Re: [DNSOP] WGLC draft-ietf-dnsop-dnssec-key-timing-03.txt until 2012-09-14

Johan Ihrén <johani@autonomica.se> Thu, 30 August 2012 09:24 UTC

Return-Path: <johani@autonomica.se>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 699B321F8550 for <dnsop@ietfa.amsl.com>; Thu, 30 Aug 2012 02:24:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.349
X-Spam-Level:
X-Spam-Status: No, score=-1.349 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_SE=0.35, J_CHICKENPOX_64=0.6, MIME_8BIT_HEADER=0.3]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6i1bCwYExVb2 for <dnsop@ietfa.amsl.com>; Thu, 30 Aug 2012 02:24:00 -0700 (PDT)
Received: from mail.netnod.se (mail.netnod.se [192.71.80.100]) by ietfa.amsl.com (Postfix) with ESMTP id 179F121F851B for <dnsop@ietf.org>; Thu, 30 Aug 2012 02:23:59 -0700 (PDT)
Received: from [IPv6:2a01:3f0:1::5a55:caff:fef0:8bdb] (unknown [IPv6:2a01:3f0:1:0:5a55:caff:fef0:8bdb]) (Authenticated sender: johani) by mail.netnod.se (Postfix) with ESMTPSA id 7F25F7C0E6; Thu, 30 Aug 2012 11:23:27 +0200 (CEST)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: Johan Ihrén <johani@autonomica.se>
In-Reply-To: <a06240805cc5d682257a0@[10.33.203.101]>
Date: Thu, 30 Aug 2012 11:23:26 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <4A7AAF8E-44C7-479A-8AC5-2695AA533139@autonomica.se>
References: <20120823214924.GL30725@x28.adm.denic.de> <a06240805cc5d682257a0@[10.33.203.101]>
To: Edward Lewis <Ed.Lewis@neustar.biz>
X-Mailer: Apple Mail (2.1084)
Cc: IETF DNSOP WG <dnsop@ietf.org>
Subject: Re: [DNSOP] WGLC draft-ietf-dnsop-dnssec-key-timing-03.txt until 2012-09-14
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Aug 2012 09:24:01 -0000

Hi Ed,

On Aug 24, 2012, at 19:54 , Edward Lewis wrote:

> At 23:49 +0200 8/23/12, Peter Koch wrote:
>> Dear DNSOP WG,
>> 
>> this is to initiate a working group last call (WGLC) for
>> 
>>        "DNSSEC Key Timing Considerations"
>>        draft-ietf-dnsop-dnssec-key-timing-03.txt
>>        <http://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-key-timing/>
> 
> First, my blanket objection to the draft, which isn't meant to be an insult to the effort that has gone into it.
> 
> The draft is too detailed.

I agree.

> Ok, I get that that is the purpose.  And it achieves that, and probably should be lauded for that and be published for that.  But, as an operator/implementor, the draft doesn't cut to the chase.
> 
> I first mentioned this a long time ago, and usually would just let it drop.  But in the last few weeks a senior developer said the same to me - it's really well detailed, but very complex.  He also added that our design complied with it in a very simplified form.  I replied that that was no accident. ;)
> 
> So - I admire this draft, but wish there was a Gerber-ized version. (Gerber being a brand of baby food.)
> 
> To give a concrete example of what I mean by too detailed - Dprp (propagation delay) is something that can be ignored with the advent of NOTIFY and IXFR.  Theoretically it is there, practically it isn't there.

While I mostly have to agree I also have to point out that with today's anycast clouds it is more likely than before that one actually may lose contact with a remote site for a while. I know that it happens to us, and while we obviously immediately attempt to rectify the situation the fact remains that our slave server on the dark side of the Moon is not just a NOTIFY+IXFR delayed. Furthermore, the TTL is also part of the propagation delay, and that obviously always remains.

So your claim of "practically it isn't there" is, unfortunately, too strong for me.

> Some specific comments:
> 
> Section 2.1
> 
> #   Of three methods, Double-Signature is conceptually the simplest -
> #   introduce the new key and new signatures, then approximately one TTL
> #   later remove the old key and old signatures.  Pre-Publication is more
> 
> Which TTL?  The TTL of the DNSKEY set, the TTL that is the largest value of all the TTLs in the zone, etc.?
> 
> Because of that question, I disagree that double signature is the simplest.  (I'm just sayin', that's my opinion.)  I think pre-pub is simpler because I know what TTL is involved (DNSEKEY).  For signatures, the TTL might vary through the set.

While I do see your point, I still think it is fair to claim that Double-Signature is CONCEPTUALLY the simplest. I.e. it is simpler to explain Double-Signature to a noob than to explain the other alternatives.

But let's not quibble about language at this stage, you do have a point and we could have been clearer here. Sorry.

> Section 2.3
> 
> #   +------------------+------------------+-----------------------------+
> #   | ZSK Method       | KSK Method       | Description                 |
> #   +------------------+------------------+-----------------------------+
> #   | Pre-Publication  | (not applicable) | Publish the DNSKEY before   |
> #   |                  |                  | the RRSIGs.                 |
> 
> Why is this "not applicable" for KSK?  A KSK can be listed before it is used as one.

The entire raison d'etre for pre-publication that for a ZSK the RRSIGs (that ZSKs generate) and the DNSKEYs (of which the ZSK is a part) don't travel together, and hence may or may not be in the same cache at the same time. 

This, however, does not hold true for KSKs, because the RRSIG generated by the KSK *must* travel together with the KSK and hence pre-publication is meaningless. You just publish the new KSK at the same time that you start using it for generating RRSIGs.

> Perhaps it isn't "not applicable" but "not realistic/sensible/practical".

Or "pointless".

> #   | (not applicable) | Double-DS        | Publish DS before the       |
> #   |                  |                  | DNSKEY.                     |
> 
> This one is non-sensical for KSK.  As an operator, I'd want to test locally before involving another party.

You're assuming that the other party (i.e. the parent) is someone else than yourself. That is not necessarily correct. Another reason may be that while you know that you will be able to publish your new KSK almost instantly, you also know that that lazy-bones of a parent will take a random time between 1h and 2 weeks to add the new DS. So you start with the request to the parent...

I have to disagree that Double-DS is non-sensicalf for a KSK. It is not, although in the common use case of the parent being a well-run TLD then I can see the *parent* being against this method. But that's not the only case I care about.

> I guess my notes here reflect that I see this document as helping operations as opposed to being an analysis of the protocol engineering.
> 
> Section 4.
> 
> #   The aim of the emergency rollover is to allow the zone to be re-
> #   signed with a new key as soon as possible.  As a key must be in the
> #   ready state to sign the zone, having at least one additional key (a
> #   standby key) in this state at all times will minimise delay.
> 
> I disagree with that goal.  In designing emergency key changes, we realized the goal is to minimize operational disruption, not minimize time until a new key is "in place."  In some cases, a key "break" might be a local event, local in the sense of the target name or the target of the poisoning.  

I disagree with your disagreement ;-)

I do agree with the goal of minimizing operational disruption. That's the correct goal. In some cases it may be that the consequence is to basically ignore the problem and just stay with the normal rollover schedule. 

Also, one has to ask whose operations we're talking about ... i.e. there's a difference between minimizing your operational disruption (as the zone owner) and the operational disruption for an ISP doing validation of your data (see nasa.gov vs Comcast).

However, IF you've made the decision not to stay with the schedule, but actually cause an operational disruption and do an emergency rollover THEN you want it to complete as quickly as possible.

> With this in mind, the only difference between a scheduled key change and an emergency key change is whether it is planned or not (;)) and how much more you pester the parent for the DS change (if needed).

This is exactly my view also.

> And the latter sentence might be countered with - having a standby key is a tradeoff against having smaller responses.  (The same old "time vs. space" tradeoff.)  Here, it's a matter of optimizing for the sunny day or the cloudy day.

Sure.

> Section 6
> 
> #   The reader is therefore reminded that DNSSEC is, as of date of
> #   publication, in the early stages of deployment, and best practices
> #   may further develop over time.
> 
> This is true.  I wish this would be emphasized in the earlier parts of the document.

I agree.

Regards,

Johan