Re: [secdir] review of draft-ietf-dnsext-dnssec-gost-05

Sandra Murphy <> Mon, 25 January 2010 22:44 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 151433A67D7 for <>; Mon, 25 Jan 2010 14:44:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id Z5mCIfpu3cHP for <>; Mon, 25 Jan 2010 14:44:40 -0800 (PST)
Received: from ( []) by (Postfix) with ESMTP id 99A3A3A6452 for <>; Mon, 25 Jan 2010 14:44:40 -0800 (PST)
Received: from ( []) by (8.13.5/8.13.5) with ESMTP id o0PMiYsY008849; Mon, 25 Jan 2010 16:44:34 -0600
Received: from ( []) by (8.13.8/8.13.8) with ESMTP id o0PMiXp4008402; Mon, 25 Jan 2010 16:44:33 -0600
Received: from ([]) by over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Mon, 25 Jan 2010 17:44:32 -0500
Date: Mon, 25 Jan 2010 17:44:32 -0500 (Eastern Standard Time)
From: Sandra Murphy <>
To: Basil Dolmatov <>
In-Reply-To: <>
Message-ID: <>
References: <p06240810c76be77be756@[]> <> <p06240818c76c1a38cbf8@[]> <> <> <p0624080bc78249fa2c22@[]> <>
MIME-Version: 1.0
Content-Type: MULTIPART/MIXED; BOUNDARY="283575587-17756-1264459472=:2224"
X-OriginalArrivalTime: 25 Jan 2010 22:44:32.0635 (UTC) FILETIME=[F63CACB0:01CA9E0F]
Cc: Andrew Sullivan <>,,, Ralph Droms <>
Subject: Re: [secdir] review of draft-ietf-dnsext-dnssec-gost-05
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 25 Jan 2010 22:44:42 -0000

A few comments and requests for clarification in line.


On Mon, 25 Jan 2010, Basil Dolmatov wrote:

> Stephen Kent пишет:
>       At 9:33 PM +0300 1/23/10, Basil Dolmatov wrote:
>       Andrew Sullivan Ô˯ÂÚ:
>                   BTW, we have had this discussion in SIDR, where the RPKI has a similar
>                   global scope and where Vasily had made a similar request for
>                   recognition of GOST algorithms. So far, that WG has said no, for the
>                   reasons I cited in my comments and above. The current plan there is to
>                   go with the two suite model I described above.
>             Ok.  Thanks for this; it's useful feedback.
>       Andrew, I, being the participant in the quoted process, want to share my description of what
>       had happened and I think that it will differ to some extent.
>       I noted that RPKI and SIDR implementations having exactly no possibility to support different
>       protocols will definitely meet the problems, which DNSSec is overcoming simply by its design.
>       Steve, in his presentation showed the technology which gives possibility to given AS (or group
>       of ASes) to build entirely independent system of distribution of routing information from the
>       outer world. That was _the_other_way_ to handle possible protocol problems, just to present
>       mechanism, which allows to split whole system into several entirely independent protocol
>       domains.
>       Comparing to DNS the IDR ideology is entirely different: DNS is wholistic and united service,
>       but main IDR principle is the independence of routing decisions for any given AS.
>       I also noted then that from my point of view the DNSSec protocol approach seems much more
>       productive for the development of the network as a whole and maintaining its integrity, SIDR
>       approach from that perspective seems a restrictive one and leading to the dead end in the near
>       future.
>       I would be very cautious when considering the borrowing of the technologies and approaches from
>       SIDR to any other protocols and services, these technologies though allowing to "overcome"
>       possible protocol problems in fact will lead to the network split.
>       dol@
> Basil,
> I agree that there are differences between the DNS and RPKI contexts, but we disagree on the principle
> common aspects associated with how to accommodate multiple algorithms in both environments.
> Yes, we do disagree in principles (see below).
>       The question for both DNSSEC and SIDR/RPKI is how many algorithms relying parties MUST/SHOULD be
> I wondered why MUST and SHOULD are quoted together. I thought that it is two _different_ modal verbs with
> _different_ meaning and _different_ implementation demands.
>       required to implement, and how do we. The approach adopted (so far) in the SIDR context is to
>       minimize such requirements, to not burden RPs, and to avoid creating the sort of potential security
>       problems cited by Paul Hoffman. Thus the plan is to mandate support for two sets of algorithms (we
>       have only one set so far), a current MUST implement and a next MUST implement.
>       I believe that the situation for DNESEC is equivalent, i.e., imposing a requirement (via MUST or
>       SHOULD) to support more than a current and next set of algorithms is not justifiable.
> The situation in DNSSec is entirely different from SIDR:
>       Comparing to DNS the IDR ideology is entirely different: DNS is wholistic and united service, but
>       main IDR principle is the independence of routing decisions for any given AS.

I'm not certain of your comparison here.  Certainly the independence of 
local decisions is a fundamental principal in BGP.  Do not DNS name 
servers make local decisions?  And DNS resolvers?

> The way that was chosen by SIDR developers is demanding to invent some methods and technologies to prevent
> network from being split.

You will have to explain this further as I see nothing undertaken in sidr 
that would produce a network split or whose sole purpose is to prevent a 
network split.

> Thank you, Steve, you proposed one of the possible technologies which makes that possible (at least makes a
> forthcoming split more or less implicit).

Steve's approach demonstrated how it was possible to provide for a local 
determination of authorization for routing information.

It had nothing to do with algorithm support, which I thought was your 

> That does not mean that this technology is the _good_ one. It means that for the given set of circumstances this
> solution is _the_only_possible_ one.
> So, I quit the discussion in SIDR, not because of I was satisfied with the technology and solutions, but because
> of I have understood how I could maintain network interoperability even with this rigid technology and have had
> more urgent tasks to perform.
> I kindly ask to all participating parties do not try to castrate flexible protocol design of DNSSec to the
> SIDR/RPKI rigid approach.
>       It imposes unacceptable costs on resolvers (analogous to RPs in the RPKI context)
> RPs - are not resolver analogues, but this is for another discussion.
>       and may have adverse secruity implications. Such externalization of costs is a fundamentally bad
>       approach, one that the IETF tries to avoid in analogous contexts in all areas.
> Here is another difference od DNSSec from SIDR - most of the software is open-source in DNSSec, so costs have
> been already distributed evenly.

You will have to explain this point more.  What does open source 
development have to do with the cost of operating a secure system?  Part 
of the cost being externallized is the need to multiply sign and multiply 
verify the same information in multiple algorithms.  Each new globally 
mandated algorithm is a burden on all users, whether they are paying 
development costs or not.

> As for proprietary realisations it seems to me the maintaining of the cost/profit balance is the task of the
> management of the given enterprise, and I am sure that they will do their work well.
>       It is fine for DNSEXT to allocate algorithm IDs to national algorithms like GOST, but it is not
>       appropriate to mandate their support, for the reasons cited in my review.
> I do agree that MUST set of algorithms should be very narrow and limited generally speaking to those algorithms
> by which root zone is signed.
> As for the other algorithms, it seems to me that the main goal of DNS system is the providing integral name
> service resolution. If one have to perform some additional steps (install different resolver software, include
> something and something) just to get access to the network names on some part of the world, then the obvious next
> step will be to point this different resolver to another root of the tree.

I don't understand this argument either.  You agree that the algorithm set 
needs to be limited to those used by the roots.  If that is done, why then 
would it be necessary to point to a different root?

A limited mandated algorithm set exists, you agree that a limited set is 
good - what exactly is your complaint?


> Maybe this is the way the DNS system will develop, but now I think that the some effort to keep the DNS system
> united is justified.
> dol@
> Steve