Re: [DNSOP] [Ext] DNSSEC Strict Mode

Paul Wouters <paul@nohats.ca> Wed, 24 February 2021 16:56 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47AC33A1800 for <dnsop@ietfa.amsl.com>; Wed, 24 Feb 2021 08:56:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tb3lbq3S-xEu for <dnsop@ietfa.amsl.com>; Wed, 24 Feb 2021 08:56:11 -0800 (PST)
Received: from mx.nohats.ca (mx.nohats.ca [193.110.157.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E8DCD3A1823 for <dnsop@ietf.org>; Wed, 24 Feb 2021 08:55:46 -0800 (PST)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 4Dm29X07htz39k; Wed, 24 Feb 2021 17:55:44 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1614185744; bh=fb6nSgougE+c6s/UYe+BzYe1SnKD0AADv3AFXw4OZLw=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=ATWMYRfqqSMTrEKyodCbUwnFCGg7in9sAmKW4uisgnZ3UDvV90ksH3UUmnqBeRZ4P w1dPKYKt3ybS/QhNtbd+exazIvLg7uOSmNcUhcZwCWSlLMnZJ15wUKxwDw4V9rAnMm i4VT2AxUfcoZknKfeAUHX9mCjwINvRoJyWNM0ooA=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id FuJtwGIputtN; Wed, 24 Feb 2021 17:55:42 +0100 (CET)
Received: from bofh.nohats.ca (bofh.nohats.ca [193.110.157.194]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Wed, 24 Feb 2021 17:55:42 +0100 (CET)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id A51376029BA0; Wed, 24 Feb 2021 11:55:40 -0500 (EST)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 9C77B66B1E; Wed, 24 Feb 2021 11:55:40 -0500 (EST)
Date: Wed, 24 Feb 2021 11:55:40 -0500
From: Paul Wouters <paul@nohats.ca>
To: Ben Schwartz <bemasc=40google.com@dmarc.ietf.org>
cc: dnsop <dnsop@ietf.org>
In-Reply-To: <CAHbrMsCSSJTaV1-GZTC2AwbzDkLvCQ=YA+y1L0K2UwHi4KUe2A@mail.gmail.com>
Message-ID: <3ed12563-8ee8-f921-b824-3f1096fe9547@nohats.ca>
References: <CAHbrMsBeCiZ-31hjKvet2UPDPFhdVYpgqR6Kw-WWz1ERgeSFoQ@mail.gmail.com> <7BB07063-2CA3-4283-8866-2B19A7AAA9A0@icann.org> <45e3c45-d324-8124-5dae-98acba9dd7cb@watson.org> <CAHbrMsBsG8OnXOXwAFY5eNf-0viQ_e5nKKhp1XVpnpMkGW1L-Q@mail.gmail.com> <CAH1iCipjp2Cixvfi4XKUoXmv94=rpB96g8v568UvMZdkJysubA@mail.gmail.com> <CAHbrMsCSSJTaV1-GZTC2AwbzDkLvCQ=YA+y1L0K2UwHi4KUe2A@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/GOkzh23vQSsTCPrP7e07nfUBWFc>
Subject: Re: [DNSOP] [Ext] DNSSEC Strict Mode
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Feb 2021 16:56:14 -0000

On Wed, 24 Feb 2021, Ben Schwartz wrote:

> On Tue, Feb 23, 2021 at 11:05 PM Brian Dickson <brian.peter.dickson@gmail.com> wrote:
> ...
>       My perspective is that most zone operators will only want to deploy a single algorithm, and improving the rate at which new
>       algorithms are feasible to be adopted should be an explicit goal.
> 
> I don't think this is realistic.  Consider, for example, the deprecation of TLS 1.0 [1] 15 years after it was superseded by TLS 1.1.  I
> see no reason to expect that DNSSEC validator update cycles will be faster.

I think there are two things confused here. Obsoleting an algorithm from
a single zone using migration to a newer algorithm, and exorcising an
old algorithm from the planet.

The first is clearly defined on how it is done. It is also known that if
the losing Registrar is uncooperative, things will be a bit wonky during
the transfer. That can only be fixed by contractual obligations, not
technology.

> Given the experience with TLS, I don't think we can reasonably assume that "clients" are on a much faster update cycle.

I don't see the relevance of this at all. The "strict mode" seems to
be originating from a believe that having two algorithms in the zone,
either briefly during migration, or permanently to satisfy multiple
government requirements, is a problem. I have not been convinced there
is a problem that this draft would remedy.

> I think, at core, there's a philosophical question here.  Do we intend for DNSSEC to actually be used for critical security in open
> systems?  If so, it will have to work like TLS: a 1% failure rate will be utterly intolerable, so servers will have to retain support
> for the 99th percentile of awful ancient clients.

No, because the failure mode of no longer trusting obsoleted DNSSEC
algorithms is to treat them as "unsigned". So there is no failure
rate of any percentage (other than implementation errors, such as
returning ServFail when the system doesn't allow SHA1, instead of
marking SHA1 as untrusted and returning data without the AD bit,
which has happened recently in fedora with knot for example)

Paul