Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-negative-trust-anchors

Warren Kumari <warren@kumari.net> Tue, 05 May 2015 21:06 UTC

Return-Path: <warren@kumari.net>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 921BF1B29B1 for <dnsop@ietfa.amsl.com>; Tue, 5 May 2015 14:06:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.078
X-Spam-Level:
X-Spam-Status: No, score=-1.078 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, J_CHICKENPOX_37=0.6, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-0.7] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6L9wTU2dMolw for <dnsop@ietfa.amsl.com>; Tue, 5 May 2015 14:06:05 -0700 (PDT)
Received: from mail-wi0-f172.google.com (mail-wi0-f172.google.com [209.85.212.172]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 69C8D1ACDDC for <dnsop@ietf.org>; Tue, 5 May 2015 14:06:05 -0700 (PDT)
Received: by wizk4 with SMTP id k4so177906720wiz.1 for <dnsop@ietf.org>; Tue, 05 May 2015 14:06:04 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=U7AlyhrLQ05Hm3sd/LPxHawv30q63PmaW5Jb5DJREJA=; b=BOnQMokGQcJ4ZkrB5CkVA/UxlUJ3o77pZkJ7Zp+4TdTTNC6k19DRnxF4wg0uWjAMy+ Oe0ePtPlYUf7dJ7HpBsTt1LP5VdJ0X83SPtzQP4B7PTZSBpIDo9o2CbcVyGA4Qdkku4S tjweKSyBv26go8/DEYbA74uenSth5lI+QcvIIZXUk3LadohfrfSrZWs1eO96NExm4Th4 SI9TZTtPsqlTGhKxEuacFsc+R9pvh6z4hSgB3u59rvOoCdKLuFo/KQ6yzS194Nbpcjcj SpShh0SW3UxVY8GV9CWMOJeZdEO1hcMjDqrpM1oKlXm8Iw0o4HykxUMagXe/qpwFYyPB lGJw==
X-Gm-Message-State: ALoCoQl7Pn/vjQ/fO13syKD6FO5ZF4zWOSzOP42Fc6xVPsYQ9F9XVmJr/lb8SiiHUYP5A0nqaji5
MIME-Version: 1.0
X-Received: by 10.180.83.193 with SMTP id s1mr1755725wiy.22.1430859964128; Tue, 05 May 2015 14:06:04 -0700 (PDT)
Received: by 10.194.47.36 with HTTP; Tue, 5 May 2015 14:06:04 -0700 (PDT)
In-Reply-To: <CAJE_bqc-T75k3sQZKtAF1VHp49biGn+Es5v5FivNSz5e3oB-Cg@mail.gmail.com>
References: <553EBF02.3050703@gmail.com> <CAJE_bqc-T75k3sQZKtAF1VHp49biGn+Es5v5FivNSz5e3oB-Cg@mail.gmail.com>
Date: Tue, 05 May 2015 17:06:04 -0400
Message-ID: <CAHw9_iL9RLp0jynT0m_D6dGZYhmdonvBC-5ifTdB63eh5gvBeg@mail.gmail.com>
From: Warren Kumari <warren@kumari.net>
To: 神明達哉 <jinmei@wide.ad.jp>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/mJ0jBaIgBOB5qzyw7q0zHH0S8xU>
Cc: Tim Wicinski <tjw.ietf@gmail.com>, dnsop <dnsop@ietf.org>
Subject: Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-negative-trust-anchors
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 May 2015 21:06:08 -0000

... and now I'm replying to the rest of the comments.

I've integrated them and posted a new version with the clarifications
on a *positive* **trust anchor** under an NTA.
I'm not very happy with the text I added, if others have better text
happy to consider it...

Huge thanks to Jinmei for the careful review, catching this corner
case, and providing helpful text...

More comments inline.


On Mon, May 4, 2015 at 2:25 PM, 神明達哉 <jinmei@wide.ad.jp> wrote:
> At Mon, 27 Apr 2015 18:58:10 -0400,
> Tim Wicinski <tjw.ietf@gmail.com> wrote:
>
>> This starts a Working Group Last Call for Adoption for
>> draft-ietf-dnsop-negative-trust-anchors
>
> (I guess this is "for Publication", not "for Adoption").
>
> Also, have we decided to publish it as an Informational document?  I'm
> not opposed to it, but this document contains some normative text and
> affects inseparability in some sense, so a standard truck seems to be
> a more appropriate choice for me.
>

I personally don't have a strong opinion here. I think that the
authors figured that it "felt" more informational, and mainly (in our
view) provided advice to operators -- but, we are perfectly happy to
change it to Std if that's what the chairs would like...


>> Current versions of the draft is available here:
>>
>> https://datatracker.ietf.org/doc/draft-ietf-dnsop-negative-trust-anchors/
>>
>> https://tools.ietf.org/html/draft-ietf-dnsop-negative-trust-anchors-04
>>
>> Please review the draft and offer relevant comments. Also, if someone
>> feels the document is *not* ready for publication, please speak out with
>> your reasons
>
> I do not think it's ready for publication yet.
>
> I'd like to see a discussion on whether it really makes sense that an
> NTA for a domain name even disables a positive trust anchor below the
> name.  I made more specific comment on this in a separate message:
> http://www.ietf.org/mail-archive/web/dnsop/current/msg14170.html
> (with some other comments on the 04 version of the draft).
>

So, I've heard back from some of the other authors (and Evan, one of
the implementors), and what we'd all assumed / understood was what you
also believe is the "right thing". Since the root is signed we haven't
really been seeing many manually configured trust anchors, and so we
hadn't really discussed it much.

If there is a *positive* *trust anchor* for foo.bar.baz.example, it
takes precedence over a negative trust anchor at baz.example. The
mental model I've been using is "just pretend that there is no DS in
the parent" when you see an NTA.

So, now all I need to do is try craft some text (and probably an
example to illustrate).
There are number of places where I'll have to make some changes to
clarify this. I've just posted a new version that somewhat clarifies
this, but more text gratefully accepted...


> I also think Appendix B needs more editorial cleanups.  Those
> editorial matters may not be a showstopper by themselves, but I guess
> it's better to fix them before sending it to the IESG.
>


Fair. I'll do those. I may post a new version with the larger changes
first, as they may need more discussion.

> A couple of other comments on version 4:
>
> - Section 4:
>    It is therefore
>    recommended that NTA implementors should periodically attempt to
>    validate the domain in question, for the period of time that the
>
>   I guess this 'recommended' may be better RFC2119 capitalized, i.e.,
>   "RECOMMENDED".  Not a strong opinion, but it seems to me to be more
>   aligned with general tone and other usage of RFC2119 keywords of
>   this section.

DONE.

I now have "It is therefore RECOMMENDED that NTA implementors SHOULD
periodically attempt to validate the domain in question..."
Is that what folk would like?

>
> - Section 4: likewise, maybe s/should/SHOULD/
>    When removing the NTA, the implementation should remove all cached
>    entries below the NTA node.

DONE.
Looks good.


>
> Editorial and minor comments:
>
> - Section 3: there's an awkward blank line (and spaces) before the
>   reference:
>    names for a Negative Trust Anchor.  For example, Unbound calls their
>    configuration "domain-insecure."
>
>    [Unbound-Configuration]

DONE.
Weird...


>
> - Section 7.1: s/has have/has/


DONE.
Good catch.

>    Thus, there may be a gap between when a domain has have been re-
>
> - Appendix B: s/servers/server's/ (?)
>    domain is consistency and history.  It therefore is good if you have
>    the ability to look at the servers DNS traffic over a long period of

DONE.

>
> - Appendix B: s/them install/install them/
>    most of these tools are open source so you can them install locally
>    if you want.
>


DONE.


> - Appendix B: this sentence doesn't parse well to me...
>
>    Using the tools over the Internet has the advantage though that as
>    these are not located in the same part of the network you already
>    will have more than local view by using different tools.

DONE.


>
> - Appendix B: s/server.s/servers./
>    consistently around the world and from all authoritative server.s Use

DONE.

>
> - Appendix B: s/an guarantee/a guarantee/
>    attack, although that is not an guarantee.  Also if the output from

DONE.
Wow, I didn't do a good proofreading here, did I? :-)


>
> - Appendix B: it's now a dnsop wg document
>    EDNS0 client subnet (draft-vandergaast-edns-client-subnet) applied to
>    the domain.

DONE.
Doh!

>
> - Appendix B: this sentence doesn't parse well to me...
>
>    Again if the data is the same this
>    is an indication that the error is operator caused not an guarantee.

DONE.

>
> - Appendix B: s/parents/parent's/ (or "parent zone's ?)
>    o  DNSKEYs in child zone don't match parents zone DS record.  There

DONE.
Huh. Yeah. I couldn't figure out which, so I made it 'DNSKEYs in child
zone don't match the DS record in the parent zone.'


>
> - Appendix B: these two sentences seem too informal grammatically, if
>   not broken:
>       Has the existed before and was used?
>       Was there a change in the DNSKEY RRSet recently (indicating a key
>       rollover) and of course has the actual data in the zone changes.

DONE. I think.

>
> - Appendix B:
>    o  Data in DS or DNSKEY doesn't match the other.  This is more common
>       in initial setup when there was a copy and paste error.  Again
>       checking history on data is the best you can do there.  It's not
>       possible to give a checklist just to run through to decide if a
>       domain is broken because of an attack or an operator error.
>
>   Is the "It's not possible..." sentence supposed to belong to the
>   bullet?  This sentence seems to talk about something general, and
>   seem to make more sense if it's part of the sentence that follows:
>
>    All of the above is just a starting point for consideration when
>    having to decide to deploy or not deploy a trust anchor.

DONE

Thanks for all of the suggestions.

>
> --
> JINMEI, Tatuya
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf