[DNSOP] Spinning out of scope on draft-...-delegation-trust...

Edward Lewis <edlewis.subscriber@cox.net> Mon, 14 April 2014 13:05 UTC

Return-Path: <edlewis.subscriber@cox.net>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 546AA1A045A for <dnsop@ietfa.amsl.com>; Mon, 14 Apr 2014 06:05:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.527
X-Spam-Level:
X-Spam-Status: No, score=0.527 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.272, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QQe6GebdKHzy for <dnsop@ietfa.amsl.com>; Mon, 14 Apr 2014 06:05:57 -0700 (PDT)
Received: from eastrmfepo203.cox.net (eastrmfepo203.cox.net [68.230.241.218]) by ietfa.amsl.com (Postfix) with ESMTP id 1C74E1A0451 for <dnsop@ietf.org>; Mon, 14 Apr 2014 06:05:56 -0700 (PDT)
Received: from eastrmimpo210 ([68.230.241.225]) by eastrmfepo203.cox.net (InterMail vM.8.01.05.15 201-2260-151-145-20131218) with ESMTP id <20140414130554.RKOM30677.eastrmfepo203.cox.net@eastrmimpo210> for <dnsop@ietf.org>; Mon, 14 Apr 2014 09:05:54 -0400
Received: from [192.168.1.110] ([68.98.142.232]) by eastrmimpo210 with cox id pp5t1n007513AP001p5toW; Mon, 14 Apr 2014 09:05:53 -0400
X-CT-Class: Clean
X-CT-Score: 0.00
X-CT-RefID: str=0001.0A020208.534BDD31.025C,ss=1,re=0.000,fgs=0
X-CT-Spam: 0
X-Authority-Analysis: v=2.0 cv=aZC/a2Ut c=1 sm=1 a=x3e9yDt9dqT69S6Zli6DPg==:17 a=eG8M399KuSQA:10 a=G8Uczd0VNMoA:10 a=N659UExz7-8A:10 a=kviXuzpPAAAA:8 a=JLQxvRVWsvOD4GfzUgwA:9 a=pILNOxqGKmIA:10 a=x3e9yDt9dqT69S6Zli6DPg==:117
X-CM-Score: 0.00
Authentication-Results: cox.net; auth=pass (PLAIN) smtp.auth=edlewis.subscriber@cox.net
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
From: Edward Lewis <edlewis.subscriber@cox.net>
In-Reply-To: <pn9G1n00K0xxhYs01n9HXo>
Date: Mon, 14 Apr 2014 09:05:52 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <0BC982D8-2AC9-4699-B4BE-F7595F2703D2@cox.net>
References: <533C6007.4070600@gmail.com> <1721093A-28F6-44F1-A6E1-87F43CE02879@frobbit.se> <CAHw9_iJ_t==kw2UBGFdyJ+RHdfZzOcPsKC=X2Mp691NdXNsAcA@mail.gmail.com> <75DFBECC-B6E8-4BED-A27B-81FB1F317541@frobbit.se> <pn9G1n00K0xxhYs01n9HXo>
To: DNSOP WG <dnsop@ietf.org>
X-Mailer: Apple Mail (2.1874)
Archived-At: http://mailarchive.ietf.org/arch/msg/dnsop/M_dkIOIZYUe2M5UeBCZuS1l-u7E
Cc: Edward Lewis <edlewis.subscriber@cox.net>
Subject: [DNSOP] Spinning out of scope on draft-...-delegation-trust...
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Apr 2014 13:05:59 -0000

Perhaps again I’ll be labelled as a potential troll for this.  Again, using an example for a non-specific comment...

On Apr 14, 2014, at 7:09, one person wrote:

> At 10-04-14 21:54, someone else:
> 
>> We already have too many parents that have I do not know how many
>> stupid rules for ...
> 
> While I agree with you some (TLD) parents are sometimes too pedantic,

It is not in scope for the WG to judge the requirements which various DNS registries (TLD and otherwise) have signed up to meet.  It would be far more constructive to accept actual, demonstrated needs than such for a tech-utopia.  One of the things I learned when comparing DNSSEC operations to protocol engineering was that operators face a wide range of environments.  If the IETF is to produce protocols that are universally appealing, then the protocol has to pander - or be so good that it results in “simplifying” the number of different environments.  The IETF desires greater operator involvement, you don’t get that by complaining about the operators’ use cases.

Process-wise I’m surprised to see a new version come out before the end of the last call.  There was a draft a few years ago that I was following.  Each time I’d redline half a copy I’d learn that the one I was reading had been replaced by the next.  That wasn’t a last call time, so it was annoying.  But this time there is a last call and I would think the editors should wait for any stragglers.  (This time I did respond earlier.)

The rest of this I may have said before.  This draft (the CDS/CDNSKEY) describes an interchange from essential the key manager of the child zone and the provisioning system of the parent zone.  The communications medium is one direction, no feedback possible, but the client (in the sense that one end takes the initiative) can detect changes made by the server.

This is like (analogy time) one person who can speak to another and see the result, but there’s no other communication path. (Unrelated, this also applies to praying.)  Staying in-band only, the only way to make this work is to involve relative time (time-outs).

I do not to intend to say this is dead when I say: this cannot scale (unquantifed).  I mean that, in the sense we give up on scaling, we can define a protocol.

I think it is silly to burn two RR types to communicate the same thing.  You’re inviting debate on testing and handling the two being out of sync.

I don’t have a problem with leaving the records in as long as the parent is supposed to have the record represented in its zone - but only because I’m willing to sacrifice scaling.  This causes less state to be maintained (but is does create a greater load on a parent system that is polling).

I think that all use of the communications medium has to adhere to the basic rules of security.    Here that being ZSK signed - knowing that the validation engine does not inspect the SEP bit - but that when considering this is a client key manager to parent provisioning protocol (not DNS), the extra signature should be there.  (Come to think of it, the ZSK RRSIG is a redundant, but don’t expect cache-protecting validators to respect the SEP bit.)

Please take steps to simplify the protocol and discussion.  Giving up on scaling can make this a tool that some operators can use - and perhaps on a small scale within an organization.  It would be interesting to see is a general purpose DNS implementation will try this to manage a set of zones (as opposed to managing zones in isolation).

DNSSEC is clumsy.  It needs a solution here.