[DNSOP]Re: Intdir telechat review of draft-ietf-dnsop-dnssec-bootstrapping-08

Benson Muite <benson_muite@emailplus.org> Sat, 18 May 2024 09:31 UTC

Return-Path: <benson_muite@emailplus.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D79E3C14CE5D; Sat, 18 May 2024 02:31:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.74
X-Spam-Level:
X-Spam-Status: No, score=-4.74 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-1.944, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=emailplus.org header.b="VAPcV0Bh"; dkim=pass (2048-bit key) header.d=messagingengine.com header.b="N/TJoIKi"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Oq4rjM3KGYk1; Sat, 18 May 2024 02:31:13 -0700 (PDT)
Received: from fhigh8-smtp.messagingengine.com (fhigh8-smtp.messagingengine.com [103.168.172.159]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 844DEC14F68E; Sat, 18 May 2024 02:31:13 -0700 (PDT)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.48]) by mailfhigh.nyi.internal (Postfix) with ESMTP id 99A931140162; Sat, 18 May 2024 05:31:12 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute7.internal (MEProxy); Sat, 18 May 2024 05:31:12 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=emailplus.org; h=cc:cc:content-transfer-encoding:content-type:content-type :date:date:from:from:in-reply-to:in-reply-to:message-id :mime-version:references:reply-to:subject:subject:to:to; s=fm1; t=1716024672; x=1716111072; bh=EV3uVbgw19I9yprvYf+TfLVHw5PIXUDM ARn3mlu6ZtI=; b=VAPcV0Bh6b52qQIHFNIFySe4S98/UHvaz/sJfMwnR+kMxCPu Z6UbN/RB4UqV9U9vUF5LHf+SA3AQGmLTJ6NW/8lM5yAe/OFWAeL4l5wjTt0m57wx qUpVIhKTAUUjyOhjabuq6x5GVGOCH5wUZlcyp5GZ+k6Vc+XB4oK2PfLvqI0JfAQj EZuEDmJVljeojcD7Xz12493LiseBWy3Lkvdk+dUG4V/zMbSWFngr8bZMKNFNQ+Me lJ74+MbfaJJ8rTsiNF7aewanYAjzGVYpq0Uz4bWGs8008FNGWex6PBZ7vmDkJO4e dPDokqO6bOsQmcQ0fuIO1BA4+lG2097xjHpqgw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-transfer-encoding :content-type:content-type:date:date:feedback-id:feedback-id :from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm1; t=1716024672; x= 1716111072; bh=EV3uVbgw19I9yprvYf+TfLVHw5PIXUDMARn3mlu6ZtI=; b=N /TJoIKiXll8VjFlBq+0NdksNs7yu+5Gno+4f01L2VoNrp1Rgs3BrTst4aR15kr+E 6PwfBdNfH1kOAZtgn8SBDW9Q/gL8xSMkSe7hYuo7uaXiwU//F0t3Cob/W+d1McxL w41hun+v5pTfhDaredVMmvFZjGHnqn0N/2BszYANAE7nD/ppN0ziQpDn0czR9TIz ZVhgQe4fKFV4Dskygb7g66023YlL5zcxFLnXdWnbM7Ny3re2/y0ki4ulqh+ZrnDf iTyhNQTzNFWC3XBxVj4dQrJJL4y80s7/lCqgkGzIyj1qX/DmDpfbg+SyySEQP2Hc HLokUvyMVR7qj1/pLGM6g==
X-ME-Sender: <xms:YHVIZpKkZBsWWubJ1PqH3qwSLuyt6XnsyUde9vQhrsNHq3aLuXyl8g> <xme:YHVIZlJaQ7ALHQYb3rH-rzXAlj1WpK7ftYzz6-XrSLuIibrjean6fYmi3a8DnkZ76 n7b0V2S1CCmHlRn>
X-ME-Received: <xmr:YHVIZht5y-a_hb9Kb74RUzV-ajauc7xC6HJCLzD02JXC21E8ij76ymdIFA6MOcmCznY>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvledrvdehiedgudeiucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne cujfgurhepkfffgggfvfevfhfhufgjtgfgsehtjeertddtfeejnecuhfhrohhmpeeuvghn shhonhcuofhuihhtvgcuoegsvghnshhonhgpmhhuihhtvgesvghmrghilhhplhhushdroh hrgheqnecuggftrfgrthhtvghrnhepffeileegieelueekjeeitdfgtddvuedtvdeuveff iedvledujedvvedtffdtgffgnecuffhomhgrihhnpehivghtfhdrohhrghdpghhithhhuh gsrdgtohhmnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhho mhepsggvnhhsohhnpghmuhhithgvsegvmhgrihhlphhluhhsrdhorhhg
X-ME-Proxy: <xmx:YHVIZqY-OGcMp3Do1D6Fu2Pi6zOJsn0os9e4LG1XBMXFaw36OMH82A> <xmx:YHVIZgaVh2wi-JiCHxjG_ucyd4Cw7k8evXcJ4ui4KBW-se4-VOkJaQ> <xmx:YHVIZuBzDBw7M9c3lMpcsMRn3pjWuqLeRo32nPEbnIcIXdjeVgBDDA> <xmx:YHVIZuYnhqZfmXTcfyc8y-0aPeK43p9UIhX1LX1uOuo8-_xLAvq25w> <xmx:YHVIZvxOknJNWkEjq6AsaWbz6ipG5kBiRj7AfQs2HHh6PFmMA7qvIT4B>
Feedback-ID: ic1e8415a:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Sat, 18 May 2024 05:31:10 -0400 (EDT)
Message-ID: <d500ff45-0ab1-7852-7789-9a55192dd1b4@emailplus.org>
Date: Sat, 18 May 2024 12:31:06 +0300
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.15.1
Content-Language: en-US
To: Peter Thomassen <peter@desec.io>, int-dir@ietf.org
References: <171553939119.13322.12950960334297290558@ietfa.amsl.com> <cc26f1c5-2628-4e5f-a04e-f869bf43caf0@desec.io>
From: Benson Muite <benson_muite@emailplus.org>
In-Reply-To: <cc26f1c5-2628-4e5f-a04e-f869bf43caf0@desec.io>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Message-ID-Hash: S42XKAHHZ5XKHSAEHKFPJRIT5FHLW4WW
X-Message-ID-Hash: S42XKAHHZ5XKHSAEHKFPJRIT5FHLW4WW
X-MailFrom: benson_muite@emailplus.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: dnsop@ietf.org, draft-ietf-dnsop-dnssec-bootstrapping.all@ietf.org, last-call@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [DNSOP]Re: Intdir telechat review of draft-ietf-dnsop-dnssec-bootstrapping-08
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/G-WbSbw6XoiRSPw4W_6JCURK7Cw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

Hi Peter,

Thanks for addressing the concerns and educating me.

On 15/05/2024 15.23, Peter Thomassen wrote:
> Hi Benson,
> 
> Thank you for your review.
> 
> On 5/12/24 20:43, Benson Muite via Datatracker wrote:
>> Reviewer: Benson Muite
>> Review result: Ready with Nits
>>
>> I am an assigned INT directorate reviewer for
>> <draft-ietf-dnsop-dnssec-bootstrapping-08.txt>. These comments were
>> written
>> primarily for the benefit of the Internet Area Directors. Document
>> editors and
>> shepherd(s) should treat these comments just like they would treat
>> comments
>> from any other IETF contributors and resolve them along with any other
>> Last
>> Call comments that have been received. For more details on the INT
>> Directorate,
>> see https://datatracker.ietf.org/group/intdir/about/ .
>>
>> Based on my review, if I was on the IESG I would ballot this document
>> as YES.
>>
>> SUMMARY:
>> The draft proposes a mechanism to enable automated initial validation
>> of child
>> subdomain CDS/CDNSKEY records when an out of balliwick name server is
>> available
>> and when the child zone name is not too long.
>>
>> SUGGESTIONS FOR IMPROVEMENT:
> 
> Incorporated changes will show up in the -09 revision (will be published
> later today) and are part of this PR:
> https://github.com/desec-io/draft-ietf-dnsop-dnssec-bootstrapping/pull/15
> 
>> 1. May want to minimize number of acronyms in the abstract, for
>> example DS
>> (Delegation Signer), CDS (Child DS) and CDNSKEY (Child Domain Name System
>> public key)
> 
> Those terms are identifiers for DNS record types, rather than acronyms.
> As a salient example, the TLSA record type "does not stand for anything"
> (RFC 6698 Section 1.2).
> 
> As such, they are typically not expanded in DNS-related RFCs (see for,
> for example, RFC 8078 whose abstract uses DS and DNSKEY as well without
> expansion).

Ok.

> 
>> 2. Too long is not specified though is mentioned in section 4.4 -
>> could more details be given
> 
> We've added a reference to RFC 1035 Section 3.1 which defines these
> length requirements.

Thanks.

> 
>> and do deprecated out of band methods need to be
>> used in such cases?
> 
> The document deprecates automatic DNSSEC bootstrapping without
> authentication. If it can't be done automatically with authentication,
> one can set up DS records manually (by interacting with the parent
> operator).
> 
> To do it securely, an out of band channel may be needed (e.g., via the
> registrar's web interface). One does not have to use a deprecated
> (insecure) automated method.

Ok.

> 
>> Any estimates on how often too long names might occur?
> I'm not aware of any numbers. It essentially happens when the _dsboot
> and _signal labels together with the domain name and longest nameserver
> hostname exceed 255 octets.
> 
> As both nameserver names and delegated domain names are usually shorter
> than ~120 octets, this is expected to happen very rarely in practice. We
> don't have numbers, unfortunately, but I wouldn't be surprised if the
> only real examples are experiments set up to prove the point.
> 

Ok.

>> 3.
>> Will there be a follow on informational best practice document based on
>> operational experiences?
> Saying this is not in scope for the spec document, but yes, various
> people (including some ICANN staff) have expressed interest in writing
> up best practices / operational experience on DNSSEC automation,
> including (but not limited to) the topic of bootstrapping.
>

Great.

> Thanks,
> Peter
>