Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-validator-requirements

"Livingood, Jason" <Jason_Livingood@comcast.com> Mon, 30 January 2023 14:43 UTC

Return-Path: <Jason_Livingood@comcast.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AEFB5C14F6EB for <dnsop@ietfa.amsl.com>; Mon, 30 Jan 2023 06:43:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.494
X-Spam-Level:
X-Spam-Status: No, score=-6.494 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, URI_NOVOWEL=0.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcast.com header.b="qJT9DO34"; dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=comcastcorp.onmicrosoft.com header.b="E6eGs8pF"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ob50W5bQOpT3 for <dnsop@ietfa.amsl.com>; Mon, 30 Jan 2023 06:43:00 -0800 (PST)
Received: from mx0b-00143702.pphosted.com (mx0b-00143702.pphosted.com [148.163.141.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 17CFEC14EB12 for <dnsop@ietf.org>; Mon, 30 Jan 2023 06:42:59 -0800 (PST)
Received: from pps.filterd (m0156894.ppops.net [127.0.0.1]) by mx0b-00143702.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 30UCbIPs014996; Mon, 30 Jan 2023 09:42:58 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=20190412; bh=xFl8Qr6cv56JUEv6ga3dRIbwKy5Ol2loJnb+bAbycpY=; b=qJT9DO34IdVsSwKSxmc6NdvvMIXusLTs8d7pWYl3o3K8zPcC5eS5MQiqOnJgzsqlY/kb EceN5psiBEBoV1Y2CXtv6Sl7dCJwRgW54gqdmr2NQ/QYKd5DPUWPiPmq+derhKD9TkZ0 VZrFv4FI4YCSE/8WoGua5ij5OXFuN94WQWEEgU61mr4AXoAKPQVu9M3EBbD/PX1Ly893 uUuYwjIc1kozMiSTx44t1CJc0+hqnd3UZLhT9dQbuToLTF6+szbKGvvLrg0/IdMGP5yO ExrgGLQRTBH3R2vehef/QNPJ40zsZBOTu6GHj5K8PyDYjgMUZ0s4WnIXQSRzk+Z5FJ0A JQ==
Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11lp2168.outbound.protection.outlook.com [104.47.58.168]) by mx0b-00143702.pphosted.com (PPS) with ESMTPS id 3nd1exhjuy-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 30 Jan 2023 09:42:58 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dWC4+wtmSlIRWCFujJonOVhEEduKrlmwwuBx4jsCfPPTKxdwI8Kyefglyvl8vZ8B8ZQ9O8g1QnqCgT3B48BoiBMrcZO2F/yVn9gs7qAbFq1QJ9nGvdewsDIamD1FIChpWv2wDMI7AVbtoykbPLTgxTVkZ6VhklVADDpibWSPtivTDqqmpxWptrTKOPxwNrRR+tIKQJRrcLWrpX6O3VlSiGD5MgaT8lNyWzgr4jsD3LU3FBuymSCQ8mk7R7eBKdlGOKLzWnYGLUM+y9GzntacBEY/1sFuZBPthXHH0UxUFGsuP6y/Hjp0+sD1IBBG7I96RQhosd7F6n56O9eGThqyVQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xFl8Qr6cv56JUEv6ga3dRIbwKy5Ol2loJnb+bAbycpY=; b=iPO/z/fTAUJkULdfnyclhy/VmhnKm4IUL3Cnoeono8onx/7pZt4ERAu2kFL3DTDw7GMpPfHUfd7TmOKfiG2wXP+gvl0HKb3cJBWFLH5G6J0CTDqwu9d4T/CMG0NfLBuczHOiwQwMzW1WjMfUjrJI3CFhdKzFxr+1KiL60N04qVQfEUhsnzWbwRsOWohPpL1tr3Tm9GHRO9moIFurXrrig41giC13exRGmb65IBi7DMpdt26JxfNJxreratjLRSXBJPfBLXmsRMnZVVyHWwfMXGGu2jiT+Q3OkWqsR+Rd1rsSg3IRHEhYHWv2O260guvV8rHMY92wDClh8RrtPGCJHQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cable.comcast.com; dmarc=pass action=none header.from=cable.comcast.com; dkim=pass header.d=cable.comcast.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcastcorp.onmicrosoft.com; s=selector1-comcastcorp-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xFl8Qr6cv56JUEv6ga3dRIbwKy5Ol2loJnb+bAbycpY=; b=E6eGs8pFVlEIsjGCnIyFVKaReJxLU+FmGdzeWl4oQWdz2lCNNlwTvpZezEu6o40zD0SN3uh9IkxjLg/zfp3IZYsOxUAaddNf+IckE/uLJtwsYJVXG0B5xx7hPv/biX0HQvYT6hJYcaH4ZsRzBNBXNnSJompdkAHPY3F0HZvHmxA=
Received: from MN2PR11MB3709.namprd11.prod.outlook.com (2603:10b6:208:f3::22) by SJ1PR11MB6202.namprd11.prod.outlook.com (2603:10b6:a03:45b::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6043.36; Mon, 30 Jan 2023 14:42:54 +0000
Received: from MN2PR11MB3709.namprd11.prod.outlook.com ([fe80::31ac:1509:5271:a924]) by MN2PR11MB3709.namprd11.prod.outlook.com ([fe80::31ac:1509:5271:a924%7]) with mapi id 15.20.6043.036; Mon, 30 Jan 2023 14:42:54 +0000
From: "Livingood, Jason" <Jason_Livingood@comcast.com>
To: Tim Wicinski <tjw.ietf@gmail.com>, Daniel Migault <mglt.ietf@gmail.com>
CC: Florian Obser <florian+ietf@narrans.de>, "dnsop@ietf.org" <dnsop@ietf.org>
Thread-Topic: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-validator-requirements
Thread-Index: AQHZMAaOHjhx62zCZ0WZQDeHer2/oK6t8+8AgAB85YCACE2SAA==
Date: Mon, 30 Jan 2023 14:42:54 +0000
Message-ID: <FEB57DA2-C5D7-40DC-A6F5-39E92AB43119@cable.comcast.com>
References: <CADyWQ+FwRaSdpSWXBDqCG9ZPNPiG4pGUx37PVtExbqVPr5ZfmA@mail.gmail.com> <65d26b98-e0d6-e69b-10d4-17632451cab6@nic.cz> <CADZyTk=wUydEv4X8KgHe3Mj0cZTmiaR3mjn_Z2n73U-eST-HPA@mail.gmail.com> <f397b7d4-fe4f-6000-5ce5-f2faa7b27b3e@nic.cz> <CADZyTkkdn__VhRRqwKDbNx3ymTR0KJmxoTN9aKMcox-JS=pW_A@mail.gmail.com> <m1wn7gd1ms.fsf@narrans.de> <CADZyTkkGfE2+SOwO-U40-iN3PnH2Cm7aoodDVxyp_rA-_iO8uw@mail.gmail.com> <CADZyTkmNYX4uzhYVChE8f7zQGdUPR2oD6qP7nLuVoeoStEnjJA@mail.gmail.com> <CADZyTk=sSTSB3Gio4AWvAsySnYARh_=LWb_3z2MTmYLv_hVcTw@mail.gmail.com> <CADyWQ+E3aJ67rJVAk=c_Ziv5WWTQDuq3rf7TEcMXYfqzC8mTSQ@mail.gmail.com> <CADyWQ+EG0o3Dryocz3_DhhHANTa5gjhb7s4QdtEDm3SQHJU0eQ@mail.gmail.com>
In-Reply-To: <CADyWQ+EG0o3Dryocz3_DhhHANTa5gjhb7s4QdtEDm3SQHJU0eQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.69.23011802
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR11MB3709:EE_|SJ1PR11MB6202:EE_
x-ms-office365-filtering-correlation-id: ff8af4ad-4677-4b45-22bb-08db02d0457b
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR11MB3709.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(4636009)(366004)(376002)(39860400002)(136003)(346002)(396003)(451199018)(4326008)(76116006)(41300700001)(66556008)(66476007)(66446008)(64756008)(8676002)(33656002)(66946007)(8936002)(110136005)(316002)(966005)(54906003)(5660300002)(6486002)(83380400001)(71200400001)(4001150100001)(166002)(2906002)(186003)(6512007)(478600001)(53546011)(6506007)(86362001)(66574015)(2616005)(38070700005)(82960400001)(122000001)(38100700002)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_FEB57DA2C5D740DCA6F539E92AB43119cablecomcastcom_"
MIME-Version: 1.0
X-OriginatorOrg: cable.comcast.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR11MB3709.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ff8af4ad-4677-4b45-22bb-08db02d0457b
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Jan 2023 14:42:54.4583 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 906aefe9-76a7-4f65-b82d-5ec20775d5aa
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FpMx9oiW/+vAyTtiwpmVXOYjGegNfFn3WfAEqen22tuvks54IuPhbsn2ZH82ewx3i/DMalJlSo2PJv7vRJZID2PZ8nwixW/mZVROyIZndCc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ1PR11MB6202
X-Proofpoint-ORIG-GUID: 9osMLxAbFisqi70WCUMDA9qn0pEWYPO9
X-Proofpoint-GUID: 9osMLxAbFisqi70WCUMDA9qn0pEWYPO9
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.930,Hydra:6.0.562,FMLib:17.11.122.1 definitions=2023-01-30_13,2023-01-30_01,2022-06-22_01
X-Proofpoint-Spam-Reason: safe
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/Cjbdk6XU31wlEl1zkPG17ghR8eg>
Subject: Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-validator-requirements
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Jan 2023 14:43:04 -0000

Since it is in WGLC – are you able to close out the issues in Github? (https://github.com/mglt/draft-mglt-dnsop-dnssec-validator-requirements/issues)

Jason

From: DNSOP <dnsop-bounces@ietf.org> on behalf of Tim Wicinski <tjw.ietf@gmail.com>
Date: Tuesday, January 24, 2023 at 21:55
To: Daniel Migault <mglt.ietf@gmail.com>
Cc: Florian Obser <florian+ietf@narrans.de>, dnsop <dnsop@ietf.org>
Subject: Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-validator-requirements

All

Daniel and I noticed some weird formatting issues with his -02 draft, so he's pushed out -03 which is just fixing some broken formatting.

Tim


On Tue, Jan 24, 2023 at 2:28 PM Tim Wicinski <tjw.ietf@gmail.com<mailto:tjw.ietf@gmail.com>> wrote:
Thanks Daniel.   We've been  waiting for your updated draft.

tim


On Tue, Jan 24, 2023 at 10:14 AM Daniel Migault <mglt.ietf@gmail.com<mailto:mglt.ietf@gmail.com>> wrote:
Hi,

If you think I have addressed all comments I received, if you believe that is not the case or if there are other comments, please let me know. Otherwise I expect to publish a new version by the end of the week.

Yours,
Daniel

On Fri, Jan 13, 2023 at 5:21 PM Daniel Migault <mglt.ietf@gmail.com<mailto:mglt.ietf@gmail.com>> wrote:
Hi,

I am just wondering if you have any further comments or thoughts or we declare your concerns being addressed. If you think we are fine, just let me know.

Yours,
Daniel

On Tue, Jan 3, 2023 at 7:14 PM Daniel Migault <mglt.ietf@gmail.com<mailto:mglt.ietf@gmail.com>> wrote:
Hi Vladimir and Florian,

Thanks for the comment regarding the use of 5011, to update the trust anchors. There are two situations where TAs need to be updated:
* 1) configuration so the server instances are started with the up-to-date TA.
* 2) a running resolver instance that has been started with the old TA and that needs a new TA to be considered.

1) configuration:

TA trust store is an essential element of the configuration, and the document recommends having a special process to ensure every new resolver instance starts with the  up-to-date TAs. TAs are so essential in the elaboration of trust that special care must be considered.  This means that you need a robust mechanism to update the TAs trust store.
Many DRO will not implement that process and instead rely on software updates to delegate the TA trust store update to the software vendor.
If the DRO is willing to have a *special/specific* additional TA that is not updated delegated to the software vendor, the DRO will have to put in place such a mechanism. This is a critical operation and the DRO must have strong reasons to do so and must balance the additional operational risks versus the additional benefits.
Given the essential aspect of the TA trust store, we recommend updates to be handled by an automated process (as opposed to manually being performed) BUT we also recommend the process to be manually supervised, that is with a manual confirmation.
This mechanism is likely to require a specific relation between the DRO and the TA issuer with potentially the mechanism, being out-of band. To that point 5011 is probably not the best choice as mentioned by 5011 itself in section 8.3.

2) running servers

For running resolvers, there is a need to ensure that the resolver is using the up-to-date TA. For this we recommend to follow 5011 that indicates how to automatically put significant trust into the newly published DNSKEY. On the other hand, if resolvers are retarted every days we may not need to have 5011 and monitor the roll over. I think that is the purpose of your comment.

My impression is that there were some confusions in the text where 5011 was used. When it is limited to the running resolver, I would recommend enabling 5011 when the TA signer implements 5011 in case the software is not updated in a timely manner - or at least let the DRO decide whether it is willing to enable this option as a sort of insurance - even if it is relying on the software update as a general mechanism. I think it might be a bit different from what you proposed initially, which is to leave that to DRO with DNSSEC strong expertise and recommend to only stay with software updates. If there are any strong feelings on just relying on software updates and leaving 5011 to DNSSEC experts, I am also fine to push toward such a direction.

I updated the text as follows:
* clarifying TA updates for configuration versus running instances
* clarifying 5011 dot not apply for updating configuration - at least as a primary mechanism
* emphasize that the non default model is only recommended for DRO with DNSSEC expertise
* adding that TA update for running resolver may be performed also by software update under the condition the DRO is likely to ensure a very recent release is run.
* add a recommendation that when 5011 is used, the signer needs to implement 5011 timings.

The changes can be seen there:
https://github.com/mglt/draft-mglt-dnsop-dnssec-validator-requirements/commit/dbb75b72a1806520ac77cf04424b0f6de0df29b5<https://urldefense.com/v3/__https:/github.com/mglt/draft-mglt-dnsop-dnssec-validator-requirements/commit/dbb75b72a1806520ac77cf04424b0f6de0df29b5__;!!CQl3mcHX2A!Aul7dCvIBaE6NYYl6uvsDbBfBTdsGNtNex5K8fXN24ksqkUnk3rlcNhKWt8IDbAufFeL8S48i7sAUoxtc8CpdkepUA$>

Yours,
Daniel

On Sun, Nov 27, 2022 at 7:26 AM Florian Obser <florian+ietf@narrans.de<mailto:florian%2Bietf@narrans.de>> wrote:
On 2022-11-25 12:26 -05, Daniel Migault <mglt.ietf@gmail.com<mailto:mglt.ietf@gmail.com>> wrote:
> On Wed, Nov 23, 2022 at 10:29 AM Vladimír Čunát <vladimir.cunat+ietf@nic.cz<mailto:vladimir.cunat%2Bietf@nic.cz>>
> wrote:
>> I am surprised  you would not recommend RFC 5011
>>
>> 5011 needs persistent state, a thing that resolvers/validators often don't
>> need at all otherwise (cache is safe to delete).  5011 doesn't always work,
>> so you need to combine with some fallback mechanism(s) anyway - for new
>> installations and for stale ones (missed rotation).  Root rollover has
>> happened only once in history, non-root TAs aren't that common, and 5011
>> algorithm isn't very simple, so the code can easily get some bugs without
>> anyone noticing until it's too late.
>>
>> Lots of down-sides, so I rather put the TAs into SW updates, for the root
>> TA case at least.  I'd recommend trying to avoid non-root TAs, but if I had
>> to choose, I'd put them into configuration.  Again a thing that I have to
>> provision *anyway*, so I get the occasional TA updates basically for free,
>> without needing to worry about those 5011 disadvantages.  (occasional =
>> 5011 defaults to requiring 30 days of overlap)
>>
>>
> Oh! sure for the TA. My understanding of the text is that it recommends
> 5011 for running instances, but that new instances are configured with
> up-to-date TA that in most cases are updated by software update. So yes I
> agree and will check this appears clearly.

Another issue with 5011 is that it needs cooperation from the entity
signing the zone during a KSK rollover. 7583 spells this out in section
2.2. I think Vladimír is hinting at this already, I'd say it should be
spelled out. Especially since this is aimed at non-DNSSEC-Experts as you
were saying earlier in the thread.

If a DRO unilaterally decides to put in a TA for example.com<https://urldefense.com/v3/__http:/example.com__;!!CQl3mcHX2A!Aul7dCvIBaE6NYYl6uvsDbBfBTdsGNtNex5K8fXN24ksqkUnk3rlcNhKWt8IDbAufFeL8S48i7sAUoxtc8Blxvw2SQ$> as
suggested in section 7.1.1 and using 5011 this will not end well if they
don't tell the people operating the signer. They will probably not
follow the correct timing during a KSK roll.


--
Daniel Migault
Ericsson


--
Daniel Migault
Ericsson


--
Daniel Migault
Ericsson
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org<mailto:DNSOP@ietf.org>
https://www.ietf.org/mailman/listinfo/dnsop<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/dnsop__;!!CQl3mcHX2A!Aul7dCvIBaE6NYYl6uvsDbBfBTdsGNtNex5K8fXN24ksqkUnk3rlcNhKWt8IDbAufFeL8S48i7sAUoxtc8C-8lZaGA$>