Re: [DNSOP] [Ext] More private algorithms for DNSSEC

Mark Andrews <marka@isc.org> Wed, 30 March 2022 04:23 UTC

Return-Path: <marka@isc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 176983A07EC for <dnsop@ietfa.amsl.com>; Tue, 29 Mar 2022 21:23:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isc.org header.b=YLYSZ5/A; dkim=pass (1024-bit key) header.d=isc.org header.b=Bd4XNU3G
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H6GCAflDKgmE for <dnsop@ietfa.amsl.com>; Tue, 29 Mar 2022 21:23:27 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.64.53]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D3FD03A07EB for <dnsop@ietf.org>; Tue, 29 Mar 2022 21:23:27 -0700 (PDT)
Received: from zimbrang.isc.org (zimbrang.isc.org [149.20.1.12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx.pao1.isc.org (Postfix) with ESMTPS id 333B53AB008; Wed, 30 Mar 2022 04:23:26 +0000 (UTC)
DKIM-Filter: OpenDKIM Filter v2.10.3 mx.pao1.isc.org 333B53AB008
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=isc.org; s=ostpay; t=1648614206; bh=94aaRRZmBVvmcUqeROQOiCd5ahVAs7SnbECLMb2L8Pk=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=YLYSZ5/A74OpJC4K1BbbY0ZDsqkU1KbOgrRZZTO4Ukrv0jYyDO8da1Q3PDEqtm/6m UbukoHEvnw35OvWO0HhGfmI2FXGKe7A5DM5o038kCeJiICG/fPB9J0ZUYshtP8Dew7 LqJ34D4ZfhzVmrH95mcr3oyoV5J0MNmqfR+moyEE=
Received: from zimbrang.isc.org (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTPS id 4C7A4EC3FE6; Wed, 30 Mar 2022 04:22:21 +0000 (UTC)
Received: from localhost (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTP id 0CB48EC3FEF; Wed, 30 Mar 2022 04:22:21 +0000 (UTC)
DKIM-Filter: OpenDKIM Filter v2.10.3 zimbrang.isc.org 0CB48EC3FEF
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isc.org; s=05DFB016-56A2-11EB-AEC0-15368D323330; t=1648614141; bh=zNOimlN3dMFQBs3O8dolsVEHUZK5BArBcazqazg8OcU=; h=Mime-Version:From:Date:Message-Id:To; b=Bd4XNU3Gn5PPexBE28/wCWscoovFCkB2N5xUpLQc3tKk5x066ONP0Ua9DRuJ71Xx/ mHRn01trNdUZKdgwhm5ipzMGyakrPUaHshFpUV0zbH7x5gcGIEL/FVqQdqExXrv0qr ZuDIri36yF9DqqRFw3fkBqANbRgXLmMAL7Lpcn70=
Received: from zimbrang.isc.org ([127.0.0.1]) by localhost (zimbrang.isc.org [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id QqjpU01q7QEA; Wed, 30 Mar 2022 04:22:20 +0000 (UTC)
Received: from smtpclient.apple (n114-74-26-107.bla4.nsw.optusnet.com.au [114.74.26.107]) by zimbrang.isc.org (Postfix) with ESMTPSA id A3EFBEC3FE6; Wed, 30 Mar 2022 04:22:19 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
From: Mark Andrews <marka@isc.org>
In-Reply-To: <CAH1iCio6KjeJS1oL_Q=jcLNKsjO458Z49T6B9F_JQ8dMdT0pZg@mail.gmail.com>
Date: Wed, 30 Mar 2022 15:23:20 +1100
Cc: Peter Thomassen <peter@desec.io>, Paul Hoffman <paul.hoffman@icann.org>, dnsop WG <dnsop@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <DA3089D6-FC60-4C82-A352-6B3C88206B40@isc.org>
References: <5C105C71-B18C-4366-94F5-E8D60970109C@icann.org> <20B389EF-4909-43A0-9BC8-F57F5E332E8A@verisign.com> <1D59C3FB-4FCC-4A03-8E13-EA6902B14D2A@icann.org> <54622bd0dd3253187a9c9b69d0a1188a4d898bd9.camel@powerdns.com> <CC878AFE-3B67-49D9-9A9E-F3D21BC900FB@isc.org> <6859EF89-8E3A-4C18-8B4A-2AF4C37CDF65@icann.org> <585479E8-293C-42D4-BA2F-7FD99B27EBDE@isc.org> <c3a7bfb5-9e43-ca40-8b15-7f84a2826022@desec.io> <C78A56E8-E4F6-40A4-8C1B-32738A53518D@isc.org> <CAH1iCio6KjeJS1oL_Q=jcLNKsjO458Z49T6B9F_JQ8dMdT0pZg@mail.gmail.com>
To: Brian Dickson <brian.peter.dickson@gmail.com>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/UujVKta3iAO6vAVlgkptq83RO4A>
Subject: Re: [DNSOP] [Ext] More private algorithms for DNSSEC
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2022 04:23:33 -0000


> On 30 Mar 2022, at 14:29, Brian Dickson <brian.peter.dickson@gmail.com> wrote:
> 
> 
> 
> On Tue, Mar 29, 2022 at 1:31 PM Mark Andrews <marka@isc.org> wrote:
> 
> 
> > On 30 Mar 2022, at 00:28, Peter Thomassen <peter@desec.io> wrote:
> > 
> > 
> > 
> > On 3/28/22 20:34, Mark Andrews wrote:
> >> About the only part not already specified is matching DS to DNSKEY using PRIVATEDNS but as you can see it is obvious to anyone with a little bit of cryptographic understanding.
> > 
> > That creates problems plus complexity, which I find very undesirable. Orthogonality trumps complexity.
> > 
> > For example, zones need to have a DNSKEY for each signing algorithm given in the DS record set. I would expect most implementations to currently only look at the algorithm number in this context, and not at the 253/254 algorithm identifier.
> 
> And if they don’t implement any PRIVATEDNS or PRIVATEOID algorithm this is EXACTLY the correct behaviour.
> 
> You (Mark) are arguing that any experimentation would turn 253 in to a MUST IMPLEMENT.

No, its experimenters need to implement.  Everyone else doesn’t have to touch any code.

> I think the other arguments (about having multiple algorithms allocated for experimental usage) is more persuasive, including the nature of multiple algorithms when experimentation is done.
> 
> This also keeps the 253 use case (actual private production use) distinct from experimentation usage, thus preventing any negative interaction between experiments and production zones.

Where did private (not needed to be documented) morph into not for use in experimentation?  We documented how to
avoid negative interactions by specifying that you MUST use a DNS namespace you control or use a OID which you have
been allocated (which are free from IANA).  There are no restrictions about publishing PRIVATEDNS or PRIVATEOID keys
to the world.  Anyone one can publish them at anytime anywhere in the DNS tree.

> (It's not about whether the behavior is correct, it's about whether there is value added in selecting the 253 mechanism rather than reserving experiment-only code points, IMHO.)

We only have a restricted number of code points that don’t require the use of an OID or a DNS name and once they have
been used for an algorithm they are burned for use with any other algorithm.

> > There will also be implementations which don't care to implement such "private algorithm peeking". For those, algorithm handling would not be ensured in the same way as it is for non-253/254 algorithms.
> 
> Then they would be broken which by the way is why you run experiment. 
> 
> This presupposes that only 253 is used, rather than what Paul H has proposed in his very small draft. It's a moot point and not contradictory to the proposal, to not want or need to do the peeking bit (i.e. not supporting 253).
>  
> > Last, I'm not convinced that running a PQ algorithm (or other) experiment to test (non-supporting) resolvers' behavior should require controlling a domain name or OID (as is required for 253/254).
> 
> So rather than that you want to have to deal with potential colliding use of code points without identifiers.  
>  
>   You can’t
> reliably clean up experimental code points, especially if there are a lot of implementations.  DNS has a long tail.
> 
> > These concerns bring us back to Nils' comment that 253/254 is not a good basis for performing research and doing real-life experiments.
> > 
> > 
> > The above headaches would be in addition to the effort of writing the clarification document, whereas Paul's proposal requires just the document.
> 
> DNSSEC RFC say check the algorithm for a match.  They do not say check the number.  PRIVATEDNS and PRIVATEOID are sub typed
> and checking of those fields was always required once you implemented an algorithm in those spaces.
> 
> Everyone else is saying, we don't want this to be the way of doing experiments (with lots of good reasoning behind that).
> The "once you implemented" is a conditional that is not mandatory to implement. There is also guidance now that sub-typing is not a good idea for anything new in DNS.
> 
> I'd suggest that your argument is in fact suggesting the use of sub-typing for something new (experiments rather than just private use) in DNS.

Bumpkin. If I’d thought that PRIVATEDNS or PRIVATEOID couldn’t be used for experimentation I would have argued for
reservations myself 20+ years ago.  Below are the ONLY restrictions applied to PRIVATEDNS or PRIVATEOID.  Please
highlight where it says “not for experimental use” or “can only be used for production” or “never to be published
to the world”.  None of those restrictions are there.  They are figments of your imagination.

A.1.1.  Private Algorithm Types


   Algorithm number 253 is reserved for private use and will never be
   assigned to a specific algorithm.  The public key area in the DNSKEY
   RR and the signature area in the RRSIG RR begin with a wire encoded
   domain name, which MUST NOT be compressed.  The domain name indicates
   the private algorithm to use, and the remainder of the public key
   area is determined by that algorithm.  Entities should only use
   domain names they control to designate their private algorithms.

   Algorithm number 254 is reserved for private use and will never be
   assigned to a specific algorithm.  The public key area in the DNSKEY
   RR and the signature area in the RRSIG RR begin with an unsigned
   length byte followed by a BER encoded Object Identifier (ISO OID) of
   that length.  The OID indicates the private algorithm in use, and the
   remainder of the area is whatever is required by that algorithm.
   Entities should only use OIDs they control to designate their private
   algorithms.


> > I therefore support the assignment of experimental algorithm numbers, and I think the text should mandate that they MUST be treated as unknown and have no special processing, unlike private ones.
> 
> Stop calling for polluting of the commons.  We can’t properly cleanup after using experimental code points. 
> 
> I think it is sufficient to reword Paul's proposal, so that the 7 new code points are labeled "experimental" rather than "private use".

Private use includes experimental use.

> A few words about expected behavior of implementers ("Don't release production code with these code points in use", along with "ship production code to explicitly disallow use of these code points".)

Does not work in practice.

> DNS hasn't previously had explicitly allocated experimental code points for algorithms, so how those do and do not get used probably needs some minimal guidance.
> 
> I don't know if that belongs in this document, or as a separate document. My instinct is "separate", and also that such a document doesn't need to be a blocker on Paul H's document. 
> 
> Maybe it is necessary to add some sort of explicit signaling about use of experimental code points and that software involved in a particular conversation (server or client) is in experimental mode.
> 
> The (potentially really bad) idea that occurred to me was, there's a currently unused bit in the header, "Z", which is a vestigial remnant of the larger Z field of "must be zero" from 103[345]. Perhaps that bit could be re-labeled "X" (for experimental)?
> 
> Experimentation, including interoperability is a good thing. Leaving past experiments' code assignments (from the experimental range) is a bad practice, which should be self-limiting in nature.
> 
> As long as production software knows to ignore that range, and treat those code points as "unknown", the only time a problem can occur is if a client and server in production BOTH have made the error of shipping production code that understood specific code points.

253 + unknown name is “unknown” if you implement PRIVATEDNS.  Similarly 254 + unknown OID is “unknown" if you implement
PRIVATEOID.  If you don’t implement PRIVATEDNS or PRIVATEOID then 253 and 254 alone indicate unknown.

> Unit tests and regression tests for this should be the first thing implementers write, before they write a single line of code to implement experimental functionality, IMNSHO.
> 
> Putting the correct sorts of "SHOULD NOT" and/or "MUST NOT" advice in the short document is probably all that is required.
> 
> The shorter and simpler the doc, the easier it is to point implementers at it and say, "fix your code".
> 
> Brian
> 
> P.S. If I haven't already said it yet, I support use of new code points for experimentation.. They should be labeled "experimental" with guidance that the experiments are themselves private in nature, and that no production code should ever treat those code points as known or valid. 

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: marka@isc.org