Wrap-up trustupdate timers
"Olaf M. Kolkman" <olaf@NLnetLabs.nl> Tue, 21 November 2006 19:41 UTC
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1GmbVC-0003I8-MG; Tue, 21 Nov 2006 14:41:54 -0500
Received: from psg.com ([147.28.0.62]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1GmbV7-0000C2-1M; Tue, 21 Nov 2006 14:41:54 -0500
Received: from majordom by psg.com with local (Exim 4.63 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1GmbNS-000GLy-F6 for namedroppers-data@psg.com; Tue, 21 Nov 2006 19:33:54 +0000
X-Spam-Checker-Version: SpamAssassin 3.1.6 (2006-10-03) on psg.com
X-Spam-Level:
X-Spam-Status: No, score=-2.5 required=5.0 tests=AWL,BAYES_00 autolearn=ham version=3.1.6
Received: from [213.154.224.1] (helo=open.nlnetlabs.nl) by psg.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.63 (FreeBSD)) (envelope-from <olaf@NLnetLabs.nl>) id 1GmbNG-000GKv-C8 for namedroppers@ops.ietf.org; Tue, 21 Nov 2006 19:33:48 +0000
Received: from [127.0.0.1] (open.nlnetlabs.nl [IPv6:2001:7b8:206:1::53]) by open.nlnetlabs.nl (8.13.8/8.13.4) with ESMTP id kALJX9KZ037452; Tue, 21 Nov 2006 20:33:31 +0100 (CET) (envelope-from olaf@NLnetLabs.nl)
Mime-Version: 1.0 (Apple Message framework v752.2)
Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="pgp-sha1"; boundary="Apple-Mail-15--1000685773"
Message-Id: <6DEAA105-D3CF-4287-97C4-C5ABD03870C2@NLnetLabs.nl>
Cc: Mike StJohns <Mike.StJohns@nominum.com>
Content-Transfer-Encoding: 7bit
From: "Olaf M. Kolkman" <olaf@NLnetLabs.nl>
Subject: Wrap-up trustupdate timers
Date: Tue, 21 Nov 2006 20:33:11 +0100
To: IETF DNSEXT WG <namedroppers@ops.ietf.org>
X-Pgp-Agent: GPGMail 1.1.2 (Tiger)
X-Mailer: Apple Mail (2.752.2)
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 918f4bd8440e8de4700bcf6d658bc801
Dear colleagues, We have reviewed the comments received during the last call for draft-ietf-dnsext-trustupdate-timers-04 Summary: There is a rough consensus for forwarding the rollover requirements document although there are some minor editorial changes that need to be addressed in a new rev. During the WGLC the editor has stated a number of times that he was of the opinion that issues where closed and discarded those. Most notably - There has been quite some discussion on section 2.3. That is an indication that that section is not quite self- documenting. A strawman proposal is to reorder/rewrite the text so that it is clear that the zone-owner can take action within a certain time after publishing a new key in a keyset and what the response of the resolver of that action is. How about: 2.3 Remove Hold-down Zone owners MAY remove a new key from the DNSKEY RRset if the add hold-down timer has not been reached after first publication of the RRset in the DNS i.e. when the DNSKEY RR set first seen by resolvers. If resolvers notice the removal of a previously added new key from a DNSKEY RRset, it waits for the remove hold-down time and then, if the key hasn't reappeared, SHOULD discard any information about the key. Obviously the editor, who is a native speaker, will find ways to improve on this. - Clarification of the calculation of the minimum transmit time. - The editor has responded to most comments made and promised a number of minor edits. He did, at a number of times, push back suggestions made by working group members. Since there was no further dispute the chairs assume consent with the editors position and close these issues. Our proposal is to wait for rev 5 of the document allow for 1 week of review and then advance the document to the IESG with the note below (pending an additional review by the chairs). -- Olaf and Olafur DNSEXT chairs Title : Requirements related to DNSSEC Trust Anchor Rollover Author(s) : M. StJohns Filename : draft-ietf-dnsext-trustupdate-timers-05 Pages : Date : September 2006 This is a request to publish the document on the standards track This draft relates to draft-ietf-dnsext-rollover-requirements and we think these two documents should be treated together. 1) Have the chairs personally reviewed this version of the ID and do they believe this ID is sufficiently baked to forward to the IESG for publication? There are no nits according to idnits 1.108 (via tools.ietf.org). One could argue that DNSSEC terminology should have been expanded at first use, the chairs thinks this is not needed. 2) Has the document had adequate review from both key WG members and key non-WG members? Do you have any concerns about the depth or breadth of the reviews that have been performed? Yes during last-call this document has been reviewed in depth by (at least) the following people. - Wouter Wijngaards http://ops.ietf.org/lists/namedroppers/namedroppers.2006/ msg01270.html - Sam Weiler http://ops.ietf.org/lists/namedroppers/namedroppers.2006/ msg01357.html - Scott Rose http://ops.ietf.org/lists/namedroppers/namedroppers.2006/ msg01280.html - Andrew Sullivan http://ops.ietf.org/lists/namedroppers/namedroppers.2006/ msg01306.html - Wesley Griffin http://ops.ietf.org/lists/namedroppers/namedroppers.2006/ msg01372.html - Robert Story http://ops.ietf.org/lists/namedroppers/namedroppers.2006/ msg01373.html - Suresh Krishnaswamy http://ops.ietf.org/lists/namedroppers/namedroppers.2006/ msg01311.html At an earlier phase the document has been reviewed by Eric Rescorla. http://ops.ietf.org/lists/namedroppers/namedroppers.2006/msg01026.html (Eric brought up a number of issues which were argued to be operational issues concerning key handling and not relevant to the protocol described in the draft) Reviewers have compared the properties of this rollover mechanism with the goals as set in the rollover-requirements draft. The reviewers are satisfied that the threshold-timers document satisfies (see section 5 of draft-ietf-dnsext-rollover-requirements) 1. Scalability 3. General Applicability 4. Support Private Networks 7. Planned and Unplanned Rollovers 8. Timeliness 10. New RR Types (unclear requirement, but no new RR type needed) 11. Support for Trust Anchor Maintenance Operations (accomplishes replace w/ separate add/delete) 12. Recovery From Compromise 13. Non-degrading Trust There have been ('non-blocking') comments about: 5. Stale Trust Anchor Detection Depending on how many revoked DNSKEYs are in the RRset 6. Manual Operations From the resolver point of view the operations may be difficult to perform manually, on the zone-owner side manual operations is not a problem. 9. High Availability In particular the amount of revoked DNSKEYs could increase the size of the DNSKEY RRset to 2. No Intellectual Property Encumbrance Folk have been reluctant to comment on the status of the IPR claims more about this at 4) below. 3) Do you have concerns that the document needs more review from a particular (broader) perspective (e.g., security, operational complexity, someone familiar with AAA, etc.)? We think this document has had sufficient review, also from security savvy reviewers, on the other hand a final review will never hurt. 4) Do you have any specific concerns/issues with this document that you believe the ADs and/or IESG should be aware of? For example, perhaps you are uncomfortable with certain parts of the document, or whether there really is a need for it, etc., but at the same time these issues have been discussed in the WG and the WG has indicated it wishes to advance the document anyway. The rollover-requirements draft state that the preferred solution should not be IPR encumbered. Mr. Moreau claims that a patent applies (see http://ops.ietf.org/lists/namedroppers/namedroppers.2006/msg01283.html) The editor does not agree with this statement. We do not know if Mr. Moreau followed the instructions in 6.1.3 of BCP79. Besides, Diversinet claimed IPR (see https://datatracker.ietf.org/public/ipr_search.cgi? option=document_search&document_search=ietf-dnsext-trustupdate-timers) It should also be noted that there were a number of proposals from which this particular draft was selected. This included draft-ietf-dnsext-trustupdate-threshold (covered by the same Diversinet IPR claim) and draft-moreau-dnsext-takrem-dns-02.txt (see https://datatracker.ietf.org/public/ipr_detail_show.cgi?ipr_id=639). The draft-moreau-dnsext-takrem-dns-02 draft was published with a non-derivative clause. The working group has been made aware of the IPR claims and they were not subject to further discussion about applicability. 5) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The selection for this particular proposal was done during the face-2-face meeting in Montreal and met wide consensus. This consensus was confirmed on-list. Also during the last call there were several folk that supported this document explicitly. 6) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize what are they upset about. Mr. Moreau has stated discontent with the process. See https://datatracker.ietf.org/public/ipr_detail_show.cgi?ipr_id=639 and references therein. 7) Have the chairs verified that the document adheres to _all_ of the ID nits? (see http://www.ietf.org/ID-nits.html). Yes. 8) For Standards Track and BCP documents, the IESG approval announcement includes a writeup section with the following sections: - Technical Summary The document describes a means for automatically updating public keys that are configured in DNSSEC aware resolvers. New trust-anchors are configured when signatures over them can be validated using the previous trust-anchors. By introducing explicit revocation and a delay mechanism the chances of an attacker introducing a mala fide trust-anchor after a key compromise are mitigated, albeit not solved. - Working Group Summary There is a broad consensus that this solution provides a workable key-rollover. The working group is aware IPR issues. - Protocol Quality There are no implementations yet. The chairs are aware of at least 1 and maybe 2 independent organizations that plan on implementing. At least one implementer has done in-depth review during last call. The chairs are of the opinion that after implementations are written there is probably millage in documenting operational experiences. ----------------------------------------------------------- Olaf M. Kolkman NLnet Labs http://www.nlnetlabs.nl/
- Wrap-up trustupdate timers Olaf M. Kolkman
- Re: Wrap-up trustupdate timers Mike StJohns
- Re: Wrap-up trustupdate timers Olaf M. Kolkman