Re: (short version) Re: Last Call: <draft-faltstrom-uri-10.txt> (The Uniform Resource Identifier (URI) DNS Resource Record) to Proposed Standard

John C Klensin <john-ietf@jck.com> Thu, 05 March 2015 16:30 UTC

Return-Path: <john-ietf@jck.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ACB4C1A1AB9 for <ietf@ietfa.amsl.com>; Thu, 5 Mar 2015 08:30:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.61
X-Spam-Level:
X-Spam-Status: No, score=-2.61 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zJBx544AbBou for <ietf@ietfa.amsl.com>; Thu, 5 Mar 2015 08:30:42 -0800 (PST)
Received: from bsa2.jck.com (bsa2.jck.com [70.88.254.51]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1574B1A1B83 for <ietf@ietf.org>; Thu, 5 Mar 2015 08:25:34 -0800 (PST)
Received: from [198.252.137.35] (helo=JcK-HP8200.jck.com) by bsa2.jck.com with esmtp (Exim 4.82 (FreeBSD)) (envelope-from <john-ietf@jck.com>) id 1YTYaS-000Gc7-P6; Thu, 05 Mar 2015 11:25:24 -0500
Date: Thu, 05 Mar 2015 11:25:19 -0500
From: John C Klensin <john-ietf@jck.com>
To: Eliot Lear <lear@cisco.com>, Viktor Dukhovni <ietf-dane@dukhovni.org>, Pete Resnick <presnick@qti.qualcomm.com>
Subject: Re: (short version) Re: Last Call: <draft-faltstrom-uri-10.txt> (The Uniform Resource Identifier (URI) DNS Resource Record) to Proposed Standard
Message-ID: <7111545C27DE9021135BE185@JcK-HP8200.jck.com>
In-Reply-To: <54F7FE09.3030200@cisco.com>
References: <tsl8ufoh9ko.fsf@mit.edu> <2DF7230C-D1D8-4B21-9003-B336108A38CB@vpnc.org> <20150224172649.GX1260@mournblade.imrryr.org> <tslvbircj0d.fsf@mit.edu> <0325DF3F-17F3-4400-BDEA-EDB5334BF35C@frobbit.se> <20150225180227.GT1260@mournblade.imrryr.org> <7AB921D35A7F9B23A53BD11A@JcK-HP8200.jck.com> <tslvbip8io6.fsf@mit.edu> <54F09A35.9060506@qti.qualcomm.com> <54F78650.6070503@qti.qualcomm.com> <20150305064513.GH1260@mournblade.imrryr.org> <54F7FE09.3030200@cisco.com>
X-Mailer: Mulberry/4.0.8 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-SA-Exim-Connect-IP: 198.252.137.35
X-SA-Exim-Mail-From: john-ietf@jck.com
X-SA-Exim-Scanned: No (on bsa2.jck.com); SAEximRunCond expanded to false
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/I7ZrhxzvxvLto_nVtcquIzewLBI>
X-Mailman-Approved-At: Fri, 06 Mar 2015 08:08:20 -0800
Cc: Phillip Hallam-Baker <phill@hallambaker.com>, ietf@ietf.org, F?ltstr?m Patrik <paf@frobbit.se>, Mark Nottingham <mnot@mnot.net>, Sam Hartman <hartmans-ietf@mit.edu>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Mar 2015 16:30:43 -0000

(heads-up to readers -- there are a couple of issues identified
below that are separate from the security ones)

--On Thursday, March 05, 2015 07:56 +0100 Eliot Lear
<lear@cisco.com> wrote:

> A simple way to address the concern that Sam raised is to note
> that DNSSEC's trust model is largely binary, and not subject
> to alternative trust anchors.  That is- parent zone
> administrator's keys may either be trusted or not.  On the
> other hand, I don't know that this is the draft to take on
> that issue.  It's a fundamental difference between the two
> models and there are pluses and minuses to each, and it's
> perhaps worth exploring, but in this draft?

Eliot's comment above is consistent with my prior remarks on the
subject (including at least one off-list and a few others I was
too fed up to send).    I think this issue is a real and
important one.  I think some documentation about what DNSSEC
(and, by the way, DANE, etc.) are useful and/or optimal for (and
what their trust model implications and assumptions are) is
definitely needed.  But the issues are neither new nor unique to
this spec or RRTYPE.  IMO, _at most_, this document should
contain a statement indicating that there are issues and that
applications considering using this RRTYPE should be aware of
them.

If anything, the text now says too much because introductory
statements like "The basic mechanism for successful use of URI
works..." strongly imply that use of, and reliance on, DNSSEC is
the only way to accomplish successful (and safe) use.  The
current Security Considerations section could be equated to an
Applicability Statement that said "unless DNSSEC is used, and
used as specified in this document, use of the URI RR is NOT
RECOMMENDED".  I don't think that is either intended or
justified.


On a separate topic, I'm not sure that the second paragraph of
the Introduction is correct.  Historically (sic) and as far as I
am aware, DDDS has been used heavily only in conjunction with
ENUM.  It also takes me three or four readings each time I
encounter it to figure out what "looking up URIs given a
hostname" means (noting that, for some versions of DNS
terminology, a hypothetical domain (owner, node) with only NAPTR
records is _not_ a "hostname").  Perhaps something more like the
following would be both more true and easier to understand:

	Historically, uses of the DNS to map a domain name to a
	URL have relied on the NAPTR RRTYPEs and then on the
	DDDS[RFC3401] application framework with the DNS as a
	database as specified in RFC 3404 [RFC3404].

The following sentence isn't clear, which doesn't help.
Probably what is intended more like:

	Among the implications of that usage are inability to
	select interesting and relevant NAPTR records from those
	that match the query.

There are several other editorial issues (e.g., "Querying for
URI resource records is not replacing querying..." later in the
Introduction and "Applications MUST know the specific service to
prepend..." in Section 3 (one cannot prepend "a service", only
an identifier of one)), but I hope we can leave them to the RFC
Editor to identify and sort out.

Otherwise, I believe my concerns have been addressed.

Finally, given these discussions, I believe the Acknowledgements
section probably needs review and updating.

best,
    john