[DNSOP] Re: Mohamed Boucadair's Discuss on draft-ietf-dnsop-must-not-sha1-06: (with DISCUSS and COMMENT)

Wes Hardaker <wjhns1@hardakers.net> Mon, 21 April 2025 22:19 UTC

Return-Path: <wjhns1@hardakers.net>
X-Original-To: dnsop@mail2.ietf.org
Delivered-To: dnsop@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 0B58D1F0934F; Mon, 21 Apr 2025 15:19:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=hardakers.net
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EZo8DOevnDua; Mon, 21 Apr 2025 15:19:55 -0700 (PDT)
Received: from mail.hardakers.net (mail.hardakers.net [107.220.113.177]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 01F3D1F09335; Mon, 21 Apr 2025 15:19:54 -0700 (PDT)
Received: from localhost (unknown [10.0.0.9]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mail.hardakers.net (Postfix) with ESMTPSA id 903C621572; Mon, 21 Apr 2025 15:19:53 -0700 (PDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 mail.hardakers.net 903C621572
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardakers.net; s=default; t=1745273993; bh=5SanLpFpyXr36WThIe9edLjtNF3G3Cwr+dRTB8O14S8=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=QGJ2OEgFHez04paS/4rKlFKkAjXOTZLUE9yUWcJUXI69cCaZuN007En9PdBXWktfo ttQICvRFuFdRYLrJgB7iLvguCeWRYUcU25gdrIOvq5nlK2aOIy5LnW5KIexVErg3R/ nHRNhCGf8ZMh5XotK0v924V92mh3ix0SJftL/gsE=
From: Wes Hardaker <wjhns1@hardakers.net>
To: Mohamed Boucadair via Datatracker <noreply@ietf.org>
In-Reply-To: <174453560483.1099397.15288329283858358772@dt-datatracker-64c5c9b5f9-hz6qg> (Mohamed Boucadair via Datatracker's message of "Sun, 13 Apr 2025 02:13:24 -0700")
References: <174453560483.1099397.15288329283858358772@dt-datatracker-64c5c9b5f9-hz6qg>
Date: Mon, 21 Apr 2025 15:19:53 -0700
Message-ID: <ybl5xix9mye.fsf@wd.hardakers.net>
User-Agent: Gnus/5.13 (Gnus v5.13)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: 3VKTTUJOF3XV4WD2JS6JBFDJGITYKDT3
X-Message-ID-Hash: 3VKTTUJOF3XV4WD2JS6JBFDJGITYKDT3
X-MailFrom: wjhns1@hardakers.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: The IESG <iesg@ietf.org>, Mohamed Boucadair <mohamed.boucadair@orange.com>, draft-ietf-dnsop-must-not-sha1@ietf.org, dnsop-chairs@ietf.org, dnsop@ietf.org, tjw.ietf@gmail.com
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: Mohamed Boucadair's Discuss on draft-ietf-dnsop-must-not-sha1-06: (with DISCUSS and COMMENT)
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/Vzw_DpjJD77jKaHOOvi0M5KgsuY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

Mohamed Boucadair via Datatracker <noreply@ietf.org> writes:

Hiya,

Responding to your points inline:

> # Process Check
> 
> De we need to do anything given that some of the work we are updating falls
> under pre-5378?

We don't think so.  Specifically this document has no pre-existing text
that we're copying from, so don't believe that the pre-5378 stuff
applies.  This document is entirely written from scratch as new.

> # Authoritative source for recommended DNSSEC Algos
> 
> I was naively expecting that we have a document where we say that the
> authoritative reference for recommended values is the IANA registry, not
> individual RFCs?
> 
> Do we have such document? If so, the explicit updates in the draft may not be
> required.

The IANA registry table is the table we are trying to update which holds
the registry values that indicates the standards level.  You may want to
review our companion document [1] that progressing at the same time that
moves all recommendations into the IANA table because documenting the
list only in an RFC turned out to be problematic.  This document
(must-not-sha1) thus sets the levels to match the recommendation values
for implementation and deployment.

[1]: https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc8624-bis/

> # BCP237 Umbrella
> 
> As a big fun of BCP237, I wonder whether we should make this more visible in
> our DNSSEC “roadmap” documentation and list this document under the BCP237
> umbrella?

So BCP237 currently only has one document within it (RFC9364).  I think
if we added every future DNSSEC document to the BCP it would likely get
overwhelming.  I would argue that whether or not and how often we should
update BCP237 is a good discussion for the WG as a whole, but it's
outside the scope of this particular document (set).  But that's very much IMHO.

> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> # Expand DNS Public Key (DNSKEY) and resource record digital signature (RRSIG)
> in the abstract and introduction.

Done.  I'm not sure this is standard convention so we'll see if there
are others comments about this.

> # Introduction
> 
> (1) Reword for better clarity
> 
> s/The security of the SHA-1/The security protection provided by the
> SHA-1

Done

> 
> (2) Inappropriate citation
> 
> CURRENT: “DNSSEC [RFC9364] originally [RFC3110]..”
> 
> I would not cite this specific RFC as this may imply that it is RFC that «made
> extensive».

We could not quite understand what you wanted here, as both references
made sense to us.  Are you saying the RFC9364 or RFC3110 should be removed? 

> CURRENT: “Readers are encouraged to consider ..”
> 
> Not sure to parse the intent here? Do you mean implementers? Operators? Both?
> Please reword accordingly.

Good point, changed to "operators".

> (4)
> 
> CURRENT: “has been removed from some systems”
> 
> May cite an example

I think the references would all be external and likely changing, thus
we can't likely quote them directly.  The one that has been talked about
the most is RedHat's OSes, but I don't think calling them out in this
document would be appropriate.

> # Section 2:
> 
> (1)
> 
> CURRENT: “Validating resolver implementations MUST ..”
> 
> Please add a reference to
> https://datatracker.ietf.org/doc/html/rfc9499#section-10.

done

> (2)
> 
> CURRENT: “more security strict environments..”
> 
> Can we characterize this? Or provide an example? Thanks.

Not likely, as it's a highly subjective discussion that warrants an RFC
or academic or industry white paper in itself.  The security community
will always disagree on the right level of hammer for the right job.

> # IANA Considerations
> 
> CURRENT: “IANA is requested to set the "Use for DNSSEC Signing" column …”
> 
> There is no such column. I guess you meant “Zone Signing”?

This document is modifying the table as being modified by the previously
discussed companion document above [1].  That document introduces the
new columns that we're now changing.  This document is, essentially, the
first test of that new process.

> You have many references that are listed but not sued (RFC4033, RFC4509,
> RFC5702, etc.). Please check these.

Done.

> Also, there is a problem in how the references are classified. For example, you
> list “RFC8174” as informative, while this should be normative. Likewise,
> “RFC3110” is listed as normative, while it should be informative.

8174 has been fixed (thanks)

3110 is the basis for what we're modifying as recommended, so IMHO it
should be normative (but is not a hill I'll die on either).

-- 
Wes Hardaker
USC/ISI