[DNSOP] Re: [Ext] Re: Call for Adoption: draft-davies-internal-tld

Mark Andrews <marka@isc.org> Thu, 01 May 2025 23:13 UTC

Return-Path: <marka@isc.org>
X-Original-To: dnsop@mail2.ietf.org
Delivered-To: dnsop@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id B41DF23D80D9 for <dnsop@mail2.ietf.org>; Thu, 1 May 2025 16:13:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.399
X-Spam-Level:
X-Spam-Status: No, score=-4.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=isc.org header.b="KeU1bz1z"; dkim=pass (1024-bit key) header.d=isc.org header.b="eekCD4GG"
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h2M6XP-3kft1 for <dnsop@mail2.ietf.org>; Thu, 1 May 2025 16:13:20 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.2.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id D6B4E23D80C5 for <dnsop@ietf.org>; Thu, 1 May 2025 16:13:20 -0700 (PDT)
Received: from zimbrang.isc.org (zimbrang.isc.org [149.20.2.31]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx.pao1.isc.org (Postfix) with ESMTPS id E3AF93AB377; Thu, 01 May 2025 23:13:19 +0000 (UTC)
ARC-Filter: OpenARC Filter v1.0.0 mx.pao1.isc.org E3AF93AB377
Authentication-Results: mx.pao1.isc.org; arc=none smtp.remote-ip=149.20.2.31
ARC-Seal: i=1; a=rsa-sha256; d=isc.org; s=ostpay; t=1746141200; cv=none; b=I87wTF+B63hwb3bB/M3H9GvJTTvdDLzQML43oHmfYOj8BNOZ1CN3efADqTDbHFQhk2iFluxxvty9mQGed20VJxNPL4XYWC4RxUZK5LT+iuUJcVlVTJh295h3ajl7s/aiVIjzG1rCQkNE4JGBeRokSEj19NNi8UsBzmDLkD3XzmA=
ARC-Message-Signature: i=1; a=rsa-sha256; d=isc.org; s=ostpay; t=1746141200; c=relaxed/relaxed; bh=xVgp69JGjdzwDY5zi+imjCxPULUvhCHdOV9tXf+txxo=; h=DKIM-Signature:DKIM-Signature:Mime-Version:Subject:From:Date: Message-Id:To; b=Ez+erG9G69y23ZoOfG2h/235WSGOL3Sne6/LgS5draGnw6yo7KcVcLdVDzaNa3RxQiHToD4oXhcXn878kEFHg3jlckAdVJ+eUaGl3bqB6YQHpdiwdk2b+GS+RbvGYf5Y1S+p2W0b+zmotmJZ7d3s9S6FPpPpb/LMq6TkQKlfj74=
ARC-Authentication-Results: i=1; mx.pao1.isc.org
DKIM-Filter: OpenDKIM Filter v2.10.3 mx.pao1.isc.org E3AF93AB377
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=isc.org; s=ostpay; t=1746141199; bh=sD3doAWdstSf9ImHUBSMjZ7SKWDk1b5rG+VmSCHsoUM=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=KeU1bz1zDR2WMDsXy7kZmz9e0ArviolUTMyjJiWYf0Z+QshJKAY63JWX86SUsfO3D oyGeVPOaMpKxyy9jPn5LUpr3rAQiUmbK/ItegZKGglzrz9XPo4cncNJZFbBgteSfOa nx7fD6T3oCwI1NVC7wgRTyEuQBDKq02awr3qnmGU=
Received: from zimbrang.isc.org (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTPS id DCE29138C2F5; Thu, 1 May 2025 23:13:19 +0000 (UTC)
Received: from localhost (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTP id B527B138C397; Thu, 1 May 2025 23:13:19 +0000 (UTC)
DKIM-Filter: OpenDKIM Filter v2.10.3 zimbrang.isc.org B527B138C397
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isc.org; s=05DFB016-56A2-11EB-AEC0-15368D323330; t=1746141199; bh=xVgp69JGjdzwDY5zi+imjCxPULUvhCHdOV9tXf+txxo=; h=Mime-Version:From:Date:Message-Id:To; b=eekCD4GG4JdcOashIGcct816/h6UHDvpogNGW+Qd/CafVBWJnOA0AAklcor6aSFIN RHazbphDA8Ya2IKbuPzgQ/5CKfzyNpErrUoGkt053f70xfI5iYEouOYr+MmQ2KPs+b 80S9hP/I9qlGBlMQKaLapKrnUDwx6j4mBaoQGPZE=
Received: from zimbrang.isc.org ([127.0.0.1]) by localhost (zimbrang.isc.org [127.0.0.1]) (amavis, port 10026) with ESMTP id 6KRMsQwoH4bw; Thu, 1 May 2025 23:13:19 +0000 (UTC)
Received: from smtpclient.apple (n49-187-18-238.bla1.nsw.optusnet.com.au [49.187.18.238]) by zimbrang.isc.org (Postfix) with ESMTPSA id 9B6D7138C2F5; Thu, 1 May 2025 23:13:18 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.10\))
From: Mark Andrews <marka@isc.org>
In-Reply-To: <48C707E1-9DB1-4699-BF15-79C605DCBF82@strandkip.nl>
Date: Fri, 02 May 2025 09:13:06 +1000
Content-Transfer-Encoding: quoted-printable
Message-Id: <7ADE2EA1-193E-41EA-ACEF-A2BE3668036F@isc.org>
References: <9aaa33b5-d4d9-4263-89b3-b8a1b50249a3@app.fastmail.com> <48C707E1-9DB1-4699-BF15-79C605DCBF82@strandkip.nl>
To: Joe Abley <jabley@strandkip.nl>
X-Mailer: Apple Mail (2.3731.700.6.1.10)
Message-ID-Hash: PR2WMFV7TKHGM2RRZ3VNHCCQVRFDMP5I
X-Message-ID-Hash: PR2WMFV7TKHGM2RRZ3VNHCCQVRFDMP5I
X-MailFrom: marka@isc.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Ted Lemon <mellon@fugue.com>, Paul Hoffman <paul.hoffman@icann.org>, "dnsop@ietf.org WG" <dnsop@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: [Ext] Re: Call for Adoption: draft-davies-internal-tld
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/_gKLtQtTIpqObc_q96-N_9B1gW0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

A DNAME does not break the DNSSEC chain of trust.  An insecure delegation is needed to do that.

“Black hole servers” can be any set of servers.

For d.f.ip6.arpa (half of the top of the ULA reverse trees) they are the same as the parent servers.

d.f.ip6.arpa. 3600 IN NS a.ip6-servers.arpa.
d.f.ip6.arpa. 3600 IN NS d.ip6-servers.arpa.
d.f.ip6.arpa. 3600 IN NS c.ip6-servers.arpa.
d.f.ip6.arpa. 3600 IN NS b.ip6-servers.arpa.
d.f.ip6.arpa. 3600 IN NS e.ip6-servers.arpa.
d.f.ip6.arpa. 3600 IN NS f.ip6-servers.arpa.

If the traffic is too much a DNAME can be added to the DELEGATED zone.

e.g.

internal. SOA ...
internal. NS <server1>
internal. NS <server2>
...
internal. DNAME 10.in-addr.arpa.

Mark

> On 2 May 2025, at 07:58, Joe Abley <jabley@strandkip.nl> wrote:
> 
> Hi Ted,
> 
> On 1 May 2025, at 23:46, Ted Lemon <mellon@fugue.com> wrote:
> 
>> Okay, but if they are not going to the authoritative  servers to get the chain of trust, they are going to the local full-service resolver or some public third-party resolver. And so if there is an insecure delegation, that resolver can make up an answer, and it will “validate” correctly as insecure.
> 
> That is a possible outcome, I think, but again it's hard to compare against reality since in reality I don't think this is a common situation. It's possible, for example, that any device in this situation these days is likely to be managed within the realm of control that .internal has useful meaning, which makes all of this seem a bit unnecessary. Perhaps it's reasonable to wait until it's clear that there is a problem before dreaming up solutions. 
> 
>> But if the delegation is securely denied, that can’t happen. That’s why it’s important for there to be an insecure delegation to a black hole name server. 
> 
> One word of warning here; it's messy to imagine new delegations to AS112 servers, if that's how we are to imagine "black hole name server" in a global context. Such delegations can reasonably be imagined to be lame, or at least not reliably not lame.
> 
> This working group decided some time ago that's better approach was to use DNAME rather than delegation as the mechanism to shift unwanted traffic to AS112 servers. This advice has been ignored by the IETF since then, more than once I think, but I still think it's good advice.
> 
> A DNAME RR has never before been deployed in the root zone and we know from other adjacent scenarios that there are some practical problems with the idea of installing the first one.
> 
> It seems superficially attractive to imagine a course of action along the lines you suggested but there are dragons. An insecure delegation from the root zone to the root servers is cleaner, I think. 
> 
> (There's still the issue of quite how and whether the IETF should instruct the IANA to make changes to the root zone, the adjacent dragons of which make the other ones look rather small and inoffensive.)
> 
> I am still far from convinced that there is anything useful for the IETF to say, here. 
> 
> 
> Joe
> _______________________________________________
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-leave@ietf.org

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: marka@isc.org