Re: [dnsext] MAR proposal #2: Allowing pre-publishing of DNSKEYs

Matthijs Mekking <matthijs@NLnetLabs.nl> Mon, 18 April 2011 08:36 UTC

Return-Path: <matthijs@nlnetlabs.nl>
X-Original-To: dnsext@ietfc.amsl.com
Delivered-To: dnsext@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id DDA6DE065C for <dnsext@ietfc.amsl.com>; Mon, 18 Apr 2011 01:36:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TfBmAsHIS+4Y for <dnsext@ietfc.amsl.com>; Mon, 18 Apr 2011 01:36:48 -0700 (PDT)
Received: from open.nlnetlabs.nl (open.nlnetlabs.nl [IPv6:2001:7b8:206:1::1]) by ietfc.amsl.com (Postfix) with ESMTP id 70177E0682 for <dnsext@ietf.org>; Mon, 18 Apr 2011 01:36:48 -0700 (PDT)
Received: from [192.168.1.9] (ip123-112-174-82.adsl2.static.versatel.nl [82.174.112.123]) (authenticated bits=0) by open.nlnetlabs.nl (8.14.4/8.14.4) with ESMTP id p3I8aDcT084358; Mon, 18 Apr 2011 10:36:14 +0200 (CEST) (envelope-from matthijs@nlnetlabs.nl)
Message-ID: <4DABF7FD.5040406@nlnetlabs.nl>
Date: Mon, 18 Apr 2011 10:36:13 +0200
From: Matthijs Mekking <matthijs@NLnetLabs.nl>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.14) Gecko/20110223 Thunderbird/3.1.8
MIME-Version: 1.0
To: Marc Lampo <marc.lampo@eurid.eu>
References: <alpine.BSF.2.00.1011180553250.83352@fledge.watson.org> <20110310223438.978E9C0E902@drugs.dv.isc.org> <4D79DDFA.3010006@nlnetlabs.nl> <alpine.BSF.2.00.1103140901170.99213@fledge.watson.org> <20110314213319.A2799C8CA0B@drugs.dv.isc.org> <alpine.BSF.2.00.1103141750530.74870@fledge.watson.org> <a06240800c9a50cf4632a@10.31.200.110> <AANLkTimUUa5zkr+hZH4jR-euENg_n=9EwtRVBN-cxr9_@mail.gmail.com> <a06240802c9a7b6cb4cc3@192.168.1.105> <AANLkTin+hMZ-27VjkQq7_44zNguMiefhxbgGD+-XZxPP@mail.gmail.com> <a06240802c9a7e0807069@10.31.200.117> <AANLkTi=4co5mS3RYhK1BvUMOm54wgNAMeKtk3_Zm0ff1@mail.gmail.com> <a06240802c9a93d762e13@[10.31.200.112]> <a06240803c9a9417e1fe8@[10.31.200.112]> <4D938CC3.1020103@nlnetlabs.nl> <a06240800c9ba6184d535@[10.31.200.112]> <4D94DF2B.1040407@nlnetlabs.nl> <a06240800c9bb6f86edae@[10.31.200.112]> <alpine.BSF.2.00.1104011022030.92106@fledge.watson.org> <alpine.BSF.2.00.1104011024530.92106@fle dge.watson.org> <006901cbfd9c$a3844030$ea8cc090$@lampo@eurid.! eu>
In-Reply-To: <006901cbfd9c$a3844030$ea8cc090$@lampo@eurid.eu>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.6 (open.nlnetlabs.nl [213.154.224.1]); Mon, 18 Apr 2011 10:36:15 +0200 (CEST)
Cc: dnsext@ietf.org
Subject: Re: [dnsext] MAR proposal #2: Allowing pre-publishing of DNSKEYs
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2011 08:36:54 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Marc,

On 04/18/2011 09:39 AM, Marc Lampo wrote:
> (sorry for the late reply - catching up ...)
> 
> I am not in favour of publishing DS records (in the parent)
> referring towards DNSKEY records that are not present (in the child zone).
>  (is this change seems to propose)

This is a different proposal.

> Motivation :
> As registry we try to protect the chain-of trust towards our customers
> by validating DNSSEC information presented to us.
> Up till now, we have had several cases where such "orphaned" DS records
> actually turned out to be configuration errors.
> As our validation warned about this, we did not contribute to a broken
> chain-of-trust.
> 
> If orphaned DS records were to become common,
> we can no longer easily distinguish between "normal" and "error"
> situation.

You should check if there is at least one DS record that refers to an
existing DNSKEY (per algorithm). Two DS records of which one is pointing
to a DNSKEY record that does exist and one that doesn't is a valid and
thus "normal" situation.


Best regards,

Matthijs

> 
> 
> Kind regards,
> 
> Marc Lampo
> 
>  
> -----Original Message-----
> From: Samuel Weiler [mailto:weiler@watson.org] 
> Sent: 01 April 2011 04:28 PM
> To: dnsext@ietf.org
> Subject: [dnsext] MAR proposal #2: Allowing pre-publishing of DNSKEYs
> 
> This is a proposed change in DNSSECbis that changes the mandatory 
> algorithm rules.  I'm posting this as a summary of what I understand 
> some may support; I don't support this change myself. Please post in 
> this thread with your support or lack thereof.
> 
> For additional operational and zone-signing flexibility, particularly
> to allow the publication of a DNSKEY of a new algorithm before a zone
> is fully signed with that algorithm, we propose to change these rules
> to use ONLY the DS RRset for algorithm signalling, not the DNSKEY
> RRset.
> 
> Zones will be required to be signed with each algorithm (though not
> necessarily eack key) present in the zone's DS RRset or configured
> trust anchors.
> 
> My opinion:
> 
> In retrospect, we probably could have used this mechanism when we 
> first wrote these rules -- the choice to use both DS and DNSKEY for 
> signalling may have been an artifact of history.  As it is, this 
> change may cause zones signed under these new rules to fail validation 
> in deployed code, including unbound.  That alone is enough to lead me 
> to oppose this change.
> 
> -- Sam
> 
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJNq/f9AAoJEA8yVCPsQCW5sYkH/jo3mKY0x95QNUG/UZW3PkVN
yPmZuFtOD/fFsv1741hfjRWe+BJ5La9XEfC1qc1ukz6JDc4XWlMM7qSzxd5slggZ
hQpK+KC+Nw9sptZQjn/Ym6AHB6251pou629vTjmBTKua/1Bwa6ZlRyH8+fo0BuPh
xlrPVkfJlDXEQE+jScHBlIBGW80jYjrndxIJysPPiLeapONuOuJtu/8GHITMSjES
TYDJ/xu1DkJut9pdO53xu50C2xzJhHRTqnRRO73Szq6VYjwd9Bh7/q6SrhJfeNNY
+aneBoGOuOMIIes0o5o4LMprsBxBtqjy/UnfkWZ9Ac3qQ27VT0S3y+5itvIgPNE=
=PKi5
-----END PGP SIGNATURE-----