Re: [DNSOP] Fwd: New Version Notification for draft-pan-dnsop-swild-rr-type-00.txt

Paul Vixie <paul@redbarn.org> Sat, 12 August 2017 15:42 UTC

Return-Path: <paul@redbarn.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A75EA131D6B for <dnsop@ietfa.amsl.com>; Sat, 12 Aug 2017 08:42:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6EY_RxYS5S0E for <dnsop@ietfa.amsl.com>; Sat, 12 Aug 2017 08:42:46 -0700 (PDT)
Received: from family.redbarn.org (family.redbarn.org [IPv6:2001:559:8000:cd::5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28F1412EC11 for <dnsop@ietf.org>; Sat, 12 Aug 2017 08:42:46 -0700 (PDT)
Received: from tums.local (dhcp-181.access.lah1.vix.su [24.104.150.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by family.redbarn.org (Postfix) with ESMTPSA id 86E6861FF3; Sat, 12 Aug 2017 15:42:44 +0000 (UTC)
From: Paul Vixie <paul@redbarn.org>
To: dnsop@ietf.org
Cc: Lanlan Pan <abbypan@gmail.com>, Matthew Pounsett <matt@conundrum.com>, Paul Hoffman <paul.hoffman@vpnc.org>, Petr Špaček <petr.spacek@nic.cz>, Vladimír Čunát <vladimir.cunat@nic.cz>
Date: Sat, 12 Aug 2017 15:42:42 +0000
Message-ID: <1659363.yAWSxLQAC2@tums.local>
Organization: Vixie Freehold
In-Reply-To: <CANLjSvWOzaJcVL64BhNFKnTUEgfq06TQtoy=ZNJ_JafvPU1aSA@mail.gmail.com>
References: <149908054910.760.8140876567010458934.idtracker@ietfa.amsl.com> <CAAiTEH8ntOerB6MGKMS2xcCK3TL9n4fyLq6F+bpUY6oTUpWN8w@mail.gmail.com> <CANLjSvWOzaJcVL64BhNFKnTUEgfq06TQtoy=ZNJ_JafvPU1aSA@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/deM6TmNi8qZm5HuBwhSfbWExR5Q>
Subject: Re: [DNSOP] Fwd: New Version Notification for draft-pan-dnsop-swild-rr-type-00.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Aug 2017 15:42:48 -0000

On Saturday, August 12, 2017 8:29:45 AM GMT Lanlan Pan wrote:
> ...
> 
> SWILD is a feature just for recusive cache optimization, only dealing with
> the wildcard subdomain issue (with no nodes below).
> DNSSEC + NSEC aggressive is security feature, with cryptographic contents
> such as KSK/ZSK/NSEC/NSEC3/NSEC5/...
> 
> My assumption is: *we can give recursive server an alternative solution for
> wildcard subdomain cache issue, not need to depend on DNSSEC.*
> Authoritative server just simply add one SWILD RR, not much deploy cost.
> Recursive server can add SWILD support if it has an interest in wildcard
> subdomain cache optimization,  it is OPT-IN.
> 
> *I don't expect implementers would adopt SWILD 100% before adopting
> DNSSEC+NSEC aggressive. Just give an alternative choice, implementers can
> decide adopting or not, before or after, we won't pre-select for them.*

we do, though, and we must. DNSSEC development began in 1996, and deployment 
is stalled due to lack of motivation. it is the IETF's position that DNSSEC is 
a public good in that it will enable a general world-wide security level that 
has always eluded the Internet.

any DNSSEC feature that we decide to offer separately ("a la carte") is both a 
missed opportunity to increase the deployment of DNSSEC, and a self-inflicted 
wound that deliberately further stalls that deployment.

noting that DNSSEC as a protocol is of atrociously low quality ("it's crap"), 
i am in no way defending the design itself. however, it does work, and we 
would be acting contrary to our own best interests ("folly") if we took up 
anything like SWILD, or allowed anything like SWILD on the individual track.

failing that level of commitment, the IETF ought to kill DNSSEC altogether.

this is very similar to the "shall we had IPv6's features to IPv4, since V6 is 
taking so long to deploy, and these features are badly needed?" debate.

vixie