[DNSOP] Re: Call for Adoption: draft-davies-internal-tld

Mark Andrews <marka@isc.org> Sat, 19 April 2025 03:02 UTC

Return-Path: <marka@isc.org>
X-Original-To: dnsop@mail2.ietf.org
Delivered-To: dnsop@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 8ECED1E5D027 for <dnsop@mail2.ietf.org>; Fri, 18 Apr 2025 20:02:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=isc.org header.b="Cc/Fee2D"; dkim=pass (1024-bit key) header.d=isc.org header.b="NjhK3e2q"
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OqJg-jEUt5hR for <dnsop@mail2.ietf.org>; Fri, 18 Apr 2025 20:02:00 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.2.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id A8F821E5D022 for <dnsop@ietf.org>; Fri, 18 Apr 2025 20:02:00 -0700 (PDT)
Received: from zimbrang.isc.org (zimbrang.isc.org [149.20.2.31]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx.pao1.isc.org (Postfix) with ESMTPS id 19FA83AB357; Sat, 19 Apr 2025 03:01:59 +0000 (UTC)
ARC-Filter: OpenARC Filter v1.0.0 mx.pao1.isc.org 19FA83AB357
Authentication-Results: mx.pao1.isc.org; arc=none smtp.remote-ip=149.20.2.31
ARC-Seal: i=1; a=rsa-sha256; d=isc.org; s=ostpay; t=1745031719; cv=none; b=Kx7elQ2JG7DC0pcCd+lDFRu0Dr2OOPpIDJH5jqnZHNu/SoSKLV2oqDHxpXcvqjkzTTTQCs3BS+lUaO/tE4u66fcCL4suH/quKGI0KJ4hVPnuY5euu0e4AJDTXOX20BP5cQY7QTP8UATHOMeU9Au3UYblCKAXjl1nXT7ZTl8Zh64=
ARC-Message-Signature: i=1; a=rsa-sha256; d=isc.org; s=ostpay; t=1745031719; c=relaxed/relaxed; bh=tOVSGgN1U1wMid5/2na2Tnww+wPwE6SR4RNFgQrji9g=; h=DKIM-Signature:DKIM-Signature:From:Mime-Version:Subject:Date: Message-Id:To; b=g7bQc3GBtUvrcxYM7BbXwUcAw7meQcOl8siS/5J/CQHOFgRpww5NBqyFQjfj0kgY35JpwxFzXivbJpltACTwRWYTv0Bfk4lnaPDRlJgCOZqmtYApF62xHGW9fASrHV9dtcZegv6o3B3mlI5WPkWZuloLbOQuDZWkh3jEkx5dTwo=
ARC-Authentication-Results: i=1; mx.pao1.isc.org
DKIM-Filter: OpenDKIM Filter v2.10.3 mx.pao1.isc.org 19FA83AB357
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=isc.org; s=ostpay; t=1745031719; bh=aSOviFDIgJd4NPEa11du4UQLF+z0qn7kKVGaWdm+ROw=; h=From:Subject:Date:References:Cc:In-Reply-To:To; b=Cc/Fee2DKU5wg89Da60xbqVUrPd4Fxbi+vGGbe1ram4cSiTqtZgQsi0VpNM6zhxr3 9LKkiqf5Ctcb5MKclLQY9BUs+776RFFWH8Qz4OVUpSr92XKaM5BKBsWc0zRIuM2Vmd Qf1bt6/+XtGJ78qt6el4CUGb8gQKmkB+1Ej2peNQ=
Received: from zimbrang.isc.org (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTPS id 14B7BAC7F60; Sat, 19 Apr 2025 03:01:59 +0000 (UTC)
Received: from localhost (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTP id E60FBAC7F81; Sat, 19 Apr 2025 03:01:58 +0000 (UTC)
DKIM-Filter: OpenDKIM Filter v2.10.3 zimbrang.isc.org E60FBAC7F81
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isc.org; s=05DFB016-56A2-11EB-AEC0-15368D323330; t=1745031718; bh=tOVSGgN1U1wMid5/2na2Tnww+wPwE6SR4RNFgQrji9g=; h=From:Mime-Version:Date:Message-Id:To; b=NjhK3e2qb1D9YREvuW3wAQds5CzNXaqMZZ9NrpgTyvotVGFWlfODR8y6tIY9KvbJO u+vstHRCMUqb2N+Qhn/fFh+VVeFhy3x+IkYgGGtLHmDaRrY/glwPeKnopRCFr3NmXQ zdCLFjXhYBo3H6fqdjKh+McxSQBZAg3CFo7bi75Q=
Received: from zimbrang.isc.org ([127.0.0.1]) by localhost (zimbrang.isc.org [127.0.0.1]) (amavis, port 10026) with ESMTP id UufKaFQIZYLf; Sat, 19 Apr 2025 03:01:58 +0000 (UTC)
Received: from smtpclient.apple (n49-187-18-238.bla1.nsw.optusnet.com.au [49.187.18.238]) by zimbrang.isc.org (Postfix) with ESMTPSA id A44ADAC7F60; Sat, 19 Apr 2025 03:01:58 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: Mark Andrews <marka@isc.org>
Mime-Version: 1.0 (1.0)
Date: Sat, 19 Apr 2025 13:01:46 +1000
Message-Id: <E54B0C4A-71CF-4735-834E-AE2AA9890EFB@isc.org>
References: <83666fd3-a51f-46e1-a5ac-0b9a46361480@desec.io>
In-Reply-To: <83666fd3-a51f-46e1-a5ac-0b9a46361480@desec.io>
To: Peter Thomassen <peter@desec.io>
X-Mailer: iPhone Mail (22E252)
Message-ID-Hash: MCDYJ6KJ3RIX5TYOHPFFQ6LHF2OZVMVL
X-Message-ID-Hash: MCDYJ6KJ3RIX5TYOHPFFQ6LHF2OZVMVL
X-MailFrom: marka@isc.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Philip Homburg <pch-dnsop-6@u-1.phicoh.com>, dnsop@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: Call for Adoption: draft-davies-internal-tld
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/eY1A5NJmyzbdRQOvEt_hQwo0CnI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

I would insecurely “delegate”” internal back to the root servers.   Delegating to “.” produces a broken configuration. If the traffic gets too big internal can be redirected to sacrificial servers as is done for RFC1918 reverses. 
-- 
Mark Andrews

> On 19 Apr 2025, at 02:19, Peter Thomassen <peter@desec.io> wrote:
> 
> 
> 
>> On 4/18/25 10:24, Philip Homburg wrote:
>> The current draft contains the following text:
>> DNSSEC validating resolvers will fail to resolve names ending in "internal".
>> In my opinion we should not have a specification that leads to DNSSEC
>> validation errors.
> 
> I agree this is a problem, and therefore I'm against adopting this draft unless this problem is resolved.
> 
> Once it is resolved, I have no position on adopting it: I'm not sure the draft's net benefit is positive (transparency) or negative (burden). I expect it to be minimal either way.
> 
> 
> How to solve it? An insecure delegation would help.
> 
> Although the idea was previously discarded, it's worth reconsidering its implications. Please see below for an analysis.
> 
> 
> When Mark suggested an insecure delegation at IETF 122, Warren objected [1] that it can't be done because the label won't be delegated, citing the SSAC recommendation:
> 
>> 5: Mark Andrews: The Locally Served Zones registry requires that there is an insecure delegation in the root zone. This is also needed to make the zone actually work with DNSSEC…
>> W: I'm not at all sure that the first sentence is true - or, at least I don't really see why it follows.
>> I *do* however fully agree that there really should be an insecure delegation in order to make DNSSEC work, but unfortunately the SSAC document[3] which asked for this says: "Recommendation 1: The SSAC recommends that the ICANN Board ensure a string is identified using the criteria specified in Section 4.1 and reserved at the top level for private use. This particular string must never be delegated."
> 
> The SSAC recommendation is just a recommendation; when following it (which the ICANN Board is not obliged to), reasonable action would be to not execute it by the letter, but by its intention.
> 
> However, the constraining document, is not the SSAC report, but really the ICANN Board's resolution [2]:
> 
>> Resolved (2024.07.29.06), the Board reserves .INTERNAL from delegation in the DNS root zone permanently to provide for its use in private-use applications. The Board recommends that efforts be undertaken to raise awareness of its reservation for this purpose through the organization's technical outreach.
> 
> Note that the action ("reserves .INTERNAL from delegation") is relative to a purpose, "to provide for its use in private-use applications".
> 
> I would therefore argue that "delegation" here implicitly means a "normal delegation" because it would hand over control to some other operator, defeating the purpose.
> 
> Excluding a special pseudo-delegation that actually *helps* the purpose is not a helpful interpretation.
> 
> If .INTERNAL was delegated to a special name (like the DNS root), that purpose could be conserved, and the label would continue to be reserved from (normal) delegation -- BUT the zone would be unlinked from DNSSEC, removing related failure modes:
> 
> internal.  IN NS    .
> internal.  IN NSEC  international. NS RRSIG NSEC  # no DS
> internal.  IN RRSIG NSEC ...
> 
> Adding these three lines in the root zone still qualifies as "not a normal TLD delegation", but achieves the purpose while making in work with the DNSSEC protocol.
> 
> Those lines explicitly declare that the root's signing keys have no authority under .INTERNAL, which, in fact, they don't, because .INTERNAL is private use. It almost seems illogical to not have this carve-out.
> 
> In fact, *absolutely* not delegating INTERNAL. does NOT achieve the purpose "to provide for its use in private-use applications", because "it's broken by default".
> 
> Making this change is more (not less) in the spirit of the SSAC's proposal, and presumably of what the ICANN Board resolved.
> 
> Not making this change is constraining things artificially to a degree that in fact thwarts the actual purpose of the label reservation in the first place!
> 
> 
> My suggestion is therefore that we should talk to ICANN if the above procedure would be in line with the meaning of the resolution; if not, perhaps it could be clarified. -- I'm aware this is not an IETF topic, but it is a dependency for the proposed draft to make sense.
> 
> As for why this happened, I suspect that "will not be delegated" was written to indicate that "authority" will not be transferred to any registry, but unfortunately it was forgotten that one also has to un-declare the authority of the parent's signing keys in this case. -- This seems like a simple omission, and with proper explanation I'd hope it would be possible to get it fixed.
> 
> Thanks,
> Peter
> 
> [1]: https://mailarchive.ietf.org/arch/msg/dnsop/IWH_Dm3aM3HNAmBrv9PVByj8g3I/
> [2]: https://www.icann.org/en/board-activities-and-meetings/materials/approved-resolutions-special-meeting-of-the-icann-board-29-07-2024-en#section2.a
> 
> --
> https://desec.io/