Re: [Last-Call] Opsdir last call review of draft-ietf-dnsop-dnssec-bcp-03

Viktor Dukhovni <ietf-dane@dukhovni.org> Sun, 25 September 2022 19:01 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4271C14CE45; Sun, 25 Sep 2022 12:01:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_TEMPERROR=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QSAsTQ5NcxLk; Sun, 25 Sep 2022 12:01:17 -0700 (PDT)
Received: from straasha.imrryr.org (straasha.imrryr.org [100.2.39.101]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DAFEFC1522AC; Sun, 25 Sep 2022 12:00:54 -0700 (PDT)
Received: by straasha.imrryr.org (Postfix, from userid 1001) id A806B113165; Sun, 25 Sep 2022 15:00:53 -0400 (EDT)
Date: Sun, 25 Sep 2022 15:00:53 -0400
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: Gyan Mishra <hayabusagsm@gmail.com>
Cc: ops-dir@ietf.org, dnsop@ietf.org, draft-ietf-dnsop-dnssec-bcp.all@ietf.org, last-call@ietf.org
Message-ID: <YzClZZNzLnpTVjJ7@straasha.imrryr.org>
References: <166412950464.63261.16113770307028490009@ietfa.amsl.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <166412950464.63261.16113770307028490009@ietfa.amsl.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/mSh7OjojnL089AYHwVo5kdaF6mQ>
Subject: Re: [Last-Call] Opsdir last call review of draft-ietf-dnsop-dnssec-bcp-03
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 25 Sep 2022 19:01:27 -0000

On Sun, Sep 25, 2022 at 11:11:44AM -0700, Gyan Mishra via Datatracker wrote:

> The document reads well and is ready for publication.  
> 
> I do not see any issues with the draft.

I largely concur, but do have a few comments:

In the final two sentences of:

    1.  Introduction

       [...]                                It also points to the relevant
       IANA registries that relate to DNSSEC.  It does not, however, point
       to standards that rely on zones needing to be signed by DNSSEC.

it is not completely obvious to me (and perhaps more so to the uninitiated) what
the final sentence is about.  Is this about DANE and the like?  An example could
make this clear.

It may be worth mentioning in:

    1.1.  DNSSEC as a Best Current Practice

       Some observers note that, more than 15 years after the DNSSEC
       specification was published, it is still not widely deployed.  Recent
       estimates are that fewer than 10% of the domain names used for web
       sites are signed, and only around a third of queries to recursive
       resolvers are validated.  However, this low level of implementation
       does not affect whether DNSSEC is a best current practice; it just
       indicates that the value of deploying DNSSEC is often considered
       lower than the cost.  Nonetheless, the significant deployment of
       DNSSEC beneath some top-level domains (TLDs), and the near-universal
       deployment of DNSSEC for the TLDs in the DNS root zone, demonstrate
       that DNSSEC is suitable for implementation by both ordinary and
       highly sophisticated domain owners.

that part of the reluctance to deploy has been immaturity of tools, and lack of
skilled technical staff.  At least the tooling has undergone significant
improvement recently, and further automation is in active development.

In:

    2.  DNSSEC Core Documents

       *  [RFC3110] defines how to use the RSA signature algorithm (although
          refers to other documents for the details).  RSA is still the most
          popular signing algorithm for DNSSEC.

it may be worth mentioning that ECDSA P256 adoption is now almost as widely
deployed for zone signing as RSA (by count of signed zones).

In:

    3.  Additional Cryptographic Algorithms and DNSSEC

       [...]
       The GOST signing algorithm [RFC5933] was also adopted, but has seen
       very limited use, likely because it is a national algorithm specific
       to a very small number of countries.

GOST is more than merely unpopular, the underlying revision of the GOST
algorithms have been deprecated and replaced, and
<https://www.rfc-editor.org/rfc/rfc8624#section-3.1> lists GOST as "MUST NOT"
for signing.

I take issue with the next paragraph:

       Implementation developers who want to know which algorithms to
       implement in DNSSEC software should refer to [RFC8624].  Note that
       this specification is only about what algorithms should and should
       not be included in implementations: it is not advice for which
       algorithms that zone operators should and should not sign with, nor
       which algorithms recursive resolver operators should or should not
       validate.

Sure, the opening sentence of Section 3.1 reads:

       The following table lists the implementation recommendations for
       DNSKEY algorithms.

but an attentive operator should and will indeed take this advice into
consideration.  Many have already, and adoption of the deprecated algorithms 5
and 7 have declined by ~95% from their peak values.

-- 
    Viktor.