Re: [DNSOP] Comment on Ranking data

Willem Toorop <willem@nlnetlabs.nl> Fri, 05 April 2024 14:04 UTC

Return-Path: <willem@nlnetlabs.nl>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 885D7C1D4A83 for <dnsop@ietfa.amsl.com>; Fri, 5 Apr 2024 07:04:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.097
X-Spam-Level:
X-Spam-Status: No, score=-7.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nlnetlabs.nl
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QrCJCdsc2sx0 for <dnsop@ietfa.amsl.com>; Fri, 5 Apr 2024 07:04:48 -0700 (PDT)
Received: from mout-b-110.mailbox.org (mout-b-110.mailbox.org [IPv6:2001:67c:2050:102:465::110]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A396AC18DBB9 for <dnsop@ietf.org>; Fri, 5 Apr 2024 07:04:45 -0700 (PDT)
Received: from smtp202.mailbox.org (smtp202.mailbox.org [IPv6:2001:67c:2050:b231:465::202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-b-110.mailbox.org (Postfix) with ESMTPS id 4VB0br1lwlz9vWm; Fri, 5 Apr 2024 16:04:40 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nlnetlabs.nl; s=MBO0001; t=1712325880; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=rUmyYMTPKH7KUHKF6LN+0yOIta+A3qJfgWIRJUpClmw=; b=1fb4wNNqOBszD4DyxJZd+xRB59HRtoFJr3Aw2qPVgCgFk2628NE0ucQjlOewf0twPf2n/e MZZa6SA/9C8beHVb2lpHqhzHPGARIZlGybgD0fGu8UXWj/SkD45fSPVb8AXREmxcrfxX+Z 0EXETp3ruuFwLtFDPMv06g4RXiiSElIGFVDqWlePkMsEpHNey7mRYOaLUDeMPVJddeFRgE iEGBH2IFhcvTXPL9BqkxybJkdEy8Tw/G0oUigw99/AAzpBApdk4DPqlPaRlNiMXwpi15h1 +bMIAHF/BguaRKDtIxhIDxYlYkuzulG8C832nFhl4Kh8WkzuQ9Iqpds3fpT87Q==
Message-ID: <733d93c0-0b20-4c26-8bc1-6f60190c12e0@nlnetlabs.nl>
Date: Fri, 05 Apr 2024 16:04:38 +0200
MIME-Version: 1.0
To: Kazunori Fujiwara <fujiwara@jprs.co.jp>, dnsop@ietf.org
References: <20240405.162847.2106826176991704565.fujiwara@jprs.co.jp>
Content-Language: en-US
From: Willem Toorop <willem@nlnetlabs.nl>
Autocrypt: addr=willem@nlnetlabs.nl; keydata= xsFNBE1s81EBEACuJzGgccrmYEAzHc//vBq66gH7orM0GtKfQZHh4uR1FMxZXl07WevUYNuB ywTpinU9rpY1Q3S4w6QgNklgpsaHXmbOpyFjJ8FpllV8TRPiXiNrNxTpMnlb6InoszopX69t kBVHTP6cJkNgPx6R4BM0ARqEGQmOL8mAcoWyGVzbsamuGRaia54zs/kc3i9yiqEzRkoQmfwr 7sr49n7gOpmaqXvonOSiUvgEziep77emMcqVa/qZxR1r7KUq85qTNTqsQwl2cQdKS7WwOeuG 6ZIJmJ1bakriKzLBYF5xIHKSYJW0ZA20tNFrVKgTkEjiXvAJh4HlJEIi35tqa/IzWUJSc1ai nhBjxbwSl8BRq5aaPgwB+xXiDqY6BrQW1slvl5TF2A6Xr7JJ0rkH3EZgXxABAZ3WJ3RLwq1z 8jnNYj+UW/mSLsbOtgfOiBhFUXMZneHvVVvz6F6XAtyrejDl5sD2gnzm1VDfK6T6bvLtR7zr kWre0lpycDmgmUKgaEiXzfLvwT9RaWk8GdqU2GG+QOiwf+hT0peDieuodjMr59sUbx7GqVe/ 45rJBRSx+HCl2Jm7Th2Xr0kpStCd7ebVoEq9wpMyu+dM9wOTtibA9P3+9u4rAdimpAdQxEbh WbRNCng2EVhThbqRK3cTZLbtqKaWgAJqa/IQVpL9b5ps8Z4JVQARAQABzSNXaWxsZW0gVG9v cm9wIDx3aWxsZW1AbmxuZXRsYWJzLm5sPsLBjwQTAQIAOQIbIwYLCQgHAwIGFQgCCQoLBBYC AwECHgECF4AWIQTcNO5dskF7zBUeUQDl+PghL3ekmAUCXgm/sAAKCRDl+PghL3ekmLEOD/0W 50GFW5OfS/aZ3k7BfoBgSYEpgs3wUPxFCvkw4LsREcSLSdE9jFfIWh7sGiS1yP/kQGZr/yUn R58nAjGr9exyB90VsgEQqUlbks5nCqQZZrMcZRgHCB0IitYZqewBfl/GON/mqApTEQXgTJS7 0wi66828X7AyCA6kPgUfDl5V/zOE0GKm8ejNtKIIEnscNHUwpNpwTF/EegU6Fo6Ih4/bMvpg RytCgIi1tdmWETeyKjL7ASIGZL0kZkTfhQZV+V5NgToDnMFxPyndvv57Fip2mUSPkAAWRhgq ApL797C/KMpc1mCK43g6gD21KP01e5yz1BnSc09NJ7huLHYDFQKRBCfbUZuJe0KSibpRgmNE YaWT1sxByxqPbTmWDgvRXy4TGhkPm21wLqRACVmymd/KiFHdaB5NzWzrC5C0eWSCs2oziDuy Szf8/71sI8pNwjqBIp/8zA8ZI9AZrCkgzeuEeyKBcjW8O83iJkx2S9CC0KBrryvTi2QwitHX +WxJnGlOFNLQG4fp9/6EDuPUEKgmbqaiooCgDyU4aHYPFpUrHTc8aajahJ29wcXkWkIrm6rB mWzT/+05jyrrMl0HoSmZIqhwgtGHrWw+bnCxBZV2JOynDE0n+z4zh8N4rQ1vvCXu36CcR/62 YFTliLVKowkFtqO+om6DO8MBws/FoYnw/M7BTQRNbPNRARAApOziFbP3grro+2weP9wG0eYk InH0Gwc/x6hSN3iIFHtxaBNOC3U8YI0HMI8Yi5SJrzTx2rG7Uvw5aNCnBcMKNeoCJufSYIkx E41WzPEkqSNidkYoY6jxyDs6ZAFnIR3qqt/FV/93Acux1BMlnPP1sY7G5hUAC7Src8dbmAYV z6mnd43jurMYzESOygROP9yVrGOqKyiEbXf+GQ/o+8OgPs4504Z1BA/xvgZEEPqtn8Wowu/g LzTMOfMIfWsuk0ZCmV/VqfLTpZMCwMvh/qAQAsfrZMjE5fhTtbF668fHIpc4C4357H8y8XZr PXbhhtxYLu3V2pVbfKzbTMpp6Z6bJdIrFXpoyfgoFwkXcJ0zWgAFkPK+Iv16XtD/JDKWlkLo SXhCjBo8g4C7M50hzpy4zo9Na8ECtwpWBCFZ8myF94WZ+TGnP+FZz0rjTIKOZv6E9kivdFtd KxAi1RSQGo5Iwc2ugiBf4hpYyrd7vIwd0yqUqvSVTnaV8Ft8QKOV4H807grdIYkE/NOAu3N7 4uxbFIlChAxYq/ohLBCtbeuyZSOqBA2tIZE5fetHLw2+7Otq+zhrcWZ1SkchbDYp9jYzoCxf 0cEW5GyKaCoWNCblVupcDs20ckKcDVG+peWD+InnD4MSUeizHCMdL5Rt6MMaZVD4hOqWHf33 Wiw+NmrUjLUAEQEAAcLBdgQYAQIAIAIbDBYhBNw07l2yQXvMFR5RAOX4+CEvd6SYBQJeCb+w AAoJEOX4+CEvd6SYnQwQAKUN8F1N3G5rRgdyorRjX9+NEvZSn6sFAZZsngkO1fWny3z9PoGS 9n3OrKdqO2U9NdwvdWELyuFIv+3spd6Mn6DSYLSfqjg9i+YGC3AiQNoRR+VX1FWQ/TatFLpq +o1Lby04sWABhKic6pCxeCPXY2CzE7DSfUtMwBsPheK4JhpQNt6U4+7x24QIHbxcivpTq59V 7fZB8JpUgoN1k7DEAes9MEd1iOKM6ZucKgx1Q3elaS8DjRW7nJl+U9eaufa3BVt3+J3eL3Lr Q6ep4IDNEkQJoOwJytBzVQJcGkE0pdkSjO4jEocsNcQRVTahOazuYVUyYezqHDxUltAJqBux jnyyR2zZayDCoX82+UI0jtubwz1rFMqCdzID8n3PPn0AlmcHAsSNnCv4mIhI+tofc6bndNcu tJZMjoYA1MmEhgx1TStQptAQP/ZRNwV2TZFR20gwQWV1p/5R/GTlP3olNdC9Ojy0AmFMBLZb x7PI75HVJ2wtF8aq7vo2iltEM1k1zhl0Su5Ov/TEBq6JhqD5UzpqJPV6tTz76EEXfx58AxFh fVkytieLXCPI0kQTWfenexd9DUANCoa/TfYIEOi7YHJGYx/DpjfSPfThDxTGfWt0WaMILpOq +YTFA468fQW5xgeVvJlBNry4dT1XXgVbe/H+CN7q7C0Y1Ng11VOfO65X
In-Reply-To: <20240405.162847.2106826176991704565.fujiwara@jprs.co.jp>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------pqhFlAhE3AwLX8pJPTw3yMcP"
X-Rspamd-Queue-Id: 4VB0br1lwlz9vWm
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/GEhdCbncZUK7wB4hZSoWNVC6K0M>
Subject: Re: [DNSOP] Comment on Ranking data
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Apr 2024 14:04:53 -0000

Thank you Fujiwara-san,

I agree that some data should be discarded depending on use case.

I also think the draft should be more explicit on what data is actually 
meant in those ranks (i.e. referral responses with "B: Data from the 
authority section of a non-authoritative answer, Additional information 
from non-authoritative answers." etc.) and I also agree that we should 
remove the ranks which are currently meaningless and would not occur in 
practice (like the BB ranks in the list). I furthermore agree with your 
recommendation for DNS software to discard all data which is not in the 
list.

I am still contemplating whether or not the list is too generalized with 
respect to roles or functions in the DNS ecosystem (Authoritative, 
Recursive Resolver, Forwarder & Stub). Different functions get the data 
from different places, but since software may be a mix of those 
different functions, it does make sense to me to put an order to the 
preference of the data depending on where it came from in a single list.

Even with an authoritative only name server without cache, you could 
still say that data acquired over a zone transfer should be preferred 
over data read from a zone file (that may be just loaded to initialize a 
secondary name server). The other ranks in the list would then simply be 
inapplicable.

I acknowledge that it is better to accept DNSSEC validated secure data 
only when it makes sense in the context of the work a DNS software is 
doing instead of blindly trusting validated data. I will rephrase that 
in the draft. But that aside, why would it be bad to blindly trust 
DNSSEC validated secure data? What do others think?

Op 05-04-2024 om 09:28 schreef Kazunori Fujiwara:
> dnsop WG,
>
> RFC 2181 Section 5.4.1 Ranking data should be obsoleted.
> The "Raning data" draft (draft-toorop-dnsop-ranking-dns-data-00)
> defines each data's ranking and importance.
> However, some of the data should be discarded depending on the use cases.
>
> We have four DNS functions: Authoritative, Recursive Resolver, Forwarder, Stub.
>
> Some implementations have multiple functions.  For example, some
> recursive resolvers have "split-holizon" and "local zones" functions.
>
> Both "split-holizen" and "local zones" can be treated as a function
> where descendants of a specified domain name behave as an authoritative
> server rather than a recursive server.
>
> Authoritative (only) servers:
>
>    Authoritative-only servers SHOULD answer zone data from a
>    single source (for example, zone file, zone transfer, other database),
>    so rankings SHOULD not be used to replace data.
>
>    "BBB: Occluded data" SHOULD be discarded.
>          (at least when responding to queries)
>
> Recursive (only) resolvers:
>
>    They don't have "AAA: zone file" / "AA: Data from a zone transfer".
>
>    "CCC: Names and addresses for the root servers from a hints file"
>     or "CC: built into resolver software" SHOULD be used for the priming only.
>
>    The data that can be returned to the stub resolver as a name
>    resolution result is "A: The authoritative data included in the answer
>    section of an authoritative reply" only.
>
>    "A-: Data from the authority section of an authoritative answer."
>       NXDOMAIN response contains a SOA RR in the autority section.
>       Some authoritative servers add NS RRSet in the authority section.
>       I want to discard the NS RR set.
>       If you want it, send NS queries (as described in the ns-revalidation draft).
>
>    "BB: Data from the answer section of a non-authoritative answer"
>        discard it.
>
>    "BB: non-authoritative data from the answer section of authoritative answers"
>        discard it.
>
>    "B: Additional information from an authoritative answer"
>        If those data correspond to type MX, HTTPS/SVCB, or SRV responses,
>        resolvers can decide based on local policy.
>
>    "B: Data from the authority section of a non-authoritative answer,
>        Additional information from non-authoritative answers."
>        This is a referral response.
>
>      A non-authoritative response from a server with administrative
>      authority for a certain name that has NS RRSet in the authority
>      section and Glue data in the additional section is a delegated
>      response, and is used only for name resolution and not for
>      responding to stub resolvers.
>      The rank of the referral response is "A", I think.
>
>    Any other response may be an attack and should be discarded.
>
>    "AAA: all data that is verifiable DNSSEC secure regardless off were it came from"
>      I don't like this rank.
>      I like to use DNSSEC validation to decide
>        whether to use "Additional information",
>      but I don't like to blindly trust data
>        that has been successfully validated.
>
>    I believe many recursive resolver implementations have already
>    discarded unnecessary responses.
>
> Stub resolvers: accept all responses from the recursive resolver.
>
> --
> Kazunori Fujiwara, JPRS <fujiwara@jprs.co.jp>
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop