Re: [DNSOP] Comment on section 2 of draft-ietf-dnsop-nxdomain-cut-05.txt

Shumon Huque <shuque@gmail.com> Tue, 27 September 2016 19:33 UTC

Return-Path: <shuque@gmail.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7EA112B202 for <dnsop@ietfa.amsl.com>; Tue, 27 Sep 2016 12:33:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ru9IjqL4dpaA for <dnsop@ietfa.amsl.com>; Tue, 27 Sep 2016 12:33:29 -0700 (PDT)
Received: from mail-wm0-x232.google.com (mail-wm0-x232.google.com [IPv6:2a00:1450:400c:c09::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 57F2B12B014 for <dnsop@ietf.org>; Tue, 27 Sep 2016 12:33:29 -0700 (PDT)
Received: by mail-wm0-x232.google.com with SMTP id l132so195125482wmf.0 for <dnsop@ietf.org>; Tue, 27 Sep 2016 12:33:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=tF3yVf+FxCbipdbReH1NRla2LVvsMCxjxgZ/jWVbohg=; b=mPpCsuL9Ltw3g4IbSQKgREMq6FEc/fVEtsuzUcF220MUyKCnBP1H/ioFHyNbHAFhbv YY1ShRSqAOd42qOUqglo1Y7oFDp0N0jCNGIY6FOHzgu2/5G94ukjd+z9iydVETkXaxVv F0cKU05bO1vNyClkt39XQ8i1HWXDISQ7LPnFNq4Umi9QUyRpZmsYaUXNaw2ULFMIOag+ hLedjfwzsKKEAFRG2Q+Kajam2wddaqISbVvNkV4DoiE9om8j7b+1bMYN1WdUJH82mT7m eLNfKt/NnY5MlPyxXZRoBOJZa2ocKcn80Qf7oxwXrlATMmeRxyamGWu60c0vy0Go0bH5 P3sg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=tF3yVf+FxCbipdbReH1NRla2LVvsMCxjxgZ/jWVbohg=; b=U3jCAZcejfoGcYoY5LIrz1yQ050v7Z58F+/9fZGg21a3gtF4nzRpOSoTCbKxlfuP9C C1HC2JCiYRhiXAST+FkcuhggBNqrd1rabXxI+LfsarauWtssV+BFzjpfXlnK99aJDJlp hkvq+nLa/lUiM+BqSr1SiQftQ9vTl/ha1MR3yYnz1B6wRkK1s2j9kvPbxvhOk9i7ikQk zP39wLy+ZGmFaw3elZMf7CLDHOODBxZ5Eqizf6qgu4J5tDoUmZIxTs/n9B2xEsdu006+ ++PpdnN3bJykDe2hNlLxAtEOaFAg9SKfN0L97huzspXqqhn60/W1m8wK1exRvXyfdpcH zLBw==
X-Gm-Message-State: AE9vXwNVTY8vK7R0aOu/EpXA18WgsJP+R2h9DcSkUdm4U6Z0KIV0dVN0vdxaZkwTw0Jw+WTlzTOYnsFREDWYNw==
X-Received: by 10.194.68.8 with SMTP id r8mr23932536wjt.190.1475004807772; Tue, 27 Sep 2016 12:33:27 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.194.165.168 with HTTP; Tue, 27 Sep 2016 12:33:26 -0700 (PDT)
In-Reply-To: <CAHPuVdVV_fqaiMuLuFKudFaT=FXTKE57+aYuf_HS+x-0OkOk0g@mail.gmail.com>
References: <29B4A430-80C7-44C8-A6FA-54A1560D3FD7@icann.org> <20160927004928.22EAE5515C31@rock.dv.isc.org> <89B42AE2-0377-42A4-B943-E65C52B7CB55@icann.org> <CAHPuVdVneekn9NL_u72KFk7aFQ8uWLkUDqAaW9c46SG-KDVuMg@mail.gmail.com> <d1da7014063b4525a25502408d9fbdc1@SC58MEXGP032.CORP.CHARTERCOM.com> <CAHPuVdVV_fqaiMuLuFKudFaT=FXTKE57+aYuf_HS+x-0OkOk0g@mail.gmail.com>
From: Shumon Huque <shuque@gmail.com>
Date: Tue, 27 Sep 2016 15:33:26 -0400
Message-ID: <CAHPuVdVneefu_u89bsQQJszd+wGMauGDFiB7qj7nyrJ_1h3z9A@mail.gmail.com>
To: "White, Andrew" <Andrew.White2@charter.com>
Content-Type: multipart/alternative; boundary="047d7bf0db909c0044053d8251ca"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/QOB1YWcOCpAcfNP1eE6SyDdGRas>
Cc: Edward Lewis <edward.lewis@icann.org>, "dnsop@ietf.org" <dnsop@ietf.org>
Subject: Re: [DNSOP] Comment on section 2 of draft-ietf-dnsop-nxdomain-cut-05.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Sep 2016 19:33:32 -0000

On Tue, Sep 27, 2016 at 3:10 PM, Shumon Huque <shuque@gmail.com> wrote:

> On Tue, Sep 27, 2016 at 2:48 PM, White, Andrew <Andrew.White2@charter.com>
> wrote:
>
>> Hi Shumon,
>>
>>
>> What about this?
>>
>>
>>
>> # When an iterative caching DNS resolver receives a response with RCODE
>> being NXDOMAIN,
>>
>> # the resolver SHOULD store the response in its (negative) cache.  During
>> the time the response
>>
>> # is cached, any query with a QNAME at or descended from the denied name
>> that is not otherwise
>>
>> #cached (positively), can be assumed to result in a name error.
>> Responses to those queries
>>
>> # SHOULD set RCODE=NXDOMAIN (using the DNSSEC records cached as proof).
>>
>>
>>
>> When an iterative caching DNS resolver receives a query response with
>> RCODE as NXDOMAIN,
>>
>> The resolver should store the NXDOMAIN response in cache. During the time
>> that this response
>>
>> is cached, any query with a QNAME at or descended from the query that
>> resulted in NXDOMAIN
>>
>> and that is not already in cache can be assumed to result in a name
>> error. Responses to such
>>
>> queries SHOULD respond with RCODE as NXDOMAIN using DNSSEC records from
>> cache as proof.
>>
>>
>>
>> Andrew
>>
>
> Andrew - this looks very similar to Ed's rewrite.
>
> The problem I see with both is that it says to reply with NXDOMAIN for all
> names at or below the cut, except for RRsets already positively cached. But
> the current draft also allows resolvers to immediately invalidate cached
> entries below the cut and also return NXDOMAIN for them. Your rewrite
> appears to remove (or at least not mention) that possibility.
>
> --
> Shumon Huque
>

One other quick comment on the rewrite:

" .. (using the DNSSEC records cached as proof)." is a bit unclear and
perhaps misplaced. I assume here this means signed NSEC or NSEC3 records,
which may or may not exist depending on whether the zone in question is
signed. And even if they exist, the resolver typically doesn't return them
as proof unless the querier sets DO=1. I think we cover this point further
down in the text, which I'll excerpt here:

  "If the NXDOMAIN response due to a cached non-existence is from a
   DNSSEC signed zone, then it will have accompanying NSEC or NSEC3
   records that authenticate the non-existence of the name.  For a
   descendant name of the original NXDOMAIN name, the same set of NSEC
   or NSEC3 records proves the non-existence of the descendant name.
   The iterative, caching resolver MUST return these NSEC or NSEC3
   records in the response to the triggering query if the query had the
   DNSSEC OK (DO) bit set."

Re-reading this paragraph, I think I'd suggest explicitly mentioning that
the NSEC/NSEC3 signatures must be returned also.

-- 
Shumon Huque