Re: [homenet] I-D Action: draft-ietf-homenet-front-end-naming-delegation-15.txt

Stephen Farrell <stephen.farrell@cs.tcd.ie> Mon, 24 May 2021 21:01 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 246153A0893 for <homenet@ietfa.amsl.com>; Mon, 24 May 2021 14:01:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WjEwroV8WEm8 for <homenet@ietfa.amsl.com>; Mon, 24 May 2021 14:01:20 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30133.outbound.protection.outlook.com [40.107.3.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B894A3A0890 for <homenet@ietf.org>; Mon, 24 May 2021 14:01:19 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=G6SqosNBcQOPR5P4gxS0cPjBt0jkEtJYADt+Eo6+8B7FQi4O4vYLLkAySBkvrMjHHgHGnpWH1/oP+kdZhxGO08lGV7rKc4h/TOiAgqszggDbioL3nEY7OZODpNuMoeqCqdjWD+4dry/mIxZ3U/jCb9NaQlsEgb43r8pZ+wn3brKuxm5EF5FDXX4vVQvZK7VxLgFZ9JjzV59mog65zjnpD6dmdDHVQTH9mi6QUUH3Z8Ly0eAj93ACo4AaHQRoaqk8tDGrioU3r66Q4KuD2+6G0mROYr5b+pHjDzFaVMR2w0T3RCMKz7PYGKVk8AH7ftTC5D9phIAm7xhkqNVOtS+Oyg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lCg8MeUB9fA5DzwrLeoquiPXwxAeUpOXbTCx+JUklzA=; b=W2w7lvddyB8QuCdN/ERZRPoVkDtRSNgW+hEfcdILTCoWA0VbX89CxOnT4836uSAIGcmah5NkgzyOIJCAmixW4AOfrRB3jxCiv3csB/ALaIdUt7xvm2OTTjrwb2eb+VlN71aYg5yZam0S8Y7oQotT2R/R3+f2P3is5TLaAGPHd6XsrMtbipfF3To7aHECN7N/cFQn58abDL9NVPN9gUYAit7xIyVNKQyG043IqD9yBm2BwMaEr/hPY/KCj2FzLDemYbCedHxfOo5RYLitNdPogMAcSPNWXyY4qAW8/DsxHJ/+9guSadL9JgwboFd/yk+pe0d4Frl4Os6KqixW6HoSYA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cs.tcd.ie; dmarc=pass action=none header.from=cs.tcd.ie; dkim=pass header.d=cs.tcd.ie; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cs.tcd.ie; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lCg8MeUB9fA5DzwrLeoquiPXwxAeUpOXbTCx+JUklzA=; b=Y1P8G3J6B+IhD/mcqPsBUlOVxdlJ1Debv9vD+lhbFneXI9zFTd/ADcy3a1U9QEbCLn+wYZcfABVLhtirQFRQn/rI1NzJsfwL6GQfA+NZzQUCrypJ4Egw/XxRg7KhrII7DNCAEb9YYNZVBluSeHOz739xogRlx3XMrY+qDOX0ikeNHQw15zwI3xGysSA76r+JVyLoAcUkN+bFhUFjHIzozGRuP/hbfTvjls50gBn4MdjmpuXyCJBtTZjG7ViGijUXO7ZW+cgSUK/4+s03fuJW3xhWgPNODiGX8E2R49jND+idDuK2LSZ1PWM+CAcxg+HuGf8CvNG2Zj26N+UTwtFhrA==
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=cs.tcd.ie;
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com (2603:10a6:10:77::15) by DB6PR0202MB2535.eurprd02.prod.outlook.com (2603:10a6:4:1a::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4150.23; Mon, 24 May 2021 21:01:16 +0000
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com ([fe80::9c71:9f6:9136:f849]) by DB7PR02MB5113.eurprd02.prod.outlook.com ([fe80::9c71:9f6:9136:f849%6]) with mapi id 15.20.4150.027; Mon, 24 May 2021 21:01:16 +0000
To: homenet@ietf.org
References: <162092926151.12926.11178130729299739728@ietfa.amsl.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Message-ID: <b6aaa622-bb36-9cb7-0e1a-b2cd40500cec@cs.tcd.ie>
Date: Mon, 24 May 2021 22:01:14 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1
In-Reply-To: <162092926151.12926.11178130729299739728@ietfa.amsl.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="5UB5c9SBWlaWG7YUPCs7v0uX2Nf0NVh2Z"
X-Originating-IP: [2001:bb6:5e5e:b458:732f:47c7:a3c7:95b2]
X-ClientProxiedBy: DB6PR07CA0203.eurprd07.prod.outlook.com (2603:10a6:6:42::33) To DB7PR02MB5113.eurprd02.prod.outlook.com (2603:10a6:10:77::15)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [IPv6:2001:bb6:5e5e:b458:732f:47c7:a3c7:95b2] (2001:bb6:5e5e:b458:732f:47c7:a3c7:95b2) by DB6PR07CA0203.eurprd07.prod.outlook.com (2603:10a6:6:42::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.12 via Frontend Transport; Mon, 24 May 2021 21:01:15 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9849375b-996e-4653-41fc-08d91ef71209
X-MS-TrafficTypeDiagnostic: DB6PR0202MB2535:
X-MS-Exchange-SharedMailbox-RoutingAgent-Processed: True
X-Microsoft-Antispam-PRVS: <DB6PR0202MB25353C6F09CEBB4C4F310945A8269@DB6PR0202MB2535.eurprd02.prod.outlook.com>
X-TCD-Routed-via-EOP: Routed via EOP
X-TCD-ROUTED: Passed-Transport-Routing-Rules
X-MS-Oob-TLC-OOBClassifiers: OLM:227;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR02MB5113.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(39850400004)(346002)(366004)(136003)(396003)(478600001)(66616009)(2906002)(31696002)(66476007)(86362001)(786003)(235185007)(6486002)(44832011)(186003)(66556008)(16526019)(5660300002)(66946007)(52116002)(316002)(21480400003)(33964004)(38100700002)(31686004)(2616005)(83380400001)(8676002)(6916009)(36756003)(8936002)(45980500001)(43740500002); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: cs.tcd.ie
X-MS-Exchange-CrossTenant-Network-Message-Id: 9849375b-996e-4653-41fc-08d91ef71209
X-MS-Exchange-CrossTenant-AuthSource: DB7PR02MB5113.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 May 2021 21:01:15.9806 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d595be8d-b306-45f4-8064-9e5b82fbe52b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: lKQj6f1KXX/TWmwrVaJAwCD30OC/K/A/B1cHeZCce76YbDSX6ZCwZyd8ehPr9/Za
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0202MB2535
Archived-At: <https://mailarchive.ietf.org/arch/msg/homenet/cBaS9xwhYkbb_JKsN2LpCb8sSNI>
Subject: Re: [homenet] I-D Action: draft-ietf-homenet-front-end-naming-delegation-15.txt
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Homenet WG mailing list <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/homenet/>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 May 2021 21:01:26 -0000

Hiya,

I had a read of this one. My comments (as an individual, not
as chair) below. I'll chat with Barbara to see if we have a
common position on how to handle next steps but am happy to
chat about stuff below whenever.

Cheers,
S.

review of draft-ietf-homenet-front-end-naming-delegation-15
sf, 20210524

general/technical:

#1 This needs significant editorial work, there are too many
grammatical issues, at least some of which lead to ambiguity.

#2 If a home network/CPE isn't robust enough to serve as a DNS
server for it's public zone, then how is it robust enough to
resist attack/DoS on the addresses exposed in that zone? That
seems to me to counter a bunch of the arguments for this
approach, so I'd like to understand the proponents arguments
there. At minimum, any AAAA for an "inside" server/name means
that the CPE's f/w will be subject to the same kind of attacks
that might happen if the CPE was the only/primary DNS server
for the zone.

#3 The arguments about handling "disruption with the ISP" could
do with some more evidence, not necessarily as text in the
draft, but it ought exist - does it? E.g. do we know that
publishing ULAs isn't problematic? Do we know that GUAs in such
scenarios aren't still usable for longish durations given a
realistic pattern of ISP disruption?

#4 My home network is IPv6 renumbered every time there's a
reboot/power outage at the DSLAM, which happens maybe twice a
year. How would this protocol handle that? Would the DM get
overloaded maybe?

#5 The arguments why this is better than DDNS don't convince
me, except for the last one (new RR types).  Given that DDNS is
deployed, what's the chances that this would also get traction?
(Not asking that all be in the document, but I am asking.)

#6 Do the DM/DOI care about the names published? If not, why
not? E.g. say an ISP has the DOI servers "first" in how it
resolves names for a local area, what'd stop some home from
claiming to be windowsupdate.com?

#7 If the DOI sends the DS to the parent, then the DOI can
cheat on the home - why is that ok? If it is ok, then shouldn't
there really be a MUST for the HNA to check that the correct DS
is/was published via some recursive outside the control of the
DOI?

#8 Do the DS TTL and RRSIG expiry times set the limit for how
long the home n/w can handle ISP disruption? If so, be good to
say so. I also wonder if that limits the added-value here or
not.

#9 Requiring mutually authenticated TLS between HNA and DM
(section 3.2 has that MUST, even if it says TLS is only
RECOMMENDED), seems like a circular dependency. How does the
HNA get that client-cert before/at the start?

#10 4.x: I don't understand how we get interop based on all
this.  Wouldn't this kind of thing need a bunch of people to
have implemented and interop'd before we could be confident of
the spec?

#11 I don't understand what problem we're really solving with
the reverse zone stuff, nor do I see the overall thing here
would work where the ISP provides those reverse-IP stanzas for
a zone file but where that ISP has no way to update the
parent's DS record. Are there a set of "just doens't work"
configurations there really?  If so, shouldn't that be either
stated or solved somehow?

#12 Section 10 seems like a mix of generic guidance and
requirements but also things needed for interop (e.g. use DoT
on 853). I'm not convinced that's a good plan if we want
multiple implementations that interop.

specific/editorial:

- abstract: "often" where's the evidence for that? Why do you
   even need to make that (questionable) assertion? Better to
just set out the mechanism.

- abstract: "using names" should probably be "using DNS names
   or similar"

- abstract: documents don't "automate" things

- abstract: "servers" - you don't know, and shouldn't require
   that, the FQDNs published are those of servers.

- abstract: "the naming service" - what's that exactly? Isn't
   this just a new flavour of feeding zones to a DNS
authoritative?

- 1.0: what is "a single universal view"? Are you contrasting
   that with split horizon or something?

- 1.1: Publishing ULAs because of a VPN seems like an odd
   justification. Seems more likely a VPN could/would set a
different DNS recursive for clients and ULAs could be handled
there.

- 1.2: that might be better as an appendix or deleted. It's
   probably a bad idea to name specific commercial DDNS
services.

- section 2: "DOI" isn't a good choice - every RFC has one of
   those and it's not what's defined here:-) If you could avoid
the acronym collision that'd be better. Maybe "domain name
outsourcing infrastructure"/DNOI?

- section 2: I'm not seeing why you need (new?) terms for types
   of recursive resolver. Aren't those already defined
elsewhere?

- 3.1: I have no idea what is meant by: " The ".local" as well
   as ".home.arpa" are explicitly not considered as Public
Homenet zones and represented as Homenet Zone in Figure 1."
That seems like an important thing to be clear about.

  - 3.1: How is backup of KSK/ZSK handled? That's needed in this
    scenario as CPE kit breaks or is discarded. That might or
might not be something needing protocol but it definitely needs
mention.

- 3.2: What DoX implementation supports TLS client auth?

- 3.2: I don't get why a single IP/port is needed for the DM.


- 4.5.1: "MUST send a DNS request of type AXFR associated to
   the Registered Homenet Domain" - what if the domain is
already used/populated/whatever?

- 4.5.1: Where else is there the concept of a "zone template"?
   If nowhere else then I wonder if that concept needs some more
review? (I can well imagine how to make a zone file template
and am sure many have done so, but I bet there are corner-cases
galore.)

- section 5: What are YYYY, ZZZZ and XX supposed to be?  At
   least XX seems to require an IANA action or the re-use of
some port number?

- 5.1: It's not clear that DANE will always be ok there - there
   should be a way to make it work but I don't think I've seen
any worked-out description of using DANE for DoX.

- 5.1: "baked-in" isn't right - typically those lists are
   updated by the OS (e.g. OpenWRT) or via application s/w
update. (My nearest OpenSSL install has an /etc/ssl/certs
directory.)

- 5.1: I'm not clear how exactly pinning via tickets would work
   here but I didn't read RFC8672 just now so maybe it's all
clear from tha - is it?

- section 9: I don't understand: "This leave place for setting
   up automatically the relation between HNA and the DNS
Outsourcing infrastructure as described in
[I-D.ietf-homenet-naming-architecture-dhc-options]."

- section 9: "2001:db8:babe:0001::2" - the string "babe" has
   both innocent and less innocent interpretations, not sure if
you want to risk the latter being some reader's interpretation.

- section 10: you use a different example here from earlier,
   just one is probably better, unless there's a reason they
ought differ.

- 11.1: is a subsection needed there really? (I kinda skipped
   all that text TBH;-)