Re: [DNSOP] Obsoleting DLV

Matthijs Mekking <matthijs@pletterpet.nl> Thu, 25 July 2019 12:59 UTC

Return-Path: <matthijs@pletterpet.nl>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3161120172 for <dnsop@ietfa.amsl.com>; Thu, 25 Jul 2019 05:59:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.597
X-Spam-Level:
X-Spam-Status: No, score=-2.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tCOSI3dyLtTx for <dnsop@ietfa.amsl.com>; Thu, 25 Jul 2019 05:59:47 -0700 (PDT)
Received: from lb2-smtp-cloud9.xs4all.net (lb2-smtp-cloud9.xs4all.net [194.109.24.26]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF51F120167 for <dnsop@ietf.org>; Thu, 25 Jul 2019 05:59:46 -0700 (PDT)
Received: from [IPv6:2001:980:4eb1:1:b483:1312:ef97:d0a0] ([IPv6:2001:980:4eb1:1:b483:1312:ef97:d0a0]) by smtp-cloud9.xs4all.net with ESMTPSA id qdLPhOAXT0QvJqdLQhBuuY; Thu, 25 Jul 2019 14:59:44 +0200
To: dnsop@ietf.org
References: <56a4b9a1-6e80-be24-0852-fe3b91869f1e@pletterpet.nl> <alpine.OSX.2.20.1907231804420.14762@dhcp-9328.meeting.ietf.org>
From: Matthijs Mekking <matthijs@pletterpet.nl>
Message-ID: <082f6fbb-9327-f974-71c5-dac959487aa6@pletterpet.nl>
Date: Thu, 25 Jul 2019 14:59:39 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0
MIME-Version: 1.0
In-Reply-To: <alpine.OSX.2.20.1907231804420.14762@dhcp-9328.meeting.ietf.org>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-CMAE-Envelope: MS4wfGgFpWOayQKJ8iVArBQ1RkL8vZ4gvTJmQv2VqeTsKmaFJWtSTemDjdEeXyIS6OKAX7otxNsK9/rqBHCvreZ9RNn86pVS4SdS83sBXy1Tao0kSA7GiYXf THhhojjcnbFNjSGFOQ/fbv+AZd4n+LeXovLKqgdtx3Wk5j+CiWPnrVtDaANwZ/vwQEHfHDr1Jib+dn4noxwXkcrPRu+3MSud6MK7Qxo21K9J8Dof4eHRVvwQ A7MgM23BIY6FmoBpYlNCsRdBb3jtHzyrSRoIABatYss=
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/m7JAhW2YInUPxH4mGBXSLscXXQE>
Subject: Re: [DNSOP] Obsoleting DLV
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2019 12:59:50 -0000

Sam,


On 7/25/19 1:22 AM, Samuel Weiler wrote:
> On Tue, 2 Jul 2019, Matthijs Mekking wrote:
> 
>> Here's a draft with discussion why also the protocol should go
>> away. We would like to hear what you think about it.
> 
> The discussion of the private network use case in section 2 has two
> minor errors plus one bit that is unclear.
> 
> When we designed DLV, we certainly considered a private network use
> case.  RFC5074 does not strictly have public trust anchors take
> precedence over ("mask") DLV records [1].

I read text from RFC 6840 (Section C.3):

   When the trust anchors have come from different sources (e.g.,
   automated updates ([RFC5011]), one or more DNSSEC Lookaside
   Validation (DLV) registries ([RFC5074]), and manual configuration), a
   validator may wish to choose between them based on the perceived
   reliability of those sources.  The order of precedence might be
   exposed as a configuration option.


> I suggest replacing the text in section 2 starting with "One other..."
> with:
> 
>    One other possible reason to keep DLV is to distribute trust anchors
>    for private enterprises.  The authors are not aware of any such use
>    of DLV.
> 
> That does not include the argument in the below bullet, which I find
> unclear.  What does "name redirection" mean in this context?
> 
>    o  Since the zones are related to private networks, it would make
>       more sense to make the internal network more secure to avoid name
>       redirection, rather than complicate the DNS protocol.

Thanks, I made the change in the GitHub repository (BTW I also resolved
Paul Wouters nit comments from earlier).


Best regards,

Matthijs



> -- Sam
> 
> 
> [1] Specifically, 5074 says to use public trust anchors first.  If they
> give a validation result other than "Secure", then do DLV processing. 
> I'm not 100% sure of how BIND's logic works here.
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop