM
Content-Type: text/plain; charset="US-ASCII"
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-id: DNSEXT discussion <namedroppers.ops.ietf.org>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ee80a2074afbfe28d15369f4e74e579d

Matt Larson wrote on 02/09/2007 09:09:07 PM:

> On Wed, 10 Jan 2007, Olaf Kolkman wrote:
> > Please review the draft and put that fact on record through a post to
> > the mailing-list.
> 
> I have (re-)read the draft and after a thorough review, I support its
> going foward.
> 
> I have only minor comments relating to wording clarity, which are
> below.
>
> > 6.  Opt-Out
> > 
> > [...]
> >    An Opt-Out NSEC3 record is said to cover a delegation if the hash 
of
> >    the delegation's Next Closer Name to its closest provable encloser 
is
> >    between the NSEC3 ownername and next hashed ownername.
> 
> I had some difficulty parsing this sentence.  Once I figured out its
> meaning, I determined the cause of my trouble was the use of the word
> "hash" followed by the word "to" in a sense that did not refer to the
> output of the hash algorithm: "to" here does not refer to what
> something "hashes to".  I believe a minor reordering of the sentence
> might help comprehension:
> 
>      An Opt-Out NSEC3 record is said to cover a delegation if the hash
>      of the Next Closer Name of its closest provable encloser of the
>      delegation is between the NSEC3 ownername and next hashed
>      ownername.

Suresh had similar remarks about this part of the text. I've chanced it 
to:

   An Opt-Out NSEC3 record is said to cover a delegation if the hash of
   the delegation's Owner Name or Next Closer Name is between the NSEC3 
ownername and 
   next hashed ownername.

Since Next Closer Name already implies "Closest Provable Encloser" (by 
definition, see the terminology section), I've left it out.

> But maybe I'm the only one with a problem here, which is entirely
> possible.
> 
> >    An Opt-Out NSEC3 record MAY have the same original owner name as an
> >    insecure delegation.  In this case, the delegation is proven 
insecure
> >    by the lack of a DS bit in type map and the signed NSEC3 record 
does
>                                ^ the
> >    assert the existence of the delegation.

fixed.

> 
> I know the word MAY appears in big letters here, but would it be worth
> a clarification sentence explaining that NSEC3 records at insecure
> delegations are not necessary in Opt-Out zones and that if one's
> purpose for using Opt-Out is to reduce zone size, this case is
> expected to be unusual?  I'm just thinking of a signer implementor
> coming along in a few years who's not steeped in the material as we
> all are and trying to figure things out from the RFC as a starting
> point.

In an Opt-Out zone, when the security status of a delegation goes from 
signed to unsigned, it is trivial for the administrator to revoke the DS 
record, and ammend the appropriate NSEC3 record. It might be less trivial 
to remove the specific hashed name from the NSEC3-chain of hashed names. 
So it might not be that unusual.

> > 7.2.2.  Name Error Responses
> > 
> >    To prove the nonexistence of QNAME a closest encloser proof and an
> >    NSEC3 RRset covering the wildcard record at the closest encloser 
MUST
>                              ^ (nonexistent)
> >    be included in the response.
> 
> I think adding "(nonexistent)" increases clarity.

I agree. I've added '(nonexistent)'.

> 
> > 7.2.7.  Referrals to Unsigned Subzones
> > 
> > [...]
> >    If the zone in Opt-Out, then there may not be an NSEC3 record
> 
> s/in/is

Fixed.

> 
> > 7.5.  Dynamic Update
> > 
> >    A zone signed using NSEC3 may accept dynamic updates.  [...]
> 
> Should there be an informative reference to RFC 2136 here?

I've added a reference to 2136. 

> 
> > 8.1.  Responses with Unknown Hash Types
> > 
> >    A validator MUST ignore NSEC3 records with unknown hash types.  The
> >    practical result of this is that responses containing such NSEC3
>                                                           ^ only
> >    records will generally be considered bogus.
> 
> If a response contains a combination of NSEC3 records with known and
> unknown hash types, the validator ignores the ones with unknown types
> and can proceed using the ones with known types, right?  If so, adding
> "only" above helps make that more clear.

Absolutely ! Fixed !
 
> > 8.3.  Closest Encloser Proof
> > 
> > [...]
> >    3.  Truncate SNAME by one label, go to step 2.
> > 
> >    Once the closest encloser has been discovered, the validator MUST
> >    check that the NSEC3 that has the closest encloser as an ownername 
is
>                                                              ^ original
> >    from the proper zone.
> 
> I think adding "original" increases clarity.

I agree. Fixed.

> 
> > 8.5.  Validating No Data Responses, QTYPE is not DS
> > 
> >    The validator MUST verify that an NSEC3 RR that matches QNAME is
> >    present and that both the QTYPE and the CNAME type are not set in 
its
> >    Type Bit Maps field.
> > 
> >    Note that this test also covers the case where the NSEC3 record
> >    exists because it corresponds to an empty non-terminal, in which 
case
> >    the NSEC3 will usually have an empty Type Bit Maps field.
> 
> Why "usually" and not "always"?  Won't an empty non-terminal's NSEC3
> always have an empty Type Bit Maps field?

Ack. I removed the word 'usually', but did not add 'always'.
 
> > 10.1.  Domain Name Length Restrictions
> > 
> >    Zones signed using this specification have additional domain name
> >    length restrictions imposed upon them.  In particular, zone with
>                                                                 ^ s
> >    names that, when converted into hashed ownernames, exceed the 255
> >    octet length limit imposed by RFC 1035 [3].
> 
> i.e., s/zone/zones

Fixed.

Thanks for the review Matt !

Roy

--
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/namedroppers/>