Re: [DNSOP] Asking TLD's to perform checks.

Viktor Dukhovni <ietf-dane@dukhovni.org> Wed, 11 November 2015 09:00 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0628A1B3427 for <dnsop@ietfa.amsl.com>; Wed, 11 Nov 2015 01:00:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GncZ0YMqKfPR for <dnsop@ietfa.amsl.com>; Wed, 11 Nov 2015 01:00:03 -0800 (PST)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C2011A8843 for <dnsop@ietf.org>; Wed, 11 Nov 2015 01:00:03 -0800 (PST)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id 368302843A5; Wed, 11 Nov 2015 09:00:02 +0000 (UTC)
Date: Wed, 11 Nov 2015 09:00:02 +0000
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: dnsop@ietf.org
Message-ID: <20151111090001.GA18315@mournblade.imrryr.org>
References: <20151105235402.39FFC3BF2F29@rock.dv.isc.org> <20151110152511.6f1a1c20@pallas.home.time-travellers.org> <20151110204330.C47C63C7D699@rock.dv.isc.org> <7B4B7DEA-C705-437E-8BC1-64D96D55014E@vpnc.org> <0F2DD78A-69C4-49DA-936F-C32D0FC97CC2@rfc1035.com> <5373DDAB-1ED2-489B-AB62-BA7CF6D3DB48@frobbit.se> <20151111064744.GW18315@mournblade.imrryr.org> <314D2303-5654-4BA3-A190-F658DAF60E31@frobbit.se>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <314D2303-5654-4BA3-A190-F658DAF60E31@frobbit.se>
User-Agent: Mutt/1.5.24 (2015-08-30)
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/lHouckNuOMwrbbP8M97llpB318U>
Subject: Re: [DNSOP] Asking TLD's to perform checks.
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dnsop@ietf.org
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Nov 2015 09:00:05 -0000

On Wed, Nov 11, 2015 at 07:53:25AM +0100, Patrik Fältström wrote:

> > It may not be possible for everyone to agree on a comprehensive
> > set of 'wrongs' with no omissions, but it should be possible to
> > get consensus on a core set of 'wrongs' that are not controversial.
> 
> Yes and no. I think going for a minimum will be a good goal, but for
> example to have lame delegations must by definition be allowed, as some
> registration policies do require delegation (i.e. NS records). So people
> add NS records in parent zone, but nothing responds there. Until policy
> allows registration without delegation, you will see lame delegations.

My quick and dirty list is likely not "the list".  Mark correctly
points out starting with protocol (rather than content) issues is
a good idea.  Since lame delegations are content, they might be
out of scope.  I think that broken denial of existence is also a
protocol (software quality) issue, rather than zone data content.

This is not to say that no content issues can be in scope, but
likely those would need closer scrutiny.

For example, having DS RRs with no corresponding DNSKEY RRs invites
serious trouble, and does not seem to have a plausible reason (like
lame delegations).  But I'm presently setting any specifics in stone.

Just saying that progressing Mark's draft looks like a good idea
to me.

-- 
	Viktor.