Re: [homenet] I-D Action: draft-ietf-homenet-front-end-naming-delegation-15.txt
Stephen Farrell <stephen.farrell@cs.tcd.ie> Mon, 24 May 2021 21:01 UTC
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 246153A0893 for <homenet@ietfa.amsl.com>; Mon, 24 May 2021 14:01:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WjEwroV8WEm8 for <homenet@ietfa.amsl.com>; Mon, 24 May 2021 14:01:20 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30133.outbound.protection.outlook.com [40.107.3.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B894A3A0890 for <homenet@ietf.org>; Mon, 24 May 2021 14:01:19 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=G6SqosNBcQOPR5P4gxS0cPjBt0jkEtJYADt+Eo6+8B7FQi4O4vYLLkAySBkvrMjHHgHGnpWH1/oP+kdZhxGO08lGV7rKc4h/TOiAgqszggDbioL3nEY7OZODpNuMoeqCqdjWD+4dry/mIxZ3U/jCb9NaQlsEgb43r8pZ+wn3brKuxm5EF5FDXX4vVQvZK7VxLgFZ9JjzV59mog65zjnpD6dmdDHVQTH9mi6QUUH3Z8Ly0eAj93ACo4AaHQRoaqk8tDGrioU3r66Q4KuD2+6G0mROYr5b+pHjDzFaVMR2w0T3RCMKz7PYGKVk8AH7ftTC5D9phIAm7xhkqNVOtS+Oyg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lCg8MeUB9fA5DzwrLeoquiPXwxAeUpOXbTCx+JUklzA=; b=W2w7lvddyB8QuCdN/ERZRPoVkDtRSNgW+hEfcdILTCoWA0VbX89CxOnT4836uSAIGcmah5NkgzyOIJCAmixW4AOfrRB3jxCiv3csB/ALaIdUt7xvm2OTTjrwb2eb+VlN71aYg5yZam0S8Y7oQotT2R/R3+f2P3is5TLaAGPHd6XsrMtbipfF3To7aHECN7N/cFQn58abDL9NVPN9gUYAit7xIyVNKQyG043IqD9yBm2BwMaEr/hPY/KCj2FzLDemYbCedHxfOo5RYLitNdPogMAcSPNWXyY4qAW8/DsxHJ/+9guSadL9JgwboFd/yk+pe0d4Frl4Os6KqixW6HoSYA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cs.tcd.ie; dmarc=pass action=none header.from=cs.tcd.ie; dkim=pass header.d=cs.tcd.ie; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cs.tcd.ie; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lCg8MeUB9fA5DzwrLeoquiPXwxAeUpOXbTCx+JUklzA=; b=Y1P8G3J6B+IhD/mcqPsBUlOVxdlJ1Debv9vD+lhbFneXI9zFTd/ADcy3a1U9QEbCLn+wYZcfABVLhtirQFRQn/rI1NzJsfwL6GQfA+NZzQUCrypJ4Egw/XxRg7KhrII7DNCAEb9YYNZVBluSeHOz739xogRlx3XMrY+qDOX0ikeNHQw15zwI3xGysSA76r+JVyLoAcUkN+bFhUFjHIzozGRuP/hbfTvjls50gBn4MdjmpuXyCJBtTZjG7ViGijUXO7ZW+cgSUK/4+s03fuJW3xhWgPNODiGX8E2R49jND+idDuK2LSZ1PWM+CAcxg+HuGf8CvNG2Zj26N+UTwtFhrA==
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=cs.tcd.ie;
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com (2603:10a6:10:77::15) by DB6PR0202MB2535.eurprd02.prod.outlook.com (2603:10a6:4:1a::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4150.23; Mon, 24 May 2021 21:01:16 +0000
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com ([fe80::9c71:9f6:9136:f849]) by DB7PR02MB5113.eurprd02.prod.outlook.com ([fe80::9c71:9f6:9136:f849%6]) with mapi id 15.20.4150.027; Mon, 24 May 2021 21:01:16 +0000
To: homenet@ietf.org
References: <162092926151.12926.11178130729299739728@ietfa.amsl.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Message-ID: <b6aaa622-bb36-9cb7-0e1a-b2cd40500cec@cs.tcd.ie>
Date: Mon, 24 May 2021 22:01:14 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1
In-Reply-To: <162092926151.12926.11178130729299739728@ietfa.amsl.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="5UB5c9SBWlaWG7YUPCs7v0uX2Nf0NVh2Z"
X-Originating-IP: [2001:bb6:5e5e:b458:732f:47c7:a3c7:95b2]
X-ClientProxiedBy: DB6PR07CA0203.eurprd07.prod.outlook.com (2603:10a6:6:42::33) To DB7PR02MB5113.eurprd02.prod.outlook.com (2603:10a6:10:77::15)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [IPv6:2001:bb6:5e5e:b458:732f:47c7:a3c7:95b2] (2001:bb6:5e5e:b458:732f:47c7:a3c7:95b2) by DB6PR07CA0203.eurprd07.prod.outlook.com (2603:10a6:6:42::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.12 via Frontend Transport; Mon, 24 May 2021 21:01:15 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9849375b-996e-4653-41fc-08d91ef71209
X-MS-TrafficTypeDiagnostic: DB6PR0202MB2535:
X-MS-Exchange-SharedMailbox-RoutingAgent-Processed: True
X-Microsoft-Antispam-PRVS: <DB6PR0202MB25353C6F09CEBB4C4F310945A8269@DB6PR0202MB2535.eurprd02.prod.outlook.com>
X-TCD-Routed-via-EOP: Routed via EOP
X-TCD-ROUTED: Passed-Transport-Routing-Rules
X-MS-Oob-TLC-OOBClassifiers: OLM:227;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR02MB5113.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(39850400004)(346002)(366004)(136003)(396003)(478600001)(66616009)(2906002)(31696002)(66476007)(86362001)(786003)(235185007)(6486002)(44832011)(186003)(66556008)(16526019)(5660300002)(66946007)(52116002)(316002)(21480400003)(33964004)(38100700002)(31686004)(2616005)(83380400001)(8676002)(6916009)(36756003)(8936002)(45980500001)(43740500002); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: cs.tcd.ie
X-MS-Exchange-CrossTenant-Network-Message-Id: 9849375b-996e-4653-41fc-08d91ef71209
X-MS-Exchange-CrossTenant-AuthSource: DB7PR02MB5113.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 May 2021 21:01:15.9806 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d595be8d-b306-45f4-8064-9e5b82fbe52b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: lKQj6f1KXX/TWmwrVaJAwCD30OC/K/A/B1cHeZCce76YbDSX6ZCwZyd8ehPr9/Za
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0202MB2535
Archived-At: <https://mailarchive.ietf.org/arch/msg/homenet/cBaS9xwhYkbb_JKsN2LpCb8sSNI>
Subject: Re: [homenet] I-D Action: draft-ietf-homenet-front-end-naming-delegation-15.txt
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Homenet WG mailing list <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/homenet/>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 May 2021 21:01:26 -0000
Hiya, I had a read of this one. My comments (as an individual, not as chair) below. I'll chat with Barbara to see if we have a common position on how to handle next steps but am happy to chat about stuff below whenever. Cheers, S. review of draft-ietf-homenet-front-end-naming-delegation-15 sf, 20210524 general/technical: #1 This needs significant editorial work, there are too many grammatical issues, at least some of which lead to ambiguity. #2 If a home network/CPE isn't robust enough to serve as a DNS server for it's public zone, then how is it robust enough to resist attack/DoS on the addresses exposed in that zone? That seems to me to counter a bunch of the arguments for this approach, so I'd like to understand the proponents arguments there. At minimum, any AAAA for an "inside" server/name means that the CPE's f/w will be subject to the same kind of attacks that might happen if the CPE was the only/primary DNS server for the zone. #3 The arguments about handling "disruption with the ISP" could do with some more evidence, not necessarily as text in the draft, but it ought exist - does it? E.g. do we know that publishing ULAs isn't problematic? Do we know that GUAs in such scenarios aren't still usable for longish durations given a realistic pattern of ISP disruption? #4 My home network is IPv6 renumbered every time there's a reboot/power outage at the DSLAM, which happens maybe twice a year. How would this protocol handle that? Would the DM get overloaded maybe? #5 The arguments why this is better than DDNS don't convince me, except for the last one (new RR types). Given that DDNS is deployed, what's the chances that this would also get traction? (Not asking that all be in the document, but I am asking.) #6 Do the DM/DOI care about the names published? If not, why not? E.g. say an ISP has the DOI servers "first" in how it resolves names for a local area, what'd stop some home from claiming to be windowsupdate.com? #7 If the DOI sends the DS to the parent, then the DOI can cheat on the home - why is that ok? If it is ok, then shouldn't there really be a MUST for the HNA to check that the correct DS is/was published via some recursive outside the control of the DOI? #8 Do the DS TTL and RRSIG expiry times set the limit for how long the home n/w can handle ISP disruption? If so, be good to say so. I also wonder if that limits the added-value here or not. #9 Requiring mutually authenticated TLS between HNA and DM (section 3.2 has that MUST, even if it says TLS is only RECOMMENDED), seems like a circular dependency. How does the HNA get that client-cert before/at the start? #10 4.x: I don't understand how we get interop based on all this. Wouldn't this kind of thing need a bunch of people to have implemented and interop'd before we could be confident of the spec? #11 I don't understand what problem we're really solving with the reverse zone stuff, nor do I see the overall thing here would work where the ISP provides those reverse-IP stanzas for a zone file but where that ISP has no way to update the parent's DS record. Are there a set of "just doens't work" configurations there really? If so, shouldn't that be either stated or solved somehow? #12 Section 10 seems like a mix of generic guidance and requirements but also things needed for interop (e.g. use DoT on 853). I'm not convinced that's a good plan if we want multiple implementations that interop. specific/editorial: - abstract: "often" where's the evidence for that? Why do you even need to make that (questionable) assertion? Better to just set out the mechanism. - abstract: "using names" should probably be "using DNS names or similar" - abstract: documents don't "automate" things - abstract: "servers" - you don't know, and shouldn't require that, the FQDNs published are those of servers. - abstract: "the naming service" - what's that exactly? Isn't this just a new flavour of feeding zones to a DNS authoritative? - 1.0: what is "a single universal view"? Are you contrasting that with split horizon or something? - 1.1: Publishing ULAs because of a VPN seems like an odd justification. Seems more likely a VPN could/would set a different DNS recursive for clients and ULAs could be handled there. - 1.2: that might be better as an appendix or deleted. It's probably a bad idea to name specific commercial DDNS services. - section 2: "DOI" isn't a good choice - every RFC has one of those and it's not what's defined here:-) If you could avoid the acronym collision that'd be better. Maybe "domain name outsourcing infrastructure"/DNOI? - section 2: I'm not seeing why you need (new?) terms for types of recursive resolver. Aren't those already defined elsewhere? - 3.1: I have no idea what is meant by: " The ".local" as well as ".home.arpa" are explicitly not considered as Public Homenet zones and represented as Homenet Zone in Figure 1." That seems like an important thing to be clear about. - 3.1: How is backup of KSK/ZSK handled? That's needed in this scenario as CPE kit breaks or is discarded. That might or might not be something needing protocol but it definitely needs mention. - 3.2: What DoX implementation supports TLS client auth? - 3.2: I don't get why a single IP/port is needed for the DM. - 4.5.1: "MUST send a DNS request of type AXFR associated to the Registered Homenet Domain" - what if the domain is already used/populated/whatever? - 4.5.1: Where else is there the concept of a "zone template"? If nowhere else then I wonder if that concept needs some more review? (I can well imagine how to make a zone file template and am sure many have done so, but I bet there are corner-cases galore.) - section 5: What are YYYY, ZZZZ and XX supposed to be? At least XX seems to require an IANA action or the re-use of some port number? - 5.1: It's not clear that DANE will always be ok there - there should be a way to make it work but I don't think I've seen any worked-out description of using DANE for DoX. - 5.1: "baked-in" isn't right - typically those lists are updated by the OS (e.g. OpenWRT) or via application s/w update. (My nearest OpenSSL install has an /etc/ssl/certs directory.) - 5.1: I'm not clear how exactly pinning via tickets would work here but I didn't read RFC8672 just now so maybe it's all clear from tha - is it? - section 9: I don't understand: "This leave place for setting up automatically the relation between HNA and the DNS Outsourcing infrastructure as described in [I-D.ietf-homenet-naming-architecture-dhc-options]." - section 9: "2001:db8:babe:0001::2" - the string "babe" has both innocent and less innocent interpretations, not sure if you want to risk the latter being some reader's interpretation. - section 10: you use a different example here from earlier, just one is probably better, unless there's a reason they ought differ. - 11.1: is a subsection needed there really? (I kinda skipped all that text TBH;-)
- [homenet] I-D Action: draft-ietf-homenet-front-en… internet-drafts
- [homenet] Fwd: I-D Action: draft-ietf-homenet-fro… Daniel Migault
- Re: [homenet] Fwd: I-D Action: draft-ietf-homenet… Michael Richardson
- Re: [homenet] Fwd: I-D Action: draft-ietf-homenet… Daniel Migault
- Re: [homenet] I-D Action: draft-ietf-homenet-fron… Stephen Farrell
- Re: [homenet] I-D Action: draft-ietf-homenet-fron… Juliusz Chroboczek
- Re: [homenet] I-D Action: draft-ietf-homenet-fron… Daniel Migault
- Re: [homenet] I-D Action: draft-ietf-homenet-fron… Daniel Migault
- Re: [homenet] I-D Action: draft-ietf-homenet-fron… Stephen Farrell
- Re: [homenet] I-D Action: draft-ietf-homenet-fron… Daniel Migault