[dnsop] Comments on draft-krishnaswamy-dnsop-dnssec-split-view-02.txt

"Howard J. Eland" <heland@afilias.info> Thu, 13 July 2006 00:46 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1G0pLn-0004J8-Fw for dnsop-archive@lists.ietf.org; Wed, 12 Jul 2006 20:46:43 -0400
Received: from stsc1260-eth-s1-s1p1-vip.va.neustar.com ([156.154.16.129] helo=chiedprmail1.ietf.org) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G0nlt-0003N3-Iz for dnsop-archive@lists.ietf.org; Wed, 12 Jul 2006 19:05:33 -0400
Received: from mailapps.uoregon.edu ([128.223.142.45]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1G0nau-0008Jz-LX for dnsop-archive@lists.ietf.org; Wed, 12 Jul 2006 18:54:15 -0400
Received: from mailapps.uoregon.edu (IDENT:U2FsdGVkX18LIJG8tE41pzZLoU13LNwDdkqGb6uJlzU@localhost [127.0.0.1]) by mailapps.uoregon.edu (8.13.7/8.13.7) with ESMTP id k6CMH9px017155; Wed, 12 Jul 2006 15:17:09 -0700
Received: (from majordom@localhost) by mailapps.uoregon.edu (8.13.7/8.13.7/Submit) id k6CMH9Qg017153; Wed, 12 Jul 2006 15:17:09 -0700
Received: from mail00.afilias.info (mail02.afilias.info [69.46.107.12]) by mailapps.uoregon.edu (8.13.7/8.13.7) with ESMTP id k6CMH9CQ017148 for <dnsop@lists.uoregon.edu>; Wed, 12 Jul 2006 15:17:09 -0700
Received: from [142.131.134.117] ([142.131.134.117]) (authenticated bits=0) by mail00.afilias.info (8.13.1/8.13.1) with ESMTP id k6CMGu6b022229 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for <dnsop@lists.uoregon.edu>; Wed, 12 Jul 2006 18:16:57 -0400
Subject: [dnsop] Comments on draft-krishnaswamy-dnsop-dnssec-split-view-02.txt
From: "Howard J. Eland" <heland@afilias.info>
To: DNSOP List <dnsop@lists.uoregon.edu>
Content-Type: text/plain
Organization: Afilias
Date: Wed, 12 Jul 2006 17:18:23 -0500
Message-Id: <1152742703.2813.85.camel@brisket.afilias.info>
Mime-Version: 1.0
X-Mailer: Evolution 2.2.3 (2.2.3-2.fc4)
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: ClamAV 0.88.3/1594/Wed Jul 12 08:04:34 2006 on mailapps
X-Virus-Scanned: ClamAV 0.88/1594/Wed Jul 12 11:04:34 2006 on mail00.afilias.info
X-Virus-Status: Clean
X-Spam-Status: No, score=0.0 required=5.0 tests=none autolearn=ham version=3.1.1
X-Spam-Checker-Version: SpamAssassin 3.1.1 (2006-03-10) on mail00.afilias.info
X-Envelope-To: <dnsop@lists.uoregon.edu>
Sender: owner-dnsop@lists.uoregon.edu
Precedence: bulk
X-Spam-Score: -2.6 (--)
X-Scan-Signature: 057ebe9b96adec30a7efb2aeda4c26a4

All,

Here are my (also very late) comments on the split-view draft.

1) I agree with Andrew Sullivan that there's a case to separate out the
DNSSEC specific problems.  My only additional comment on this is that
_when_ RFC 403[3-5] are updated, we can tweak your DNSSEC draft, without
touching the non-DNSSEC split-view doc.

2) 1. Introduction, para 3 nit:

        "In the case of split-view DNS every authentication chain in
        every view must validate properly.  Some names may be common
        between multiple views but contain different data."
        
The last sentence here is a bit ambiguous: it's not clear if the data
you are are referring to is the different RR set returned (sans DNSSEC),
the different signatures, or both.

3) 1. Introduction, para 4 nit:
        "...but is also a well recognized security measure in DNS for
        protecting authoritative name servers against compromised
        caches."
        
Can you support this statement?  A reference to a BCP would be
sufficient I think.

4) Starting at 2.2. Query Channeling, throughout:

I like to suggest changing the name "second-level nameserver" to
"Boundary Network nameserver", so it matches the ASCII-art.

5) 2.1 Background, paras 1 and 2:
I don't care for the way this is worded.  To paraphrase:
        You run views with different servers.
        Unless you run it on one server, with different NICs.
        Unless your server code supports it directly.
        
I suggest moving things around a bit, or bullet them as examples of the
current ways that split-views are run.  I prefer the latter best, as the
former would seem to codify The Official Ways To Run Split Views, and I
don't believe this was the intent of the author.

6) 2.1 Background, para 3:
This seems out of place - it is a recommendation, but it's in the
Background section.
        
7) 2.1 Background, para 4: remove this:
        "Although the two concepts are related, split-views is not
        recommended for hiding sensitive names because of the ease with
        which names can be leaked out.  Again, if name hiding is the
        main objective, the approach of using a private delegation for
        sensitive names is strongly encouraged."
        
8) 2.2 Query Channeling:
It is not clear how other servers in the Boundary Net lookup names for
servers within the Boundary Net, or is that considered Internal Data as
well?

9) 2.3.  Controlling Errant Queries
        "Having these rules alternatively configured in the packet
        filter is also possible, but using TSIG for performing this
        authorization eases packet filter administration for DNS."

I'm a belt and suspenders kind of guy - I would do both.  I'd remove
everything after the comma.

10) 2.4.1.  Internal Recursive Forwarder, bullet 2:
        "Ability to control forwarding behaviour such that the recursive
        option is not tried, even if the name server that queries are
        normally forwarded to fails to respond."
        
This is confusing.  Is this what the author means?

        "No further attempt to resolve the query should be made if the
        name server(s) that queries are normally forwarded to fails to
        respond."
        
11) 3.  Split-View DNSSEC, para 2:
        "Often two views of a split zone are administered separately, so
        having different zone signing keys for the different views is
        also desirable."
        
This sounds like it forces the number of keys to always be >=2.  I
suggest:
        "... so the ability to configure different zone signing keys..."



Overall, I think it's very nice to have this spelled out.

Best,

-H

-- 
Howard J. Eland
Afilias USA
+1 215 366 2758
http://www.afilias.info

.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html