Re: [secdir] secdir review of draft-ietf-idnabis-rationale-13.txt

Vint Cerf <vint@google.com> Tue, 06 October 2009 11:11 UTC

Return-Path: <vint@google.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 277473A6AC6; Tue, 6 Oct 2009 04:11:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ce0qLBs2s+Dc; Tue, 6 Oct 2009 04:11:28 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.33.17]) by core3.amsl.com (Postfix) with ESMTP id 8E7043A6ACA; Tue, 6 Oct 2009 04:11:27 -0700 (PDT)
Received: from spaceape9.eur.corp.google.com (spaceape9.eur.corp.google.com [172.28.16.143]) by smtp-out.google.com with ESMTP id n96BD3gu019248; Tue, 6 Oct 2009 12:13:03 +0100
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1254827583; bh=+lfeykz85C4x69lrEVgBPmbFyBc=; h=DomainKey-Signature:Cc:Message-Id:From:To:In-Reply-To: Content-Type:Content-Transfer-Encoding:Mime-Version:Subject:Date: References:X-Mailer:X-System-Of-Record; b=GdL6SN8diAPE9xy6NSYDwXb5 DfVo7MURaOB1PImaOrrsbUBbkiBSLCIJqFWNYfT3jzykJ09ejWG6LIrLPWWYLA==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=cc:message-id:from:to:in-reply-to:content-type: content-transfer-encoding:mime-version:subject:date:references:x-mailer:x-system-of-record; b=kQyv7sOMkUY/a4tXFXyUUgvem9RwOVwNaXLovL4wc907E6kitfjPdGs+y2FPBmxD+ beGjgY6tRdLR5WP0QeYJQ==
Received: from pzk2 (pzk2.prod.google.com [10.243.19.130]) by spaceape9.eur.corp.google.com with ESMTP id n96BCwsf019469; Tue, 6 Oct 2009 04:12:59 -0700
Received: by pzk2 with SMTP id 2so1005875pzk.26 for <multiple recipients>; Tue, 06 Oct 2009 04:12:58 -0700 (PDT)
Received: by 10.115.117.13 with SMTP id u13mr2094381wam.150.1254827578248; Tue, 06 Oct 2009 04:12:58 -0700 (PDT)
Received: from ?192.168.2.56? ([189.254.68.2]) by mx.google.com with ESMTPS id 23sm389608pxi.13.2009.10.06.04.12.55 (version=SSLv3 cipher=RC4-MD5); Tue, 06 Oct 2009 04:12:56 -0700 (PDT)
Message-Id: <2FA54714-6D7F-46E3-A2CA-BC9D44CBC29B@google.com>
From: Vint Cerf <vint@google.com>
To: Charlie Kaufman <charliek@microsoft.com>
In-Reply-To: <D80EDFF2AD83E648BD1164257B9B0912082837C2@TK5EX14MBXC115.redmond.corp.microsoft.com>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Tue, 06 Oct 2009 07:12:53 -0400
References: <D80EDFF2AD83E648BD1164257B9B091208282265@TK5EX14MBXC115.redmond.corp.micr osoft.com> <p06240883c6f00ff718bf@[10.20.30.163]> <D80EDFF2AD83E648BD1164257B9B091208283635@TK5EX14MBXC115.redmond.corp.microsoft.com> <17823AE7FE62B8814BE101BF@PST.JCK.COM> <D80EDFF2AD83E648BD1164257B9B0912082837C2@TK5EX14MBXC115.redmond.corp.microsoft.com>
X-Mailer: Apple Mail (2.936)
X-System-Of-Record: true
Cc: "secdir@ietf.org" <secdir@ietf.org>, John C Klensin <klensin@jck.com>, "iesg@ietf.org" <iesg@ietf.org>, Paul Hoffman <phoffman@imc.org>, "idna-update@alvestrand.no" <idna-update@alvestrand.no>
Subject: Re: [secdir] secdir review of draft-ietf-idnabis-rationale-13.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Oct 2009 11:11:29 -0000

if we mention DNSSEC at all (and perhaps it is not necessary since  
DNSSEC operates at the DNS level), we might simply say that IDNA is  
compatible with DNSSEC since signed DNS entries that reference IDNA A- 
labels are fully compatible with DNSSEC. It is a sort of gratuitous  
statement but perhaps it was requested because DNSSEC was "new" and  
the person requesting the reference wanted to be clear that IDNA  
didn't invalid the use of DNSSEC?

vint


On Oct 6, 2009, at 3:33 AM, Charlie Kaufman wrote:

> My reading of the IDNA spec was that no query response would ever  
> contain a U-label, and therefore saying that if the query response  
> did contain a U-label then DNSSEC couldn't sign or verify it seems  
> nonsensical. I believe that DNSSEC is more like part of DNS than up  
> at the layer of IDNA; it can sign anything that DNS can return.
>
> I believe the DNSSEC spec says that what is signed is the "wire  
> form" of the name, which should be unambiguous unless different wire  
> forms are used in different contexts in the DNS protocol. For DNS  
> servers following IDNA, the wire form would always be an A-label or  
> an LDH-label.
>
> I could easily believe that there are problems when DNSSEC interacts  
> with non-IDNA compliant names (either because the term "wire form"  
> was ambiguous in some contexts or because the DNSSEC spec did not  
> consistently use that terminology). But I haven't heard anyone claim  
> that yet.
>
> 	--Charlie
>
> -----Original Message-----
> From: John C Klensin [mailto:klensin@jck.com]
> Sent: Monday, October 05, 2009 5:17 PM
> To: Charlie Kaufman; Paul Hoffman; secdir@ietf.org; iesg@ietf.org; vint@google.com 
> ; d3e3e3@gmail.com; idna-update@alvestrand.no
> Subject: RE: secdir review of draft-ietf-idnabis-rationale-13.txt
>
>
>
> --On Monday, October 05, 2009 21:40 +0000 Charlie Kaufman <charliek@microsoft.com 
> > wrote:
>
>> I considered putting in more context, but decided against it (clearly
>> a mistake).
>>
>> IDNA specifies that all internationalized domain names served by DNS
>> use the IDNA encoding, but the DNS spec does not. So the full
>> statement in the draft appears to be saying that a DNS zone that does
>> not use IDNA cannot use DNSSEC (in the sense of it wouldn't work as
>> opposed to it MUST NOT). I cannot figure out why that would be true,
>> though as I said there may be some subtlety I'm missing. I agree with
>> Andrew that I can't see why this document should mention DNSSEC at
>> all.
>
> Charlie,
>
> Thanks for the careful reading.  Let me respond as holder of the pen  
> (but one who has put a lot of stuff into the document because the WG  
> apparently wanted it rather than because I was convinced it was  
> necessary).
>
> There are at least two things going on here:
>
> (1) As a collection, the IDNA documents have a number of  
> requirements that are (or should be) stated as "if you sign up for  
> IDNA, then you are required to behave this way".  If anything  
> appears to impose requirements on DNS implementations, zones, or  
> other features except in that "conforming to IDNA"
> context, then it is unintended and almost certainly needs to be  
> fixed.  Sometimes that constraint is present in order to make sure  
> that future extensions that use a "this prefix means something  
> special" can occur without causing problems for IDNA or being  
> mutually exclusive, rather than because of an immediate
> need of IDNA as reflected in this set of documents.   However,
> it turns out to be harder to impose and describe those constraints  
> than one might expect, so some of the instances of it may be  
> convoluted.
>
> That said, IDNA cannot impose constraints on binary labels used in  
> non-IDNA-aware implementations.  It has been clear since the dawn of  
> the DNS, and certainly since RFC 2181, that arbitrary octet strings  
> are permitted to appear in zones and in queries.
> Such octet strings can certainly be UTF-8 or ISO 8859-1; they can  
> even be, e.g., UTF-16 (UCS-2) in spite of the chaos that would cause  
> for applications that assumed they could use null octets as string  
> terminators without being careful about it.
> However, whatever such labels might be, they aren't IDNA-conformant  
> IDNs or, as far as IETF Standards are concerned, IDNs at all.
>
> (2) As far as DNSSEC is concerned, you are quite correct:
> nothing in IDNA has anything to do with it.  The text is there for  
> two reasons:
>
> (i) Someone thought it important enough to mention and insisted that  
> we do so.  It wasn't me.
>
> (ii) The "two (or more) representations of the same logical label"  
> design that underlies IDNA (both the new version and the old one)  
> creates some odd ambiguities with regard to many protocols and  
> namespaces (see draft-iab-idn-encoding for an evolving discussion of  
> some of those issues).  In some cases, one pretty much has to use  
> the A-label (ACE-encoded) form.  In others, the U-label (native  
> Unicode characters) form is anticipated and required.  Still others  
> may be flexible.  When I discussed IDNABIS at a SAAG meeting some  
> time ago, I was treated to an extended discussion (during and after  
> the meeting itself) about whether certificates and other credentials  
> should keep and interpret information in ACE (A-label) form or as  
> native-character Unicode strings and about the importance of being  
> able to convert from dot-separated labels to length-label pair form  
> other than as part of calls to the DNS because some credentials were  
> kept in the latter form.  At least for a while, some of us  
> anticipated DNS servers that would accept zone files with IDNs in U- 
> label form as input and automagically do the conversion to A-labels,  
> presumably performing IDNA validation as
> part of that process.
>
> Is it desirable in that context to say "don't even think about  
> computing DNSSEC values on anything but the A-label" or "because the  
> A-label is the only thing an IDNA-conforming program can put in, or  
> look up in, a zone, DNSSEC is not affected"?  I really don't know...  
> and am certainly happy to make whatever changes in those  
> explanations that the community thinks appropriate.
>
>    john
>
>
>
>