Re: [DNSOP] [Ext] Compact DoE sentinel choice

Edward Lewis <edward.lewis@icann.org> Mon, 31 July 2023 15:58 UTC

Return-Path: <edward.lewis@icann.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92438C15152D for <dnsop@ietfa.amsl.com>; Mon, 31 Jul 2023 08:58:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.907
X-Spam-Level:
X-Spam-Status: No, score=-6.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3Y-myKY4CtxL for <dnsop@ietfa.amsl.com>; Mon, 31 Jul 2023 08:58:29 -0700 (PDT)
Received: from ppa5.dc.icann.org (ppa5.dc.icann.org [192.0.46.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C6818C151095 for <dnsop@ietf.org>; Mon, 31 Jul 2023 08:58:29 -0700 (PDT)
Received: from MBX112-W2-VA-1.pexch112.icann.org (out.mail.icann.org [64.78.48.207]) by ppa5.dc.icann.org (8.17.1.19/8.17.1.19) with ESMTPS id 36VFwSfs015252 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <dnsop@ietf.org>; Mon, 31 Jul 2023 15:58:28 GMT
Received: from MBX112-E2-VA-1.pexch112.icann.org (10.217.41.128) by MBX112-E2-VA-1.pexch112.icann.org (10.217.41.128) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.30; Mon, 31 Jul 2023 11:58:28 -0400
Received: from MBX112-E2-VA-1.pexch112.icann.org ([10.217.41.128]) by MBX112-E2-VA-1.pexch112.icann.org ([10.217.41.128]) with mapi id 15.02.1118.030; Mon, 31 Jul 2023 11:58:28 -0400
From: Edward Lewis <edward.lewis@icann.org>
To: "dnsop@ietf.org" <dnsop@ietf.org>
Thread-Topic: [DNSOP] [Ext] Compact DoE sentinel choice
Thread-Index: AQHZwXusY3KGznA+Q0ykp41/5ZGNqa/UDLiA
Date: Mon, 31 Jul 2023 15:58:27 +0000
Message-ID: <3DD71F0B-F035-4538-B9B1-706C8188C6FE@icann.org>
References: <ZL7lHPcpNpb_VFef@straasha.imrryr.org> <EE6A9C87-0D78-4179-BDBF-556459472709@icann.org> <ZMP_OazIDSDvjrbR@straasha.imrryr.org>
In-Reply-To: <ZMP_OazIDSDvjrbR@straasha.imrryr.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.65.22091101
x-originating-ip: [192.0.47.234]
x-source-routing-agent: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <90A7773BBBE6EB4996E55CB1C337BF23@pexch112.icann.org>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.591,FMLib:17.11.176.26 definitions=2023-07-31_09,2023-07-31_02,2023-05-22_02
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/kR2NZ0f5H_lh0PHP2n6GqfT3Eu4>
Subject: Re: [DNSOP] [Ext] Compact DoE sentinel choice
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 Jul 2023 15:58:33 -0000

On 7/28/23, 1:48 PM, "DNSOP on behalf of Viktor Dukhovni" <dnsop-bounces@ietf.org on behalf of ietf-dane@dukhovni.org> wrote:

>    We rolled out NSEC3 by introducing new algorithm code points, and
>    eventually these weere widely enough deployed to allow zones to be
>    signed with 7/8/10/13/14 without being seen as insecure by a significant
>    fraction of resolvers.  I don't expect CDoE to wait for the ~5 years or
>    more that this would take.

"Minimally Covering NSEC Records and DNSSEC On-line Signing" is referenced in the Compact Denial of Existence draft, it was published in 2004 (aka RFC 4470).  I can't determine which internet draft led to that document so I can't tell when discussions on this topic began.  Suffice it to say, this has been hanging around a very long time - enough time for a person to be born, raised and graduate from public schools (~18 years).  Persuasively I'll claim that this is the result of trying to be pragmatic when updating a protocol.  (Meaning - "what's another few years"?.)

I also think that software is updated more quickly, when motivated.  That's one lesson from the 2018 root zone KSK roll.  But I won't concentrate on that here.

What's pragmatic for protocol engineering may not be suitable for operations.  I'm concerned with the low deployment of DNSSEC, 25 years since the first meeting to spur adoption.  Having sat through years of messaging that "operators need to be informed" and "we need to present the business case" without much success has led me to think inward.  My hypothesis (note-hypothesis) is that DNSSEC is not (entirely) suitable for operations.  My theory is that we need to be driving towards a simpler protocol, and as part of that, we need to avoid trying to retrofit "what is needed in the world now" into "what was designed for the world we anticipated in 1990."

This is the reason I'm objecting to this approach.

One of my objections is that this approach will make names that are non-existent (per the definition in "The Role of Wildcards in the Domain Name System") and reply to queries with records owned by the name.  In replies without DNSSEC records, the response code would be NXDOMAIN and in replies with DNSSEC records, the answer appears to be a no error but no data response.  This means the zone would be seen differently depending on whether the recipient reads DNSSEC or not.

Another objection is in the redefining of fields.  While the implementation of signing and validation may be able to accommodate using "dummy resource record types" (such as meta types designed to be in the range 128-255), whether management tools will be able to keep up needs to be kept in mind as well as the increasing skillset needed by the operations staff (who will be called in when customers do not get what they expect).

E.g., while preparing this message I tried these two dig messages:

dig somename.cloudflare.com a @ns3.cloudflare.com.
and
dig somename.cloudflare.com a

The first returned NXDOMAIN, the later NoError/NoData.  If I were a human trying to figure out a problem with a wildcard not matching, the difference between these two responses would be significant.  (The reason existence is defined in the wildcard document is that existence matters when applying the synthesis rules.)

I encourage updating DNSSEC to fit into the modern world.  The result ought to lead towards higher adoption - by making DNSSEC a "no brainer" to deploy and operate.  I'm urging that this be done in the (unquantified here) right way.  I have my doubts that fitting new meanings into old formats is the way to go.