Re: [DNSOP] Éric Vyncke's No Objection on draft-ietf-dnsop-no-response-issue-20: (with COMMENT)

Mark Andrews <marka@isc.org> Tue, 14 April 2020 00:15 UTC

Return-Path: <marka@isc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C97AC3A2195; Mon, 13 Apr 2020 17:15:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DrpB4NH2A3Wi; Mon, 13 Apr 2020 17:15:44 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0872D3A2196; Mon, 13 Apr 2020 17:15:44 -0700 (PDT)
Received: from zmx1.isc.org (zmx1.isc.org [149.20.0.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.pao1.isc.org (Postfix) with ESMTPS id EB6723AB00B; Tue, 14 Apr 2020 00:15:43 +0000 (UTC)
Received: from zmx1.isc.org (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTPS id DDC2616005D; Tue, 14 Apr 2020 00:15:43 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTP id CA6DE160083; Tue, 14 Apr 2020 00:15:43 +0000 (UTC)
Received: from zmx1.isc.org ([127.0.0.1]) by localhost (zmx1.isc.org [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 7ca8qHUPTzBI; Tue, 14 Apr 2020 00:15:43 +0000 (UTC)
Received: from [172.30.42.69] (unknown [49.2.228.79]) by zmx1.isc.org (Postfix) with ESMTPSA id 558F816005D; Tue, 14 Apr 2020 00:15:42 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.5\))
From: Mark Andrews <marka@isc.org>
In-Reply-To: <158635541503.17090.16242357885883562267@ietfa.amsl.com>
Date: Tue, 14 Apr 2020 10:15:39 +1000
Cc: The IESG <iesg@ietf.org>, Tim Wicinski <tjw.ietf@gmail.com>, draft-ietf-dnsop-no-response-issue@ietf.org, dnsop-chairs@ietf.org, dnsop@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <1D23F4AA-2B22-4709-BD55-ECB864AD6FC4@isc.org>
References: <158635541503.17090.16242357885883562267@ietfa.amsl.com>
To: Éric Vyncke <evyncke@cisco.com>
X-Mailer: Apple Mail (2.3445.9.5)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/jREalxpto3TxQuArSXKls1Bb7Cs>
Subject: Re: [DNSOP] Éric Vyncke's No Objection on draft-ietf-dnsop-no-response-issue-20: (with COMMENT)
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Apr 2020 00:15:46 -0000


> On 9 Apr 2020, at 00:16, Éric Vyncke via Datatracker <noreply@ietf.org> wrote:
> 
> Éric Vyncke has entered the following ballot position for
> draft-ietf-dnsop-no-response-issue-20: No Objection
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-no-response-issue/
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> Thank you for the work put into this document. I also like the extensive test
> scenarios with 'dig' ;-)
> 
> To be honest, I was about to ballot a DISCUSS as I have some doubts whether the
> objective of removing non-compliant servers (end of section 2) is achievable...
> Too many non-compliant servers, probably managed by clueless people. But, hey,
> we can always try!

Lots have been removed over the last couple of years.  DNS flag day in Feb 2019
caused lots of vendors to issue fixed.  You can see where different vendors have
fixed their products and operators have updated.  Look around https://ednscomp.isc.org/

> I also wonder why this document is a generic BCP while section 8 and other
> parts seem to indicate more like a testing of servers. Balloting NO OBJECTION
> but also long hesitation for a DISCUSS.
> 
> Please address the nits found by Carlos during the INTDIR review:
> https://mailarchive.ietf.org/arch/msg/int-dir/wfKo4vDmFJwPa1HeDY9wxP2JdEA (at
> least one nit is already addressed, thank you)

Both of the items listed where addressed though I don’t know why xml2frc left
three spaces inside a <t> block as 3 spaces in the resulting .txt file.

> Please find below some non-blocking COMMENTs and NITs. An answer will be
> appreciated.
> 
> I hope that this helps to improve the document,
> 
> Regards,
> 
> -éric
> 
> == COMMENTS ==
> Generic: the objective of this document is a little unclear to me, is it to do
> compliance testing/certification specific DNS server software ? or to actual
> DNS servers on the Internet.

Both,  I know some TLD operators are intending to use this to test delegated servers.
I’ve been testing different populations of servers for last 4+ years to see trends
and yes they are improving.  DNS vendors can use the tests as part of their QA
process.

> -- Section 1 --
> Suggest to also add middle-box dropping EDNS in the sentence "Due to the
> inability to distinguish between packet loss and nameservers dropping EDNS"
> (see section 4).

Added.

> -- Section 4 --
> Why limiting the middle boxes to only firewalls and load balancers? There are
> many different types of middle-box (NAT, ...) also doing "packet massaging" on
> the fly... :-(

Yep, CISCO’s “dns fixup” invariable needs to be disabled if it is on in front of a DNS
server as all it does is damage and as far as I can tell no good.

Transparent DNS Proxies that aren’t.  You can’t just redirect port 53 traffic at a
recursive DNS server and have it will all work.  There are iterative clients and there
are TSIG and SIG(0) signed DNS requests at a minimum to deal with.  The later the recursive
server can’t fake a legitimate response to.  Iterative clients can be faked out by recursing
even though RD is 0 and setting AA to 1 on the response.

NAT’s that don’t do TCP but pass back TC=1 responses.

There will always be more way people break DNS.

> -- Section 10 --
> The security considerations is rather weak...
> 
> If the intent is to probe Internet servers, then why not adding some text
> around 'do it only with prior agreement of the DNS servers operator’ ?

Have you every tried to contact a DNS service operator?  Whois has been gutted.
SOA contact field are bogus.  Websites don’t have working contact points when there is
a website matching the DNS server.  You are lucky if you can reach 10% of them.

The requests only match those that are currently being sent by recursive servers or
can legitimately be expected to be sent in the future. EDNS options are sent without
prior agreement today.  Bumping the EDNS version in the request shouldn’t require prior
agreement as all EDNS aware servers should be expecting it (the expected behaviour
is specified) and for those that aren’t the EDNS version doesn’t matter.  New types
requests are being sent all the time.  New opcodes have occurred twice already so its
not like DNS servers vendors shouldn’t be expecting them to happen in the future.
NOTIFY messages (a opcode that didn’t exist in RFC 1034/1035) are sent by authoritative
to other authoritative servers and there was never any pre-agreement on doing so but it
did make handling the responses (or the lack of them) more complicated.  UPDATE requests
can also potentially be sent without prior agreement (it would actually make sense to
update PTR records using UPDATE over TCP rather than pre-populating zones with a TIMEOUT
record, currently a I-D, to remove it if not refreshed, thats every machine doing it).

I’d like to make it so that the next time any of these sort of events happen, and
they will, recursive server operators aren’t fighting broken servers and poorly
configured firewalls etc.  Same to when stub resolver use more that minimal DNS
features to talk to recursive servers.

> Also, if the firewall is "protecting" the DNS server (cough cough), then as a
> security officer I would prefer to block all unknown opcodes/types at the
> firewall (possibly with a reply).

And the harm in asking is what?  Oh, you don’t have a AAAA record or a TLSA record
or a type1001 record.  It took 10 to 15 years before AAAA lookups stopped being
blocked because it was “unknown” despite the type being defined for over a decade,
in the meantime clients that where trying to look up the records ended up waiting
several seconds every time they attempted to connect to your website.  You
where “safe” but you where losing business because your web servers appeared to be slow.

You blocked TLSA lookups so the email to you queued for 3 days before bouncing back to
the sender as undeliverable.

Negative answers are just as important as positive answers to keep things working.

Of all the DNS types defined in the last 40 years is there a single one that is
truely dangerous?  Even ANY isn’t amplifier as long as you have had a three way
handshake be it using TCP or DNS COOKIE.  Modern DNS server set TC=1 for ANY and
that moves the query to TCP for legitimate clients.  Some clients default to TCP
for ANY queries to avoid the extra transaction.

Mark

> == NITS ==
> 
> -- section 2 --
> Please add an expansion or a reference to "AD flag bit". (and in my non-native
> English speaker, it is a pleonasm).
> 
> 
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: marka@isc.org