Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-validator-requirements

Daniel Migault <mglt.ietf@gmail.com> Thu, 15 December 2022 22:36 UTC

Return-Path: <mglt.ietf@gmail.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81B49C1526F7 for <dnsop@ietfa.amsl.com>; Thu, 15 Dec 2022 14:36:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.094
X-Spam-Level:
X-Spam-Status: No, score=-7.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KiVrilkmX359 for <dnsop@ietfa.amsl.com>; Thu, 15 Dec 2022 14:36:21 -0800 (PST)
Received: from mail-oi1-x22e.google.com (mail-oi1-x22e.google.com [IPv6:2607:f8b0:4864:20::22e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D242C14CF00 for <dnsop@ietf.org>; Thu, 15 Dec 2022 14:36:21 -0800 (PST)
Received: by mail-oi1-x22e.google.com with SMTP id s186so477837oia.5 for <dnsop@ietf.org>; Thu, 15 Dec 2022 14:36:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=sV48KXKv09FhYzUwdnC05c8C7hCxb6S1m472X73qfLM=; b=cFYOMRtkbsgevyAVFQ10WZEpcRzfGwZG6nNVCZ5xdwIDfQGsasxvCTzr621vvpIPil 8zcvW7m8mxaNWqU0M8h2dOcBWGX/7ijFR9+OwjOqEZZ+r1nocWJ1IeUbIdcbZrP3tWCX 9Lo5iqqkQ+scby1IOsLoJLT9zC5jabelmoMsHStF6YLnXeojsI7WZqnnhH3NXizJeTXE 2Mxzs/GRbUVXEA7G3pzRwBD36p5MJ1u1fbNCZvB258p4yr8BynsDXe0mm8O15n6GHAfD Mmn2xw4PMZHv5uGwBgc26gyILWvKsmQRUXElzWLh/Zfca/RUuTA4nl+XgPKVNq0++PoU Xdzw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=sV48KXKv09FhYzUwdnC05c8C7hCxb6S1m472X73qfLM=; b=ch8s0wQfNhQhSYdVc8vP//mbSsBa7KJKKYX63N9guvBt8wJrOD4HoEQqm7aW8YBn3s QKNBXMfAshw3LT1ro9I/+euyw8X148iuzMdx28VsIo8UguUFsSQv4OeEqXt/eisPpVrE hkEhGGSE8nielnYqB76pSECw1PRXRChx/t5xgk/MryfVcZEzrybCB+tOb6UjJILS/oQZ gCiSSiSH7tMIrVyUvM2OZp514jKVfEDldhisXIXoR7k6FxIYyULaPmW5vIvHxJawhJ+y 6yk+KwseWJCXOTiTIKV9ZNyzC1v9qPjs6D0Hv+6hETR//yRCowsOLbT8OOfHWP5DmysL lAhA==
X-Gm-Message-State: ANoB5pl1qnkY4t3K7t8eSgu4PFNvL7DdYrpoz9iPJzIG9UpXuXrhC0bF 71VWeDbsvxb6dhc+88PopWgzU1njki2SELlrA7+f+H5o
X-Google-Smtp-Source: AA0mqf5JPcH2D07k8gjlyQ+efBogHhKiIYHDb7Nr4nT1icQuJpB7slX9BHUD3rknVdtTlwaFlMK8wLZGmITBwZKWbx4=
X-Received: by 2002:aca:2401:0:b0:35a:93eb:faf4 with SMTP id n1-20020aca2401000000b0035a93ebfaf4mr345160oic.185.1671143780889; Thu, 15 Dec 2022 14:36:20 -0800 (PST)
MIME-Version: 1.0
References: <CADyWQ+FwRaSdpSWXBDqCG9ZPNPiG4pGUx37PVtExbqVPr5ZfmA@mail.gmail.com> <65d26b98-e0d6-e69b-10d4-17632451cab6@nic.cz> <CADZyTk=wUydEv4X8KgHe3Mj0cZTmiaR3mjn_Z2n73U-eST-HPA@mail.gmail.com> <f397b7d4-fe4f-6000-5ce5-f2faa7b27b3e@nic.cz> <CADZyTkkdn__VhRRqwKDbNx3ymTR0KJmxoTN9aKMcox-JS=pW_A@mail.gmail.com> <26cd83b9-1bd0-2925-07f7-6a5c2248d479@nic.cz>
In-Reply-To: <26cd83b9-1bd0-2925-07f7-6a5c2248d479@nic.cz>
From: Daniel Migault <mglt.ietf@gmail.com>
Date: Thu, 15 Dec 2022 17:36:09 -0500
Message-ID: <CADZyTk=nDgOgabbB8aMvdo-XiTQehgVmZ77k6KB7ZKMcgmRCSA@mail.gmail.com>
To: Vladimír Čunát <vladimir.cunat+ietf@nic.cz>
Cc: dnsop@ietf.org
Content-Type: multipart/alternative; boundary="0000000000006db91505efe57bd9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/_G5oVBfDqHTPyX1FCCWEnyvJ6ss>
Subject: Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-validator-requirements
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Dec 2022 22:36:25 -0000

On Mon, Nov 28, 2022 at 6:29 AM Vladimír Čunát <vladimir.cunat+ietf@nic.cz>
wrote:

> On 25/11/2022 18.26, Daniel Migault wrote:
>
> So let me know how we came to this lines and I suspect we do share some
> similar concerns. A recurrent question and reticence we receive from MNO
> and ISPs regarding DNSSEC is that they are really scared about having
> the cache with  incoherent RRsets in their cache that causes the validation
> to fail and in many cases they imagine a mechanism to prevent and address
> such incoherent data in the cache.
> One of the intentions of this draft is to prevent such mechanisms to be
> implemented - mostly as it is likely to generate errors that DNSSEC experts
> would not be able to catch or understand - as generated by the home
> made solutions.  As a result we wanted  to minimize the change to
> the DNSSEC mechanic and only rely on very simple and standard  mechanisms.
> 4033 provided one way to limit some incoherencies, and we also thought of a
> similar mechanism that was   like the one described in
> I-D.ietf-dnsop-ns-revalidation which as we saw it ensures something like a
> mechanism that refreshes the chain of trust.
>
> I get that in countries with low validation rates [1] it may be difficult
> to explain to resolver operators that it should be only the authoritative
> side who worries that they "do DNSSEC wrong".  Maybe I'm also personally
> biased against putting much work to work around mistakes done on the other
> side of the protocol.
>
> [1] https://stats.labs.apnic.net/dnssec
>
>
> I think we are rather in agreement here and we do not want the operations
to become more complex because of the other side's mistakes.   This is
essentially why we explicitly tell them to not apply their own specific
recipes and only rely on standard options that are likely to be present in
their resolvers.

> What we expect is that the validator proposes this option and as such the
> DRO selects that option in the validator if present.
>
> Well, OK.
>
>
>
> Well yes, I'm in favor of keeping the supported-algorithm set centralized
>> internet-wide, instead of trying to start deploying a decentralized
>> mechanism.
>> [...]
>>
>> I mainly wanted to dissuade from early algorithm deprecation on validator
>> side. [...]
>>
> I got your point and agree it might be counter productive to encourage a
> mechanism that is not reliable. I propose to remove the text below:
> [...]
>
> OK.
>
> I don't see the part about extended errors as problematic (RFC 8914).  It
> really seems to be getting into (open-source) implementations and it can
> help with debugging in some cases, though deploying it is probably not very
> important either.
>
>
> So I think what you're suggesting is that  8914 will be implemented,
without even the choice being left to the operator. If that the case, would
you like the text instead of SHOULD say something like MAY if not supported
by default by the implementation ?

>
> Oh! sure for the TA. My understanding of the text is that it recommends
> 5011 for running instances, but that new instances are configured with
> up-to-date TA that in most cases are updated by software update. So yes I
> agree and will check this appears clearly.
>
> I don't think 5011 is worth doing at all.  Maybe in some exceptional use
> cases.  Well, I haven't heard much about deployment experience with
> non-root TAs, so perhaps I just don't know those well.
>
>
> I need to take the time to reconsider that. I am a bit overloaded but
expect to come back to this point more specifically. I got your point in
any case and the scenario we have  is a zone that does not want to rely on
the parent zones in case something goes wrong in these parent zones. The
other aspect is also that we did ot want to give the impression DNSSEC only
works with the root KSK as a TA. But as ai mentioned I will come back with
that.

-- 
Daniel Migault
Ericsson