Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-validator-requirements

Daniel Migault <mglt.ietf@gmail.com> Fri, 13 January 2023 22:22 UTC

Return-Path: <mglt.ietf@gmail.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C852C159495 for <dnsop@ietfa.amsl.com>; Fri, 13 Jan 2023 14:22:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.097
X-Spam-Level:
X-Spam-Status: No, score=-7.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qx4GkEgmgXd0 for <dnsop@ietfa.amsl.com>; Fri, 13 Jan 2023 14:22:10 -0800 (PST)
Received: from mail-yw1-x112e.google.com (mail-yw1-x112e.google.com [IPv6:2607:f8b0:4864:20::112e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B9E3DC1522DD for <dnsop@ietf.org>; Fri, 13 Jan 2023 14:22:10 -0800 (PST)
Received: by mail-yw1-x112e.google.com with SMTP id 00721157ae682-4b718cab0e4so304191717b3.9 for <dnsop@ietf.org>; Fri, 13 Jan 2023 14:22:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=0M/DvE4ZkgrOwkJJdy4iRH7RZNvRtFOTI4SbI1yJs8E=; b=pgGixY41QD2OSD8xEraCrxN5J2t9lkFzM8S3HvNCYQe7HnGyjIUZRRaTXC7BeZwHk1 X+1U6sQ7Hcwm27INLc76CKRmFxHBR1VP3aOvwiJSZy4b98XogJByPT5IAc/UUj1xiqpL CwWGWE/0XpNpUCKXDGiSUwDmyj+AvsxEggBqeSsrbncmUWe0JvvifbI3MPoZSB5FSGV4 1opp+53fofTqs6Hiz5KBg+uqYkRiaMvHvnbqHf4JoL+wQUMCxqyuTighp1vwg0HydGnn FX9X4dTt8cItsXXWX8fTnJxOsk+21kNELMx2PE16gT4FmcQChIl2NE4esbqP8xvvyCS9 gLlQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=0M/DvE4ZkgrOwkJJdy4iRH7RZNvRtFOTI4SbI1yJs8E=; b=4iBc2SLuIRT7w57sVTZBvYxHowMxioVvGiPmR9eJrcGb4t9JOvSsHnS2JzwGW16iIH 4ldeBN2Mz0/lrD4U8amkdreeXKH/zUHnCw7Cj4/p3HFs506esLD002it0bEdO/zY/Tfp 7PVcs1xclxBjKojliJuNHpIK93m4bjfwamK8wcvb4i1T1JkXlrfHtcvhlL4+TQl8K0Bk gJNPj+LhXI28IMKd0bfZXYTfsrMi5uNfjzFzyfcEqXDNm31QjP/lUT+cDwCm85Yp5pUn NMkaLLBaVArK2diW+86pQG+HM7lNM9oy7PES5o9nRZHVwYY4NHpTWn8IiMIKPxIyQGun ZxQQ==
X-Gm-Message-State: AFqh2kpuRP+87ssay6CFpoBcLC/H3ATZTRnoe8iNCy+x+aGjsII7G5Lf MuKhxUljzmKhP1bxt9oF6m8+PDA4Q+k6a2+Pt8Hx1NgKpfE=
X-Google-Smtp-Source: AMrXdXtj1eFL9if3RpUVrbQ7bQAaZYlP+mf46T1uOwIPShFX6FFAO5xodexUGIHBKiG/ueXk0DgEOFzdzG8phtSO5Hs=
X-Received: by 2002:a81:9894:0:b0:4bc:7dcc:4be with SMTP id p142-20020a819894000000b004bc7dcc04bemr4424047ywg.46.1673648529604; Fri, 13 Jan 2023 14:22:09 -0800 (PST)
MIME-Version: 1.0
References: <CADyWQ+FwRaSdpSWXBDqCG9ZPNPiG4pGUx37PVtExbqVPr5ZfmA@mail.gmail.com> <65d26b98-e0d6-e69b-10d4-17632451cab6@nic.cz> <CADZyTk=wUydEv4X8KgHe3Mj0cZTmiaR3mjn_Z2n73U-eST-HPA@mail.gmail.com> <f397b7d4-fe4f-6000-5ce5-f2faa7b27b3e@nic.cz> <CADZyTkkdn__VhRRqwKDbNx3ymTR0KJmxoTN9aKMcox-JS=pW_A@mail.gmail.com> <m1wn7gd1ms.fsf@narrans.de> <CADZyTkkGfE2+SOwO-U40-iN3PnH2Cm7aoodDVxyp_rA-_iO8uw@mail.gmail.com>
In-Reply-To: <CADZyTkkGfE2+SOwO-U40-iN3PnH2Cm7aoodDVxyp_rA-_iO8uw@mail.gmail.com>
From: Daniel Migault <mglt.ietf@gmail.com>
Date: Fri, 13 Jan 2023 17:21:58 -0500
Message-ID: <CADZyTkmNYX4uzhYVChE8f7zQGdUPR2oD6qP7nLuVoeoStEnjJA@mail.gmail.com>
To: Florian Obser <florian+ietf@narrans.de>
Cc: dnsop@ietf.org
Content-Type: multipart/alternative; boundary="00000000000016040605f22caa37"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/xDlWBGZi5CuVULZ-bhPqXp41EEs>
Subject: Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-validator-requirements
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Jan 2023 22:22:13 -0000

Hi,

I am just wondering if you have any further comments or thoughts or we
declare your concerns being addressed. If you think we are fine, just let
me know.

Yours,
Daniel

On Tue, Jan 3, 2023 at 7:14 PM Daniel Migault <mglt.ietf@gmail.com> wrote:

> Hi Vladimir and Florian,
>
> Thanks for the comment regarding the use of 5011, to update the
> trust anchors. There are two situations where TAs need to be updated:
> * 1) configuration so the server instances are started with
> the up-to-date TA.
> * 2) a running resolver instance that has been started with the old TA and
> that needs a new TA to be considered.
>
> 1) configuration:
>
> TA trust store is an essential element of the configuration, and the
> document recommends having a special process to ensure every new resolver
> instance starts with the  up-to-date TAs. TAs are so essential in the
> elaboration of trust that special care must be considered.  This means that
> you need a robust mechanism to update the TAs trust store.
> Many DRO will not implement that process and instead rely on software
> updates to delegate the TA trust store update to the software vendor.
> If the DRO is willing to have a *special/specific* additional TA that is
> not updated delegated to the software vendor, the DRO will have to put in
> place such a mechanism. This is a critical operation and the DRO must have
> strong reasons to do so and must balance the additional operational risks
> versus the additional benefits.
> Given the essential aspect of the TA trust store, we recommend updates to
> be handled by an automated process (as opposed to manually being performed)
> BUT we also recommend the process to be manually supervised, that is with a
> manual confirmation.
> This mechanism is likely to require a specific relation between the DRO
> and the TA issuer with potentially the mechanism, being out-of band. To
> that point 5011 is probably not the best choice as mentioned by 5011 itself
> in section 8.3.
>
> 2) running servers
>
> For running resolvers, there is a need to ensure that the resolver is
> using the up-to-date TA. For this we recommend to follow 5011 that
> indicates how to automatically put significant trust into the newly
> published DNSKEY. On the other hand, if resolvers are retarted every days
> we may not need to have 5011 and monitor the roll over. I think that is the
> purpose of your comment.
>
> My impression is that there were some confusions in the text where 5011
> was used. When it is limited to the running resolver, I would
> recommend enabling 5011 when the TA signer implements 5011 in case the
> software is not updated in a timely manner - or at least let the DRO decide
> whether it is willing to enable this option as a sort of insurance - even
> if it is relying on the software update as a general mechanism. I think it
> might be a bit different from what you proposed initially, which is to
> leave that to DRO with DNSSEC strong expertise and recommend to
> only stay with software updates. If there are any strong feelings on just
> relying on software updates and leaving 5011 to DNSSEC experts, I am also
> fine to push toward such a direction.
>
> I updated the text as follows:
> * clarifying TA updates for configuration versus running instances
> * clarifying 5011 dot not apply for updating configuration - at least as a
> primary mechanism
> * emphasize that the non default model is only recommended for DRO with
> DNSSEC expertise
> * adding that TA update for running resolver may be performed also by
> software update under the condition the DRO is likely to ensure a very
> recent release is run.
> * add a recommendation that when 5011 is used, the signer needs to
> implement 5011 timings.
>
> The changes can be seen there:
>
> https://github.com/mglt/draft-mglt-dnsop-dnssec-validator-requirements/commit/dbb75b72a1806520ac77cf04424b0f6de0df29b5
>
> Yours,
> Daniel
>
> On Sun, Nov 27, 2022 at 7:26 AM Florian Obser <florian+ietf@narrans.de>
> wrote:
>
>> On 2022-11-25 12:26 -05, Daniel Migault <mglt.ietf@gmail.com> wrote:
>> > On Wed, Nov 23, 2022 at 10:29 AM Vladimír Čunát <
>> vladimir.cunat+ietf@nic.cz>
>> > wrote:
>> >> I am surprised  you would not recommend RFC 5011
>> >>
>> >> 5011 needs persistent state, a thing that resolvers/validators often
>> don't
>> >> need at all otherwise (cache is safe to delete).  5011 doesn't always
>> work,
>> >> so you need to combine with some fallback mechanism(s) anyway - for new
>> >> installations and for stale ones (missed rotation).  Root rollover has
>> >> happened only once in history, non-root TAs aren't that common, and
>> 5011
>> >> algorithm isn't very simple, so the code can easily get some bugs
>> without
>> >> anyone noticing until it's too late.
>> >>
>> >> Lots of down-sides, so I rather put the TAs into SW updates, for the
>> root
>> >> TA case at least.  I'd recommend trying to avoid non-root TAs, but if
>> I had
>> >> to choose, I'd put them into configuration.  Again a thing that I have
>> to
>> >> provision *anyway*, so I get the occasional TA updates basically for
>> free,
>> >> without needing to worry about those 5011 disadvantages.  (occasional =
>> >> 5011 defaults to requiring 30 days of overlap)
>> >>
>> >>
>> > Oh! sure for the TA. My understanding of the text is that it recommends
>> > 5011 for running instances, but that new instances are configured with
>> > up-to-date TA that in most cases are updated by software update. So yes
>> I
>> > agree and will check this appears clearly.
>>
>> Another issue with 5011 is that it needs cooperation from the entity
>> signing the zone during a KSK rollover. 7583 spells this out in section
>> 2.2. I think Vladimír is hinting at this already, I'd say it should be
>> spelled out. Especially since this is aimed at non-DNSSEC-Experts as you
>> were saying earlier in the thread.
>>
>> If a DRO unilaterally decides to put in a TA for example.com as
>> suggested in section 7.1.1 and using 5011 this will not end well if they
>> don't tell the people operating the signer. They will probably not
>> follow the correct timing during a KSK roll.
>>
>
>
> --
> Daniel Migault
> Ericsson
>


-- 
Daniel Migault
Ericsson