Re: [DNSOP] proposal: Covert in-band zone data

Paul Ebersman <list-dnsop@dragon.net> Tue, 30 July 2019 20:08 UTC

Return-Path: <list-dnsop@dragon.net>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B9AB12001E for <dnsop@ietfa.amsl.com>; Tue, 30 Jul 2019 13:08:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nKVzCFzQ9GOW for <dnsop@ietfa.amsl.com>; Tue, 30 Jul 2019 13:08:21 -0700 (PDT)
Received: from mail.dragon.net (mail.dragon.net [IPv6:2001:4f8:3:36::235]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D850312001A for <dnsop@ietf.org>; Tue, 30 Jul 2019 13:08:21 -0700 (PDT)
Received: from fafnir.remote.dragon.net (localhost [IPv6:::1]) by mail.dragon.net (Postfix) with ESMTP id 14DC537402E6; Tue, 30 Jul 2019 13:08:21 -0700 (PDT)
Received: by fafnir.remote.dragon.net (Postfix, from userid 501) id A424215E6AD4; Tue, 30 Jul 2019 14:08:59 -0600 (MDT)
Received: from fafnir.local (localhost [127.0.0.1]) by fafnir.remote.dragon.net (Postfix) with ESMTP id 9FCFA15E6AD3; Tue, 30 Jul 2019 14:08:59 -0600 (MDT)
From: Paul Ebersman <list-dnsop@dragon.net>
To: Dan Mahoney <dmahoney@isc.org>
cc: dnsop@ietf.org
In-reply-to: <alpine.BSF.2.21.9999.1907301916050.7062@bikeshed.isc.org>
References: <20190706213024.GA56650@isc.org> <alpine.BSF.2.21.9999.1907221704030.7062@bikeshed.isc.org> <CAN6NTqymm6+OMet0sMZC0Ms5E_5mj_nwONk3fR19HwgWXYNB4Q@mail.gmail.com> <alpine.LRH.2.21.1907251332070.10708@bofh.nohats.ca> <20190725183051.33DA315BFD9D@fafnir.remote.dragon.net> <alpine.BSF.2.21.9999.1907301916050.7062@bikeshed.isc.org>
Comments: In-reply-to Dan Mahoney <dmahoney@isc.org> message dated "Tue, 30 Jul 2019 19:39:00 -0000."
X-Mailer: MH-E 7.4.2; nmh 1.7.1; XEmacs 21.4 (patch 22)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <62213.1564517339.1@fafnir.local>
Date: Tue, 30 Jul 2019 14:08:59 -0600
Message-Id: <20190730200859.A424215E6AD4@fafnir.remote.dragon.net>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/djTxtVrygi5tOsmvtIjF8hjJHJ0>
Subject: Re: [DNSOP] proposal: Covert in-band zone data
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jul 2019 20:08:24 -0000

I was also one of those folks that put things in txt zone files for
years. My whole IP address management was comments in the in-addr.arpa
zones. While I went to dynamic zones to make DNSSEC easy and lost that,
I still see value in things that should be attachable to a zone but not
zone data and not something you wanted to "publish" in the open DNS.

ebersman> I think we're allowed to replace something after 20+ years ;)

ebersman> Things that might go in:

ebersman> - AXFR/IXFR/*XFR
ebersman> - zone meta data (create/modify/delete/digital-sigs)
ebersman> - "covert" data

dmahoney> As far as extending/replacing the AXFR protocol, this is
dmahoney> great, however, I still see an orthogonal need for the thing
dmahoney> I'm asking for: Parseable metadata.  For humans.  Not as a
dmahoney> gateway to some sort of clever signaling or key-transfer
dmahoney> protocol.  Analagous more to HINFO than TXT.

Actually, I think this moves your goal nicely. If we could have things
marked as "not zone data, sensitive" and dealt with only over a covert
channel after various auth/acl checks are done, it would be easy enough
to have metadata that won't leak.

Then we define some of these things we consider "private"/non-zone.

dmahoney> I also envision the "presentation format" looking like a
dmahoney> regular comment so non-compatible implementations that tried
dmahoney> to load a zone with these simply ignored them as they do
dmahoney> regular comments.  Similar, perhaps to how server-side
dmahoney> includes work in the web world.

Legacy/non-compatible would fall out because they wouldn't ever see this
because they'd fail whatever auth/negotiation was necessary to believe
that sending covert/metadata was OK and they'd never get it.