Re: [DNSOP] Fwd: New Version Notification for draft-livingood-dnsop-negative-trust-anchors-01.txt

"Livingood, Jason" <Jason_Livingood@cable.comcast.com> Sat, 25 October 2014 13:58 UTC

Return-Path: <prvs=3375b2481e=Jason_Livingood@cable.comcast.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B17B1A0011 for <dnsop@ietfa.amsl.com>; Sat, 25 Oct 2014 06:58:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.296
X-Spam-Level: **
X-Spam-Status: No, score=2.296 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.793, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sIoVZkCOYuXx for <dnsop@ietfa.amsl.com>; Sat, 25 Oct 2014 06:58:10 -0700 (PDT)
Received: from coout.comcast.com (unknown [162.150.44.71]) by ietfa.amsl.com (Postfix) with ESMTP id 27BA31A000A for <dnsop@ietf.org>; Sat, 25 Oct 2014 06:58:10 -0700 (PDT)
X-AuditID: a2962c47-f79516d000004228-10-544bac7196af
Received: from PACDCEXHUB02.cable.comcast.com (pacdcexhub02.cable.comcast.com [24.40.56.115]) by coout.comcast.com (SMTP Gateway) with SMTP id F8.6A.16936.17CAB445; Sat, 25 Oct 2014 07:58:09 -0600 (MDT)
Received: from PACDCEXMB06.cable.comcast.com ([169.254.8.175]) by PACDCEXHUB02.cable.comcast.com ([fe80::2816:661:c294:c863%16]) with mapi id 14.03.0181.006; Sat, 25 Oct 2014 09:58:09 -0400
From: "Livingood, Jason" <Jason_Livingood@cable.comcast.com>
To: Doug Barton <dougb@dougbarton.us>, "dnsop@ietf.org" <dnsop@ietf.org>
Thread-Topic: [DNSOP] Fwd: New Version Notification for draft-livingood-dnsop-negative-trust-anchors-01.txt
Thread-Index: AQHP7uO/OhhSr8HMF0qcd8awdThwM5w/rLMAgABmNACAAMaxAA==
Date: Sat, 25 Oct 2014 13:57:48 +0000
Message-ID: <D0711EDD.E5F26%jason_livingood@cable.comcast.com>
References: <20141023170649.8872.42010.idtracker@ietfa.amsl.com> <CAHw9_i+U38Zm49ZRJp=nbs7rj_r4yJ=-C90OEx8mP0Qo2jAXtQ@mail.gmail.com> <544ACD7C.1000204@dougbarton.us>
In-Reply-To: <544ACD7C.1000204@dougbarton.us>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.5.141003
x-originating-ip: [68.87.16.247]
Content-Type: text/plain; charset="Windows-1252"
Content-ID: <79E955E54AF7CC45A59B29C5D8518D16@cable.comcast.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrKIsWRmVeSWpSXmKPExsUioWFRrFu4xjvE4NQaU4u7by6zWEyYdJ3V gcnjcmuwx5IlP5kCmKK4bZISS8qCM9Pz9O0SuDMerEkp+KVQMe3bZKYGxj1SXYycHBICJhLf rrxkhbDFJC7cW8/WxcjFISRwhlHiS3sfO4RzkFHizo/p7CBVbAI2EtO3HWUGsUUEPCRe3G9j A7GFBXIkdn9/zwgRz5W48rGHDcJ2kvh4fQGYzSKgKvF/4gOwGl4BO4nVm2dBLVjFKLGw/R1Y glNAV2LHh1VgJzECnfT91BomEJtZQFzi1pP5TBCnCkgs2XOeGcIWlXj5+B9YvaiAnsS8h6/Y IOIKEr9ONrBA9BpIvD83nxnCdpBo2/4HKq4tsWzha2aIgwQlTs58wjKBUXwWknWzkLTPQtI+ C0n7LCTtCxhZVzHKJecXpCTnZuSXlhgY6iUnJuWk6iXn5yYnFpeA6E2MwBhcNE3HfQfjhV7n Q4wCHIxKPLwBld4hQqyJZcWVuYcYJTiYlUR4Ly8ECvGmJFZWpRblxxeV5qQWH2KU5mBREudV WeAVIiSQnliSmp2aWpBaBJNl4uAE6eaSEilOzUtJLUosLcmIByWD+GJgOpBqYORJ1g0PviSQ wlhgdGfbbPfZMfcY2/h5XmQIvBfb/ULm/nrHGK4DxXHHXm9JMFK4K7Su5rdG3h6v/a1anybd mdM2Z/r02XETrR+VXovMf1slzNG/fC+f+aTa123RTv63WraXyjO9azqiv4rjxYPlLUeDl8je P2AunGZst8vBrajr14q4vkQxRSWW4oxEQy3mouJEANDUxxHYAgAA
Archived-At: http://mailarchive.ietf.org/arch/msg/dnsop/CC__NhywJBZHdM2_ADr51di-nhA
Subject: Re: [DNSOP] Fwd: New Version Notification for draft-livingood-dnsop-negative-trust-anchors-01.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Oct 2014 13:58:11 -0000

On 10/24/14, 6:06 PM, "Doug Barton" <dougb@dougbarton.us> wrote:

>But worse yet, in the operator error case you make such errors painless.
>Instead, if they are painful (as in, screw up DNSSEC and you go off line)
>then it leads to more people taking DNSSEC seriously, and doing it right.
>Of course I realize that the counter-argument is that if DNSSEC fails are
>too painful then people will simply not do it. But to the extent that
>people use that as a line of reasoning it's simply one more in a long
>string of excuses.

I think we¹re seeing a collision of how we¹d like the world to work and
how it actually works. ;-) Operators are on the front lines here; trust us
on the realities of getting stuff like this deployed.

While I totally get & 110% agree that when someone screws up their auth
records they should feel the pain - and that this pain is a signal to do
it better/right the next time - the reality is that the real pain is felt
by the DNS operator. Of course I am going to pains to point out who is
really to blame here:
http://tools.ietf.org/html/draft-livingood-dnsop-auth-dnssec-mistakes-00


Anyway, if a popular domain like google.com or facebook.com or netflix.com
was to sign - and then made a mistake - the call centers of an validating
operator would pretty much melt down. It wouldn¹t matter that we were not
to blame, we¹d feel the pain and people would be angry at us. There¹d be
pressure to Œmake the pain stop¹ (and associated costs). Oh - and these
days in the U.S. we¹d probably be blamed for ³blocking access² to the site
- violating net neutrality (that the facts would say otherwise wouldn¹t
matter**).

So - two choices - turn off DNSSEC validation for ALL domains or just the
one affected (assuming you can prove out it is a mistake and not an
attack). Which one is worse?

The market has already answered that: Negative Trust Anchors - turn it off
in as narrow a case as possible. The question for us here is whether we
wish to acknowledge this reality or pretend it does not exist. ;-)

>The other problem is that this feature is only really useful in the
>DNSSEC ramp-up period. Sure, mistakes are more common now, software is
>immature, etc. etc. But if DNSSEC is successful, the software will get
>better (it already is a lot better than even a few years ago), and
>mistakes will be less common (both on an absolute, and on a percentage
>basis). But once you introduce a feature like this, you cannot remove it.

We address the timeframe issue in the draft. Certainly you are correct
that the feature is still there afterwards, but of course the feature
already exists today so the genie is out of the bottle as they say.

>So can we please let the functionality of DNSSEC stand as designed, and
>not give people a giant trapdoor that they can trigger at the slightest
>sign of trouble? Otherwise, why bother?

I wouldn¹t say that it is at the Œslightest¹ sign of trouble. This is
intended for use when there are major problems. Turning this around:
DNSSEC deployment only got as far as it did to date because of NTAs.
Without NTAs, I don¹t believe it¹ll go much further. So do we want to help
the world understand what it takes to push ahead with DNSSEC?

>... and of course, I should point out that adding this as a knob is
>utterly pointless, since any reasonably competent validating resolver
>operator can engineer their own trapdoor.

Yes - we all decided the way to do it was with a Negative Trust Anchor.
That¹s what the draft documents. ;-)

- Jason Livingood



** From the discussion above (scroll back up to refresh your memory). A
good recent example is a claim by some anonymous poster in a Reddit thread
that Comcast was blocking Tor. Within hours it went viral and was posted
to major news sites, never mind that it wasn¹t true. I posted
http://corporate.comcast.com/comcast-voices/setting-the-record-straight-on-
tor and yet still to this day there are tweets and reposts about how we
block Tor, pointing back to the original news articles. I can¹t wait for
what will happen when a major domain breaks if a NTA did not exist.