Re: [DNSOP] New Version Notification for draft-wessels-dns-zone-digest-01.txt

Joe Abley <jabley@hopcount.ca> Sun, 29 July 2018 21:32 UTC

Return-Path: <jabley@hopcount.ca>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DAD5130EF7 for <dnsop@ietfa.amsl.com>; Sun, 29 Jul 2018 14:32:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hopcount.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wow6Bn2KqXwR for <dnsop@ietfa.amsl.com>; Sun, 29 Jul 2018 14:32:18 -0700 (PDT)
Received: from mail-it0-x22a.google.com (mail-it0-x22a.google.com [IPv6:2607:f8b0:4001:c0b::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D849C128CF3 for <dnsop@ietf.org>; Sun, 29 Jul 2018 14:32:17 -0700 (PDT)
Received: by mail-it0-x22a.google.com with SMTP id d9-v6so14435989itf.2 for <dnsop@ietf.org>; Sun, 29 Jul 2018 14:32:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hopcount.ca; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=piXuc6MeQ+eSGHEc/QEM5BpWSWd+27FTdBfQ6vguJDc=; b=L4DpvCGQm6ouRiiCeRR/A4mJ7lHTKKnZezwq4/U1HyKbH6vXHFBmJtndLF3e8BT6Bx CWdITrYrwQ0LTKPma86QVllEVLqTaMH4TMXTHDOgCbFfoR12kPU8MAnaMeAA//KJzbFQ vp30KAY7xwJz48wTRtVtfrhOizGQIVgPuOxiw=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=piXuc6MeQ+eSGHEc/QEM5BpWSWd+27FTdBfQ6vguJDc=; b=dD6/Kc2C3/Vzjd8BnI9yphnruUgp/GO+pijZ5aeKo8Ghn3g7SK5ExG/QAwLlHffl+M piPKk6t6e4Ehvjwi7cAGY+v5DxpuEv+EfCAXmNYovNTAsFHKuu8MR0YmFFbN245n/V9L cTdI2vnVB+/17ObVRfNYrMl2g7I3FQGyT0BxN46+CqeF4TLvjv+2ojXJb9VBHPTE2iiT A0Lb0nzR8lFx5v1RmBj/j6YC0IwLWkr8xC68R7hMBQeXmmEVFENd24tBVTAvdi8yRLbs iZJAh+4ShXnQAtk0kGPe2aJ8ipYU8tvMZ5j+AZpi8K2vcdxsmG2F0ia2vzR5zMd/24PO hQ6g==
X-Gm-Message-State: AOUpUlHtJZbFGviEq4OkSj/0UP6c3JxwqF6tQU+AbfTLa/EheviqiIQO xIceb/PkfCNKByblbhnXYux3L/tmW4A=
X-Google-Smtp-Source: AAOMgpfm0LRchRR32nUXupZC6Gh4BPeYUR0wyD8WF1G97fYRj/p5mfJI0ijleWpRu+OQ01zx2HVv6g==
X-Received: by 2002:a24:184c:: with SMTP id 73-v6mr12225915itr.42.1532899936722; Sun, 29 Jul 2018 14:32:16 -0700 (PDT)
Received: from ?IPv6:2607:f2c0:101:3:6d81:e02f:e86f:3b17? (node-131dv4ig82mq2zun13.ipv6.teksavvy.com. [2607:f2c0:101:3:6d81:e02f:e86f:3b17]) by smtp.gmail.com with ESMTPSA id a11-v6sm8248255ita.21.2018.07.29.14.32.15 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 29 Jul 2018 14:32:15 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail-4EFBE87B-B964-4276-B091-EEDC2AF8752C"
Mime-Version: 1.0 (1.0)
From: Joe Abley <jabley@hopcount.ca>
X-Mailer: iPad Mail (15G77)
In-Reply-To: <CABf5zvJJgrK7ATfwV2hhg8rH4TUM16TH69LmOq6V=qGDeU+TRA@mail.gmail.com>
Date: Sun, 29 Jul 2018 17:32:14 -0400
Cc: dnsop <dnsop@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <BFD89C9A-6EE7-47F4-BC18-6F2DFA11F910@hopcount.ca>
References: <20180729155014.C8F2C20030CD40@ary.qy> <5F1A8568-02D6-4145-8ECE-59385C31DA7C@shinkuro.com> <CAJhMdTP-J8qaGQE1rTQQ6KUC0fdtHpJeztr9GaY2n-WGpYm8Pg@mail.gmail.com> <CABf5zvLq4PUiVYk3-sBZ-HF-Ecp7eSzBKhm-Fw=2+80OOYQ0ug@mail.gmail.com> <03FAA51D-C9EE-4619-91A7-636C29D2D6F1@hopcount.ca> <CABf5zvJJgrK7ATfwV2hhg8rH4TUM16TH69LmOq6V=qGDeU+TRA@mail.gmail.com>
To: Steve Crocker <steve@shinkuro.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/wDAzzZrF7wlceyvSJtLPuPISuZI>
Subject: Re: [DNSOP] New Version Notification for draft-wessels-dns-zone-digest-01.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 29 Jul 2018 21:32:21 -0000

Hi Steve,

I fully agree that the kinds of things I was waving my hands about are science projects at best, and so far from ready for informed standardisation in dnsop that it seems silly even typing that phrase.

However, you were speculating about the future in your reaction to some of the commentary here, and inferring that the draft under discussion (or some of the discussion surrounding it) was pointing in a silly direction.

I was just trying to illustrate that there are more possible directions. Many of them may well be silly, but it's a little early to pass judgement, I think.


Joe

> On Jul 29, 2018, at 15:59, Steve Crocker <steve@shinkuro.com> wrote:
> 
> Joe,
> 
> Thanks.  You've mentioned several things tagged with "it would be nice to have."  Each of these has both (a) one or more assumptions about a problem that seeking to be addressed and (b) the implication of a fairly massive architectural change.  These need a deeper and better organized discussion than can be done on this list.  This is really IAB territory or something similar, in my opinion, and the starting point is a careful delineation of the problems before we engage in specific solutions.  Your experience, perceptions and judgments are top notch, but it will take time and work to get everyone else on the same page.  (Or not.)
> 
> Meanwhile, there is already an evolution toward local service of the root zone.  It seems to be there are two relevant threads to pursue.  One is how best to support it, and the other, picking up on your point, is to understand what problems, defects, etc. there might be as more and more recursive resolvers start to serve the root zone.
> 
> Speaking for myself, I'm not opposed, in principle, to thinking about fresh designs and radical changes where it's appropriate.  For example, I have made comments in the past and will be making more comments in the future about the whois system.  But with respect to the evolution of the root service, I'm not in agreement that we should be entangling it with the much larger architectural issues you're raising.
> 
> Steve
> 
> 
>> On Sun, Jul 29, 2018 at 12:44 PM, Joe Abley <jabley@hopcount.ca> wrote:
>> Hi Steve,
>> 
>> On Jul 29, 2018, at 15:09, Steve Crocker <steve@shinkuro.com> wrote:
>> 
>> > As an individuals, you, I, or anyone else, can do whatever we like, of course.  On the other hand, as system designers we presumably look at the overall system and try to put in place an operational structure that anticipates and meets the likely needs of the users.
>> 
>> Agreed!
>> 
>> > The present and long-standing system provides the recursive resolvers with well-oiled and highly effective solutions to (a) finding the root servers and (b) getting highly reliable and highly responsive answers from them.
>> 
>> This is true. However, there are some disadvantages of the current system that are worth thinking about when we consider alternatives, such as the privacy implications of having all resolvers call home to a set of well-known servers and the aggregate cost of engineering and operations that has gone into making the root system as resilient as it is.
>> 
>> I have spoken in the past in opposition to the idea that slaving the root zone on resolvers was a desirable end-state; I think it leaves operational gaps that we should want to fill. Being able to validate the contents of the zone and have software react appropriately (without human operator intervention) when zone data is found to be stale or inaccurate obviates many of my concerns.
>> 
>> Perhaps there is a future where the root server system was preserved only to serve legacy clients, whilst more modern software had a diversity of options in addition to that fall-back.
>> 
>> I think the root zone is a convenient starting point for these kinds of discussions, but I think the scope could be wider. Maybe one day the DNS protocol (for all zones, not just the root zone) is only comonly used for communications between stub and resolver, where we have the deployed base with the longest tail, and where capacity planning and attack resistance is a different kind of problem because all your traffic generators are on-net. Perhaps the database problem of replicating authoritative data into resolver caches is solved in different ways.
>> 
>> It would be nice if end-users didn't have to rely upon authoritative servers being up in order to resolve names; it would be nice if there wasn't a small set of targets against which the next memcached-scale attack could be used to take us back to 21 October 2016; it would be nice if the integrity of the naming scheme didn't ultimately rely upon the deployment of BCP38.
>> 
>> If such a mechanism relied upon DNSSEC to ensure integrity of data in the absence of plausible channel authentication, availability of zones might be aligned with DNSSEC deployment, which would give the Alexa 500 a(nother) reason to sign their zones.
>> 
>> There are lots of things to think about here. I don't think clinging to the status quo in terms of infrastructure or institutions is necessarily a good idea, although I do agree with the idea of preserving legacy compatability and incremental change.
>> 
>> 
>> Joe
>