Re: [DNSOP] Delegation acceptance checks
Havard Eidnes <he@uninett.no> Sat, 06 May 2023 23:11 UTC
Return-Path: <he@uninett.no>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96436C14CE44 for <dnsop@ietfa.amsl.com>; Sat, 6 May 2023 16:11:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=uninett.no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EEGG2k6a9BWK for <dnsop@ietfa.amsl.com>; Sat, 6 May 2023 16:10:58 -0700 (PDT)
Received: from smistad.uninett.no (smistad.uninett.no [IPv6:2001:700:1:0:eeb1:d7ff:fe59:fbaa]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26F3EC14CF12 for <dnsop@ietf.org>; Sat, 6 May 2023 16:10:56 -0700 (PDT)
Received: from smistad.uninett.no (smistad.uninett.no [158.38.62.77]) by smistad.uninett.no (Postfix) with ESMTP id D66C943ED03; Sun, 7 May 2023 01:10:52 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uninett.no; s=he201803; t=1683414653; bh=IVmxqhTdvBF4WKP5AoLkiT8L9sGBGqezcvXZ7fNU/44=; h=Date:To:Cc:Subject:From:In-Reply-To:References:From; b=HRNvzIwyJXI0anHvbB/iThv2bzu9OazlWiSLRRCvqa6rGZB6NtH28fC7Es94X/6Gq FGj/rAK2uqhTcX+FANursWe3W414t48KNtw8gStgCXmzVTX/OwRRzG0ELPU4WKOdKf +bP2CAqzzcQ8tgpVRlBSdkpsgthv+c1xf8sNbxQs=
Date: Sun, 07 May 2023 01:10:52 +0200
Message-Id: <20230507.011052.1632879695052938676.he@uninett.no>
To: jabley@strandkip.nl
Cc: peter@desec.io, warren@kumari.net, m9p@india.emu.st, dnsop@ietf.org, nils@desec.io
From: Havard Eidnes <he@uninett.no>
In-Reply-To: <infYuCGtin93oe5p2i5xJp8pcRb7w42d543MM2sVkYVjvFHtzAXROt49cDyiguu_SZz7xg4xk802loka9IA_0U--Uu3cJIQOigisNvOOw7A=@strandkip.nl>
References: <20230504.200747.619569100111463947.he@uninett.no> <8ee0d0dd-685b-f767-e5bd-d722cc873dc8@desec.io> <infYuCGtin93oe5p2i5xJp8pcRb7w42d543MM2sVkYVjvFHtzAXROt49cDyiguu_SZz7xg4xk802loka9IA_0U--Uu3cJIQOigisNvOOw7A=@strandkip.nl>
X-Mailer: Mew version 6.9 on Emacs 26.3
Mime-Version: 1.0
Content-Type: Text/Plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/-iWvT6KJSgBdycmIGRgRTqoPJl8>
Subject: Re: [DNSOP] Delegation acceptance checks
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 06 May 2023 23:11:03 -0000
> Pre-delegation checks add friction to the domain registration > process. They further complicate the commuications between > different actors in the commercial graph (registrars, registries, > resellers, DNS operators, hosting companies) and introduce delay > and manual intervention into what might otherwise be a fairly > automated or at least automatable process. That is to say, checks > have a cost, and that cost might well be difficult to sell in a > commercial environment, especially one where the policy depends on > a membership that is often quite commercially motivated. (I > appreciate not all TLDs are the same.) Oh, yes, the sanctity of making a buck, "we can't let any technical obstacle get in it's way", and by extension "contributing to maintaining the good health of the public DNS doesn't really matter, as long as we get to collect the registration fees." I guess it depends on what service the registry is actually offering. One way to look at it is that it's offering a service to extend the public DNS name space to registrants. In that scenario it makes perfect sense to do a one-time check on initial registration or update, with the intention of preventing the domain owner from shooting himself in the foot. Another way would be to look at it as purely a name space administration issue, i.e. just ensure uniqueness, and let loose the commercial folks with their "product innovations" and "improved efficiency" aims, casting aside quite a few technical considerations for the public DNS. In case you haven't noticed, I have a distaste for the latter, and a number of registries operate with the former model. On the technical side, I don't think anyone has suggested to introduce repeated checks with de-registration either of a single NS or an entire domain on auto-polit. Does any public registry actually do that sort of thing? I've never heard of it. I call that a straw man. > On the technical side, I think arriving at a generalised approach > will be difficult. For example, > > 1. Repeated checks -- just because something is declared good at > registration time doesn't mean it might not go bad later. How > often do you need to check? You are assuming too much here, I think, in particular what the goal is and what the a reasonable mechanism to attain that goal could be. I've not argued to "outlaw inconsistencies or lameness", and it is true that such errors may be introduced over time outside of the interactions with the registry. What I have argued is that it's probably a good idea to check for consistency & service on the time of registration or update. > 2. The possibility of cascading failure -- a partial failure in a > delegation, if punished by a domain suspension, might result in > a complete failure. This is at worst an attack vector and at > best contrary to the interests of stability for users of the > Internet. Making automated changes to disable things that are > already demonstrably fragile seems a bit like form over > function. Again, here you're assuming that something doing a repeated check will automatically de-register a domain on auto-pilot. I certainly have not argued for such a thing, and would find the suggestion absurd. > 3. Deliberately-incoherent namespaces -- many of the most common > responses in the DNS are generated at response time according > to a variety of dynamic policy, and are subject to access > control. So vantage points matter. Any policy that is measuring > the health of a delegation needs to be able to interpret the > results of multiple measurements from different vantage points > and understand which of them correspond to a policy that is > acceptable, without any a priori understanding of what the > response generation policy is. In general I think this is > problematic. I don't think this is problematic at all. If a registrant wants to do "private stuff" with his domain, he'd do best in keeping that private, and the effects of that out of visibility for the registry. The registry should be checking the publically visible data, and is unlikely to have a probe for consistency checking within a "private DNS zone" of a registrant. And ... if you really insist on doing violence to the DNS standards and expectations of consistency, you're of course free to do whatever dirty deeds you have convinced yourself you need to do in a subdomain / sub-zone of your properly functioning public DNS domain. > 4. The fiction of a single namespace. The particular bits of > machinery that respond to particular names and particular > addresses (including nameserver names and nameserver addresses) > are not always the same. Private namespaces exist that avoid > collisions with the nominally-public namespace by making the > same companyname.com domain exist in both, but implementing > each very differently. This is valid and good advice, even > (e.g. compared to squatting on .HOME or .CORP). Should those > domains be suppressed simply because they are not intended for > use by the general public? I would actually argue that the name space is a single -- the public DNS name space is a single tree. Witness the rather long discussion thread in this group around the .ALT name space, and how normal DNS- using clients and servers are supposed to relate to it, and how we now need to carve out a blockage to prevent someone else coming along later and actually getting .ALT registered in the DNS. I will concede, though, that what is different is that certain parts of the name space are only available to a subset of the clients. So, you're arguing that it would be "causing too much work"(?) for the registry to insist on having the registrant stand up a couple of public name servers to register the publically visible version of a domain? Really? Regards, - Håvard
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Paul Wouters
- [DNSOP] WGLC rfc8499bis one week extension for la… Benno Overeinder
- Re: [DNSOP] WGLC rfc8499bis one week extension fo… George Michaelson
- Re: [DNSOP] WGLC rfc8499bis one week extension fo… Joe Abley
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Peter Thomassen
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Peter Thomassen
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Paul Hoffman
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Tim Wicinski
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Wessels, Duane
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… John Kristoff
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Hollenbeck, Scott
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… libor.peltan
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Brian Dickson
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Mark Delany
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Joe Abley
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Paul Vixie
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Wes Hardaker
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Paul Vixie
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Ralf Weber
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Magnus Sandberg
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Frederico A C Neves
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Peter Thomassen
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Wes Hardaker
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Paul Wouters
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Joe Abley
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Joe Abley
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Peter Thomassen
- Re: [DNSOP] WGLC rfc8499bis one week extension fo… John Kristoff
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Warren Kumari
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Havard Eidnes
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Havard Eidnes
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Warren Kumari
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Edward Lewis
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Edward Lewis
- Re: [DNSOP] WGLC rfc8499bis one week extension fo… Donald Eastlake
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Edward Lewis
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Havard Eidnes
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Mark Delany
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Warren Kumari
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Havard Eidnes
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Havard Eidnes
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Joe Abley
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Mark Andrews
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… George Michaelson
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Mark Andrews
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Brian Dickson
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Joe Abley
- [DNSOP] Delegation acceptance checks [was: Re: [E… Peter Thomassen
- Re: [DNSOP] Delegation acceptance checks [was: Re… Warren Kumari
- Re: [DNSOP] Delegation acceptance checks Havard Eidnes
- Re: [DNSOP] Delegation acceptance checks [was: Re… Mark Delany
- Re: [DNSOP] Delegation acceptance checks [was: Re… Joe Abley
- Re: [DNSOP] [Ext] WGLC rfc8499bis one week extens… Edward Lewis
- Re: [DNSOP] Delegation acceptance checks [was: Re… Brian Dickson
- Re: [DNSOP] Delegation acceptance checks [was: Re… John Levine
- Re: [DNSOP] Delegation acceptance checks [was: Re… Dr Eberhard W Lisse
- Re: [DNSOP] Delegation acceptance checks Dr Eberhard W Lisse
- Re: [DNSOP] WGLC rfc8499bis one week extension fo… Benno Overeinder
- Re: [DNSOP] Delegation acceptance checks Havard Eidnes
- Re: [DNSOP] Delegation acceptance checks Joe Abley
- Re: [DNSOP] Delegation acceptance checks [was: Re… John Levine
- Re: [DNSOP] Delegation acceptance checks [was: Re… Mark Andrews
- Re: [DNSOP] Delegation acceptance checks [was: Re… Peter Thomassen
- Re: [DNSOP] Delegation acceptance checks Peter Thomassen
- Re: [DNSOP] Delegation acceptance checks Mark Elkins
- Re: [DNSOP] Delegation acceptance checks [was: Re… John Levine
- Re: [DNSOP] Delegation acceptance checks [was: Re… Kim Davies
- Re: [DNSOP] Delegation acceptance checks [was: Re… Mark Andrews
- Re: [DNSOP] Delegation acceptance checks [was: Re… John Levine
- Re: [DNSOP] Delegation acceptance checks [was: Re… Mark Andrews
- Re: [DNSOP] Delegation acceptance checks [was: Re… John R Levine
- Re: [DNSOP] Delegation acceptance checks [was: Re… Mark Andrews
- Re: [DNSOP] Delegation acceptance checks [was: Re… Rubens Kuhl
- Re: [DNSOP] Delegation acceptance checks [was: Re… John R Levine
- Re: [DNSOP] Delegation acceptance checks [was: Re… Edward Lewis