From owner-namedroppers@ops.ietf.org  Sat Dec  1 08:44:39 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA14139
	for <dnsext-archive@lists.ietf.org>; Sat, 1 Dec 2001 08:44:38 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16AA2B-000Enj-00
	for namedroppers-data@psg.com; Sat, 01 Dec 2001 05:18:23 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16AA2A-000End-00
	for namedroppers@ops.ietf.org; Sat, 01 Dec 2001 05:18:22 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16AA2A-000IlW-00
	for namedroppers@ops.ietf.org; Sat, 01 Dec 2001 05:18:22 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <E16A7sG-000Chn-00@psg.com>
To: namedroppers@ops.ietf.org
Subject: list policy
From: Randy Bush <randy@psg.com>
Date: Sat, 01 Dec 2001 03:00:00 -0800
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

namedroppers@ops.ietf.org is the mailing list for the ietf dnsext wg.  see
<http://www.ietf.org/html.charters/dnsext-charter.html> for the wg charter.
messages should be on topics appropriate to the dnsext wg, which are various
discussion of the dns protocols or administrivia of the wg itself.  the list
is moderated.

calls for papers, announcements of events not directly relevant to the dns
protocols, etc. are not appropriate.  discussion of problems with particular
implementations, announcements of releases, sites' misconfigurations, etc.
should be done on mailing lists for the particular implementations.

there is a wg for dns operational practice, dnsop, whose charter can be
found at <http://www.ietf.org/html.charters/dnsop-charter.html>.

there is a mailing list for discussion of whose implementation is better,
and why someone else's is broken.  it is weenie-war@ops.ietf.org.  all
discussions of such nature should occur there or on /dev/null.  unlike the
namedroppers list, weenie-war@ops.ietf.org is not archived.

questions or concerns related to the acceptance or rejection of
specific messages to the namedroppers mailing list should first be
discussed with the wg chairs, with followup appeals using the normal
appeals process of rfc 2026 (i.e., follup with area directors, then
iesg, etc.).

there is a mailing list for the discussion of ietf processes, which
includes any general discussion of the moderation of ietf mailing
lists.  it is poised@lists.tislabs.com

---

NOTE WELL:

All statements related to the activities of the IETF and addressed to the 
IETF are subject to all provisions of Section 10 of RFC 2026, which grants 
to the IETF and its participants certain licenses and rights in such 
statements.

Such statements include verbal statements in IETF meetings, as well as 
written and electronic communications made at any time or place, which are 
addressed to

    - the IETF plenary session,
    - any IETF working group or portion thereof,
    - the IESG, or any member thereof on behalf of the IESG,
    - the IAB or any member thereof on behalf of the IAB,
    - any IETF mailing list, including the IETF list itself,
      any working group or design team list, or any other list
      functioning under IETF auspices,
    - the RFC Editor or the Internet-Drafts function

Statements made outside of an IETF meeting, mailing list or other function, 
that are clearly not intended to be input to an IETF activity, group or 
function, are not subject to these provisions.



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sun Dec  2 21:58:24 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA02908
	for <dnsext-archive@lists.ietf.org>; Sun, 2 Dec 2001 21:58:23 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16AiwI-000Fzg-00
	for namedroppers-data@psg.com; Sun, 02 Dec 2001 18:34:38 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16AiwI-000Fza-00
	for namedroppers@ops.ietf.org; Sun, 02 Dec 2001 18:34:38 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16AiwI-000BmQ-00
	for namedroppers@ops.ietf.org; Sun, 02 Dec 2001 18:34:38 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <5.0.2.1.2.20011202131106.021097b8@localhost>
In-Reply-To: <200111302005.fAUK57o03206@as.vix.com>
References: <Message from Olaf Kolkman <olaf@ripe.net>
 <200111300750.fAU7oaI21432@birch.ripe.net>
Date: Sun, 02 Dec 2001 18:33:09 -0800
To: Paul A Vixie <vixie@vix.com>, namedroppers@ops.ietf.org
From: "David R. Conrad" <david.conrad@nominum.com>
Subject: Re: Transition from 2535 to opt-in 
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Paul,

At 12:05 PM 11/30/2001 -0800, Paul A Vixie wrote:
>i keep looking at opt-in and DS and asking "how many more years will it take
>before we get the complexity managed in dnssec and have widely deployed it?"

Yes.

>i have an alternative proposal.  use hardware crypto and since .COM with the
>protocol we have now and stop the merry-go-round of dnssec protocol 
>development
>before a lot of us are overcome with motion sickness.

While I too would like the merry-go-round to stop, signing large zones like 
.COM isn't the problem, or rather it is among the easier problems to solve 
-- just throw hardware at it as you note.  The harder problem to solve is 
propagating O(10 GB) worth of DNS data globally in a short amount of time 
(particularly in the worst case scenario of private key compromise).  The 
next hardest problem to solve is key management, particularly in the same 
worst case scenario.  The hardest problem to solve is to convince people 
DNSSEC does something useful -- it appears there is a view that protecting 
name/address translations aren't particularly interesting given there are 
other ways of skinning that particular security cat that are already in use 
(e.g., SSL, TLS, etc).  Of course, the DNS can be used for things other 
than name/address translations and insuring the integrity of that data 
would probably be important, however there are people who believe that such 
use of the DNS is ill-advised.  Fix the last problem and I'm sure DNSSEC 
will be deployed, regardless of what the IETF thinks needs to be done wrt 
the standards.

Rgds,
-drc



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec  3 09:04:12 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA00377
	for <dnsext-archive@lists.ietf.org>; Mon, 3 Dec 2001 09:04:10 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16AtIa-0001oa-00
	for namedroppers-data@psg.com; Mon, 03 Dec 2001 05:38:20 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16AtIZ-0001oU-00
	for namedroppers@ops.ietf.org; Mon, 03 Dec 2001 05:38:19 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16AtIZ-0005U8-00
	for namedroppers@ops.ietf.org; Mon, 03 Dec 2001 05:38:19 -0800
Message-Id: <200112031337.IAA28972@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: namedroppers@ops.ietf.org
From: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-dnsext-ecc-key-01.txt
Date: Mon, 03 Dec 2001 08:37:18 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the DNS Extensions Working Group of the IETF.

	Title		: Elliptic Curve KEYs in the DNS
	Author(s)	: R. Schroeppel, D. Eastlake
	Filename	: draft-ietf-dnsext-ecc-key-01.txt
	Pages		: 14
	Date		: 30-Nov-01
	
A standard method for storing elliptic curve cryptographic keys in
the Domain Name System is described which utilizes DNS KEY resource
record.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-ecc-key-01.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-dnsext-ecc-key-01.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-dnsext-ecc-key-01.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20011130160630.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-dnsext-ecc-key-01.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-dnsext-ecc-key-01.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20011130160630.I-D@ietf.org>

--OtherAccess--

--NextPart--




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec  3 09:06:06 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA00519
	for <dnsext-archive@lists.ietf.org>; Mon, 3 Dec 2001 09:06:05 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16AtIW-0001oI-00
	for namedroppers-data@psg.com; Mon, 03 Dec 2001 05:38:16 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16AtIV-0001oC-00
	for namedroppers@ops.ietf.org; Mon, 03 Dec 2001 05:38:15 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16AtIV-0005U2-00
	for namedroppers@ops.ietf.org; Mon, 03 Dec 2001 05:38:15 -0800
Message-Id: <200112031337.IAA28959@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: namedroppers@ops.ietf.org
From: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-dnsext-dhcid-rr-04.txt
Date: Mon, 03 Dec 2001 08:37:13 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the DNS Extensions Working Group of the IETF.

	Title		: A DNS RR for encoding DHCP information (DHCID RR)
	Author(s)	: M. Stapp, T. Lemon, A. Gustafsson
	Filename	: draft-ietf-dnsext-dhcid-rr-04.txt
	Pages		: 9
	Date		: 30-Nov-01
	
It is possible for multiple DHCP clients to attempt to update the
same DNS FQDN as they obtain DHCP leases. Whether the DHCP server or
the clients themselves perform the DNS updates, conflicts can arise.
To resolve such conflicts, 'Resolution of DNS Name Conflicts'[1]
proposes storing client identifiers in the DNS to unambiguously
associate domain names with the DHCP clients to which they refer.
This memo defines a distinct RR type for this purpose for use by
DHCP clients and servers, the 'DHCID' RR.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-dhcid-rr-04.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-dnsext-dhcid-rr-04.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-dnsext-dhcid-rr-04.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20011130160532.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-dnsext-dhcid-rr-04.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-dnsext-dhcid-rr-04.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20011130160532.I-D@ietf.org>

--OtherAccess--

--NextPart--




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec  5 06:30:01 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA18462
	for <dnsext-archive@lists.ietf.org>; Wed, 5 Dec 2001 06:30:00 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16BZhG-0007NG-00
	for namedroppers-data@psg.com; Wed, 05 Dec 2001 02:54:38 -0800
Received: from roam.psg.com ([147.28.4.2])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16BZhE-0007Mu-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 02:54:37 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16BZhD-000Nir-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 05:54:35 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112051050.fB5Aora44300@open.nlnetlabs.nl>
In-Reply-To: "Paul A Vixie's message as of Nov 30, 21:33"
From: ted@tednet.nl (Ted Lindgreen)
Date: Wed, 5 Dec 2001 11:50:53 +0100
To: Paul A Vixie <vixie@vix.com>, namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

[Quoting Paul A Vixie, on Nov 30, 21:33, in "Re: Transition from  ..."]
> i keep looking at opt-in and DS and asking "how many more years will it take
> before we get the complexity managed in dnssec and have widely deployed it?"

Hi,

There are two issues here on which timely deployment, or
deployment ever depends, first the conclusions:

DS: we need it.
OptIn: if OptIn, why not just forget NXT?

Let me explain:

- DS:
      There is a real issue with the parent-child communication
      in 2535, which must be resolved, before TLDs can deploy it.
      Result: no solution no deployment.
      On the other hand, there are quite a number of (TLD-)people
      that are both ready and anxious to start deploying DNSSEC,
      but just waiting for DS (or any other solution to deal with
      the parental SIG over the childs KEY) to be accepted.

- Opt-In:
      Opt-In will help superlarge TLDs, but IMHO it also changes
      the basic idea of DNSSEC from:
       "securing the DNS infrastructure"
      into:
       "securing small parts of the tree or even single RRsets"
      From recent discussions, I have learned that many people
      think that doing that is reasonable (although I personally
      do not agree), because:
      1. the DNS infrastructure is not that vulnarable anymore;
      2. only few people believe full DNSSEC will ever be deployed;
      3. there is real value in securing only the RRsets that
	 matter (KEYs, APPKEYs, CERT, www.bank.tld, etc.);
      so, secure only what needs to be secured, and forget the rest.

      My personal conclusion from this line of thinking is:
      If ("IF") we go for Opt-In, then go for it all the way, and
      just forget authenticated denial. This will really make
      implementation and deployment much simpler, and thus speed
      it up.

Regards,
-- ted


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec  5 15:26:48 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09231
	for <dnsext-archive@lists.ietf.org>; Wed, 5 Dec 2001 15:26:47 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16BiJK-00082C-00
	for namedroppers-data@psg.com; Wed, 05 Dec 2001 12:06:30 -0800
Received: from roam.psg.com ([147.28.4.2])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16BiJI-000822-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 12:06:28 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16BiJG-000NyJ-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 12:06:26 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <v03130300b833dbcb1468@[199.171.39.21]>
In-Reply-To: <200112051050.fB5Aora44300@open.nlnetlabs.nl>
References: "Paul A Vixie's message as of Nov 30, 21:33"
Date: Wed, 5 Dec 2001 09:24:38 -0500
To: namedroppers@ops.ietf.org
From: Edward Lewis <lewis@tislabs.com>
Subject: Re: Transition from 2535 to opt-in
Cc: lewis@tislabs.com
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

At 5:50 AM -0500 12/5/01, Ted Lindgreen wrote:
>OptIn: if OptIn, why not just forget NXT?

The question of whether "authenticated denial is desired" has been answered
"yes" a number of times over the past year or so  The question has been
raised by the WG chair on the list and in person at London.  So it appears
that there is a desire to provide the service.  (Why?  I don't know.)

Opt-In allows those who want authenticated denial to have that service.
Because opt-in has a means to indicate when it is in use, there is no
ambiguity on the part of the resolver when it comes to understanding the
situation.  Signalling opt-in is done by the lack of the NXT bit in the NXT
RRDATA's type bitmap.  I think this is a solid but expensive way to
indicate the status.

Solid in terms of its indication - there is only one bit involved to
comunicate yes/no, so there is no conflict possible in the resolver's
processing.  Unlike trying to tag the zone key set to indicate the way a
zone operates, which means multiple bits indicating a yes/no status, this
indication leave no room for ambiguity.

Expensive in that this mechanism can only be done once.  If we use the NXT
bit in the bitmap for this purpose, it can't be done again.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                NAI Labs
Phone: +1 443-259-2352                      Email: lewis@tislabs.com

Opinions expressed are property of my evil twin, not my employer.




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec  5 19:41:35 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA23003
	for <dnsext-archive@lists.ietf.org>; Wed, 5 Dec 2001 19:41:34 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16Bm9P-000HHD-00
	for namedroppers-data@psg.com; Wed, 05 Dec 2001 16:12:31 -0800
Received: from tserver.conference.usenix.org ([209.179.127.3] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16Bm9O-000HH6-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 16:12:30 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16Bm9M-000O3V-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 16:12:28 -0800
Message-ID: <3C0E3271.B5071C1F@isi.edu>
MIME-Version: 1.0
References: <200112051050.fB5Aora44300@open.nlnetlabs.nl>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Date: Wed, 05 Dec 2001 09:42:57 -0500
From: Daniel Massey <masseyd@isi.edu>
To: Ted Lindgreen <ted@tednet.nl>
CC: Paul A Vixie <vixie@vix.com>, namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Ted Lindgreen wrote:
> 
> [Quoting Paul A Vixie, on Nov 30, 21:33, in "Re: Transition from  ..."]
> > i keep looking at opt-in and DS and asking "how many more years will it take
> > before we get the complexity managed in dnssec and have widely deployed it?"
> 
> Hi,
> 
> There are two issues here on which timely deployment, or
> deployment ever depends, first the conclusions:
> 
> DS: we need it.
> OptIn: if OptIn, why not just forget NXT?
> 
> Let me explain:
> 
> - DS:
>       There is a real issue with the parent-child communication
>       in 2535, which must be resolved, before TLDs can deploy it.

Ted is exactly right.  We need DS to make wide scale deployment  
feasible. The only thing I would add is that the need for DS is not 
just limited to just TLDs.  Based on our test deployment and related 
work we have been doing, DS is essential for anyone that has to deal 
with multiple organizations (i.e. anyone with one or more child zones 
that are run by someone other than you).    

Dan


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec  5 19:43:07 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA23065
	for <dnsext-archive@lists.ietf.org>; Wed, 5 Dec 2001 19:43:05 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16BmGj-000Had-00
	for namedroppers-data@psg.com; Wed, 05 Dec 2001 16:20:05 -0800
Received: from tserver.conference.usenix.org ([209.179.127.3] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16BmGh-000HaI-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 16:20:03 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16BmGg-000O4l-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 16:20:02 -0800
Message-Id: <5.1.0.14.2.20011205102507.032deec0@localhost>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Date: Wed, 05 Dec 2001 10:35:34 -0500
To: namedroppers@ops.ietf.org
From: Olafur Gudmundsson <ogud@hlid.dc.ogud.com> (by way of 
 =?iso-8859-1?Q?=D3lafur?= Gudmundsson/DNSEXT co-chair <ogud@ogud.com>)
Subject: DNSEXT agenda at 52 IETF.
Cc: agenda@ietf.org
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk



	DNSEXT(tensions)  Agenda at the 52'nd IETF
	2001/Dec/10    19:30 - 22:00  (Monday)
	Savoy Room.

Chairs: Olafur Gudmundsson, ogud@ogud.com
	Randy Bush, randy@psg.com
	
DNSEXT Agenda

05 min Agenda Bashing                     Olafur Gudmundsson
05 min WG status                          Olafur Gudmundsson

Multicast/Zeroconf DNS
15 min Multicast DNS.                     Bernard Aboda
   http://www.ietf.org/internet-drafts/draft-ietf-dnsext-mdns-07.txt

10 min Alternatives to Multicast DNS ?    Olafur Gudmundsson
    Open discussion

DNSSEC
15 min DNS threat model                   Rob Austein & Derek Atkins
   http://www.ietf.org/internet-drafts/draft-ietf-dnsext-dns-threats-00.txt

05 min Delegation Signer                  Olafur Gudmundsson
   http://www.ietf.org/internet-drafts/draft-ietf-dnsext-delegation-signer-04.txt

05 min Opt IN                             Roy Arends
   http://www.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-opt-in-01.txt

05 min RFC253xbis KEY revisions           Donald Eastlake.
   http://www.ietf.org/internet-drafts/draft-ietf-dnsext-rfc2536bis-dsa-01.txt
   http://www.ietf.org/internet-drafts/draft-ietf-dnsext-rfc2539bis-dhk-01.txt

05 min AD bit (open issue)                Olafur Gudmundsson
   http://www.ietf.org/internet-drafts/draft-ietf-dnsext-ad-is-secure-03.txt

15 min Next steps                         Randy Bush
    Open discussion to follow up on the London discussion on the status
    of DNSSEC protocol and if or what changes to make to protocol
    before advancing it.

Other DNS issues
10 min TKEY rekey mode                    Yuji Kamite
   http://www.ietf.org/internet-drafts/draft-ietf-dnsext-tkey-renewal-mode-00.txt 


Other DNS issues
10 min New DNS MIB                        Barr Hibbs
   http://www.ietf.org/internet-drafts/draft-hibbs-dns-server-mib-00.txt

10 min NGtrans DNS ops. requirements      Alain Durand
   http://www.ietf.org/internet-drafts/draft-ietf-ngtrans-dns-ops-req-03.txt.

10 min DNS Stale Resource Rec. Removal    Kamal Janardhan
   http://www.ietf.org/internet-drafts/draft-janardhan-dnsext-aging-00.txt

05 min Observed DNS Resolution Misbehavior Matt Larson
   http://www.ietf.org/internet-drafts/draft-ietf-dnsop-bad-dns-res-00.txt

Where do application KEY's go ?
05 min Restrict KEY                       Dan Massey
   http://www.ietf.org/internet-drafts/draft-ietf-dnsext-restrict-key-for-dnssec-00.txt

05 min Generic KEY RR Protocol value      Edward Lewis
   http://www.ietf.org/internet-drafts/draft-lewis-dnsext-key-genprot-00.txt

05 min APPKEY                             Jakob Schlyter
   http://www.ietf.org/internet-drafts/draft-schlyter-appkey-01.txt

05 min Directions for using DNS as key storage Olafur Gudmundsson



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec  5 19:46:59 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA23169
	for <dnsext-archive@lists.ietf.org>; Wed, 5 Dec 2001 19:46:58 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16BmNf-000Hrx-00
	for namedroppers-data@psg.com; Wed, 05 Dec 2001 16:27:15 -0800
Received: from tserver.conference.usenix.org ([209.179.127.3] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16BmNd-000Hrn-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 16:27:14 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16BmNb-000O5T-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 16:27:11 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112051736.fB5Hauo08958@as.vix.com>
In-Reply-To: Message from ted@tednet.nl (Ted Lindgreen) 
   of "Wed, 05 Dec 2001 11:50:53 +0100." <200112051050.fB5Aora44300@open.nlnetlabs.nl> 
To: namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in 
Date: Wed, 05 Dec 2001 09:36:56 -0800
From: Paul A Vixie <vixie@vix.com>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

>       From recent discussions, I have learned that many people
>       think that doing that is reasonable (although I personally
>       do not agree), because:
>       1. the DNS infrastructure is not that vulnarable anymore;

i challenge this.  the dns infrastructure is as vulnerable as it ever was.
in bind8/contrib we ship several "contributed" spoofage tools that work just
as well now as the day they were written, and are not BIND specific at all.

>       2. only few people believe full DNSSEC will ever be deployed;

opt-in doesn't change this.  right now we need to get "." signed and then any
subdomain who publishes a key can be signed and so on.  "opt-in" is for
partial signing of large zones -- only those who have published keys.  what
we need to do is sign the whole thing, including keys when present.  opt-in
is a crutch for COM, which is "hard" to sign.

>       3. there is real value in securing only the RRsets that
> 	 matter (KEYs, APPKEYs, CERT, www.bank.tld, etc.);
>       so, secure only what needs to be secured, and forget the rest.

i challenge this.  SSL is non-universal and even so depends on trusting small
numbers of signing authorities.  DNS is universal and depends only on getting
one's key signed by the parent domain's administrator, of whom there can be an
unlimited number (though only one per domain).  

we need universal capability for certainty across all RR types.  things like
A and PTR are no less authenticity-critical than KEY and CERT and so on.

>       My personal conclusion from this line of thinking is:
>       If ("IF") we go for Opt-In, then go for it all the way, and
>       just forget authenticated denial. This will really make
>       implementation and deployment much simpler, and thus speed
>       it up.

my own conclusion from this is that since arguments for authenticated denial
were made years ago and are still quite compelling, there's no reason to do
opt-in except as a crutch for COM.


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec  5 19:51:39 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA23329
	for <dnsext-archive@lists.ietf.org>; Wed, 5 Dec 2001 19:51:38 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16BmUq-000I8Y-00
	for namedroppers-data@psg.com; Wed, 05 Dec 2001 16:34:40 -0800
Received: from tserver.conference.usenix.org ([209.179.127.3] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16BmUo-000I8B-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 16:34:38 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16BmUn-000O5y-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 16:34:37 -0800
Message-ID: <20011205141844.A17359@research.netsol.com>
References: <200112051050.fB5Aora44300@open.nlnetlabs.nl>
Mime-Version: 1.0
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature";
	micalg=sha1; boundary="YZ5djTAD1cGYuMQK"
Content-Disposition: inline
In-Reply-To: <200112051050.fB5Aora44300@open.nlnetlabs.nl>
Date: Wed, 5 Dec 2001 14:18:44 -0500
From: Mike Schiraldi <raldi@research.netsol.com>
Cc: namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk


--YZ5djTAD1cGYuMQK
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, Dec 05, 2001 at 11:50:53AM +0100, Ted Lindgreen wrote:
>       My personal conclusion from this line of thinking is:
>       If ("IF") we go for Opt-In, then go for it all the way, and
>       just forget authenticated denial. This will really make
>       implementation and deployment much simpler, and thus speed
>       it up.

Without NXT records and authenticated denial, there is no security. Imagine
the following subset of the COM zone, in an Opt-In world:

; foo1.com is secure
foo1.com  NXT foo3.com NS SIG KEY
foo1.com  NS  ns.foo.net
foo1.com  KEY ...
foo1.com  SIG KEY ...
foo1.com  SIG NXT ...

; foo2.com is not secure
foo2.com  NS  ns.xyz.net

; foo3.com is secure
foo3.com  NXT foo4.com NS SIG KEY
foo3.com  NS  ns.abc.net
foo3.com  KEY ...
foo3.com  SIG KEY ...
foo3.com  SIG NXT ...



Let's say you do a query for www.foo3.com, and your ISP wants to hijack the
query and make it appear that foo3.com is not secure and has a nameserver of
ns.yourisp.nl.

Without NXT records, it can formulate a response like

FOO3.COM.      NS  NS.YOURISP.NL
NS.YOURISP.NL  A   1.2.3.4

But with NXT records, that doesn't work. As shown in the example section of
the Opt-In draft, a response for an insecure domain would have to include a
NXT record showing it was not secure. In other words, it would have to look
something like:

FOO3.COM.      NS  NS.YOURISP.NL
NS.YOURISP.NL  A   1.2.3.4
FOO1.COM.      NXT FOO4.COM. NS SIG KEY ; this record proves that there is
                                        ; no secure domain between foo1
                                        ; and foo4; in other words, it=20
                                        ; shows that foo3 is not secure
FOO1.COM.      SIG NXT ...
; [some other RRs omitted for simplicity]

And your ISP can't do this, because it can't create the SIG record.


--=20
Mike Schiraldi
VeriSign Applied Research

--YZ5djTAD1cGYuMQK
Content-Type: application/x-pkcs7-signature
Content-Disposition: attachment; filename="smime.p7s"
Content-Transfer-Encoding: base64
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--YZ5djTAD1cGYuMQK--


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec  5 19:56:27 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA23467
	for <dnsext-archive@lists.ietf.org>; Wed, 5 Dec 2001 19:56:27 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16BmZY-000IMO-00
	for namedroppers-data@psg.com; Wed, 05 Dec 2001 16:39:32 -0800
Received: from tserver.conference.usenix.org ([209.179.127.3] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16BmZX-000IMG-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 16:39:31 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16BmZX-000O6X-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 16:39:31 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112052034.fB5KYoo11358@as.vix.com>
In-Reply-To: Message from Edward Lewis <lewis@tislabs.com> 
   of "Wed, 05 Dec 2001 09:24:38 EST." <v03130300b833dbcb1468@[199.171.39.21]> 
To: namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in 
Date: Wed, 05 Dec 2001 12:34:50 -0800
From: Paul A Vixie <vixie@vix.com>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> Expensive in that this mechanism can only be done once.  If we use the NXT
> bit in the bitmap for this purpose, it can't be done again.

sure it can.  we can continue discussing the whichness of what in our ivory
tower for another five years (it's already been five years; what's five more?)
three years from now we'll have opt-maybe, opt-in, opt-out, and who knows what
else.


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec  5 22:14:02 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA27792
	for <dnsext-archive@lists.ietf.org>; Wed, 5 Dec 2001 22:14:02 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16BolS-000NHl-00
	for namedroppers-data@psg.com; Wed, 05 Dec 2001 18:59:58 -0800
Received: from tserver.conference.usenix.org ([209.179.127.3] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16BolR-000NHf-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 18:59:57 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16BolP-000OBd-00
	for namedroppers@ops.ietf.org; Wed, 05 Dec 2001 18:59:55 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
References: <200112051736.fB5Hauo08958@as.vix.com>
In-Reply-To: Paul A Vixie's message of "Wed, 05 Dec 2001 09:36:56 -0800"
Message-ID: <sjmk7w1f7zi.fsf@benjamin.ihtfp.org>
To: Paul A Vixie <vixie@vix.com>
Cc: namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in
From: Derek Atkins <warlord@MIT.EDU>
Date: 05 Dec 2001 20:33:05 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Paul A Vixie <vixie@vix.com> writes:

> >       3. there is real value in securing only the RRsets that
> > 	 matter (KEYs, APPKEYs, CERT, www.bank.tld, etc.);
> >       so, secure only what needs to be secured, and forget the rest.
> 
> i challenge this.  SSL is non-universal and even so depends on
> trusting small numbers of signing authorities.  DNS is universal and
> depends only on getting one's key signed by the parent domain's
> administrator, of whom there can be an unlimited number (though only
> one per domain).

It's even worse that you say, Paul...  First, SSL only protects
TCP-based protocols.  That limits it to a subset of existing protocols
(a rather large subset, mind you, but a subset nonetheless).  Second,
using SSL doesn't help you at all when you try to use DNS indirection
pointers (CNAME, SRV, AFSDB, etc.)  Only 2535+ DNSSec can protect
blind[1] DNS "delegations" in this manner.

-derek

[1] by "blind" I mean that the end-host doesn't know about all the
potential delegations that may point to it.  In the SSL sense, what
this means is that I may have a CNAME from hostX.foo.com pointing to
hostY.bar.net; for SSL to work, hostY would need to have a certificate
for "hostX.foo.com" whereas with DNSSec it would not need to know
about this delegation.

-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
       warlord@MIT.EDU                        PGP key available


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec  6 18:10:05 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA15758
	for <dnsext-archive@lists.ietf.org>; Thu, 6 Dec 2001 18:10:03 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16C7Km-000GTf-00
	for namedroppers-data@psg.com; Thu, 06 Dec 2001 14:49:40 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16C7Kl-000GTZ-00
	for namedroppers@ops.ietf.org; Thu, 06 Dec 2001 14:49:39 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16C7Kl-000FTF-00
	for namedroppers@ops.ietf.org; Thu, 06 Dec 2001 14:49:39 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112060957.fB69vkG09614@birch.ripe.net>
In-Reply-To: Message from Edward Lewis <lewis@tislabs.com> 
   of "Wed, 05 Dec 2001 09:24:38 EST." <v03130300b833dbcb1468@[199.171.39.21]> 
To: namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in 
Date: Thu, 06 Dec 2001 10:57:46 +0100
From: Olaf Kolkman <olaf@ripe.net>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit



Ed wrote:
 * The question of whether "authenticated denial is desired" has been answered
 * "yes" a number of times over the past year or so  The question has been
 * raised by the WG chair on the list and in person at London.  So it appears
 * that there is a desire to provide the service.  (Why?  I don't know.)
 * 
 * Opt-In allows those who want authenticated denial to have that service.
 *
 * (... technical bit skipped ...)


To me this is almost a paradox :-) 

I am still trying to get to a opinion about opt-in. A few thoughts on
the subject;

If you say "Opt-In allows those who want authenticated denial to have
that service" you only refer to the "server" side of the problem. As a
client or as a user of the system I have little choice.

If opt-in is adapted the zone owner will decide to which granularity
authenticated denial of existence is in place:
  - In a verifiable insecure zone  there is no such thing as authenticated
    denial.
  - In a RFC2535 zone authenticated denial is available for all records 
    in the zone.
  - In an OPT-IN zone the authenticated denial is granular.

IMHO DNSSEC can only be a success if it is widely deployed over the
DNS tree and it easy for end users to understand they are in a secure
zone or not. Adding granularity makes understanding the security in
the tree much harder for end users (i.e. troubleshooting sysadmins). I
am concerned about OPT-IN becoming a widely deployed mechanism because
it adds complexity to the secure DNS tree that is expensive for the
end-user. In other words, I understand that opt-in allows for
reasonable (and billable) costs on the server side. I am worried about
the costs of opt-in on the client side prohibiting deployment.

AFAIK .com is one of the few (and maybe the only) zone(s) that has
scaling problems when using a non granular (rfc2535) approach. What I
understand from the NLnet Labs folk is that it is technically possible
to sign and serve relatively big TLDs such as .de (on a desktop PC)
and even .com (on a $5000 alpha).

Since I think the opt-in is only useful for HUGE delegation zones I
would like the to see the last line of the security section changed
from:

"Thus, it is recommended to use RFC 2535 [4] where possible and to use
Opt-In where necessary."

into:
"opt-in increases the complexity of the secure DNS tree, therefore
it's use should be very carefully considered. RFC 2535 NXT records
SHOULD be used in almost all zones. The use of opt-in SHOULD only be
considered in zones that mainly consist of delegation records and for
which inclusion of NXT for the whole zone is prohibitively
expensive."


--Olaf 

PS. One technical argument for authenticated denial of existence is a
counter measure against DOS attacks; I query for a RR in a secured
domain and I get a NXDOMAIN or NOANSWER back from a man in the
middle. Without authenticated denial of existence I will be lost.


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec  6 18:10:26 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA15772
	for <dnsext-archive@lists.ietf.org>; Thu, 6 Dec 2001 18:10:24 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16C7Me-000GXa-00
	for namedroppers-data@psg.com; Thu, 06 Dec 2001 14:51:36 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16C7Me-000GXU-00
	for namedroppers@ops.ietf.org; Thu, 06 Dec 2001 14:51:36 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16C7Me-000FYr-00
	for namedroppers@ops.ietf.org; Thu, 06 Dec 2001 14:51:36 -0800
Message-ID: <20011206120232.Y46034-100000@main>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Date: Thu, 6 Dec 2001 12:46:38 +0100 (CET)
From: Roy Arends <Roy.Arends@nominum.com>
To: <namedroppers@ops.ietf.org>
Cc: <lewis@tislabs.com>, <ted@tednet.nl>
Subject: Re: Transition from 2535 to opt-in
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

On Wed, 5 Dec 2001, Edward Lewis wrote:

> At 5:50 AM -0500 12/5/01, Ted Lindgreen wrote:
> >OptIn: if OptIn, why not just forget NXT?
>
> The question of whether "authenticated denial is desired" has been answered
> "yes" a number of times over the past year or so  The question has been
> raised by the WG chair on the list and in person at London.  So it appears
> that there is a desire to provide the service.  (Why?  I don't know)

Why ?

In a secured world I want cryptographic proof that somebank.info does not
exist if asked for. Simply handing over an NXDOMAIN status doesn't cut it,
anyone could give me that status, and there is nothing to cryptographicly
verify. Would make a beauty of a DoS if it did.

> Opt-In allows those who want authenticated denial to have that service.
> Because opt-in has a means to indicate when it is in use, there is no
> ambiguity on the part of the resolver when it comes to understanding the
> situation.  Signalling opt-in is done by the lack of the NXT bit in the NXT
> RRDATA's type bitmap.  I think this is a solid but expensive way to
> indicate the status.
>
> Solid in terms of its indication - there is only one bit involved to
> comunicate yes/no, so there is no conflict possible in the resolver's
> processing.  Unlike trying to tag the zone key set to indicate the way a
> zone operates, which means multiple bits indicating a yes/no status, this
> indication leave no room for ambiguity.
>
> Expensive in that this mechanism can only be done once.  If we use the NXT
> bit in the bitmap for this purpose, it can't be done again.

Solid indeed, expensive ? The rfc2535-NXT design was expensive to begin
with.  It's a close design, not open to extend anything. And that the NXT
is absolutely neccessary right now is even worse. How do you replace that
in the future ? Very hard to do.

If we would design a new NXT (lets call it NEX for argument sake), how and
where do we signal between NXT and NEX and NO records if at least one of
them is mandatory. In the SEC record ? And how do we give authenticated
denial for that SEC record. Would that be done with NXT, NEX or NO ? And
where would that be signalled ? In the parent ? Am I going in loops ?

The above is the real reason why opt-in moved from signalling by KEY to
signalling by NXT (the reason I wrote the no-sig draft).

The current NXT design can be extended by simply assigning pseudo-RRtypes
(huh?, yep!). Types that only exist in the type-bit-map of a NXT record
(the original NO-SIG design), but then again, that would be even an uglier
hack than using the redundant NXT bit in the type-bit-map.

Proposing to design a new NXT type (=add a few more years) from the ground
up would probably get me shot in SLC by some religious DNSSEC fanatic.

Time is the most expensive protocol of all.

Roy Arends



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec  6 18:13:14 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA15816
	for <dnsext-archive@lists.ietf.org>; Thu, 6 Dec 2001 18:13:13 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16C7Ma-000GX6-00
	for namedroppers-data@psg.com; Thu, 06 Dec 2001 14:51:32 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16C7MZ-000GWx-00
	for namedroppers@ops.ietf.org; Thu, 06 Dec 2001 14:51:31 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16C7MZ-000FYg-00
	for namedroppers@ops.ietf.org; Thu, 06 Dec 2001 14:51:31 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112061134.fB6BYeY48804@open.nlnetlabs.nl>
In-Reply-To: "Edward Lewis's message as of Dec  5, 21:48"
From: ted@tednet.nl (Ted Lindgreen)
Date: Thu, 6 Dec 2001 12:34:40 +0100
To: Edward Lewis <lewis@tislabs.com>, namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

[Quoting Edward Lewis, on Dec  5, 21:48, in "Re: Transition from  ..."]

> The question of whether "authenticated denial is desired" has been answered
> "yes" a number of times over the past year or so  The question has been
> raised by the WG chair on the list and in person at London.  So it appears
> that there is a desire to provide the service.  (Why?  I don't know.)

I'm sorry, but I may have expressed myself poorly, but this
was not something I was trying to argue against.

I was also present in London and understand why and when authenticated
denial is desired. I also understand that Opt-In does not do away
with authenticated denial.

My question, however is (and also was in London, where an answer
was given, no consensus was reached, as far as I understood);

  "what do we want to achieve with DNSSEC"?

If it is, like Vixie, myself and others argue:

  "To protect the DNS infrastructure"
or said differently:
  "to single out, and get rid of bad RRs in an environment of
   certifyable and intentionally uncertifyable RRs"

then we need authenticated denial. This is to detect when certified
RRs are being replaced by spoofed uncertified RRs. (Please note
that all arguments for the need of authenticated denial, including
the post of Mike Schiraldi in this thread, are about this kind of
attacks).

However, if the goal is, like the author of the current Opt-In
proposal states, and was voiced by quite a number of people at
the off-the-record DNSSEC meeting during the IETF in London:

[Quoting Roy Arends, on Dec  5, 14:04, in "Re: Transition from  ..."]
> ....
>    secure only the RRsets that matter.
>    secure only what needs to be secured.
> ....

then I argue that authenticated denial is not needed, as we now
only need to prove that a certain RR that we want to be secured
verifies. Example:

 I (secure aware user) want to setup an ssh/ipsec tunnel, do
 banking business, or whatever, with you (secure aware site).
 It would be very handy, if I can get the key-info from DNS,
 but I would only use that info when it verifies.
 The same is true for the other side, as you want to make sure
 that I am the one I pretend to be.
 Now there are only two possibilities that matter:
 1. It verifies ==> OK
 2. It does not verify ==> not OK, but further it is totally
    irrelevant whether the info was bad, spoofed, had an
    outdated sig, or was intentionally not secured: for its
    usage it is just not good enough.

The same reasoning comes up for every "RR that matters": you want
it to verify or else it's just worthless. The need for authenticated
denial was to determine whether info is "intentionally not secured"
or "bad", but this distinction is irrellevant for the ""RRs that matter".

Why do a make a big point of it? Probably, because I am also looking
at it from the user/resolver point of view, and not only from the
large TLD point of view.

With our (NLnet Labs) work on designing a secure aware resolver
we found out the hard way, that:
- It is very easy to add a sig-checker and key-chaser to a (stub-)
  resolver to proof that a secured RR verifies or not. This is a
  simple bottom-up procedure:
    get RR/get SIG/get KEY/verify/get SIG of KEY/.. etc. up to
    a KEY we trust.
  For the "secure only the RRsets that matter" approach, this
  is fine and all we need.
- However, to "protect the DNS infrastructure" we need to build
  a resolver, that finds out when secured RRs are being replaced
  by spoofed uncertified RRs. And this is much more difficult.
  It requires a top-down analysis of the DNS tree.  In fact, it
  needs the whole DNS machinery which is now only present in the
  caching forwarders, to be plugged into the stubresolver.

Now, with Opt-In we go implement the whole complex machinery,
but gain only the "secure only the RRsets that matter" goal.
Looking at the added complexity the one hand, and at the gain on
the other, I really think we are on the wrong track.

In conclusion:
 If the goal is "To protect the DNS infrastructure", then
  let us get consensus about that, and we go all the way.
 But, if the goal is "secure only the RRsets that matter"
  let us get consensus about that, then first cleanup the
  complexity not needed anymore, and go that way.

Regards,
-- ted


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec  7 00:45:44 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA27834
	for <dnsext-archive@lists.ietf.org>; Fri, 7 Dec 2001 00:45:44 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CDcS-00061y-00
	for namedroppers-data@psg.com; Thu, 06 Dec 2001 21:32:20 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CDcR-00061s-00
	for namedroppers@ops.ietf.org; Thu, 06 Dec 2001 21:32:19 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16CDcR-000GzB-00
	for namedroppers@ops.ietf.org; Thu, 06 Dec 2001 21:32:19 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112062348.fB6Nm9o39602@as.vix.com>
In-Reply-To: Message from Roy Arends <Roy.Arends@nominum.com> 
   of "Thu, 06 Dec 2001 12:46:38 +0100." <20011206120232.Y46034-100000@main> 
To: namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in 
Date: Thu, 06 Dec 2001 15:48:09 -0800
From: Paul A Vixie <vixie@vix.com>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> Proposing to design a new NXT type (=add a few more years) from the ground
> up would probably get me shot in SLC by some religious DNSSEC fanatic.

not me.  when rome is going to burn, bring a bag of marshmellows, that's all.

> Time is the most expensive protocol of all.

yes.  we should be deep in deployment by this time.  let's not repeat the
time-related errors that got us to where we're not.



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec  7 10:47:54 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA22611
	for <dnsext-archive@lists.ietf.org>; Fri, 7 Dec 2001 10:47:53 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CN1R-0003M0-00
	for namedroppers-data@psg.com; Fri, 07 Dec 2001 07:34:45 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CN1Q-0003Lu-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 07:34:44 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16CN1Q-000H1h-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 07:34:44 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112071334.fB7DYp657398@open.nlnetlabs.nl>
In-Reply-To: "Roy Arends's message as of Dec  7,  0:17"
From: ted@tednet.nl (Ted Lindgreen)
Date: Fri, 7 Dec 2001 14:34:51 +0100
To: <namedroppers@ops.ietf.org>
Subject: Re: Transition from 2535 to opt-in
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

[Quoting Roy Arends, on Dec  7,  0:17, in "Re: Transition from  ..."]

> On Wed, 5 Dec 2001, Edward Lewis wrote:
> 
> > At 5:50 AM -0500 12/5/01, Ted Lindgreen wrote:
> > >OptIn: if OptIn, why not just forget NXT?
> >
> > The question of whether "authenticated denial is desired" has been answered
> > "yes" a number of times over the past year or so  The question has been
> > raised by the WG chair on the list and in person at London.  So it appears
> > that there is a desire to provide the service.  (Why?  I don't know)
> 
> Why ?
> 
> In a secured world I want cryptographic proof that somebank.info does not
> exist if asked for. Simply handing over an NXDOMAIN status doesn't cut it,
> anyone could give me that status, and there is nothing to cryptographicly
> verify. Would make a beauty of a DoS if it did.

Please note, that if you can substitude a secured RR by an NXDOMAIN,
you can probably substitude also other info.
Therefore, when a DOS attack is the goal, and substitution is
possible, there a plenty more possibilities to do that.
This is true whether we have DNSSEC or not. And if we have DNSSEC,
it can be done whether the zone is signed or not.

In fact, I am affraid that it is even easier to DoS a secured RR,
because just flipping any single bit in any of the accompagning
SIG/KEY chain will do just as fine as substituting the RR itself,
so the substitution possibilities only increase.

This seems bad, but please understand that DNSSEC was neither
designed, nor capable as defence against DoS attacks.

So, yes, there may be compelling arguments why and when authenticated
denial is desired, but defence against DoS attacks is not one of them.

Regards,
-- ted


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec  7 10:49:06 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA22634
	for <dnsext-archive@lists.ietf.org>; Fri, 7 Dec 2001 10:49:05 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CMxi-0003DE-00
	for namedroppers-data@psg.com; Fri, 07 Dec 2001 07:30:54 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CMxh-0003D8-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 07:30:53 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16CMxh-000GvF-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 07:30:53 -0800
In-Reply-To: <200112061134.fB6BYeY48804@open.nlnetlabs.nl>
Message-ID: <20011207111142.T46034-100000@main>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Date: Fri, 7 Dec 2001 11:38:07 +0100 (CET)
From: Roy Arends <Roy.Arends@nominum.com>
To: Ted Lindgreen <ted@tednet.nl>
Cc: Edward Lewis <lewis@tislabs.com>, <namedroppers@ops.ietf.org>
Subject: Re: Transition from 2535 to opt-in
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

On Thu, 6 Dec 2001, Ted Lindgreen wrote:

> then I argue that authenticated denial is not needed, as we now
> only need to prove that a certain RR that we want to be secured
> verifies. Example:
>
>  I (secure aware user) want to setup an ssh/ipsec tunnel, do
>  banking business, or whatever, with you (secure aware site).
>  It would be very handy, if I can get the key-info from DNS,
>  but I would only use that info when it verifies.
>  The same is true for the other side, as you want to make sure
>  that I am the one I pretend to be.
>  Now there are only two possibilities that matter:
>  1. It verifies ==> OK
>  2. It does not verify ==> not OK, but further it is totally
>     irrelevant whether the info was bad, spoofed, had an
>     outdated sig, or was intentionally not secured: for its
>     usage it is just not good enough.



ridiculous



1. it verifies ==> OK
2. it does not verify ==> not OK.

Then I want to know what went wrong.

 -) Spoofed ?
 -) DoSed ?
 -) Simple typo on my side ?
 -) some other unexpected variable ?

       OR

 -) is it VERIFIABLY UNSECURE ?

The difference between the first 4 points and the last is authenticated
denial. With the first 4 you simply don't know what went wrong.

When you identify your bank and it is not ok, you then simply go home and
tell yourself "not ok" and don't care about it ? The rest is irrelevant ?
Or could it be that the bank moved, you're lost, you're in the wrong city
or simply are at the wrong bank.

There is no difference between a signed RRset AND it's authenticated
denial in opt-in and in rfc 2535, whether we're talking usage or
importance.

Roy Arends
Nominum



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec  7 11:13:16 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA23319
	for <dnsext-archive@lists.ietf.org>; Fri, 7 Dec 2001 11:13:15 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CNS0-0004QF-00
	for namedroppers-data@psg.com; Fri, 07 Dec 2001 08:02:12 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CNS0-0004Q9-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 08:02:12 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16CNS0-000Hwv-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 08:02:12 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112071557.QAA10668@omval.tednet.nl>
In-Reply-To: "Roy Arends's message as of Dec  7, 11:30"
From: ted@tednet.nl (Ted Lindgreen)
Date: Fri, 7 Dec 2001 16:57:23 +0100
To: Roy Arends <Roy.Arends@nominum.com>, Ted Lindgreen <ted@tednet.nl>
Subject: Re: Transition from 2535 to opt-in
Cc: Edward Lewis <lewis@tislabs.com>, <namedroppers@ops.ietf.org>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

[Quoting Roy Arends, on Dec  7, 11:30, in "Re: Transition from  ..."]
> On Thu, 6 Dec 2001, Ted Lindgreen wrote:
> 
> > then I argue that authenticated denial is not needed, as we now
> > only need to prove that a certain RR that we want to be secured
> > verifies. Example:
> >
> >  I (secure aware user) want to setup an ssh/ipsec tunnel, do
> >  banking business, or whatever, with you (secure aware site).
> >  It would be very handy, if I can get the key-info from DNS,
> >  but I would only use that info when it verifies.
> >  The same is true for the other side, as you want to make sure
> >  that I am the one I pretend to be.
> >  Now there are only two possibilities that matter:
> >  1. It verifies ==> OK
> >  2. It does not verify ==> not OK, but further it is totally
> >     irrelevant whether the info was bad, spoofed, had an
> >     outdated sig, or was intentionally not secured: for its
> >     usage it is just not good enough.
> 
> 
> 
> ridiculous
> 
> 
> 1. it verifies ==> OK
> 2. it does not verify ==> not OK.
> 
> Then I want to know what went wrong.
> 
>  -) Spoofed ?
>  -) DoSed ?
>  -) Simple typo on my side ?
>  -) some other unexpected variable ?
> 
>        OR
> 
>  -) is it VERIFIABLY UNSECURE ?
> 
> The difference between the first 4 points and the last is authenticated
> denial. With the first 4 you simply don't know what went wrong.

Yes, that is exactly the point:

- When "you" are the DNS infrastructure, this info is essential, because
  it distiguishes your actions between:
  - It is BAD ==> Throw it away.
  - It is intentionally not secured ==> Keep it as such.

- But when "you" are a user, interested to use valid key-info, then it is
  only usable when it verifies.
  If it does not verify, the next step is error handling, in which the
  DNS-protocol may or may not assist you in analysing the problem.
  And perhaps you even have to call/mail some relevant person
  to ask "what's up?".
  But in the meantime the bottomline remains:
    no verification ==> no valid key-info.
 
> When you identify your bank and it is not ok, you then simply go home and
> tell yourself "not ok" and don't care about it ? The rest is irrelevant ?

 When this bank tells me my credit card is "not ok", I certainly do care
 about that, and it is certainly relevant. I have to go into an error
 handling procedure, in which the bankemployee or ATM machine may or
 may not assist me in analysing my problem. Perhaps I even have to call
 my own bank to ask "what's up?".
 But in the meantime the bottomline remains:
    no valid credit card ==> no money.

Please note, that there is a difference between:
 "securing the infrastructure", where you want to weed out all the BADs
 between many certifieds and uncertifieds;
and
 "securing certain special RRs, such as an ipsec-key", where you just
 want to check that your special RRs verify and all other RRs are
 irrelevant.

The difference is that in the former authenticated denial is crucial, and
in the latter at most informative for error handling.

Regards,
-- ted


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec  7 12:51:21 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA25895
	for <dnsext-archive@lists.ietf.org>; Fri, 7 Dec 2001 12:51:19 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16COzH-0008Hm-00
	for namedroppers-data@psg.com; Fri, 07 Dec 2001 09:40:39 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16COzH-0008Hg-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 09:40:39 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16COzH-000Kc9-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 09:40:39 -0800
In-Reply-To: <200112071334.fB7DYp657398@open.nlnetlabs.nl>
Message-ID: <20011207174337.V47758-100000@main>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Date: Fri, 7 Dec 2001 18:21:42 +0100 (CET)
From: Roy Arends <Roy.Arends@nominum.com>
To: Ted Lindgreen <ted@tednet.nl>
Cc: <namedroppers@ops.ietf.org>
Subject: Re: Transition from 2535 to opt-in
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

On Fri, 7 Dec 2001, Ted Lindgreen wrote:

> [Quoting Roy Arends, on Dec  7,  0:17, in "Re: Transition from  ..."]
>
> > On Wed, 5 Dec 2001, Edward Lewis wrote:
> >
> > > At 5:50 AM -0500 12/5/01, Ted Lindgreen wrote:
> > > >OptIn: if OptIn, why not just forget NXT?
> > >
> > > The question of whether "authenticated denial is desired" has been answered
> > > "yes" a number of times over the past year or so  The question has been
> > > raised by the WG chair on the list and in person at London.  So it appears
> > > that there is a desire to provide the service.  (Why?  I don't know)
> >
> > Why ?
> >
> > In a secured world I want cryptographic proof that somebank.info does not
> > exist if asked for. Simply handing over an NXDOMAIN status doesn't cut it,
> > anyone could give me that status, and there is nothing to cryptographicly
> > verify. Would make a beauty of a DoS if it did.
>
> Please note, that if you can substitude a secured RR by an NXDOMAIN,
> you can probably substitude also other info.
> Therefore, when a DOS attack is the goal, and substitution is
> possible, there a plenty more possibilities to do that.
> This is true whether we have DNSSEC or not. And if we have DNSSEC,
> it can be done whether the zone is signed or not.
>
> In fact, I am affraid that it is even easier to DoS a secured RR,
> because just flipping any single bit in any of the accompagning
> SIG/KEY chain will do just as fine as substituting the RR itself,
> so the substitution possibilities only increase.
>
> This seems bad, but please understand that DNSSEC was neither
> designed, nor capable as defence against DoS attacks.
>
> So, yes, there may be compelling arguments why and when authenticated
> denial is desired, but defence against DoS attacks is not one of them.

I keep hearing that statement over and over all over the place in several
ways, shape and form. "DNSSEC was not designed as a defense against DoS
attacks". When I say "beauty" of a "DoS" attack, I implied one can
actually (ab)use DNSSEC in an almost perfect way to simply kick a domain
of the planet if one would do away with authenticated denial. Note that
this is a far more efficient (several orders) of DoS attack then simply
compromising a record on the fly.

If the "DNSSEC was not designed as a defense against DoS attacks" is used
as a general statement, why aren't NXT and SIG generated on the fly ?
EXACTLY, to make sure the system will not be used against a DoS.

And why is there DNSSEC in general ? To defend against spoofs, poisons and
other DoS attacks.

It is all in the eye of the (secure) resolver. It wants some cryptographic
proof, a signed record, something to verify.

Roy Arends
Nominum



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec  7 19:03:38 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA02959
	for <dnsext-archive@lists.ietf.org>; Fri, 7 Dec 2001 19:03:37 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CUPg-000G8S-00
	for namedroppers-data@psg.com; Fri, 07 Dec 2001 15:28:16 -0800
Received: from 42-196-131-12.bellhead.com ([12.131.196.42] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CUPg-000G8M-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 15:28:16 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16CUPd-0000BH-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 15:28:13 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: Message from Roy Arends <Roy.Arends@nominum.com> 
   of "Fri, 07 Dec 2001 18:21:42 +0100." <20011207174337.V47758-100000@main> 
Message-Id: <20011207185837.AA2932A51@orchard.arlington.ma.us>
From: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
To: Roy Arends <Roy.Arends@nominum.com>
Cc: Ted Lindgreen <ted@tednet.nl>, namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in 
Date: Fri, 07 Dec 2001 13:58:32 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

I'm not quite sure who said this, but:

> > This seems bad, but please understand that DNSSEC was neither
> > designed, nor capable as defence against DoS attacks.
> >
> > So, yes, there may be compelling arguments why and when authenticated
> > denial is desired, but defence against DoS attacks is not one of them.

This position taken to an extreme would encourage us to engineer a
"please crash" request into every protocol.

It would be wrong to lump all denial-of-service attacks together into
a single category -- there are many different sorts of attacks which
could cause denial of service.  Some are easy to defend against, some
are hard.

IMHO, the way to go is to engineer protocols (and implementations) to
be robust against low-packet-rate denial-of-service attacks (such as
forged NXDOMAINS and the "classic" SYN flood), while efforts like
itrace provide tools to allow network operators to deal with the
high-packet-rate attacks.

						- Bill


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec  7 19:15:51 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA03126
	for <dnsext-archive@lists.ietf.org>; Fri, 7 Dec 2001 19:15:50 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CUat-000GN3-00
	for namedroppers-data@psg.com; Fri, 07 Dec 2001 15:39:51 -0800
Received: from 42-196-131-12.bellhead.com ([12.131.196.42] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CUas-000GMs-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 15:39:50 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16CUaq-0000CD-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 15:39:48 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <2F3EC696EAEED311BB2D009027C3F4F4058698BD@vhqpostal.verisign.com>
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: "'Paul A Vixie'" <vixie@vix.com>, namedroppers@ops.ietf.org
Subject: RE: Transition from 2535 to opt-in 
Date: Fri, 7 Dec 2001 11:33:14 -0800 
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Paul,

	Your argument reminds me of the Menendez brothers, who shot their
parents and then asked the court for liniency because they are orphans. If
you want the discussion to stop then don't fillibuster.

	Deployment issues are NEVER solved by ignoring them. If you succeed
in your apparent aim of stopping deployment of Opt-in you will stop
deployment of DNSSEC entirely in the large TLDs. Furthermore, if you were
correct in your assertion that Opt-in is incompatible with 2535 then partial
deployment in the small domains would block any deployment in the large
domains until a new opt-in spec is developed. I dispute your initial
assertion but if you insist on making it then please note that in the
absence of deployment the discovery of an error in a protocol that prevents
extensibility argues for fixing the protocol and not propogating a broken
one.

	Let us consider the history of some other IETF working groups. PEM
did not advance deployment by refusing to change its undeployable PKI
architecture. The intransigence of the PEM working group eventually
fractured the email security space so that we had PGP and S/MIME in
competition.

	This is an engineering issue. Without opt-in the DNSSEC records for
.com will take up approximately ten times their current amount of space.
That means ten times the amount of RAM, ten times the amount of disk
storage, ten time the amount of silo storage etc. The costs of signing the
zone are prohibitive even before we count the cost of the signing devices or
work out how to securely manage the necessary number of private keys.

	This is before you get to the problem of distributing the data. If I
was on the ICANN board I would explicitly prohibit my contractor from
deploying DNSSEC without opt-in. The risk of introducing instability into
the main TLDs vastly outweighs any advantage that can be argued for DNSSEC
prior to deployment.

	I am an engineer. For me the cost of deployment is a significant
issue. If a specification requires large deployment costs for a security
feature that few parties will be able to take advantage of then it is a bad
specification.

	As for your analysis of the security requirements; first DNSSEC will
provide no security at all if it remains as spec-ware. Second I do not agree
that you have identified a significant security issue.

	If it were the case that I had $O(10^8) extra to spend on DNS
security I would be spending it on physical security (and I would not be
telling you in particular what I was doing). Cryptography is no defense
against terrorists whose principal skills are knowing how to clean an AK47
and milk a goat. I don't have great respect for people who go around
announcing possible targets to these folk through the AP and Reuters.
Careless talk such as yours could cost lives. Perhaps next time you could
give the street addresses of the new facilities as well so they don't bomb
an empty building by mistake.

	It is very easy to delay deployment of cryptographic specifications
by raising alleged security issues that can only be addressed at prohibitive
cost. If you wish to continue your filibuster please do not blame others for
the delay in deployment that you are causing.


	At this point there are only two possible outcomes:

1) We deploy DNSSEC with opt-in.
2) We design a new specification entirely.

	If you insist that you cannot live with option 1 and the group
agrees with you then it is time to burn the 2535 drafts and start again. The
sooner we do this the better, since the longer we delay starting the longer
it will be until we finish.

	I would prefer to begin by deploying DNSSEC-opt-in and then start
consideration of additional opportunities there are to add security to the
DNS system.


		Phill


Phillip Hallam-Baker FBCS C.Eng.
Principal Scientist
VeriSign Research
VeriSign Inc.
pbaker@verisign.com
781 245 6996 x227


> -----Original Message-----
> From: Paul A Vixie [mailto:vixie@vix.com]
> Sent: Wednesday, December 05, 2001 3:35 PM
> To: namedroppers@ops.ietf.org
> Subject: Re: Transition from 2535 to opt-in 
> 
> 
> > Expensive in that this mechanism can only be done once.  If 
> we use the NXT
> > bit in the bitmap for this purpose, it can't be done again.
> 
> sure it can.  we can continue discussing the whichness of 
> what in our ivory
> tower for another five years (it's already been five years; 
> what's five more?)
> three years from now we'll have opt-maybe, opt-in, opt-out, 
> and who knows what
> else.
> 
> 
> to unsubscribe send a message to 
> namedroppers-request@ops.ietf.org with
> the word 'unsubscribe' in a single line as the message text body.

to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec  7 19:16:20 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA03146
	for <dnsext-archive@lists.ietf.org>; Fri, 7 Dec 2001 19:16:20 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CUZe-000GLk-00
	for namedroppers-data@psg.com; Fri, 07 Dec 2001 15:38:34 -0800
Received: from 42-196-131-12.bellhead.com ([12.131.196.42] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CUZd-000GLe-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 15:38:33 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16CUZb-0000C9-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 15:38:31 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <2F3EC696EAEED311BB2D009027C3F4F4058698BC@vhqpostal.verisign.com>
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: "'Olaf Kolkman'" <olaf@ripe.net>, namedroppers@ops.ietf.org
Subject: RE: Transition from 2535 to opt-in 
Date: Fri, 7 Dec 2001 11:21:23 -0800 
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> AFAIK .com is one of the few (and maybe the only) zone(s) that has
> scaling problems when using a non granular (rfc2535) approach. What I
> understand from the NLnet Labs folk is that it is technically possible
> to sign and serve relatively big TLDs such as .de (on a desktop PC)
> and even .com (on a $5000 alpha).

Olaf,

	Let us imagine for a moment that we get you to sign a rack of
non-disclosure forms, blindfold you, take you on a drive to our 
data center etc. etc.

	Do you imagine that you would see the current .com zone being
served by a '$5,000 alpha' or anything that remotely resembles such 
a small scale without DNSSEC?

	I am interested to learn how deployment of a specification that
increases the data volume by an order of magnitude can reduce hardware
costs by several orders of magnitude.

		Phill


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec  7 19:23:31 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA03331
	for <dnsext-archive@lists.ietf.org>; Fri, 7 Dec 2001 19:23:31 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CUol-000Gjc-00
	for namedroppers-data@psg.com; Fri, 07 Dec 2001 15:54:11 -0800
Received: from 42-196-131-12.bellhead.com ([12.131.196.42] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CUok-000GjQ-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 15:54:10 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16CUoi-0000D5-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 15:54:08 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
References: <20011207174337.V47758-100000@main>
In-Reply-To: Roy Arends's message of "Fri, 7 Dec 2001 18:21:42 +0100 (CET)"
Message-ID: <sjmvgfir6io.fsf@benjamin.ihtfp.org>
To: Roy Arends <Roy.Arends@nominum.com>
Cc: Ted Lindgreen <ted@tednet.nl>, <namedroppers@ops.ietf.org>
Subject: Re: Transition from 2535 to opt-in
From: Derek Atkins <warlord@MIT.EDU>
Date: 07 Dec 2001 17:48:31 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Roy Arends <Roy.Arends@nominum.com> writes:

> If the "DNSSEC was not designed as a defense against DoS attacks" is used
> as a general statement, why aren't NXT and SIG generated on the fly ?
> EXACTLY, to make sure the system will not be used against a DoS.

Well, partially.  They are not created in real-time because the data
is quazi-static.  Why re-sign the same data over and over when you can
sign it once and re-use the signature?  Also, creating signatures is
an _expensive_ operation.  It was even more so 5+ years ago when 2535
was being written.

-derek

-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
       warlord@MIT.EDU                        PGP key available


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec  7 19:25:17 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA03349
	for <dnsext-archive@lists.ietf.org>; Fri, 7 Dec 2001 19:25:17 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CUpJ-000GkC-00
	for namedroppers-data@psg.com; Fri, 07 Dec 2001 15:54:45 -0800
Received: from 42-196-131-12.bellhead.com ([12.131.196.42] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CUpJ-000Gk5-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 15:54:45 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16CUpG-0000DA-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 15:54:42 -0800
In-Reply-To: <sjmvgfir6io.fsf@benjamin.ihtfp.org>
Message-ID: <20011208000812.J47758-100000@main>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Date: Sat, 8 Dec 2001 00:19:25 +0100 (CET)
From: Roy Arends <Roy.Arends@nominum.com>
To: Derek Atkins <warlord@MIT.EDU>
Cc: Roy Arends <Roy.Arends@nominum.com>, Ted Lindgreen <ted@tednet.nl>,
        <namedroppers@ops.ietf.org>
Subject: Re: Transition from 2535 to opt-in
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

On 7 Dec 2001, Derek Atkins wrote:

> Roy Arends <Roy.Arends@nominum.com> writes:
>
> > If the "DNSSEC was not designed as a defense against DoS attacks" is used
> > as a general statement, why aren't NXT and SIG generated on the fly ?
> > EXACTLY, to make sure the system will not be used against a DoS.
>
> Well, partially.  They are not created in real-time because the data
> is quazi-static.  Why re-sign the same data over and over when you can
> sign it once and re-use the signature?  Also, creating signatures is
> an _expensive_ operation.  It was even more so 5+ years ago when 2535
> was being written.

You're right and there is also the private key on an online machine issue.
All these arguments make a case for NXT+SIG to be generated in advance.
The argument (DoS) I made came up when I was looking at alternatives for
storing NXT+SIG's.

Regards,

Roy Arends
Nominum





to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec  7 20:41:29 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA04319
	for <dnsext-archive@lists.ietf.org>; Fri, 7 Dec 2001 20:41:28 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CW8p-000IMw-00
	for namedroppers-data@psg.com; Fri, 07 Dec 2001 17:18:59 -0800
Received: from 42-196-131-12.bellhead.com ([12.131.196.42] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CW8p-000IMp-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 17:18:59 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16CW8m-0000GZ-00
	for namedroppers@ops.ietf.org; Fri, 07 Dec 2001 18:18:56 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112080026.fB80QHo64593@as.vix.com>
In-Reply-To: Message from Roy Arends <Roy.Arends@nominum.com> 
   of "Sat, 08 Dec 2001 00:19:25 +0100." <20011208000812.J47758-100000@main> 
To: namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in 
Date: Fri, 07 Dec 2001 16:26:17 -0800
From: Paul A Vixie <vixie@vix.com>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> > > EXACTLY, to make sure the system will not be used against a DoS.
> >
> > Well, partially.  They are not created in real-time because the data
> > is quazi-static.  Why re-sign the same data over and over when you can
> > sign it once and re-use the signature?  Also, creating signatures is
> > an _expensive_ operation.  It was even more so 5+ years ago when 2535
> > was being written.

well, the protocol as it sits right now (but not for long!) was designed
with the idea that dynamic calculation would be too expensive.  in other
words the reason we precalc these sigs is because we can, and the reason
we can is because we thought we would have to so we designed it that way.

> You're right and there is also the private key on an online machine issue.
> All these arguments make a case for NXT+SIG to be generated in advance.
> The argument (DoS) I made came up when I was looking at alternatives for
> storing NXT+SIG's.

does anybody other than me think that if we're still addressing issues at
this fundamental level five+ years into the project, that we're just doomed?


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sat Dec  8 10:07:12 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA29943
	for <dnsext-archive@lists.ietf.org>; Sat, 8 Dec 2001 10:07:11 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CiaI-0005WB-00
	for namedroppers-data@psg.com; Sat, 08 Dec 2001 06:36:10 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CiaI-0005W5-00
	for namedroppers@ops.ietf.org; Sat, 08 Dec 2001 06:36:10 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16CiaE-0000U7-00
	for namedroppers@ops.ietf.org; Sat, 08 Dec 2001 07:36:06 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112081103.fB8B3Gs66168@open.nlnetlabs.nl>
In-Reply-To: "Paul A Vixie's message as of Dec  8,  2:47"
From: ted@tednet.nl (Ted Lindgreen)
Date: Sat, 8 Dec 2001 12:03:16 +0100
To: Paul A Vixie <vixie@vix.com>, namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

[Quoting Paul A Vixie, on Dec  8,  2:47, in "Re: Transition from  ..."]

> does anybody other than me think that if we're still addressing issues at
> this fundamental level five+ years into the project, that we're just doomed?

Well, my solid conclusion, after leading a team of DNSSEC developers
for the past years is, unfortunately, that you are right about the
first part of above question.

About the last part of your question... I'm very close to agree.
Well, in fact... let me explain:

At the London meeting (not during an official meeting, but a
side-one, where most of the DNSSEC specialists, some 40 people,
met), the question was raised:
  "Is the DNS cache poisoning threat still an issue here?"

A surprisingly large part, well the overly majority of the
people present, reacted in the range between:
  "Hmm, no, this is mostly fixed already, isn't it?"
and
 "Well, no, at least that's not why we want DNSSEC."

During the official meeting where other security people were
dominating, the wind blew from an other direction.  The need to
recap the threats was adviced, and in the mean time a draft is
presented (draft-ietf-dnsext-dns-threats-00.txt by Atkins and
Austein).

We were totally puzzled with development going one way, and dnsops
talking about another.  As a result, we, NLnet Labs, have put our
DNSSEC development work on ice.  Without a common goal, it is
impossible te determine a direction.

And therefore, I keep asking (and feel like a broken record) the
question: please let's restate our goal again.

Then, I see 3 possible outcomes (but there will, no doubt be more,
and hopefully better):
1. The goal remains: "Protect the DNS infrastructure"
   Then, we should focus on either deployment on 2535, with only
   the real necessary modifications, or conclude that 2535 won't 
   ver work, and put our focus on developing DNS-2 or some
   other alternative.
2. If the goal is: "A cheap PKI".
   Then, let's design, build and implement a cheap PKI, and please
   don't try to clobber into DNS.
3. A compromise, where only "the info the must be signed, is signed".
   Then, the right way is to strip RFC 2535 to do just that, and
   not increase its complexity with opt-whatever.

Anyway, when above decision is made, NLnet Labs is ready to join
the development-party again, but as longs we are directionless,
we will standby.

Regards,
-- ted


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sat Dec  8 11:41:09 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA01169
	for <dnsext-archive@lists.ietf.org>; Sat, 8 Dec 2001 11:41:08 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16CkC7-0007Mo-00
	for namedroppers-data@psg.com; Sat, 08 Dec 2001 08:19:19 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16CkC6-0007Me-00
	for namedroppers@ops.ietf.org; Sat, 08 Dec 2001 08:19:18 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16CkC6-0000aC-00
	for namedroppers@ops.ietf.org; Sat, 08 Dec 2001 09:19:18 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112081617.fB8GHao88658@as.vix.com>
In-Reply-To: Message from ted@tednet.nl (Ted Lindgreen) 
   of "Sat, 08 Dec 2001 12:03:16 +0100." <200112081103.fB8B3Gs66168@open.nlnetlabs.nl> 
To: namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in 
Date: Sat, 08 Dec 2001 08:17:36 -0800
From: Paul A Vixie <vixie@vix.com>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> At the London meeting (not during an official meeting, but a
> side-one, where most of the DNSSEC specialists, some 40 people,
> met), the question was raised:
>   "Is the DNS cache poisoning threat still an issue here?"
> 
> A surprisingly large part, well the overly majority of the
> people present, reacted in the range between:
>   "Hmm, no, this is mostly fixed already, isn't it?"

they were wrong.  it's not fixed.  it's not fixable without a protocol change.

> and
>   "Well, no, at least that's not why we want DNSSEC."

had i been there i would have said "this is only one of several reasons why i
want dnssec."  folks use "cheap PKI" as a covering term but it's a misnomer.
there's a whole class of data which i won't use the DNS to propagate because
DNS is extremely spoofable.

> Anyway, when above decision is made, NLnet Labs is ready to join the
> development-party again, but as longs we are directionless, we will
> standby.

isc, on the other hand, remains only as committed as the people who fund us.

right now the thing i see as needing work is the protocol development process
itself.  irrespective of the comments from verisign labs here yesterday, i get
the impression that dnssec won't be allowed to progress to the point where it
is "stable enough" for deployment until several namedroppers decide to retire.
(the verisign counter-challenge was that dnssec can't be stable until it's
feature-complete.  that skins the same cat but indirectly.)


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sun Dec  9 13:31:22 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA03174
	for <dnsext-archive@lists.ietf.org>; Sun, 9 Dec 2001 13:31:21 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16D8Lu-000Fly-00
	for namedroppers-data@psg.com; Sun, 09 Dec 2001 10:07:02 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16D8Lu-000Fls-00
	for namedroppers@ops.ietf.org; Sun, 09 Dec 2001 10:07:02 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16D8Lt-0000Gr-00
	for namedroppers@ops.ietf.org; Sun, 09 Dec 2001 11:07:01 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112091804.fB9I4VG15699@birch.ripe.net>
In-Reply-To: Message from "Hallam-Baker, Phillip" <pbaker@verisign.com> 
   of "Fri, 07 Dec 2001 11:21:23 PST." <2F3EC696EAEED311BB2D009027C3F4F4058698BC@vhqpostal.verisign.com> 
To: "Hallam-Baker, Phillip" <pbaker@verisign.com>
cc: namedroppers@ops.ietf.org
Subject: Re: Transition from 2535 to opt-in 
Date: Sun, 09 Dec 2001 19:04:31 +0100
From: Olaf Kolkman <olaf@ripe.net>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

 "Hallam-Baker, Phillip" <pbaker@verisign.com> writes:
 * > understand from the NLnet Labs folk is that it is technically possible
 * > to sign and serve relatively big TLDs such as .de (on a desktop PC)
 * > and even .com (on a $5000 alpha).
 * 
 * Olaf,
 * 
 * 	Let us imagine for a moment that we get you to sign a rack of
 * non-disclosure forms, blindfold you, take you on a drive to our 
 * data center etc. etc.

That would be fun :-) 

 * 
 * 	Do you imagine that you would see the current .com zone being
 * served by a '$5,000 alpha' or anything that remotely resembles such 
 * a small scale without DNSSEC?

Sorry, I misphrased that sentence. NLnet Labs only looked at signing
not at serving. Signing of .com was possible on a commodity machine.

I do understand that serving the a larger data volume is more costly
and I also do understand opt-in allows one for a slow transition. 


--Olaf


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sun Dec  9 18:36:53 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA05804
	for <dnsext-archive@lists.ietf.org>; Sun, 9 Dec 2001 18:36:51 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16DDCT-000PBU-00
	for namedroppers-data@psg.com; Sun, 09 Dec 2001 15:17:37 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16DDCS-000PBO-00
	for namedroppers@ops.ietf.org; Sun, 09 Dec 2001 15:17:36 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16DDCR-0000lX-00
	for namedroppers@ops.ietf.org; Sun, 09 Dec 2001 16:17:35 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <5.1.0.14.2.20011209130056.02401770@localhost>
In-Reply-To: <4.3.2.7.2.20011120150342.01e852f8@funnel.cisco.com>
References: <E15uhKK-000FQK-00@rip.psg.com>
 <E15mJrH-000Bmg-00@rip.psg.com>
Date: Sun, 09 Dec 2001 13:06:52 -0500
To: Mark Stapp <mjs@cisco.com>, namedroppers <namedroppers@ops.ietf.org>
From: =?iso-8859-1?Q?=D3lafur?= Gudmundsson/DNSEXT co-chair <ogud@ogud.com>
Subject: Re: wg last call for draft-ietf-dnsext-dhcid-rr-03.txt to ps
Cc: mellon@nominum.com, gson@nominum.com
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

At 04:39 PM 11/21/2001, Mark Stapp wrote:
>At 02:37 PM 10/19/2001 -0700, Randy Bush wrote:
>
> >there seem to be folk too tired to speak for themselves on the mailing list,
> >so they send this stuff to me in email.  as 2026 does not specify that one
> >has the right to confront one's accusors, i will forward anonymously :-)
>
>I've made revisions that address these comments and submitted a new draft.
>The notification will show up as soon as the draft editor processes my
>submission. Specifics inline:
>
>-- Mark
>
>
> >3. Does not explicitly state if this is a singleton type or multiple
> >    DHCID RR can be in a set.
>
>Done.

I assume that there is some other document that specifies how
to interpret multiple DHCID, it would be helpful to have a pointer to
that.
My understanding has been this is supposed to be a semaphore for
DHCP servers but allowing multiple DHCID that semantics are broken.


> >4. Section 3.4 should be structured something like:
> >          "digest is calculated over <dhcpid> | <option> | <canonical FQDN>"
> >          followed by list of what <dhcpid> + <option> pairs are allowed
> >          followed by paragraph defining how to convert each option into
> >          "digestable" data.
> >    Right now it is really hard to comprehend, I'm sure the authors
> >    understand this but interoperabilty is going to be a problem.
>
>I've re-arranged some of this section, and added a couple of illustrations
>in an attempt to make it sufficiently clear.
>
> >6. Section 3.1 should state that the DHCID is fixed length 18 bytes RR.
> >    Most of second paragraph does not belong, all text until "the DHCID
> >    resource" should be moved or deleted.  The "n bytes" MUST be changed to
> >    "16 bytes".
>
>Not correct. If the 0xffff identifier 'escape' is used at some point, the
>format may change and the RDATA length may change. Since the opaque RDATA
>has no semantic significance to the DNS protocol, there's no need to
>restrict its format in this way. I'd be concerned that someone would build
>such a limitation into a parser somewhere, when this RR should be treated
>as opaque binary data by DNS resolvers.

This is still not clear and the size of MD5 is still refered to as 'n bytes'.

         Olafur



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 10 18:58:33 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA15099
	for <dnsext-archive@lists.ietf.org>; Mon, 10 Dec 2001 18:58:31 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16DZui-000OWi-00
	for namedroppers-data@psg.com; Mon, 10 Dec 2001 15:32:48 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16DZuh-000OWZ-00
	for namedroppers@ops.ietf.org; Mon, 10 Dec 2001 15:32:48 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16DZuf-0000PS-00
	for namedroppers@ops.ietf.org; Mon, 10 Dec 2001 16:32:45 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <v03130300b83aae28d6f8@[12.131.201.176]>
In-Reply-To: <200111071204.HAA01252@ietf.org>
Date: Mon, 10 Dec 2001 17:41:03 -0500
To: namedroppers@ops.ietf.org
From: Edward Lewis <lewis@tislabs.com>
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt
Cc: lewis@tislabs.com
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

At 7:04 AM -0500 11/7/01, Internet-Drafts@ietf.org wrote:
>	Title		: Limiting the Scope of the KEY Resource Record
>
>This document limits the KEY resource record to only DNS zone keys.

I think there is a good reason to restrict the KEY RR.  But I disagree with
the way the draft describes it.

The good reasons to restrict the KEY RR is that the KEY RR incurs special
processing by name servers when the KEY RR is a zone key and that the
resolver handles zone keys in special ways.

The draft lists other "reasons" which aren't really germain.  Specifically:

>        o    They serve different purposes.
>        o    They are managed by different administrators.
>        o    They are authenticated according to different rules.
>        o    Faults/key compromises have different consequences.

The four blurbs why these reasons aren't reasons...
1) Reusing data structures for different purposes is sometimes "good."
2) The same admin may be the one doing DNS and (say) installing SSH.
3) The default (RFC 3007/8) rules do differ between data and zone keys, but
   not application keys and data.
4) This is too loose a statement to have meaning.

I'm picking on the rationale because issuing a post-definition restriction
is not something to be taken lightly, so there should be a good rationale.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                NAI Labs
Phone: +1 443-259-2352                      Email: lewis@tislabs.com

Opinions expressed are property of my evil twin, not my employer.




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Tue Dec 11 08:40:42 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA17332
	for <dnsext-archive@lists.ietf.org>; Tue, 11 Dec 2001 08:40:42 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16Dmi7-000HKQ-00
	for namedroppers-data@psg.com; Tue, 11 Dec 2001 05:12:39 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16Dmi7-000HKK-00
	for namedroppers@ops.ietf.org; Tue, 11 Dec 2001 05:12:39 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16Dmi6-0000kT-00
	for namedroppers@ops.ietf.org; Tue, 11 Dec 2001 06:12:38 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <5.1.0.14.0.20011210190242.01e26c00@jurassic.eng.sun.com>
Date: Mon, 10 Dec 2001 21:30:47 -0800
To: namedroppers@ops.ietf.org
From: Alain Durand <Alain.Durand@sun.com>
Subject: zeroconf name resolution does not mean necessarily DNS
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

To follow up on the DNSext discussion on mdns/zeroconf.

What is needed is something to map local names to IP addresses
in a zeroconf environment (no DNS server)
This does mean that whatever we design has to be integrate in the
general name resolution process of operating system and does not
mean it has to be integrated in the DNS itself.

As I said earlier, there is usually a switch to say in what order to
do name resolution: example: first FILES, then NIS then DNS
What is needed is just another local scope name service.

When a web browser tries to resolve a name like mylapto-at-the-airport
it calls a library function like getnameinfo(), it does not call DNS directly.
The library function goes to the switch and decide how to retrieve the 
information.

So, my point is that whatever we design does not need to look like DNS at all.
It may, but is not required and it may or may not be desirable.

	- Alain.



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Tue Dec 11 15:39:14 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24457
	for <dnsext-archive@lists.ietf.org>; Tue, 11 Dec 2001 15:39:13 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16DtRJ-0004wI-00
	for namedroppers-data@psg.com; Tue, 11 Dec 2001 12:23:45 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16DtRJ-0004wC-00
	for namedroppers@ops.ietf.org; Tue, 11 Dec 2001 12:23:45 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16DtRI-000155-00
	for namedroppers@ops.ietf.org; Tue, 11 Dec 2001 13:23:44 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <5.1.0.14.0.20011211092328.01e359a8@jurassic.eng.sun.com>
Message-ID: <Pine.BSF.4.21.0112110929430.28718-100000@internaut.com>
Date: Tue, 11 Dec 2001 09:34:03 -0800 (PST)
From: Bernard Aboba <aboba@internaut.com>
To: Alain Durand <Alain.Durand@sun.com>
cc: namedroppers@ops.ietf.org, sob@harvard.edu
Subject: Re: zeroconf name resolution does not mean necessarily DNS
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> If zeroconf requirements are broken, they should be fixed.

Agreed. Perhaps the way to accomplish this is to bring the document to
IETF last call (checked and only WG last call is complete) so that
comments from DNSEXT WG and other sources can be incorporated. Right now
the Zeroconf WG believes that it is "done". 




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Tue Dec 11 15:42:13 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24522
	for <dnsext-archive@lists.ietf.org>; Tue, 11 Dec 2001 15:42:13 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16DtOK-0004mR-00
	for namedroppers-data@psg.com; Tue, 11 Dec 2001 12:20:40 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16DtOK-0004mL-00
	for namedroppers@ops.ietf.org; Tue, 11 Dec 2001 12:20:40 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16DtOJ-00014j-00
	for namedroppers@ops.ietf.org; Tue, 11 Dec 2001 13:20:39 -0700
Message-Id: <5.1.0.14.0.20011211092328.01e359a8@jurassic.eng.sun.com>
In-Reply-To: <Pine.BSF.4.21.0112110855390.28676-100000@internaut.com>
References: <5.1.0.14.0.20011210190242.01e26c00@jurassic.eng.sun.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Date: Tue, 11 Dec 2001 09:29:21 -0800
To: Bernard Aboba <aboba@internaut.com>
From: Alain Durand <Alain.Durand@sun.com>
Subject: Re: zeroconf name resolution does not mean necessarily DNS
Cc: namedroppers@ops.ietf.org
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

At 09:05 AM 12/11/2001 -0800, Bernard Aboba wrote:
> > What is needed is something to map local names to IP addresses
> > in a zeroconf environment (no DNS server)
>
>Before we jump into a discussion of zeroconf name resolution requirements,
>it is probably worth while to at least consider what is included in the
>Zeroconf WG Requirements document, which has completed WG (and IETF?) last
>call:

If zeroconf requirements are broken, they should be fixed.


>2.2 Translation between Host name and IP Address Scenarios
>
>
>    Requirement:
>    - MUST support DNS application layer interfaces as described
>      in RFC 1123, section 6.1. [RFC 1123]

RFC1123, section 6.1:

6.1.1 INTRODUCTION

Every host MUST implement a resolver for the Domain Name System (DNS),
and it MUST implement a mechanism using this DNS resolver to convert
host names to IP addresses and vice-versa [DNS:1, DNS:2].
In addition to the DNS, a host MAY also implement a host name translation
mechanism that searches a local Internet host table. See Section 6.1.3.8
for more information on this option.

         - Alain.



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Tue Dec 11 15:42:20 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24534
	for <dnsext-archive@lists.ietf.org>; Tue, 11 Dec 2001 15:42:19 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16DtLn-0004hb-00
	for namedroppers-data@psg.com; Tue, 11 Dec 2001 12:18:03 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16DtLm-0004hT-00
	for namedroppers@ops.ietf.org; Tue, 11 Dec 2001 12:18:02 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16DtLm-00014S-00
	for namedroppers@ops.ietf.org; Tue, 11 Dec 2001 13:18:02 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <5.1.0.14.0.20011210190242.01e26c00@jurassic.eng.sun.com>
Message-ID: <Pine.BSF.4.21.0112110855390.28676-100000@internaut.com>
Date: Tue, 11 Dec 2001 09:05:53 -0800 (PST)
From: Bernard Aboba <aboba@internaut.com>
To: Alain Durand <Alain.Durand@sun.com>
cc: namedroppers@ops.ietf.org
Subject: Re: zeroconf name resolution does not mean necessarily DNS
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> What is needed is something to map local names to IP addresses
> in a zeroconf environment (no DNS server)

Before we jump into a discussion of zeroconf name resolution requirements,
it is probably worth while to at least consider what is included in the
Zeroconf WG Requirements document, which has completed WG (and IETF?) last
call:

2.2 Translation between Host name and IP Address Scenarios

   Host names allow users to refer to hosts using names instead of IP
   addresses. This is among the most fundamental, thus most important,
   usage paradigms in TCP/IP networking.

   Terms:

     host name - A textual name that allows a user to refer to a host
     by name rather than IP address.

     domain name - Zero or more textual labels, separated by dots,
     that identify a DNS domain [RFC 1034] [RFC 1035].

     resolver - The host needing a name to IP address translation.

   The scenario for translation between host name and IP address is
   Web browsing. In addition, host name selection is discussed.

2.2.1  Web Browsing

   Applications, such as web browsers, make extensive use of DNS
   resolver functions.  A mechanism to support DNS resolver
   interfaces in the zero configuration environement is required.

   Requirement:
   - MUST support DNS application layer interfaces as described
     in RFC 1123, section 6.1. [RFC 1123]

2.2.2  Host Name Selection

   How the host is administratively assigned a domain name is determined
   by some other configuration protocol or user configuration, and is
   not part of this zeroconf scenario. A protocol must allow a host
   to determine if its name is unique. If the name is not unique, the
   protocol must notify the user or some IP interface configuration
   software to select another name then repeat the process of verifying
   the uniqueness of the name.

   Requirement:

   - MUST allow a host to determine if its name is unique. Then if
     not unique, notify the user or configuration software so that
     another name may be chosen and similarly verified.

2.2.3  IPv6 Considerations

   Protocols to perform translation between host name and IP address
   have no zeroconf-related differences for IPv4 and IPv6.

3.2 Name to Address Resolution

   The security implications of this zeroconf protocol must be
   compared against the DNS protocol.

   DNS is a client-server protocol.  The zeroconf name to address
   translation protocol will likely use multicast so that any host
   may respond to queries.  This broadens the possibility that host
   authentication in the form of hostname-IP address mappings may be
   compromised, since all hosts effectively may behave as DNS servers.

   Currently it is possible to subvert DNS in various ways, unless
   DNSsec [RFC 2535, RFC 2931] is used.  For example:

   - A client may be configured with the address of an attacker's DNS
     server.  For example, an active attacker on the same subnet as the
     client may respond to DHCP DHCPDISCOVER messages and deliberately
     configure the client to use a compromised DNS server.

   - An active attack against a DNS client is possible - where an
     attacker unicasts a DNS reply to a client request that arrives
     at the client before the legitimate server's response.

   DNSsec protects against such attacks as the client can verify that
   the data it retrieves using the DNS has been signed from a source
   that the client has been configured to accept.

   A zeroconf name to address resolution protocol MUST be compatible
   with the use of DNSsec.  Therefore it MUST be possible for a host
   running a zeroconf protocol to use DNS and DNSsec for authenticated
   name resolution if that host (or its administrator) chooses to do so.
   [RFC 2541]




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec 12 16:36:27 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA18675
	for <dnsext-archive@lists.ietf.org>; Wed, 12 Dec 2001 16:36:25 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EGkY-000Pn5-00
	for namedroppers-data@psg.com; Wed, 12 Dec 2001 13:17:10 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EGkY-000Pmy-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 13:17:10 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EGkX-0005Yr-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 14:17:09 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <v03130301b83d760368fd@[12.131.202.36]>
In-Reply-To: <v03130300b83aae28d6f8@[12.131.201.176]>
References: <200111071204.HAA01252@ietf.org>
Date: Wed, 12 Dec 2001 16:11:21 -0500
To: Edward Lewis <lewis@tislabs.com>
From: Edward Lewis <lewis@tislabs.com>
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt
Cc: namedroppers@ops.ietf.org, lewis@tislabs.com
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

One other reason for resticting the KEY RR is something I learned after a
discussion with Rob Austein (I hope I phrased this right):

Overflowing UDP is a bad (but not dangerous) thing in DNS - it usually
causes a fallback to TCP.  Larger data sets increase the likelyhood of
overflow.  Individual keys are large, it doesn't take too many to trigger
an overflow of the packet.  Therefore, steps need to be taken to limit the
size of the KEY RR set as this has an impact on the operation of DNS.

Hmm...just a thought, this doesn't necessarily mean that KEY should only be
used for dnssec.  A more direct answer to this particular reason is to
restrict a KEY RR set to only one key protocol value (ie just dnssec or
just ipsec or just...), which at a zone apex effectively is a restriction
to just dnssec.

At 5:41 PM -0500 12/10/01, Edward Lewis wrote:
>At 7:04 AM -0500 11/7/01, Internet-Drafts@ietf.org wrote:
>>	Title		: Limiting the Scope of the KEY Resource Record
>>
>>This document limits the KEY resource record to only DNS zone keys.
>
>I think there is a good reason to restrict the KEY RR.  But I disagree with
>the way the draft describes it.
>
>The good reasons to restrict the KEY RR is that the KEY RR incurs special
>processing by name servers when the KEY RR is a zone key and that the
>resolver handles zone keys in special ways.
>
>The draft lists other "reasons" which aren't really germain.  Specifically:
>
>>        o    They serve different purposes.
>>        o    They are managed by different administrators.
>>        o    They are authenticated according to different rules.
>>        o    Faults/key compromises have different consequences.
>
>The four blurbs why these reasons aren't reasons...
>1) Reusing data structures for different purposes is sometimes "good."
>2) The same admin may be the one doing DNS and (say) installing SSH.
>3) The default (RFC 3007/8) rules do differ between data and zone keys, but
>   not application keys and data.
>4) This is too loose a statement to have meaning.
>
>I'm picking on the rationale because issuing a post-definition restriction
>is not something to be taken lightly, so there should be a good rationale.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                NAI Labs
Phone: +1 443-259-2352                      Email: lewis@tislabs.com

Opinions expressed are property of my evil twin, not my employer.




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec 12 17:54:48 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA20370
	for <dnsext-archive@lists.ietf.org>; Wed, 12 Dec 2001 17:54:47 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EHtf-0007kS-00
	for namedroppers-data@psg.com; Wed, 12 Dec 2001 14:30:39 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EHte-0007k5-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 14:30:38 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EHtd-0005ee-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 15:30:37 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112122151.fBCLptO00340@syn.hamachi.org>
In-Reply-To: Message from Edward Lewis <lewis@tislabs.com> 
   of "Wed, 12 Dec 2001 16:11:21 EST." <v03130301b83d760368fd@[12.131.202.36]> 
From: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
To: Edward Lewis <lewis@tislabs.com>
Cc: namedroppers@ops.ietf.org
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt 
Date: Wed, 12 Dec 2001 16:51:54 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> Hmm...just a thought, this doesn't necessarily mean that KEY should only be
> used for dnssec.  A more direct answer to this particular reason is to
> restrict a KEY RR set to only one key protocol value (ie just dnssec or
> just ipsec or just...), which at a zone apex effectively is a restriction
> to just dnssec.

It is extremely common to put hosts and such at zone apexes.  

One *could* use naming conventions like the ones used with SRV records
to move the keys away from the name uttered by the user..

				- Bill


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec 12 18:34:53 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA21270
	for <dnsext-archive@lists.ietf.org>; Wed, 12 Dec 2001 18:34:52 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EIlt-000CtF-00
	for namedroppers-data@psg.com; Wed, 12 Dec 2001 15:26:41 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EIls-000Csq-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 15:26:40 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EIls-0005jx-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 16:26:40 -0700
Message-ID: <3C17E6FF.B8314202@email.mot.com>
MIME-Version: 1.0
References: <5.1.0.14.0.20011210190242.01e26c00@jurassic.eng.sun.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Date: Thu, 13 Dec 2001 10:23:43 +1100
From: Aidan Williams <aidan@arc.corp.mot.com>
To: Alain Durand <Alain.Durand@sun.com>
CC: namedroppers@ops.ietf.org, sob@harvard.edu, zeroconf@merit.edu
Subject: Re: zeroconf name resolution does not mean necessarily DNS
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Alain Durand wrote:
> What is needed is something to map local names to IP addresses
> in a zeroconf environment (no DNS server)
> This does mean that whatever we design has to be integrate in the
> general name resolution process of operating system and does not
> mean it has to be integrated in the DNS itself.
> 

This discussion has been had before.  The zeroconf working group
charter only talks about developing two new protocols, and a name
service protocol is not one of them.  Rather, the expectation was
that the existing DNS protocol would be 'profiled' for zeroconf use.

In suggesting that the requirements document is broken w.r.t. using
DNS for name resolution, I think there is a charter issue.

> As I said earlier, there is usually a switch to say in what order to
> do name resolution: example: first FILES, then NIS then DNS
> What is needed is just another local scope name service.
> 

This discussion has been had on the dnsext mailing list too.
I wrote a draft describing the update of the DHCP search list option
supporting this sort of thing, but subsequently this turned out to be
a bad idea because of the complexity of the per-interface and
search-order interactions.

> So, my point is that whatever we design does not need to look like DNS at all.
> It may, but is not required and it may or may not be desirable.
> 

Indeed, I have a lot of sympathy for that view, and I could live with
ICMPv6 Node Information Query as the IPv6 zeroconf name resolution
protocol.

To my mind, mDNS and the ICMPv6 Node Information Query are pretty much
the same protocol.  They both use multicast, and DNS formatted packets,
but the encapsulation is different (icmp vs udp).

Therefore the issues that are dogging the mDNS protocol ought to apply
also to the ICMPv6 NI Query.  If we define the NI Query as "not DNS",
we could easily define mDNS as "not DNS" (and if I recall correctly,
that was suggested in the meeting too).

regards
	aidan
____
:wq!


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec 12 18:35:58 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA21291
	for <dnsext-archive@lists.ietf.org>; Wed, 12 Dec 2001 18:35:57 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EIXc-000BTp-00
	for namedroppers-data@psg.com; Wed, 12 Dec 2001 15:11:56 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EIXc-000BTj-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 15:11:56 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EIXb-0005ic-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 16:11:55 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
References: <200111071204.HAA01252@ietf.org>
	<v03130301b83d760368fd@[12.131.202.36]>
In-Reply-To: <v03130301b83d760368fd@[12.131.202.36]> (Edward Lewis's message
 of "Wed, 12 Dec 2001 16:11:21 -0500")
Message-ID: <iluitbcdp3w.fsf@dhcp128.extundo.com>
To: Edward Lewis <lewis@tislabs.com>
Cc: namedroppers@ops.ietf.org
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt
From: Simon Josefsson <simon+namedroppers@josefsson.org>
Date: Wed, 12 Dec 2001 23:56:35 +0100
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Making the owner name of the KEY RR be application specific, to solve
the UDP overflow problem, has also been discussed.  If the RR's are
named differently for each application that uses KEY RRs, you won't
overflow UDP [unless the application needs several KEY RRs].

Seen from a design point of view, moving the semantic meaning of the
KEY RR "protocol field" outside the protocol field (and into the owner
name) is perhaps not optimal, altough it would solve the issue without
modifying the protocol.

Edward Lewis <lewis@tislabs.com> writes:

> One other reason for resticting the KEY RR is something I learned after a
> discussion with Rob Austein (I hope I phrased this right):
>
> Overflowing UDP is a bad (but not dangerous) thing in DNS - it usually
> causes a fallback to TCP.  Larger data sets increase the likelyhood of
> overflow.  Individual keys are large, it doesn't take too many to trigger
> an overflow of the packet.  Therefore, steps need to be taken to limit the
> size of the KEY RR set as this has an impact on the operation of DNS.
>
> Hmm...just a thought, this doesn't necessarily mean that KEY should only be
> used for dnssec.  A more direct answer to this particular reason is to
> restrict a KEY RR set to only one key protocol value (ie just dnssec or
> just ipsec or just...), which at a zone apex effectively is a restriction
> to just dnssec.
>
> At 5:41 PM -0500 12/10/01, Edward Lewis wrote:
>>At 7:04 AM -0500 11/7/01, Internet-Drafts@ietf.org wrote:
>>>	Title		: Limiting the Scope of the KEY Resource Record
>>>
>>>This document limits the KEY resource record to only DNS zone keys.
>>
>>I think there is a good reason to restrict the KEY RR.  But I disagree with
>>the way the draft describes it.
>>
>>The good reasons to restrict the KEY RR is that the KEY RR incurs special
>>processing by name servers when the KEY RR is a zone key and that the
>>resolver handles zone keys in special ways.
>>
>>The draft lists other "reasons" which aren't really germain.  Specifically:
>>
>>>        o    They serve different purposes.
>>>        o    They are managed by different administrators.
>>>        o    They are authenticated according to different rules.
>>>        o    Faults/key compromises have different consequences.
>>
>>The four blurbs why these reasons aren't reasons...
>>1) Reusing data structures for different purposes is sometimes "good."
>>2) The same admin may be the one doing DNS and (say) installing SSH.
>>3) The default (RFC 3007/8) rules do differ between data and zone keys, but
>>   not application keys and data.
>>4) This is too loose a statement to have meaning.
>>
>>I'm picking on the rationale because issuing a post-definition restriction
>>is not something to be taken lightly, so there should be a good rationale.
>
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> Edward Lewis                                                NAI Labs
> Phone: +1 443-259-2352                      Email: lewis@tislabs.com
>
> Opinions expressed are property of my evil twin, not my employer.

to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec 12 18:42:13 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA21448
	for <dnsext-archive@lists.ietf.org>; Wed, 12 Dec 2001 18:42:12 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EIrx-000DO8-00
	for namedroppers-data@psg.com; Wed, 12 Dec 2001 15:32:57 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EIrw-000DO1-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 15:32:56 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EIrv-0005kb-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 16:32:55 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-reply-to: "12 Dec 2001 16:51:54 EST."
 <200112122151.fBCLptO00340@syn.hamachi.org>
Message-id: <200112122326.fBCNQXl29673@gungnir.fnal.gov>
Date: Wed, 12 Dec 2001 17:26:33 -0600
From: Matt Crawford <crawdad@fnal.gov>
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt
To: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
Cc: Edward Lewis <lewis@tislabs.com>, namedroppers@ops.ietf.org
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> One *could* use naming conventions like the ones used with SRV records
> to move the keys away from the name uttered by the user..

I sure think that's the way to go.  You cn keep each app's keys at a
different name, which keeps RRset sizes down and permits a
"first-come, first-serve" policy for names rather than a stricter
policy for RR type codes.

	_ssh._key.fqdn
	_ipsec._key.fqdn
	...etc...


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec 12 23:24:38 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA28584
	for <dnsext-archive@lists.ietf.org>; Wed, 12 Dec 2001 23:24:38 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16ENCF-000GVf-00
	for namedroppers-data@psg.com; Wed, 12 Dec 2001 20:10:11 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16ENCF-000GVZ-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 20:10:11 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16ENCF-00061r-00
	for namedroppers@ops.ietf.org; Wed, 12 Dec 2001 21:10:11 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <200112122151.fBCLptO00340@syn.hamachi.org>
Message-ID: <Pine.BSO.4.43.0112130458001.11964-100000@fonbella.crt.se>
Date: Thu, 13 Dec 2001 05:00:58 +0100 (MET)
From: Jakob Schlyter <jakob@crt.se>
To: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
Cc: Edward Lewis <lewis@tislabs.com>, <namedroppers@ops.ietf.org>
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt 
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Wed, 12 Dec 2001, Bill Sommerfeld wrote:

> One *could* use naming conventions like the ones used with SRV records
> to move the keys away from the name uttered by the user..

this might be the way to go to avoid subtyping using RDATA, but I do not
think we should do this using the KEY.

we should write down the requirements for application keys in DNS and then
proceed further. we might end up with something like APPKEY, but that will
probably need more discussion and feedback from apps-people.

	jakob



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 13 09:32:13 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA21326
	for <dnsext-archive@lists.ietf.org>; Thu, 13 Dec 2001 09:32:12 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EWgW-000DKL-00
	for namedroppers-data@psg.com; Thu, 13 Dec 2001 06:18:04 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EWgV-000DKF-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 06:18:03 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EWdO-0006Im-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 07:14:50 -0700
Message-Id: <v03130306b83ddd47dbca@[12.131.202.36]>
In-Reply-To: <Pine.BSO.4.43.0112130458001.11964-100000@fonbella.crt.se>
References: <200112122151.fBCLptO00340@syn.hamachi.org>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Date: Wed, 12 Dec 2001 23:25:31 -0500
To: <namedroppers@ops.ietf.org>
From: Edward Lewis <lewis@tislabs.com>
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt
Cc: lewis@tislabs.com
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

Before we spend a lot of time on this again, I'd like to point out that we
just had this discussion a few months ago and wound up rat holing.  The
message from Olafur at the end of the meeting Monday was that this issue
should (for the time being) be punted out the WG.

A few of us have begun to do some work on this outside of the mantle of the
DNS* WG's.  Word on a mailing list should appear in the near future.

(What I'm trying to say - a lot of good points have been raised, but let's
not continue to clutter up namedroppers with this.)

At 11:00 PM -0500 12/12/01, Jakob Schlyter wrote:
>On Wed, 12 Dec 2001, Bill Sommerfeld wrote:
>
>> One *could* use naming conventions like the ones used with SRV records
>> to move the keys away from the name uttered by the user..
>
>this might be the way to go to avoid subtyping using RDATA, but I do not
>think we should do this using the KEY.
>
>we should write down the requirements for application keys in DNS and then
>proceed further. we might end up with something like APPKEY, but that will
>probably need more discussion and feedback from apps-people.
>
>	jakob


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                NAI Labs
Phone: +1 443-259-2352                      Email: lewis@tislabs.com

Opinions expressed are property of my evil twin, not my employer.




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 13 15:49:25 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA28997
	for <dnsext-archive@lists.ietf.org>; Thu, 13 Dec 2001 15:49:25 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EcU0-000Hek-00
	for namedroppers-data@psg.com; Thu, 13 Dec 2001 12:29:32 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EcTz-000Hed-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 12:29:31 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EcTz-0006Ro-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 13:29:31 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
References: <200112122151.fBCLptO00340@syn.hamachi.org>
	<v03130306b83ddd47dbca@[12.131.202.36]>
Message-Id: <E16EcCO-0006Oc-00@roam.psg.com>
From: Randy Bush <randy@psg.com>
To: Edward Lewis <lewis@tislabs.com>
Cc: <namedroppers@ops.ietf.org>
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt
Date: Thu, 13 Dec 2001 13:11:20 -0700
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> Before we spend a lot of time on this again, I'd like to point out that we
> just had this discussion a few months ago and wound up rat holing.  The
> message from Olafur at the end of the meeting Monday was that this issue
> should (for the time being) be punted out the WG.
> 
> A few of us have begun to do some work on this outside of the mantle of the
> DNS* WG's.  Word on a mailing list should appear in the near future.
> 
> (What I'm trying to say - a lot of good points have been raised, but let's
> not continue to clutter up namedroppers with this.)

considering the plenary discussion of when design groups become cliques,
and that this is a dnsext document, i believe this suggestion, though
well-meant, to be inappropriate.

randy


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 13 15:49:26 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA28996
	for <dnsext-archive@lists.ietf.org>; Thu, 13 Dec 2001 15:49:25 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EcYX-000ILs-00
	for namedroppers-data@psg.com; Thu, 13 Dec 2001 12:34:13 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EcYX-000ILm-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 12:34:13 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EcYW-0006S8-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 13:34:12 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <v03130305b83e94e6b655@[12.131.200.217]>
In-Reply-To: <3C18DF89.802E75AE@isi.edu>
References: <Pine.BSO.4.43.0112130458001.11964-100000@fonbella.crt.se>
Date: Thu, 13 Dec 2001 12:32:30 -0500
To: namedroppers@ops.ietf.org
From: Edward Lewis <lewis@tislabs.com>
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt
Cc: lewis@tislabs.com
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

I do think that restricting keys as described is a good idea.  My comments
(all previously stated, so I'll just categorize) are that:

1) Adjust the introduction so that we document that we are doing this for
the right reason.

2) I felt impelled as an engineer to point out that there is another
approach to solving the overflow problem.  The document should capture the
alternative and state why it was not pursued.  (I like credit for my bad
ideas.)

<soapbox on document preparation>
My overall concern is that any document capture as much as possible the
history and other considerations behind technical recommendations so that
the actions are understood through the years.  The more I work on DNS the
more I hear about subtle design considerations.  This oral histroy is
"important" and (by definition) covers stuff not in the RFCs and other
documents.  Having to get oral history from the people in the know is nice,
but ususally comes after a lot of work going down wrong paths.

At 12:04 PM -0500 12/13/01, Daniel Massey wrote:
>Let's get rid of the sub-type for the KEY record by restricting
>it to DNSSEC zone keys.  As stated in the draft, this can be
>done with only minor changes.  The format of KEY is not changed
>and the use of DNSSEC keys is not changed.  It seems like Jakob's
>keydist@cafax.se is a good place to discuss application keys.
>The only constraint added by restrict-key is that application
>keys can't use the KEY record.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                NAI Labs
Phone: +1 443-259-2352                      Email: lewis@tislabs.com

Opinions expressed are property of my evil twin, not my employer.




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 13 15:52:56 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA29064
	for <dnsext-archive@lists.ietf.org>; Thu, 13 Dec 2001 15:52:55 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EcTM-000HdA-00
	for namedroppers-data@psg.com; Thu, 13 Dec 2001 12:28:52 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EcTM-000Hd3-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 12:28:52 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EcTL-0006RU-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 13:28:51 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <3C18DF89.802E75AE@isi.edu>
References: <Pine.BSO.4.43.0112130458001.11964-100000@fonbella.crt.se>
Date: Thu, 13 Dec 2001 12:04:09 -0500
From: Daniel Massey <masseyd@isi.edu>
To: Jakob Schlyter <jakob@crt.se>
CC: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>,
        Edward Lewis <lewis@tislabs.com>, namedroppers@ops.ietf.org
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Hi,

With respect to using naming conventions for the KEY record, 
I don't think anyone has suggested storing DNSSEC zone keys 
in _dnsseczone._key.fqdn. (please don't!) So the naming 
convention change to KEY would result in a sub-typed record 
where only SOME of the sub-types use a naming convention.  

When we begin to apply naming conventions to SOME sub-types,
I think we need to back up and ask whether the record
is trying to do too much.  

Let's get rid of the sub-type for the KEY record by restricting
it to DNSSEC zone keys.  As stated in the draft, this can be
done with only minor changes.  The format of KEY is not changed
and the use of DNSSEC keys is not changed.  It seems like Jakob's
keydist@cafax.se is a good place to discuss application keys. 
The only constraint added by restrict-key is that application 
keys can't use the KEY record.   

Dan

Jakob Schlyter wrote:
> 
> On Wed, 12 Dec 2001, Bill Sommerfeld wrote:
> 
> > One *could* use naming conventions like the ones used with SRV records
> > to move the keys away from the name uttered by the user..
> 
> this might be the way to go to avoid subtyping using RDATA, but I do not
> think we should do this using the KEY.
> 
> we should write down the requirements for application keys in DNS and then
> proceed further. we might end up with something like APPKEY, but that will
> probably need more discussion and feedback from apps-people.
> 
>         jakob
> 
> to unsubscribe send a message to namedroppers-request@ops.ietf.org with
> the word 'unsubscribe' in a single line as the message text body.


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 13 16:35:52 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA29716
	for <dnsext-archive@lists.ietf.org>; Thu, 13 Dec 2001 16:35:51 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EdHJ-000PBL-00
	for namedroppers-data@psg.com; Thu, 13 Dec 2001 13:20:29 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EdHJ-000PBF-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 13:20:29 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EdHI-0006YP-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 14:20:28 -0700
Message-ID: <Pine.BSO.4.43.0112122325571.29167-100000@fonbella.crt.se>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Date: Thu, 13 Dec 2001 16:52:03 +0100 (MET)
From: Jakob Schlyter <jakob@crt.se>
To: IETF DNSEXT WG <namedroppers@ops.ietf.org>, IETF DNSOP WG <dnsop@cafax.se>,
        DNSSEC <dnssec@cafax.se>
Subject: distributing application keys
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

I've set up a mailinglist for discussions about distributing application
keys. the list is called <keydist@cafax.se> and managed by majordomo.

	jakob



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 13 22:10:27 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA05726
	for <dnsext-archive@lists.ietf.org>; Thu, 13 Dec 2001 22:10:26 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EiRM-000LHP-00
	for namedroppers-data@psg.com; Thu, 13 Dec 2001 18:51:12 -0800
Received: from 254-205-131-12.bellhead.com ([12.131.205.254] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EiRL-000LHJ-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 18:51:11 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EiRD-00071s-00
	for namedroppers@ops.ietf.org; Thu, 13 Dec 2001 19:51:03 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <v03130300b83f0ed052aa@[12.131.192.63]>
In-Reply-To: <E16EcCO-0006Oc-00@roam.psg.com>
References: <200112122151.fBCLptO00340@syn.hamachi.org>
 <v03130306b83ddd47dbca@[12.131.202.36]>
Date: Thu, 13 Dec 2001 21:08:22 -0500
To: Randy Bush <randy@psg.com>
From: Edward Lewis <lewis@tislabs.com>
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt
Cc: Edward Lewis <lewis@tislabs.com>, <namedroppers@ops.ietf.org>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

I think my statement wasn't clear.  I was referring to discussing "how to
put application keys in dns," not the draft's rationale based on the desire
to avoid the application key problems. (???)

At 3:11 PM -0500 12/13/01, Randy Bush wrote:
>> Before we spend a lot of time on this again, I'd like to point out that we
>> just had this discussion a few months ago and wound up rat holing.  The
>> message from Olafur at the end of the meeting Monday was that this issue
>> should (for the time being) be punted out the WG.
>>
>> A few of us have begun to do some work on this outside of the mantle of the
>> DNS* WG's.  Word on a mailing list should appear in the near future.
>>
>> (What I'm trying to say - a lot of good points have been raised, but let's
>> not continue to clutter up namedroppers with this.)
>
>considering the plenary discussion of when design groups become cliques,
>and that this is a dnsext document, i believe this suggestion, though
>well-meant, to be inappropriate.
>
>randy


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                NAI Labs
Phone: +1 443-259-2352                      Email: lewis@tislabs.com

Opinions expressed are property of my evil twin, not my employer.




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 14 10:08:44 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA00657
	for <dnsext-archive@lists.ietf.org>; Fri, 14 Dec 2001 10:08:43 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EtcI-000MRq-00
	for namedroppers-data@psg.com; Fri, 14 Dec 2001 06:47:14 -0800
Received: from 250-200-131-12.bellhead.com ([12.131.200.250] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EtcI-000MRk-00
	for namedroppers@ops.ietf.org; Fri, 14 Dec 2001 06:47:14 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EtcH-0007Or-00
	for namedroppers@ops.ietf.org; Fri, 14 Dec 2001 07:47:13 -0700
In-Reply-To: <200112122151.fBCLptO00340@syn.hamachi.org> 
References: <200112122151.fBCLptO00340@syn.hamachi.org> 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID: <5140.1008321855@brandenburg.cs.mu.OZ.AU>
From: Robert Elz <kre@munnari.OZ.AU>
To: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
cc: Edward Lewis <lewis@tislabs.com>, namedroppers@ops.ietf.org
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt 
Date: Fri, 14 Dec 2001 16:24:15 +0700
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

    Date:        Wed, 12 Dec 2001 16:51:54 -0500
    From:        Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
    Message-ID:  <200112122151.fBCLptO00340@syn.hamachi.org>

  | One *could* use naming conventions like the ones used with SRV records
  | to move the keys away from the name uttered by the user..

One could, but one certainly should not.

It is becoming clear to me that putting application keys in the DNS
is simply the wrong solution.

Attempting to do it in the simple way causes packet size problems.

Attempts to avoid that by bending the namespace (aside from being obscene
to begin with) causes problems later if the desire is to have more that
one app share the same key - there's no way in the DNS for two different
names to have the same RDATA, short of duplication or CNAMES.   Duplication
(especially of large data that might need to be duplicated very many times)
causes zone size blowout, and dramatically reduces the effectiveness of
caching.  And I'm not sure I would want to rely an awful lot on a KEY that
was fetched from some random location after following a CNAME (and even
then, the CNAME is extra data to have to store and send around - even if
it would typically be much smaller than a key).

And it seems that no-one wants to propose a separate RR type for every
different application (which would have the same data size problems as
bending the namespace, if not the same mangling of the DNS namespace).

Just design a new protocol and be done with it - it doesn't need to be
very complex, it can start with security mandated in it so the key
can really be trusted ...   By all means define a new DNS RR (or use the
SRV RR) to allow apps to locate the key server for a domain (and note:
a domain includes any DNS label).

Just keep anything other than the keys needed for the DNS itself out
of the DNS (and I'm not sure even those shouldn't be moved).

kre



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 14 10:48:44 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA01346
	for <dnsext-archive@lists.ietf.org>; Fri, 14 Dec 2001 10:48:42 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16EuGd-000OAh-00
	for namedroppers-data@psg.com; Fri, 14 Dec 2001 07:28:55 -0800
Received: from 250-200-131-12.bellhead.com ([12.131.200.250] helo=roam.psg.com)
	by psg.com with esmtp (Exim 3.33 #1)
	id 16EuGc-000OAb-00
	for namedroppers@ops.ietf.org; Fri, 14 Dec 2001 07:28:54 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16EuGc-0007Sy-00
	for namedroppers@ops.ietf.org; Fri, 14 Dec 2001 08:28:54 -0700
In-Reply-To: <5140.1008321855@brandenburg.cs.mu.OZ.AU>
Message-ID: <Pine.LNX.4.30L.0112141005430.5495-100000@error-messages.mit.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Date: Fri, 14 Dec 2001 10:25:22 -0500 (EST)
From: Greg Hudson <ghudson@MIT.EDU>
To: Robert Elz <kre@munnari.OZ.AU>
cc: <namedroppers@ops.ietf.org>
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt 
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

On Fri, 14 Dec 2001, Robert Elz wrote:
> It is becoming clear to me that putting application keys in the DNS
> is simply the wrong solution.

> Attempts to avoid that by bending the namespace (aside from being obscene
> to begin with) causes problems later if the desire is to have more that
> one app share the same key - there's no way in the DNS for two different
> names to have the same RDATA, short of duplication or CNAMES.   Duplication
> (especially of large data that might need to be duplicated very many times)
> causes zone size blowout, and dramatically reduces the effectiveness of
> caching.  And I'm not sure I would want to rely an awful lot on a KEY that
> was fetched from some random location after following a CNAME (and even
> then, the CNAME is extra data to have to store and send around - even if
> it would typically be much smaller than a key).

I will counterargue that:

  1. Sharing one keys between two apps is usually considered egregiously
bad security juju anyway.  (The two keys can be part of the same signature
hierarchy, but they shouldn't be the same.)

  2. Your argument that "there's no way in the DNS for two different names
to have the same RDATA" is purely an implementation issue, since we're
talking about two different names in the same zone.

  3. You haven't provided any justification for trusting a key less
because you followed a CNAME to get it.  (Yes, following a CNAME means
potentially adding more vectors of attack to compromise the key, but not
if the CNAME is just to a different application name for the same
hostname.  And besides, you never had any assurance to begin with that
your original source didn't pick up the key from any old random source;
simply because they tell you where that source is shouldn't decrease your
trust.)

  4. You already provided a convincing counterargument to the size example
yourself.

I think bending the namespace is unfortunate, but hardly obscene.  Having
to bend the namespace does suggest that we're using DNS for something
it wasn't designed for (specifically, looking up a pair of strings instead
of just one string), but it's a relatively minor adaptation.

> Just design a new protocol and be done with it - it doesn't need to be
> very complex, it can start with security mandated in it so the key
> can really be trusted ...   By all means define a new DNS RR (or use the
> SRV RR) to allow apps to locate the key server for a domain (and note:
> a domain includes any DNS label).

I'd be okay with this if we allow an application key in the DNS for the
key server (but no other applications).  It can be a separate RR
type from KEY.  Without this, there is no way to chain the DNSSEC security
infrastructure to the key server's, so you need two signing authorities
instead of one.



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 14 19:29:57 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA09969
	for <dnsext-archive@lists.ietf.org>; Fri, 14 Dec 2001 19:29:56 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16F2Ry-000IYD-00
	for namedroppers-data@psg.com; Fri, 14 Dec 2001 16:13:10 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16F2Rx-000IY6-00
	for namedroppers@ops.ietf.org; Fri, 14 Dec 2001 16:13:09 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16F2Rx-000M3B-00
	for namedroppers@ops.ietf.org; Fri, 14 Dec 2001 16:13:09 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112141612.fBEGCZl00426@syn.hamachi.org>
In-Reply-To: Message from Robert Elz <kre@munnari.OZ.AU> 
   of "Fri, 14 Dec 2001 16:24:15 +0700." <5140.1008321855@brandenburg.cs.mu.OZ.AU> 
From: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
To: Robert Elz <kre@munnari.OZ.AU>
Cc: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>,
        Edward Lewis <lewis@tislabs.com>, namedroppers@ops.ietf.org
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt 
Date: Fri, 14 Dec 2001 11:12:35 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> It is becoming clear to me that putting application keys in the DNS
> is simply the wrong solution.

Others (including myself) will respectfully disagree.

> Attempts to avoid that by bending the namespace (aside from being obscene
> to begin with) causes problems later if the desire is to have more that
> one app share the same key 

Sharing the same key between multiple applications is, in general, a
bad idea -- compromise of one key will compromise the other.

> Duplication (especially of large data that might need to be
> duplicated very many times) causes zone size blowout

If this becomes a problem, dns implementations can adapt by sharing
storage.

> and dramatically reduces the effectiveness of caching.  

I don't see how this follows.  "dramatically" overstates the case,
particularly when we're only talking to one app per server..

> Just design a new protocol and be done with it - it doesn't need to be
> very complex, it can start with security mandated in it so the key
> can really be trusted ...   By all means define a new DNS RR (or use the
> SRV RR) to allow apps to locate the key server for a domain (and note:
> a domain includes any DNS label).

Except that by your absolute "no app keys in the DNS" rule, we can't
chain trust from the DNS into this application...

					- Bill


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 14 19:29:57 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA09977
	for <dnsext-archive@lists.ietf.org>; Fri, 14 Dec 2001 19:29:57 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16F2Pj-000ITx-00
	for namedroppers-data@psg.com; Fri, 14 Dec 2001 16:10:51 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16F2Pj-000ITr-00
	for namedroppers@ops.ietf.org; Fri, 14 Dec 2001 16:10:51 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16F2Pf-000LzJ-00
	for namedroppers@ops.ietf.org; Fri, 14 Dec 2001 16:10:47 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <Pine.LNX.4.30L.0112141005430.5495-100000@error-messages.mit.edu> 
References: <Pine.LNX.4.30L.0112141005430.5495-100000@error-messages.mit.edu> 
Message-ID: <6309.1008346153@brandenburg.cs.mu.OZ.AU>
From: Robert Elz <kre@munnari.OZ.AU>
To: Greg Hudson <ghudson@MIT.EDU>
cc: namedroppers@ops.ietf.org
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt 
Date: Fri, 14 Dec 2001 23:09:13 +0700
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

    Date:        Fri, 14 Dec 2001 10:25:22 -0500 (EST)
    From:        Greg Hudson <ghudson@MIT.EDU>
    Message-ID:  <Pine.LNX.4.30L.0112141005430.5495-100000@error-messages.mit.edu>

  |   1. Sharing one keys between two apps is usually considered egregiously
  | bad security juju anyway.

Whether that's true or not, for keys that are going to be stable long
enough to stick in the DNS, it will happen...

  |   2. Your argument that "there's no way in the DNS for two different names
  | to have the same RDATA" is purely an implementation issue, since we're
  | talking about two different names in the same zone.

Well, not necessarily, if the name bending was added (that's creating
sub-domains, and any sub-domain could be delegated).   But that's an
unlikely problem...   More seriously, it isn't just the primary server
that matters here, there's also the secondaries (neither AXFR nor IXFR
have any way to denote "the same data as that other RR") and there's also
all the caches.

  | I'd be okay with this if we allow an application key in the DNS for the
  | key server (but no other applications).

One application key - ie: a keyserver key for a domain (which then wouldn't
need namespace mangling) I could tolerate.

kre




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 14 19:32:07 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA10007
	for <dnsext-archive@lists.ietf.org>; Fri, 14 Dec 2001 19:32:06 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16F2WO-000Ik2-00
	for namedroppers-data@psg.com; Fri, 14 Dec 2001 16:17:44 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16F2WO-000Ijw-00
	for namedroppers@ops.ietf.org; Fri, 14 Dec 2001 16:17:44 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16F2WO-000MAv-00
	for namedroppers@ops.ietf.org; Fri, 14 Dec 2001 16:17:44 -0800
References: <200112122151.fBCLptO00340@syn.hamachi.org>
	<5140.1008321855@brandenburg.cs.mu.OZ.AU>
In-Reply-To: <5140.1008321855@brandenburg.cs.mu.OZ.AU> (Robert Elz's message
 of "Fri, 14 Dec 2001 16:24:15 +0700")
Message-ID: <m3itb93chg.fsf@sjosefsson-pc.d.dynas.se>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
To: Robert Elz <kre@munnari.OZ.AU>
Cc: namedroppers@ops.ietf.org
Subject: Re: I-D ACTION:draft-ietf-dnsext-restrict-key-for-dnssec-00.txt
From: Simon Josefsson <sjosefsson@rsasecurity.com>
Date: Fri, 14 Dec 2001 19:03:55 +0100
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

Robert Elz <kre@munnari.OZ.AU> writes:

>     Date:        Wed, 12 Dec 2001 16:51:54 -0500
>     From:        Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
>     Message-ID:  <200112122151.fBCLptO00340@syn.hamachi.org>
>
>   | One *could* use naming conventions like the ones used with SRV records
>   | to move the keys away from the name uttered by the user..
>
> One could, but one certainly should not.
>
> It is becoming clear to me that putting application keys in the DNS
> is simply the wrong solution.
>
> Attempting to do it in the simple way causes packet size problems.

If this is the reason, do you regard IPv6 and DNSSEC as equally bad
because they also cause packet size problems?

We do have 
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-message-size-04.txt
that discusses this problem though.

Are there other arguments against storing application keying material
in DNS?

> Just design a new protocol and be done with it - it doesn't need to be
> very complex, it can start with security mandated in it so the key
> can really be trusted ...   By all means define a new DNS RR (or use the
> SRV RR) to allow apps to locate the key server for a domain (and note:
> a domain includes any DNS label).

This only works if the new protocol replaces DNS for name lookups as
well.

I believe that the same service that provide name to address mappings,
be it DNS or something else, must also provide a mapping between name
(or address) and application keys.  Otherwise we'll just end up with
the same problem we have now: that knowing the address (hostname, IP
address or email address) is not sufficient to get the application
keying material for the address.  And this is something that would be
needed if we want opportunistic encryption to happen.

This is not saying that the keys themselves really MUST be stored in
DNS, a SRV record that points to a LDAP server, or something similar,
would work equally well.  The point is that these solutions doesn't
seem to work now, so we should consider other solutions.


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 17 09:54:45 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03898
	for <dnsext-archive@lists.ietf.org>; Mon, 17 Dec 2001 09:54:43 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16FyeW-0009Z5-00
	for namedroppers-data@psg.com; Mon, 17 Dec 2001 06:22:00 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16FyeW-0009Yz-00
	for namedroppers@ops.ietf.org; Mon, 17 Dec 2001 06:22:00 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16FyeW-000JYf-00
	for namedroppers@ops.ietf.org; Mon, 17 Dec 2001 06:22:00 -0800
Message-Id: <200112171421.JAA02543@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: namedroppers@ops.ietf.org
From: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-dnsext-obsolete-iquery-02.txt
Date: Mon, 17 Dec 2001 09:21:42 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the DNS Extensions Working Group of the IETF.

	Title		: Obsoleting IQUERY
	Author(s)	: D. Lawrence
	Filename	: draft-ietf-dnsext-obsolete-iquery-02.txt
	Pages		: 4
	Date		: 14-Dec-01
	
Based on a lack of working implementations of the IQUERY method
of performing inverse DNS lookups, and because an alternative
mechanism for doing inverse queries of address records has been
successfully used operationally for well over a decade, this
draft proposes that the IQUERY operation be entirely obsoleted.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-obsolete-iquery-02.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-dnsext-obsolete-iquery-02.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-dnsext-obsolete-iquery-02.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20011214135857.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-dnsext-obsolete-iquery-02.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-dnsext-obsolete-iquery-02.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20011214135857.I-D@ietf.org>

--OtherAccess--

--NextPart--




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 17 18:04:22 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA21217
	for <dnsext-archive@lists.ietf.org>; Mon, 17 Dec 2001 18:04:20 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16G6X8-000J8l-00
	for namedroppers-data@psg.com; Mon, 17 Dec 2001 14:46:54 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16G6X8-000J8f-00
	for namedroppers@ops.ietf.org; Mon, 17 Dec 2001 14:46:54 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16G6X8-0006vb-00
	for namedroppers@ops.ietf.org; Mon, 17 Dec 2001 14:46:54 -0800
Message-Id: <200112171421.JAA02543@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: namedroppers@ops.ietf.org
From: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-dnsext-obsolete-iquery-02.txt
Date: Mon, 17 Dec 2001 09:21:42 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the DNS Extensions Working Group of the IETF.

	Title		: Obsoleting IQUERY
	Author(s)	: D. Lawrence
	Filename	: draft-ietf-dnsext-obsolete-iquery-02.txt
	Pages		: 4
	Date		: 14-Dec-01
	
Based on a lack of working implementations of the IQUERY method
of performing inverse DNS lookups, and because an alternative
mechanism for doing inverse queries of address records has been
successfully used operationally for well over a decade, this
draft proposes that the IQUERY operation be entirely obsoleted.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-obsolete-iquery-02.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-dnsext-obsolete-iquery-02.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-dnsext-obsolete-iquery-02.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20011214135857.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-dnsext-obsolete-iquery-02.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-dnsext-obsolete-iquery-02.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
--OtherAccess--
--NextPart--


From owner-namedroppers@ops.ietf.org  Tue Dec 18 11:32:32 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA21108
	for <dnsext-archive@lists.ietf.org>; Tue, 18 Dec 2001 11:32:31 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16GMtY-000Ash-00
	for namedroppers-data@psg.com; Tue, 18 Dec 2001 08:15:08 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16GMtY-000Asb-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 08:15:08 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16GMtY-000Fvt-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 08:15:08 -0800
Message-Id: <5.1.0.14.2.20011218110546.02db2cd0@localhost>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Date: Tue, 18 Dec 2001 11:13:58 -0500
To: erik Nordmark <Erik.Nordmark@eng.sun.com>
From: =?iso-8859-1?Q?=D3lafur?= =?iso-8859-1?Q?_Gu=F0mundsson?=
  <ogud@ogud.com>
Subject: DNS IQUERY Obsolete advancement 
Cc: namedroppers@ops.ietf.org, iesg-secretary@ietf.org
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk


Erik,
The working group has completed the review of this document and there
is strong consensus to advancement it.
Please start IETF last call process.


	Title		: Obsoleting IQUERY
	Author(s)	: D. Lawrence
	Filename	: draft-ietf-dnsext-obsolete-iquery-02.txt
	Pages		: 4
	Date		: 14-Dec-01
	
Based on a lack of working implementations of the IQUERY method
of performing inverse DNS lookups, and because an alternative
mechanism for doing inverse queries of address records has been
successfully used operationally for well over a decade, this
draft proposes that the IQUERY operation be entirely obsoleted.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-obsolete-iquery-02.txt



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Tue Dec 18 13:14:38 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA23284
	for <dnsext-archive@lists.ietf.org>; Tue, 18 Dec 2001 13:14:37 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16GOaH-000ETk-00
	for namedroppers-data@psg.com; Tue, 18 Dec 2001 10:03:21 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16GOaG-000ETe-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 10:03:20 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16GOaG-000J2R-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 10:03:20 -0800
In-Reply-To: "Your message with ID" <5.1.0.14.2.20011218110546.02db2cd0@localhost>
Message-ID: <Roam.SIMC.2.0.6.1008698424.3223.nordmark@bebop.france>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; CHARSET=US-ASCII
Date: Tue, 18 Dec 2001 19:00:24 +0100 (CET)
From: Erik Nordmark <Erik.Nordmark@eng.sun.com>
Subject: Re: DNS IQUERY Obsolete advancement 
To: =?iso-8859-1?Q?=D3lafur_Gu=F0mundsson?= <ogud@ogud.com>
Cc: erik Nordmark <Erik.Nordmark@eng.sun.com>, namedroppers@ops.ietf.org,
        iesg-secretary@ietf.org
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

> 
> Erik,
> The working group has completed the review of this document and there
> is strong consensus to advancement it.
> Please start IETF last call process.

I'm assuming this is for Proposed Standard status.

  Erik



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Tue Dec 18 13:43:01 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA23750
	for <dnsext-archive@lists.ietf.org>; Tue, 18 Dec 2001 13:43:00 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16GP6B-000FA0-00
	for namedroppers-data@psg.com; Tue, 18 Dec 2001 10:36:19 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16GP6B-000F9u-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 10:36:19 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16GP6B-000K00-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 10:36:19 -0800
Message-Id: <5.1.0.14.2.20011218131606.0286d3a0@localhost>
In-Reply-To: <Roam.SIMC.2.0.6.1008698424.3223.nordmark@bebop.france>
References: <"Your message with ID" <5.1.0.14.2.20011218110546.02db2cd0@localhost>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Date: Tue, 18 Dec 2001 13:21:06 -0500
To: Erik Nordmark <Erik.Nordmark@eng.sun.com>,
        =?iso-8859-1?Q?=D3lafur?==?iso-8859-1?Q?_Gu=F0mundsson?= <ogud@ogud.com>
From: =?iso-8859-1?Q?=D3lafur?= =?iso-8859-1?Q?_Gu=F0mundsson?= <ogud@ogud.com>
Subject: Re: DNS IQUERY Obsolete advancement 
Cc: erik Nordmark <Erik.Nordmark@eng.sun.com>, namedroppers@ops.ietf.org,
        iesg-secretary@ietf.org
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

At 01:00 PM 12/18/2001, Erik Nordmark wrote:
> >
> > Erik,
> > The working group has completed the review of this document and there
> > is strong consensus to advancement it.
> > Please start IETF last call process.
>
>I'm assuming this is for Proposed Standard status.


This ID updates an Full standard, does this have to go through the
full standards process, or it go to Full or draft standard ?
Testing is simple just check for RCODE, in any case there is minimal
code to write.

         Olafur



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Tue Dec 18 13:52:22 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA23917
	for <dnsext-archive@lists.ietf.org>; Tue, 18 Dec 2001 13:52:21 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16GPEJ-000FMm-00
	for namedroppers-data@psg.com; Tue, 18 Dec 2001 10:44:43 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16GPEI-000FMg-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 10:44:42 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16GPEI-000KEr-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 10:44:42 -0800
In-Reply-To: "Your message with ID" <5.1.0.14.2.20011218131606.0286d3a0@localhost>
Message-ID: <Roam.SIMC.2.0.6.1008700119.32329.nordmark@bebop.france>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; CHARSET=US-ASCII
Date: Tue, 18 Dec 2001 19:28:39 +0100 (CET)
From: Erik Nordmark <Erik.Nordmark@eng.sun.com>
Subject: Re: DNS IQUERY Obsolete advancement 
To: =?iso-8859-1?Q?=D3lafur_Gu=F0mundsson?= <ogud@ogud.com>
Cc: Erik Nordmark <Erik.Nordmark@eng.sun.com>, namedroppers@ops.ietf.org,
        iesg-secretary@ietf.org
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk


> This ID updates an Full standard, does this have to go through the
> full standards process, or it go to Full or draft standard ?
> Testing is simple just check for RCODE, in any case there is minimal
> code to write.

It, like any update or obsoleting of a full standard,
would go through the regular proposed, draft, standard steps.

  Erik



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Tue Dec 18 17:55:33 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA28573
	for <dnsext-archive@lists.ietf.org>; Tue, 18 Dec 2001 17:55:32 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16GSsW-000Jis-00
	for namedroppers-data@psg.com; Tue, 18 Dec 2001 14:38:28 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16GSsW-000Jim-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 14:38:28 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16GSsW-0000ur-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 14:38:28 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <v03130303b84572efe175@[10.33.10.175]>
In-Reply-To: <E15tJPa-000EhB-00@rip.psg.com>
Date: Tue, 18 Dec 2001 17:34:07 -0500
To: Randy Bush <randy@psg.com>
From: Edward Lewis <lewis@tislabs.com>
Subject: Re: dnssec key manglement
Cc: namedroppers <namedroppers@ops.ietf.org>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

This is something that I've spent a lot more time thinking about in the
past month.  A couple of us talked about this at the IETF, but much more
consideration is needed.

One of the factors to consider is that there may not be one (mechanical)
answer to this problem.  I am fully aware that we are not here to touch
ICANN subject matter, but the ICANN architecture of registrars and registry
may require a solution that is "richer" than less complex environments.
(I'm stating this as objectively as I can, I do not mean to launch a debate
on ICANN or whether we should engineer to meet the needs of any
organization.)

I don't know if we want to discuss this topic on the namedroppers list
right now, so I'll refrain from rambling on about initial thoughts.
Suffice it to say that I am motivated by a funder (which is non-ICANN) to
look into this and will be.  If anyone wants to discuss this (further), I'm
willing.

At 8:52 PM -0500 10/15/01, Randy Bush wrote:
>from a discussion with a secret friend :-)
>
>> current techniques are oob via a web page or email.  these do not
>> do well for frequent re-keying.  i am not sure if this has been
>> thought out at any scale.
>
>This is a good time to think it out:
>
>   DS is a lot simpler keying scenario to manage
>   than sig@child
>
>   Maybe there's a simple key exchange protocol buried
>   in IKE or coming in JFK that can be used to meet dnssec
>   requirements.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                NAI Labs
Phone: +1 443-259-2352                      Email: lewis@tislabs.com

Opinions expressed are property of my evil twin, not my employer.




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec 19 00:47:49 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA08126
	for <dnsext-archive@lists.ietf.org>; Wed, 19 Dec 2001 00:47:49 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16GZ5a-0000Tw-00
	for namedroppers-data@psg.com; Tue, 18 Dec 2001 21:16:22 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16GZ5a-0000Tq-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 21:16:22 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16GZ5Z-000BtC-00
	for namedroppers@ops.ietf.org; Tue, 18 Dec 2001 21:16:21 -0800
In-Reply-To: <Roam.SIMC.2.0.6.1008700119.32329.nordmark@bebop.france> 
References: <Roam.SIMC.2.0.6.1008700119.32329.nordmark@bebop.france> 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID: <1900.1008738429@brandenburg.cs.mu.OZ.AU>
From: Robert Elz <kre@munnari.OZ.AU>
To: Erik Nordmark <Erik.Nordmark@eng.sun.com>
cc: =?iso-8859-1?Q?=D3lafur_Gu=F0mundsson?= <ogud@ogud.com>,
        namedroppers@ops.ietf.org, iesg-secretary@ietf.org
Subject: Re: DNS IQUERY Obsolete advancement 
Date: Wed, 19 Dec 2001 12:07:09 +0700
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

    Date:        Tue, 18 Dec 2001 19:28:39 +0100 (CET)
    From:        Erik Nordmark <Erik.Nordmark@eng.sun.com>
    Message-ID:  <Roam.SIMC.2.0.6.1008700119.32329.nordmark@bebop.france>

  | It, like any update or obsoleting of a full standard,
  | would go through the regular proposed, draft, standard steps.

It is going to be kind of interesting when we come to look for two
or more independent implementations of the failure to implement IQUERY...

Sure, my FTP server doesn't implement IQUERY - there's one!  My SMTP
server doesn't either.  That's the second.

This probably should be a BCP, rather than PS etc.

kre



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec 19 17:05:50 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA08674
	for <dnsext-archive@lists.ietf.org>; Wed, 19 Dec 2001 17:05:44 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16GoWx-000FuU-00
	for namedroppers-data@psg.com; Wed, 19 Dec 2001 13:45:39 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16GoWx-000FuO-00
	for namedroppers@ops.ietf.org; Wed, 19 Dec 2001 13:45:39 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16GoWx-000CCy-00
	for namedroppers@ops.ietf.org; Wed, 19 Dec 2001 13:45:39 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112192102.WAA11175@grimsvotn.TechFak.Uni-Bielefeld.DE>
In-reply-to: Your message of "Wed, 19 Dec 2001 12:07:09 +0700."
             <1900.1008738429@brandenburg.cs.mu.OZ.AU> 
To: namedroppers@ops.ietf.org
Cc: Erik Nordmark <Erik.Nordmark@eng.sun.com>
Subject: Re: DNS IQUERY Obsolete advancement 
Date: Wed, 19 Dec 2001 22:02:41 +0100
From: Peter Koch <pk@TechFak.Uni-Bielefeld.DE>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit


{Cc trimmed}

kre wrote:

> It is going to be kind of interesting when we come to look for two
> or more independent implementations of the failure to implement IQUERY...

My first thought also was how that non-interoperability test would look like.
But then one could argue that it's necessary to show that DNS "works" without
the need to implement IQUERY which calls for the usual standards track approach
(and rapid advancement in this case since "wide deployment" shows IQUERY
*is* not needed).

> This probably should be a BCP, rather than PS etc.

It is more like an Applicability Statement as of RFC 2026, section 3.3(e).
IQUERY is optional in STD 13 anyway, so with current rules applied it would
not have become part of the STD. Section 9 of 2026 could open the door for
instant addition of this draft to the set of STD13. The procedural cost though
may be high compared to the achieved gain given that nobody seems to have
wasted time implementing IQUERY for quite a couple of years.

-Peter


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec 19 17:25:24 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA09199
	for <dnsext-archive@lists.ietf.org>; Wed, 19 Dec 2001 17:25:24 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16GozX-000GbP-00
	for namedroppers-data@psg.com; Wed, 19 Dec 2001 14:15:11 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16GozX-000GbJ-00
	for namedroppers@ops.ietf.org; Wed, 19 Dec 2001 14:15:11 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16GozX-000D3O-00
	for namedroppers@ops.ietf.org; Wed, 19 Dec 2001 14:15:11 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
References: <5.1.0.14.2.20011219165423.023f2aa0@localhost>
Message-Id: <E16Goym-000D1i-00@rip.psg.com>
From: Randy Bush <randy@psg.com>
To: =?iso-8859-1?Q?=D3lafur?==?iso-8859-1?Q?_Gu=F0mundsson?= <ogud@ogud.com>
Cc: namedroppers@ops.ietf.org
Subject: Re: Protection of unsecured delegations
Date: Wed, 19 Dec 2001 14:14:24 -0800
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> The strongest argument I have heard against OPT-in is that
> "OPT-in removes the protection of the innocent get with DNSSEC".

not exactly.  it has been generally phrased as

    it changes the basic security model of dnssec from a secure signed
    zone to a collection of signed and unsigned rrsets, and we do not
    _fully_ understand the implications of this from the security pov,
    but some security folk have expressed serious concern.

your message does explore some of the implications.  but i hope smb and
others will express their concerns so that i can understand them.

randy


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec 19 17:29:38 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA09333
	for <dnsext-archive@lists.ietf.org>; Wed, 19 Dec 2001 17:29:37 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16GotL-000GQF-00
	for namedroppers-data@psg.com; Wed, 19 Dec 2001 14:08:47 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16GotL-000GQ9-00
	for namedroppers@ops.ietf.org; Wed, 19 Dec 2001 14:08:47 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16GotL-000Crb-00
	for namedroppers@ops.ietf.org; Wed, 19 Dec 2001 14:08:47 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <5.1.0.14.2.20011219165423.023f2aa0@localhost>
Date: Wed, 19 Dec 2001 17:07:03 -0500
To: namedroppers@ops.ietf.org
From: =?iso-8859-1?Q?=D3lafur?= =?iso-8859-1?Q?_Gu=F0mundsson?= <ogud@ogud.com>
Subject: Protection of unsecured delegations
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

The strongest argument I have heard against OPT-in is that
"OPT-in removes the protection of the innocent get with DNSSEC".
All other arguments fall into,
	"not convinced we need this",
	"this is ugly and/or complicated",
	"Verisign must have ulterior motive, therefor this is bad".

After thinking about what Roy Arends said in the DNSEXT meeting in
the OPT-in presentation, I think we need to reassess the "harm" done
by OPT-in.


Attacks against Delegations
	a. Denial of existence
	b. Diversion of DNS queries via forged NS set (forged reply)
		b.1 delegation looks lame.
		b.2 Lying about the contents of a delegated zone

A. Denial of existence in DNS is done by
RFC1035  Rcode=NXdomain, an=0, au=1, authority section contains SOA
RFC2535  same as above and NXT record is added to authority section.
DS       same as RFC2535
OPT-in   same as RFC2535

B. Diversion of DNS queries is done by sending back different NS set.
Remember NS in parent is not signed.

RFC1035 resolver with properly implemented random Query ID and random
port make these attacks hard or limit them to an attacker that sees
the query stream, but all are possible.

RFC2535, or DS or OPT-in in parent does not help RFC1035 resolver
thus provides no protection against any of the attacks.

RFC2535 in parent prevents RFC2535 resolver from believing case a. BUT
the if the NXDomain answer arrives before the real answers, it may prevent
the resolver from accepting the real one thus accomplishing the
same result. This only applies to nameservers/resolvers that only
listen to the first message returned in response to a query.
RFC2535 resolver is still vulnerable to b.1 and b.2 because the
NS set is unsigned.

DS zone
DS capable Resolver has same vulnerabilities as RFC2535 one.
RFC2535 capable resolver might be susceptible to a., in this case
when it performs a check on the NXT record and seeing unknown bit (NODS)
rejects the NXT even though the signature verifies the contents.

OPT-in zone
OPT-in capable resolver is vulnerable to all attacks at unsecured
delegations.
IF the covering NXT is played back against RFC2535-only capable
resolver, it will return that the delegations provably does not exist.
OPT-in resolver has same vulnerabilities as RFC2535 one at secure
delegations.

In short, signing delegation zone like .com the only protection that
unsecured delegations get at security aware resolvers, is against the
crudest attack, no protection is offered against the others.
All secure delegations are still vulnerable to B.1,
Accomplishing B.2 is real hard without key compromise.

Given all above
Question: Is Opt-in "mostly harmless" ?

If answer is yes, what rules do we set for OPT-in.
	1. Only allowed in delegation zones (like .com)
	2. Only skip unsecured delegations but protect other names
	3. Skip any name in a zone other than apex.

1. is the case used to motivate and justify
2. is where DNSSEC provides least protection.
3. Is the general case and addresses the NXT walk concerns that some
    operators and policy people bring up time again and again.

	Olafur



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Wed Dec 19 18:04:34 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA09947
	for <dnsext-archive@lists.ietf.org>; Wed, 19 Dec 2001 18:04:33 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16GpaC-000Her-00
	for namedroppers-data@psg.com; Wed, 19 Dec 2001 14:53:04 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16GpaC-000Hel-00
	for namedroppers@ops.ietf.org; Wed, 19 Dec 2001 14:53:04 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16GpaC-000E6E-00
	for namedroppers@ops.ietf.org; Wed, 19 Dec 2001 14:53:04 -0800
Message-ID: <Pine.BSF.4.21.0112191420550.43326-100000@internaut.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Date: Wed, 19 Dec 2001 14:24:10 -0800 (PST)
From: Bernard Aboba <aboba@internaut.com>
To: namedroppers@ops.ietf.org
Subject: Version of mDNS document for review
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

A strawman revision of the mDNS specification is up for review at: 
http://www.drizzle.com/~aboba/draft-ietf-dnsext-mdns-08.txt

This draft incorporates the following changes:

a. Uses a separate port (5353) and allocated IPv4 multicast linklocal
address (224.0.0.251).

b. Specifies use of a distinct cache for mDNS. 

c. Removes use of "local.arpa" namespace. 

d. Separates normative and informative references

Please post comments to the authors and to the list. 



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 09:58:39 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA08175
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 09:58:39 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16H4N5-000CB4-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 06:40:31 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16H4N5-000CAy-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 06:40:31 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16H4N5-000Dav-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 06:40:31 -0800
In-Reply-To: <E16Goym-000D1i-00@rip.psg.com>
Message-ID: <20011220101311.T1182-100000@node10c4d.a2000.nl>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Date: Thu, 20 Dec 2001 14:49:03 +0100 (CET)
From: Roy Arends <Roy.Arends@nominum.com>
To: <namedroppers@ops.ietf.org>
Cc: Randy Bush <randy@psg.com>,
        =?ISO-8859-1?Q?=D3lafur_Gu=F0mundsson?= <ogud@ogud.com>
Subject: Re: Protection of unsecured delegations
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

On Wed, 19 Dec 2001, Randy Bush wrote:

> > The strongest argument I have heard against OPT-in is that
> > "OPT-in removes the protection of the innocent get with DNSSEC".
>
> not exactly.  it has been generally phrased as
>
>     it changes the basic security model of dnssec from a secure signed
>     zone to a collection of signed and unsigned rrsets, and we do not
>     _fully_ understand the implications of this from the security pov,
>     but some security folk have expressed serious concern.
>
> your message does explore some of the implications.  but i hope smb and
> others will express their concerns so that i can understand them.
>
> randy

There was some consensus after that presentation in that the security
considerations should be stated in a document that is either included or
referred to by the opt-in draft.

I hereby invite security folk to express their serious concern so we can
sieve the FUD and state the residue in either a separate document or
include it in the draft, so we can _fully_ understand the implications of
this from the security point of view.

Oh, btw, I'll volunteer to author that document.

...

Prereq: Please read draft-dnsext-dnssec-opt-in-01.txt


Now, to state in one phrase what opt-in gives up wrt 2535:

    Opt-in gives up authenticated [denial of] existence for unsecured
    delegations.

How is that accomplished ?

    By changing the semantics of the NXT record.

    - 2535 NXT:  Nothing between owner and next domain name exists.
                 (authenticated [denial of] existence).

    - opt-in NXT:Nothing between owner and next domain name is signed.
                 (authenticated [denial of] signatures).

    Note that the latter is a subset of the former. (if a name does not
    exist, a signature for that name does not exist).

    To signal opt-in, the NXT bit is set to zero in the NXT RDATA's
    type-bit-map.



***
How does this change the security context/status/realm ?
***

What follows is a breakdown in 3 parts. The first part discusses the
various active attack types. The second part discusses backward
compatibility issues that introduces security issues. The last part
discusses the possibility to restrict opt-in to unsecured delegations
only.

A) Various Attack types.

   From the secure resolver point of view, there are 3 possible
   attack-types wrt authenticated [denial of] signatures.

   A malicious entity can:

   1) falsely state unsecured delegation information.
   2) falsely state non-existence of unsecured delegation.
   3) falsely state existence of unsecured delegation.

   The first attack-type exist in both the 2535 and the opt-in context.
   The second and third attack-type exist solely in the opt-in context.
   (see [*] below for discussions of the defense against the second and
   third attack type).

   Here follows examples of the three attack-types:

   1) Assume:
         The resolver is opt-in aware.
         A zone (.tld) is signed using opt-in.
         A zone has 2 secured delegations (aaa.tld, zzz.tld)
         A zone has an unsecured delegation (unsecured.tld NS somewhere).

         The resolver wants to resolve "unsecured.tld".

      Attack:
         A malicious entity wants to divert the delegation.

      Method:
         Inject A records for "somewhere" or,
         Change the NS RRSet from "somewhere" to "somewhere_else"

   2) Assume:
         The resolver is opt-in aware.
         A zone (.tld) is signed using opt-in.
         A zone has 2 secured delegations (aaa.tld, zzz.tld)
         A zone has an unsecured delegation (unsecured.tld NS somewhere).

         The resolver wants to resolve "unsecured.tld".

      Attack:
         A malicious entity wants to DoS the delegation by stating
         NXDOMAIN.

      Method:
         Remove all in ANSWER section, an=0,au=1, change the RCODE from
         NOERROR to NXDOMAIN.

   3) Assume:
         The resolver is opt-in aware.
         A zone (.tld) is signed using opt-in.
         A zone (.tld) has 2 secured delegations (aaa.tld, zzz.tld).
         "unsecured.tld" does not exist.

         The resolver wants to resolve "unsecured.tld".

      Attack:
         A malicious entity wants the resolver to believe "unsecured.tld"
         does exist.

      Method:
         Add "unsecured.tld" to the ANSWER section, an=1,au=1, change
         the RCODE from NXDOMAIN to NOERROR




B) Backwards compatibility with 2535.

   2535 and opt-in can co-exist, though the secure resolver needs to be
   able to differ between the two. A resolver that is solely capable of
   1035/2535 (and no opt-in) will either:

     - treat an opt-in NXT record type as bad (it noticed absence of the
       NXT bit in the type-bit-map, and can't compute)

     - treat an opt-in NXT record type as 2535 NXT record type (it ignores
       the absence of the NXT bit in the type-bit-map)

   The above is definitly unwanted. Comparable with deployment of DS, we
   need a "flag date" event to deploy opt-in. Both (DS and opt-in flag
   dates) should probably be the same date if/when it is decided to adopt
   both.



C) Unsecured Nodes vs Unsecured Delegations.

   In the opt-in draft, no difference was made between Unsecured Nodes &
   Unsecured Delegations. (A node = all RRsets with the same owner name)

   The reason for this is that in general, Unsecured Nodes can be
   accomplished by the use of Unsecured Delegations (regardless whether
   2535 or opt-in is used):

       "delegate the node you do not want to secure".

   I have absolutely no problem in restricting the current opt-in draft to
   "unsecured delegations" instead of the more general "unsecured nodes",
   since one can be accomplished by the other.


-----------

[*]

What follows are MHO's:

There is an obvious defense against attack 2, either sign the delegation,
or use 2535 NXT records (revert to 2535). But this is a decision that
is made by the domain-holder/zone-owner, while this decision affects
the end user.

There is an obvious defense against attack 3, replace the encapsulating
opt-in NXT record with a 2535 NXT record (revert to 2535) denying the
existence of the domain. Again, a decision that is made by the
domain-holder/zone-owner. (note that a malicious entity could simply
register the domain, as it was previously non-existent).

As said, opt-in gives up authenticated [denial of] existence for unscured
delegations. These are delegations that were not secure to begin with. The
only service 2535 offers for unsecured delegations is to authenticate its
existence without specifying where it exists.

Regards,

Roy Arends
Nominum






to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 11:11:09 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA10684
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 11:11:09 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16H5fg-000E4y-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 08:03:48 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16H5fg-000E4s-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 08:03:48 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16H5fg-000Fvd-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 08:03:48 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112201602.fBKG2L905573@syn.hamachi.org>
In-Reply-To: Your message of "Thu, 20 Dec 2001 14:49:03 +0100."
             <20011220101311.T1182-100000@node10c4d.a2000.nl> 
From: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
To: Roy Arends <Roy.Arends@nominum.com>
Cc: namedroppers@ops.ietf.org
Subject: Re: Protection of unsecured delegations 
Date: Thu, 20 Dec 2001 11:02:21 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

I'd be less concerned about the delegation vs. leaf data issue for
opt-in as long as folks who haven't yet set up fully secured
delegations can opt for 2535-style null key..

I think there needs to be more text on resolver behavior, and, in
particular, a discussion of resolver search paths.

I can see resolvers doing any of:

[a] Do the lookup and only return trusted data.  Not useful to me
until everyone I care about has opted in..

[b] If there's trusted data anywhere on the path, return the first
trusted answer, otherwise return the first non-trusted answer.

[c] Return the first name along the path for which a query returns
some data.

Version [b] provides much better protection of the innocent than [c].

					- Bill


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 11:29:39 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA11531
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 11:29:38 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16H5pl-000EOV-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 08:14:13 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16H5pl-000EOP-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 08:14:13 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16H5pl-000GDh-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 08:14:13 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
References: <200112201602.fBKG2L905573@syn.hamachi.org>
In-Reply-To: Bill Sommerfeld's message of "Thu, 20 Dec 2001 11:02:21 -0500"
Message-ID: <sjmn10d27s0.fsf@benjamin.ihtfp.org>
To: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
Cc: Roy Arends <Roy.Arends@nominum.com>, namedroppers@ops.ietf.org
Subject: Re: Protection of unsecured delegations
From: Derek Atkins <warlord@MIT.EDU>
Date: 20 Dec 2001 11:09:03 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Bill,

Have you looked at the Delegation Signer (DS) record specification
and how that would relate to Opt-In?

-derek

Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us> writes:

> I'd be less concerned about the delegation vs. leaf data issue for
> opt-in as long as folks who haven't yet set up fully secured
> delegations can opt for 2535-style null key..
> 
> I think there needs to be more text on resolver behavior, and, in
> particular, a discussion of resolver search paths.
> 
> I can see resolvers doing any of:
> 
> [a] Do the lookup and only return trusted data.  Not useful to me
> until everyone I care about has opted in..
> 
> [b] If there's trusted data anywhere on the path, return the first
> trusted answer, otherwise return the first non-trusted answer.
> 
> [c] Return the first name along the path for which a query returns
> some data.
> 
> Version [b] provides much better protection of the innocent than [c].
> 
> 					- Bill
> 
> 
> to unsubscribe send a message to namedroppers-request@ops.ietf.org with
> the word 'unsubscribe' in a single line as the message text body.

-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
       warlord@MIT.EDU                        PGP key available


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 11:31:03 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA11591
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 11:31:03 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16H5xO-000Ecy-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 08:22:06 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16H5xO-000Ecs-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 08:22:06 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16H5xO-000GRj-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 08:22:06 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <200112201602.fBKG2L905573@syn.hamachi.org>
Message-ID: <20011220171404.R1182-100000@node10c4d.a2000.nl>
Date: Thu, 20 Dec 2001 17:27:58 +0100 (CET)
From: Roy Arends <Roy.Arends@nominum.com>
To: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
Cc: <namedroppers@ops.ietf.org>, Roy Arends <Roy.Arends@nominum.com>
Subject: Re: Protection of unsecured delegations 
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Thu, 20 Dec 2001, Bill Sommerfeld wrote:

> I'd be less concerned about the delegation vs. leaf data issue for
> opt-in as long as folks who haven't yet set up fully secured
> delegations can opt for 2535-style null key..
>
> I think there needs to be more text on resolver behavior, and, in
> particular, a discussion of resolver search paths.
>
> I can see resolvers doing any of:
>
> [a] Do the lookup and only return trusted data.  Not useful to me
> until everyone I care about has opted in..
>
> [b] If there's trusted data anywhere on the path, return the first
> trusted answer, otherwise return the first non-trusted answer.
>
> [c] Return the first name along the path for which a query returns
> some data.
>
> Version [b] provides much better protection of the innocent than [c].

A secure resolver knows what to expect. It expects a signed statement.
This statement is unambiguous.

so a secure resolver does:

[a] Does the lookup and starts at some secure [super]-domain (it has to
    have a key preconfigured right ?)

or

[b] Does the lookup and does not care about security (it has no key
    preconfigured for a particular [super]domain).

We're talking about [a] here. The resolver knows if it must expect a
secured domain, since the parent unambiguously states that to the
resolver.

Roy Arends
Nominum













to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 14:09:36 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA17161
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 14:09:35 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16H8IJ-000Hn7-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 10:51:51 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16H8II-000Hn0-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 10:51:50 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16H8II-000Kj2-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 10:51:50 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <3C222A8B.F6174219@sun.com>
Date: Thu, 20 Dec 2001 19:14:35 +0100
From: Erik Guttman <erik.guttman@sun.com>
To: aboba@internaut.com
CC: cheshire@apple.com, erik.guttman@sun.com, levone@microsoft.com,
        dthaler@microsoft.com, sra@hactrn.net, namedroppers@ops.ietf.org
Subject: re: mdns-08 draft
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Bernard,

This document is moving in the right direction.  A few comments.

---

Please change the title of the draft to

  Link-local Multicast DNS

In the future, we may define Multicast DNS to be something grander.

---

  For the purpose of this document a host that sends a multicast query
is
  called a "sender", while a host that listens to (but not necessarily
  responds to) a multicast query is called "responder". A host
configured
  to be a "responder" may also be a "sender". A host configured to not
be
  a "responder" cannot be a "sender".

Why?  This is an arbitrary rule.  I can imagine a very simple client 
that might not need a responder.  Every feature costs.

---

  If the multicast query is not positively resolved ("positively
resolved"
  refers in this document to a response with the RCODE set to 0) during
a
  limited amount of time, 

Non-positively resolved multicast queries won't get replies.  This is
stated later

  A response to an mDNS query MUST have RCODE set to
  zero. mDNS responders may respond only to queries which they can
resolve
  positively.

So, maybe you just want to say 'If the multicast query is not resolved
during
a limited amount of time...'

---

  The sender MUST anticipate receiving multiple replies to the same
  multicast query, in the event that several multicast DNS enabled
  computers receive the query and respond with valid answers.  When this
  occurs, the responses MAY first be concatenated, and then treated in
the
  same manner that multiple RRs received from the same DNS server would,
  ordinarily.

There are 2 ways of reading this.  The sender may get back >1 response
while they are waiting.  This is OK.  Or the sender has to wait for a 
while till it gets back all the responses being sent.  This is not good.
I say leave it up to the implementor.  I send a request, get a response
back in 10 msec, and exit the resolver.  Or, I could send a request and
gather all responses I get in a second.  What I don't like is the notion
that a resolver is REQUIRED to wait for all the requests it gets back in
a bounded period of time.  This means that even though I get a response
in 10 msec, I end up waiting for (say) 3 seconds.  Poor performance
has been rescued from the jaws of excellence!

---
  Where a host is configured to respond to multicast DNS queries on more
  than one interface, the host MUST verify resource record uniqueness on
  each interface for each UNIQUE resource record that could be used on
  that interface. To accomplish this, the host MUST multicast a dynamic
  DNS update request as specified in [RFC2136] for each new UNIQUE
  resource record.

Why don't you just use mDNS to multicast a request for UNIQUE before
you answer for it?  This reduces the complexity of the protocol
quite a bit (doesn't need dynamic update which isn't really used
anyway, removes a normative reference and page 10 can be dropped!)

---
[mDNSEnable]   Guttman, E., "DHCP mDNS Enable Option", Internet draft
               (work in progress), draft-guttman-mdns-enable-01.txt,
               July 2001.

I need to carry this forward.  Please send feedback on this draft
so that I can issue a revision.

Erik


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 16:55:29 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA21899
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 16:55:28 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HAyI-000LA3-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 13:43:22 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HAyI-000L9x-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 13:43:22 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HAyI-000PVQ-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 13:43:22 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <3C224ACD.B1DBB08D@ehsco.com>
References: <3C222A8B.F6174219@sun.com>
Date: Thu, 20 Dec 2001 14:32:13 -0600
From: "Eric A. Hall" <ehall@ehsco.com>
To: Erik Guttman <erik.guttman@sun.com>
CC: aboba@internaut.com, cheshire@apple.com, levone@microsoft.com,
        dthaler@microsoft.com, sra@hactrn.net, namedroppers@ops.ietf.org
Subject: Re: mdns-08 draft
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Erik Guttman wrote:

> Please change the title of the draft to
> 
>   Link-local Multicast DNS

or anything other than "Multicast DNS", which this is not

> In the future, we may define Multicast DNS to be something grander.

seconded


-- 
Eric A. Hall                                        http://www.ehsco.com/
Internet Core Protocols          http://www.oreilly.com/catalog/coreprot/


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 18:46:09 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA25038
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 18:46:09 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HChP-000NbC-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 15:34:03 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HChO-000Nb6-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 15:34:02 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HChO-0002hz-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 15:34:02 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <3C224ACD.B1DBB08D@ehsco.com>
Message-ID: <Pine.NEB.4.33.0112201452110.3549-100000@woody.zocalo.net>
Date: Thu, 20 Dec 2001 14:52:28 -0800 (PST)
From: Bill Woodcock <woody@zocalo.net>
To: "Eric A. Hall" <ehall@ehsco.com>
cc: Erik Guttman <erik.guttman@sun.com>, <aboba@internaut.com>,
        <cheshire@apple.com>, <levone@microsoft.com>, <dthaler@microsoft.com>,
        <sra@hactrn.net>, <namedroppers@ops.ietf.org>
Subject: Re: mdns-08 draft
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

    > > Please change the title of the draft to
    > >   Link-local Multicast DNS
    >
    > or anything other than "Multicast DNS", which this is not

    > > In the future, we may define Multicast DNS to be something grander.
    > seconded

Thirded.
                                -Bill




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 19:07:45 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA25508
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 19:07:45 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HD4y-000O7r-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 15:58:24 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HD4x-000O7l-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 15:58:23 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HD4x-0003Oh-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 15:58:23 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: "Your message with ID" <Pine.BSF.4.21.0112191420550.43326-100000@internaut.com>
Message-ID: <Roam.SIMC.2.0.6.1008891236.10234.nordmark@bebop.france>
Date: Fri, 21 Dec 2001 00:33:56 +0100 (CET)
From: Erik Nordmark <Erik.Nordmark@eng.sun.com>
Subject: Re: Version of mDNS document for review
To: Bernard Aboba <aboba@internaut.com>
Cc: namedroppers@ops.ietf.org
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> a. Uses a separate port (5353) and allocated IPv4 multicast linklocal
> address (224.0.0.251).

Has an IPv6 link-local multicast been allocated as well?

I thought there was a suggestion on the floor to also
name the protocol something other than *DNS i.e. to point out that
if offers a similar name resolution service to DNS but limited to
a single link (and happens to reuse DNS packet formats).
Thus "Link local ... name lookup" might be a reasonable name.

  Erik



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 19:10:35 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA25568
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 19:10:35 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HD9P-000OEm-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 16:02:59 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HD9P-000OEg-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 16:02:59 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HD9P-0003Wp-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 16:02:59 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <Roam.SIMC.2.0.6.1008891236.10234.nordmark@bebop.france>
Message-ID: <Pine.BSF.4.21.0112201527300.45060-100000@internaut.com>
Date: Thu, 20 Dec 2001 15:31:50 -0800 (PST)
From: Bernard Aboba <aboba@internaut.com>
To: Erik Nordmark <Erik.Nordmark@eng.sun.com>
cc: namedroppers@ops.ietf.org
Subject: Re: Version of mDNS document for review
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> Has an IPv6 link-local multicast been allocated as well?

Section 2.1.1 describes how the IPv6 "solicited name multicast address" is
determined. This procedure is the same as that specified in section 3 of
"IPv6 Node Information Queries". So no additional IPv6 link-local address
allocation is required. 

> I thought there was a suggestion on the floor to also
> name the protocol something other than *DNS i.e. to point out that
> if offers a similar name resolution service to DNS but limited to
> a single link (and happens to reuse DNS packet formats).
> Thus "Link local ... name lookup" might be a reasonable name.

There has been a suggestion to call it "Linklocal Multicast DNS" (llmDNS). 



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 19:24:43 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA25749
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 19:24:42 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HDMp-000Obf-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 16:16:51 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HDMp-000ObZ-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 16:16:51 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HDMp-0003vo-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 16:16:51 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112210011.fBL0Bri01185@nic-naa.net>
In-Reply-To: Your message of "Thu, 20 Dec 2001 14:52:28 PST."
             <Pine.NEB.4.33.0112201452110.3549-100000@woody.zocalo.net> 
To: Bill Woodcock <woody@zocalo.net>
cc: "Eric A. Hall" <ehall@ehsco.com>, Erik Guttman <erik.guttman@sun.com>,
        aboba@internaut.com, cheshire@apple.com, levone@microsoft.com,
        dthaler@microsoft.com, sra@hactrn.net, namedroppers@ops.ietf.org,
        brunner@nic-naa.net
Subject: Re: mdns-08 draft 
Date: Thu, 20 Dec 2001 19:11:53 -0500
From: Eric Brunner-Williams in Portland Maine <brunner@nic-naa.net>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

uh... mini-multicast dns (in the spirit of dr. evil's evil twin)


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 20:16:27 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA26265
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 20:16:26 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HEBi-000PiL-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 17:09:26 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HEBh-000PiF-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 17:09:25 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HEBh-0005RS-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 17:09:25 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <4AEE3169443CDD4796CA8A00B02191CD0336D608@win-msg-01.wingroup.windeploy.ntdev.microsoft.com>
Subject: RE: mdns-08 draft
Date: Thu, 20 Dec 2001 17:00:27 -0800
From: "Levon Esibov" <levone@windows.microsoft.com>
To: "Eric A. Hall" <ehall@ehsco.com>, "Erik Guttman" <erik.guttman@sun.com>
Cc: <aboba@internaut.com>, <cheshire@apple.com>,
        "Dave Thaler" <DTHALER@windows.microsoft.com>, <sra@hactrn.net>,
        <namedroppers@ops.ietf.org>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

I agree that having different name may prevent unnecessary confusion.
How about the following name:

"Local Server-less DNS (LSLDNS)"

> -----Original Message-----
> From: Eric A. Hall [mailto:ehall@ehsco.com]
> Sent: Thursday, December 20, 2001 12:32 PM
> To: Erik Guttman
> Cc: aboba@internaut.com; cheshire@apple.com; Levon Esibov; Dave Thaler;
> sra@hactrn.net; namedroppers@ops.ietf.org
> Subject: Re: mdns-08 draft
>
> Erik Guttman wrote:
>
> > Please change the title of the draft to
> >
> >   Link-local Multicast DNS
>
> or anything other than "Multicast DNS", which this is not
>
> > In the future, we may define Multicast DNS to be something grander.
>
> seconded
>
>
> --
> Eric A. Hall http://www.ehsco.com/
> Internet Core Protocols http://www.oreilly.com/catalog/coreprot/

to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 20:40:14 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA26504
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 20:40:14 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HEYa-0000D8-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 17:33:04 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HEYa-0000D2-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 17:33:04 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HEYa-00068X-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 17:33:04 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <4AEE3169443CDD4796CA8A00B02191CD0336D609@win-msg-01.wingroup.windeploy.ntdev.microsoft.com>
Subject: RE: mdns-08 draft
Date: Thu, 20 Dec 2001 17:17:57 -0800
From: "Levon Esibov" <levone@windows.microsoft.com>
To: <erik.guttman@sun.com>, <aboba@internaut.com>
Cc: <cheshire@apple.com>, "Dave Thaler" <DTHALER@windows.microsoft.com>,
        <sra@hactrn.net>, <namedroppers@ops.ietf.org>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> -----Original Message-----
> From: Erik Guttman [mailto:erik.guttman@sun.com]
> Sent: Thursday, December 20, 2001 10:15 AM
> To: aboba@internaut.com
> Cc: cheshire@apple.com; erik.guttman@sun.com; Levon Esibov; Dave Thaler;
> sra@hactrn.net; namedroppers@ops.ietf.org
> Subject: re: mdns-08 draft
>
> Bernard,
>
> This document is moving in the right direction.  A few comments.
>
> ---
>
> Please change the title of the draft to
>
>   Link-local Multicast DNS
>
> In the future, we may define Multicast DNS to be something grander.
>
> ---
>
>   For the purpose of this document a host that sends a multicast query is
>   called a "sender", while a host that listens to (but not necessarily
>   responds to) a multicast query is called "responder". A host configured
>   to be a "responder" may also be a "sender". A host configured to not be
>   a "responder" cannot be a "sender".
>
> Why?  This is an arbitrary rule.  I can imagine a very simple client
> that might not need a responder.  Every feature costs.
>
[Levon Esibov] I have no objections.
> ---
>
>   If the multicast query is not positively resolved ("positively resolved"
>   refers in this document to a response with the RCODE set to 0) during a
>   limited amount of time,
>
> Non-positively resolved multicast queries won't get replies.  This is
> stated later
>
>   A response to an mDNS query MUST have RCODE set to
>   zero. mDNS responders may respond only to queries which they can resolve
>   positively.
>
> So, maybe you just want to say 'If the multicast query is not resolved
> during
> a limited amount of time...'
>
> ---
[Levon Esibov] Agree. In this case we should explain what "positively"
means in the second section that you quote above.


>
>   The sender MUST anticipate receiving multiple replies to the same
>   multicast query, in the event that several multicast DNS enabled
>   computers receive the query and respond with valid answers.  When this
>   occurs, the responses MAY first be concatenated, and then treated in the
>   same manner that multiple RRs received from the same DNS server would,
>   ordinarily.
>
> There are 2 ways of reading this.  The sender may get back >1 response
> while they are waiting.  This is OK.  Or the sender has to wait for a
> while till it gets back all the responses being sent.  This is not good.
> I say leave it up to the implementor.  I send a request, get a response
> back in 10 msec, and exit the resolver.  Or, I could send a request and
> gather all responses I get in a second.  What I don't like is the notion
> that a resolver is REQUIRED to wait for all the requests it gets back in
> a bounded period of time.  This means that even though I get a response
> in 10 msec, I end up waiting for (say) 3 seconds.  Poor performance
> has been rescued from the jaws of excellence!
>
[Levon Esibov]
our intend was not to require client to wait for all possible responses.
I agree that a decision on whether use the first or some or all of the
responses should be left up to implementers.

I thought that having MAY in the text doesn't require one to implement
it this way. Feel free to propose a clarifying text.

> ---
>   Where a host is configured to respond to multicast DNS queries on more
>   than one interface, the host MUST verify resource record uniqueness on
>   each interface for each UNIQUE resource record that could be used on
>   that interface. To accomplish this, the host MUST multicast a dynamic
>   DNS update request as specified in [RFC2136] for each new UNIQUE
>   resource record.
>
> Why don't you just use mDNS to multicast a request for UNIQUE before
> you answer for it?  This reduces the complexity of the protocol
> quite a bit (doesn't need dynamic update which isn't really used
> anyway, removes a normative reference and page 10 can be dropped!)
[Levon Esibov]
No ambiguity regarding the intent of the request is the main benefit of
using dynamic DNS opcode vs regular query. At this point I don't have
the exact scenario when this feature could be useful, but it is possible
that a host doesn't want for some reason to respond to a particular
query (e.g. if it is currently overloaded), but wants to defend its
name...

>
> ---
> [mDNSEnable]   Guttman, E., "DHCP mDNS Enable Option", Internet draft
>                (work in progress), draft-guttman-mdns-enable-01.txt,
>                July 2001.
>
> I need to carry this forward.  Please send feedback on this draft
> so that I can issue a revision.
>
> Erik


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 20 20:45:37 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA26540
	for <dnsext-archive@lists.ietf.org>; Thu, 20 Dec 2001 20:45:37 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HEfD-0000NB-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 17:39:55 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HEfC-0000N5-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 17:39:54 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HEfC-0006Ku-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 17:39:54 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <3C2292BD.DD3A4DF0@ehsco.com>
References: <4AEE3169443CDD4796CA8A00B02191CD0336D608@win-msg-01.wingroup.windeploy.ntdev.microsoft.com>
Date: Thu, 20 Dec 2001 19:39:09 -0600
From: "Eric A. Hall" <ehall@ehsco.com>
To: Levon Esibov <levone@windows.microsoft.com>
CC: Erik Guttman <erik.guttman@sun.com>, aboba@internaut.com,
        cheshire@apple.com, Dave Thaler <DTHALER@windows.microsoft.com>,
        sra@hactrn.net, namedroppers@ops.ietf.org
Subject: Re: mdns-08 draft
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Levon Esibov wrote:
> I agree that having different name may prevent unnecessary confusion.
> How about the following name:
> 
> "Local Server-less DNS (LSLDNS)"

The "local server-less" name would conflict at least conceptually with
other extensions to DNS which used remote servers. Perhaps the best
terminology would be something precise such as "Zeroconf Extensions to
DNS" or "Link-Local DNS"

I hate writing titles too

-- 
Eric A. Hall                                        http://www.ehsco.com/
Internet Core Protocols          http://www.oreilly.com/catalog/coreprot/


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 21 01:27:16 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA03321
	for <dnsext-archive@lists.ietf.org>; Fri, 21 Dec 2001 01:27:16 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HIx7-0005an-00
	for namedroppers-data@psg.com; Thu, 20 Dec 2001 22:14:41 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HIx7-0005ah-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 22:14:41 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HIx7-000EMd-00
	for namedroppers@ops.ietf.org; Thu, 20 Dec 2001 22:14:41 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <20011220220807.A18549@pianosa.catch22.org>
References: <Pine.NEB.4.33.0112201452110.3549-100000@woody.zocalo.net> <200112210011.fBL0Bri01185@nic-naa.net>
In-Reply-To: <200112210011.fBL0Bri01185@nic-naa.net>; from brunner@nic-naa.net on Thu, Dec 20, 2001 at 07:11:53PM -0500
Date: Thu, 20 Dec 2001 22:08:07 -0800
From: David Terrell <dbt@meat.net>
To: Eric Brunner-Williams in Portland Maine <brunner@nic-naa.net>
Cc: Bill Woodcock <woody@zocalo.net>, "Eric A. Hall" <ehall@ehsco.com>,
        Erik Guttman <erik.guttman@sun.com>, aboba@internaut.com,
        cheshire@apple.com, levone@microsoft.com, dthaler@microsoft.com,
        sra@hactrn.net, namedroppers@ops.ietf.org
Subject: Re: mdns-08 draft
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Thu, Dec 20, 2001 at 07:11:53PM -0500, Eric Brunner-Williams in Portland Maine wrote:
> uh... mini-multicast dns (in the spirit of dr. evil's evil twin)

p2pmdns?

-- 
David Terrell           |  "Please note that calling an attacker
dbt@meat.net            |  'lame' is not an approved security method."
http://wwn.nebcorp.com/ |    - Benjy Feen


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 21 11:08:48 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA25668
	for <dnsext-archive@lists.ietf.org>; Fri, 21 Dec 2001 11:08:48 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HRxX-000HRI-00
	for namedroppers-data@psg.com; Fri, 21 Dec 2001 07:51:43 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HRxW-000HRC-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 07:51:42 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HRxW-0006Jj-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 07:51:42 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <3CD14E451751BD42BA48AAA50B07BAD6EEFCC8@vsvapostal3.bkup6>
From: "Larson, Matt" <mlarson@verisign.com>
To: namedroppers@ops.ietf.org
Subject: RE: Protection of unsecured delegations 
Date: Fri, 21 Dec 2001 10:11:48 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Hi, Bill.

> I think there needs to be more text on resolver behavior, and, in
> particular, a discussion of resolver search paths.
> 
> I can see resolvers doing any of:
> 
> [a] Do the lookup and only return trusted data.  Not useful to me
> until everyone I care about has opted in..
> 
> [b] If there's trusted data anywhere on the path, return the first
> trusted answer, otherwise return the first non-trusted answer.
> 
> [c] Return the first name along the path for which a query returns
> some data.

Maybe I'm the only one, but I'm sorry, I don't understand your [b] or [c].

For [b], what do you mean "return the first trusted answer" and "first
non-trusted answer"?  I don't understand "first" in this context.

For [c], what do you mean by "first name along the path for which a query
returns some data"?  Do you mean "return the last name of the last secure
zone encountered while descending the name space looking for the quered
name"?  In terms of what's useful to an application and/or stub resolver
(IMHO), a queried <name, type, class> either exists or it doesn't.  If it
exists, it's either signed or it isn't.

Matt


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 21 12:39:07 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA27481
	for <dnsext-archive@lists.ietf.org>; Fri, 21 Dec 2001 12:39:05 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HTU9-000Jad-00
	for namedroppers-data@psg.com; Fri, 21 Dec 2001 09:29:29 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HTU9-000JaX-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 09:29:29 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HTU9-00093p-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 09:29:29 -0800
In-Reply-To: <4AEE3169443CDD4796CA8A00B02191CD0336D609@win-msg-01.wingroup.windeploy.ntdev.microsoft.com>
Message-ID: <Pine.BSF.4.21.0112210844070.46232-100000@internaut.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Date: Fri, 21 Dec 2001 09:14:47 -0800 (PST)
From: Bernard Aboba <aboba@internaut.com>
To: Levon Esibov <levone@windows.microsoft.com>
cc: erik.guttman@sun.com, cheshire@apple.com,
        Dave Thaler <DTHALER@windows.microsoft.com>, sra@hactrn.net,
        namedroppers@ops.ietf.org
Subject: RE: mdns-08 draft
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

> Please change the title of the draft to
> 
>  Link-local Multicast DNS
>  
>  In the future, we may define Multicast DNS to be something grander.

Done. See http://www.drizzle.com/~aboba/draft-ietf-dnsext-mdns-08.txt for
the new version. 

> A host configured to not be a "responder" cannot be a "sender".
>  
> > Why?  This is an arbitrary rule.  I can imagine a very simple client
> > that might not need a responder.  Every feature costs.

How about this? 

"A host configured to not be a responder SHOULD NOT be a "sender". While
hosts configured only as senders can detect name conflicts, they cannot
notify other senders of potential name conflicts for their name. Thus
implementation of both responder and sender functionality is encouraged."


> > ---
> > 
> >   If the multicast query is not positively resolved ("positively
> > resolved"
> >   refers in this document to a response with the RCODE set to 0)
> during
> > a
> >   limited amount of time,
> > 
> > Non-positively resolved multicast queries won't get replies.  This is
> > stated later
> > 
> >   A response to an mDNS query MUST have RCODE set to
> >   zero. mDNS responders may respond only to queries which they can
> > resolve
> >   positively.
> > 
> > So, maybe you just want to say 'If the multicast query is not resolved
> > during
> > a limited amount of time...'

Done. 

> [Levon Esibov] Agree. In this case we should explain what "positively"
> means in the second section that you quote above.

Moved. 

> [Levon Esibov] 
> our intend was not to require client to wait for all possible responses.
> I agree that a decision on whether use the first or some or all of the
> responses should be left up to implementers.
> 
> I thought that having MAY in the text doesn't require one to implement
> it this way. Feel free to propose a clarifying text.

How about this? 

"However, after receiving an initial response, the sender is not required
to wait for LMDNS_TIMEOUT for additional responses."

>>"If... senders on that network are configured with the key for the top
>> zone "local.arpa."...
>
> Why is this still here? Shouldn't the last sentence be removed? 

How about this? 

"The mechanism specified in this draft does not require use of DNSSEC. As
a result, responses to LMDNS queries MAY NOT be authenticated. If
authentication is desired, and a pre-arranged security ocnfiguration is
possible, then IPsec ESP with a null transform MAY be used to authenticate
LMDNS responses. In a small network without a certificate authority, this
can be most easily accomplished through configuration of a group
pre-shared key for trusted hosts."



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 21 14:29:00 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA00213
	for <dnsext-archive@lists.ietf.org>; Fri, 21 Dec 2001 14:28:59 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HV6L-000LXz-00
	for namedroppers-data@psg.com; Fri, 21 Dec 2001 11:13:01 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HV6L-000LXt-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 11:13:01 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HV6K-000Bpr-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 11:13:00 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: Message from "Larson, Matt" <mlarson@verisign.com> 
	of "Fri, 21 Dec 2001 10:11:48 EST."
	<3CD14E451751BD42BA48AAA50B07BAD6EEFCC8@vsvapostal3.bkup6> 
Message-Id: <20011221183405.3462028EF1@as.vix.com>
From: Paul Vixie <paul@vix.com>
To: namedroppers@ops.ietf.org
Subject: Re: Protection of unsecured delegations 
Date: Fri, 21 Dec 2001 10:34:05 -0800
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> > I can see resolvers doing any of:
> > 
> > [a] Do the lookup and only return trusted data.  Not useful to me
> > until everyone I care about has opted in..
> > 
> > [b] If there's trusted data anywhere on the path, return the first
> > trusted answer, otherwise return the first non-trusted answer.
> > 
> > [c] Return the first name along the path for which a query returns
> > some data.
> 
> Maybe I'm the only one, but I'm sorry, I don't understand your [b] or [c].
> 
> For [b], what do you mean "return the first trusted answer" and "first
> non-trusted answer"?  I don't understand "first" in this context.

see the "search" directive of /etc/resolv.conf.

bill's examples are the first i've seen of how common applications will
benefit from dnssec.  counter proposals should look like API specifications.


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 21 18:04:02 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA03584
	for <dnsext-archive@lists.ietf.org>; Fri, 21 Dec 2001 18:04:02 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HYU3-000PKV-00
	for namedroppers-data@psg.com; Fri, 21 Dec 2001 14:49:43 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HYU3-000PKO-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 14:49:43 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HYU2-000Hiw-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 14:49:42 -0800
Message-ID: <3C23B476.EB3663FD@sun.com>
MIME-Version: 1.0
References: <Pine.BSF.4.21.0112210844070.46232-100000@internaut.com>
Date: Fri, 21 Dec 2001 23:15:18 +0100
From: Erik Guttman <erik.guttman@sun.com>
To: Bernard Aboba <aboba@internaut.com>
CC: Levon Esibov <levone@windows.microsoft.com>, cheshire@apple.com,
        Dave Thaler <DTHALER@windows.microsoft.com>, sra@hactrn.net,
        namedroppers@ops.ietf.org, erik.guttman@sun.com
Subject: Re: mdns-08 draft
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

Bernard,

Bernard Aboba wrote:
> > A host configured to not be a "responder" cannot be a "sender".
> >
> > > Why?  This is an arbitrary rule.  I can imagine a very simple client
> > > that might not need a responder.  Every feature costs.
> 
> How about this?
> 
> "A host configured to not be a responder SHOULD NOT be a "sender". While
s/SHOULD NOT/SHOULD

---

> How about this?
> 
> "However, after receiving an initial response, the sender is not required
> to wait for LMDNS_TIMEOUT for additional responses."

I like it.
 
> >>"If... senders on that network are configured with the key for the top
> >> zone "local.arpa."...
> >
> > Why is this still here? Shouldn't the last sentence be removed?
> 
> How about this?
> 
> "The mechanism specified in this draft does not require use of DNSSEC. As
> a result, responses to LMDNS queries MAY NOT be authenticated. If
s/MAY NOT/may not

This text expresses a possibility not a requirement.  It should be
written in lower case.

> authentication is desired, and a pre-arranged security ocnfiguration is
> possible, then IPsec ESP with a null transform MAY be used to authenticate
> LMDNS responses. In a small network without a certificate authority, this
> can be most easily accomplished through configuration of a group
> pre-shared key for trusted hosts."

Groovy.

Erik


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 21 18:06:45 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA03610
	for <dnsext-archive@lists.ietf.org>; Fri, 21 Dec 2001 18:06:44 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HYbo-000PUF-00
	for namedroppers-data@psg.com; Fri, 21 Dec 2001 14:57:44 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HYbo-000PU8-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 14:57:44 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HYbo-000Hwd-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 14:57:44 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <3C23B476.EB3663FD@sun.com>
Message-ID: <Pine.BSF.4.21.0112211442070.46681-100000@internaut.com>
Date: Fri, 21 Dec 2001 14:43:42 -0800 (PST)
From: Bernard Aboba <aboba@internaut.com>
To: Erik Guttman <erik.guttman@sun.com>
cc: Levon Esibov <levone@windows.microsoft.com>, cheshire@apple.com,
        Dave Thaler <DTHALER@windows.microsoft.com>, sra@hactrn.net,
        namedroppers@ops.ietf.org
Subject: Re: mdns-08 draft
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> > How about this?
> > 
> > "A host configured to not be a responder SHOULD NOT be a "sender". While
> s/SHOULD NOT/SHOULD

What are we trying to say here? That senders SHOULD be responders
too? Or that a sender MAY NOT be a responder? 




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 21 18:24:04 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA03846
	for <dnsext-archive@lists.ietf.org>; Fri, 21 Dec 2001 18:24:02 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16HYtK-000Prc-00
	for namedroppers-data@psg.com; Fri, 21 Dec 2001 15:15:50 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16HYtK-000PrW-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 15:15:50 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16HYtK-000IR8-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 15:15:50 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
To: namedroppers <namedroppers@ops.ietf.org>
From: Olafur Gudmundsson <ogud@ogud.com>, Randy Bush <randy@psg.com>
Subject: DS and Opt-in - a proposal
Message-Id: <E16HYtK-000IR8-00@rip.psg.com>
Date: Fri, 21 Dec 2001 15:15:50 -0800
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

This is a request for comments.  Members of the working group who disagree
with these recommendations, please send technical comments on the mailing
list ASAP.  Similarly technical points in support we might have missed
should also be sent to the list.

There has been discussion among interested parties on the issue of DS [0]
and Opt-in [1] adoption in DNS.  A small group has discussed the issues in
on a conference call and has identified following issues:
 o DS and OPT-in both break backwards compatibility with RFC 2535.
 o DS increases protocol complexity but reduces operational effort.
 o OPT-in limits authenticated denial of secured names while at the same
   time potentially saving significant operating costs for large delegating
   zones.
 o Due to key management scaling issues, deploying RFC 2535 without DS will
   severely limit the usability of DNSSEC.
 o The cost of incompatible changes increases steeply with time.  Currently,
   there is minimal deployment of RFC 2535 signed zones, so there is minimal
   use of secure revolvers, so the impact is lowest now.
 o Delegations in DNS have problems when it comes to securing, NS set is on
   both sides and child signs.
 o The value of authenticated denial is not clear, for some it is important,
   for others it is only a nice but sometimes expensive property.

The discussion concluded that the deployment of DS was critical, and worried
that a decision not to adopt Opt-in could pose problems in deployment.  Thus
we propose the following:
 o DS and Opt-in proposals both be adopted and
 o RFC 2535 backwards compatibility NOT be retained. (flag day!)
	
In parallel to getting slightly revised OPT-in and DS documents published as
Proposed Standards, the following activities should take place:
 o Implementation(s) of name servers and revolver(s) that support DS and
   Opt-in must be made available as soon as possible.
 o The rewrite of RFC 2535 should be resumed and completed no later than
   June 2002.

Time-line 
  - Opt-in and DS go for WG last call February 1
  - Opt-in and DS go for IETF last call February 15
  - RFC 2535bis-00 draft March 1
  - RFC 2535bis-xx WG last call March 15

List of people participating in the discussion group 
  Roy Arends
  Steve Bellovin (regrets)
  Randy Bush
  Olafur Gudmundsson
  Edward Lewis
  Mark Kosters
  Paul Vixie
  Brian Wellington

This beings a two week last call on this proposal, to end 2002.01.01.

Thanks,
  Olafur Gudmundsson and Randy Bush
  dnsext co-chairs

---

[0] - draft-ietf-dnsext-delegation-signer-04.txt
[1] - draft-ietf-dnsext-dnssec-opt-in-01.txt

to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sat Dec 22 00:38:09 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA10106
	for <dnsext-archive@lists.ietf.org>; Sat, 22 Dec 2001 00:38:09 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16Heji-0003TE-00
	for namedroppers-data@psg.com; Fri, 21 Dec 2001 21:30:18 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16Heji-0003T8-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 21:30:18 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16Heji-00031O-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 21:30:18 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <70270000.1008998881@askvoll.hjemme.alvestrand.no>
In-Reply-To: <4AEE3169443CDD4796CA8A00B02191CD0336D608@win-msg-01.wingroup.windeploy.ntdev.microsoft.com>
References:  <4AEE3169443CDD4796CA8A00B02191CD0336D608@win-msg-01.wingroup.wi
 ndeploy.ntdev.microsoft.com>
Date: Sat, 22 Dec 2001 06:28:04 +0100
From: Harald Alvestrand <harald@alvestrand.no>
Cc: namedroppers@ops.ietf.org
Subject: RE: mdns-08 draft
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

--On torsdag, desember 20, 2001 17:00:27 -0800 Levon Esibov <levone@windows.microsoft.com> wrote:

> I agree that having different name may prevent unnecessary confusion.
> How about the following name:
>
> "Local Server-less DNS (LSLDNS)"

since baby-naming is a game for the whole family :-)
what about

  Link-Local Name Resolution (LLNR)

as a name?
after all, we COULD name the function, not the package format...



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sat Dec 22 00:38:13 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA10117
	for <dnsext-archive@lists.ietf.org>; Sat, 22 Dec 2001 00:38:13 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16Heax-0003Jl-00
	for namedroppers-data@psg.com; Fri, 21 Dec 2001 21:21:15 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16Heaw-0003Jf-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 21:21:14 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16Heav-0002S6-00
	for namedroppers@ops.ietf.org; Fri, 21 Dec 2001 21:21:13 -0800
Message-Id: <5.1.0.14.2.20011221224450.029b31a0@localhost>
In-Reply-To: <E16HYtK-000IR8-00@rip.psg.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Date: Fri, 21 Dec 2001 22:46:22 -0500
To: namedroppers <namedroppers@ops.ietf.org>
From: =?iso-8859-1?Q?=D3lafur?= Gudmundsson/DNSEXT co-chair <ogud@ogud.com>
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

At 06:15 PM 12/21/2001, Olafur Gudmundsson , Randy Bush <randy@psg.com> wrote:
>This is a request for comments.  Members of the working group who disagree
>with these recommendations, please send technical comments on the mailing
>list ASAP.  Similarly technical points in support we might have missed
>should also be sent to the list.
>
>This beings a two week last call on this proposal, to end 2002.01.01.

Before anyone jumps up and down this the date is 2002/Jan/07

         Olafur



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sat Dec 22 08:38:21 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA29152
	for <dnsext-archive@lists.ietf.org>; Sat, 22 Dec 2001 08:38:20 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16Hm56-0009Tg-00
	for namedroppers-data@psg.com; Sat, 22 Dec 2001 05:20:52 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16Hm56-0009Ta-00
	for namedroppers@ops.ietf.org; Sat, 22 Dec 2001 05:20:52 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16Hm56-000N57-00
	for namedroppers@ops.ietf.org; Sat, 22 Dec 2001 05:20:52 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <70270000.1008998881@askvoll.hjemme.alvestrand.no>
Message-ID: <Pine.NEB.4.33.0112220116360.6314-100000@woody.zocalo.net>
Date: Sat, 22 Dec 2001 01:16:51 -0800 (PST)
From: Bill Woodcock <woody@zocalo.net>
To: Harald Alvestrand <harald@alvestrand.no>
cc: <namedroppers@ops.ietf.org>
Subject: RE: mdns-08 draft
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

    > what about
    >
    >   Link-Local Name Resolution (LLNR)
    >
    > as a name?
    > after all, we COULD name the function, not the package format...

_Much_ better.

                                -Bill




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Thu Dec 27 11:55:47 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA18393
	for <dnsext-archive@lists.ietf.org>; Thu, 27 Dec 2001 11:55:45 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16JdSB-000AcN-00
	for namedroppers-data@psg.com; Thu, 27 Dec 2001 08:32:23 -0800
Received: from roam.psg.com ([147.28.4.2])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16JdSA-000AcG-00
	for namedroppers@ops.ietf.org; Thu, 27 Dec 2001 08:32:23 -0800
Received: from randy by roam.psg.com with local (Exim 3.33 #1)
	id 16JdS3-00034c-00
	for namedroppers@ops.ietf.org; Thu, 27 Dec 2001 08:32:15 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20011227101446.284405ec.olaf@ripe.net>
In-Reply-To: <E16HYtK-000IR8-00@rip.psg.com>
References: <E16HYtK-000IR8-00@rip.psg.com>
Date: Thu, 27 Dec 2001 10:14:46 +0100
From: "Olaf M. Kolkman" <olaf@ripe.net>
To: namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Fri, 21 Dec 2001 15:15:50 -0800
Olafur Gudmundsson <ogud@ogud.com>, Randy Bush <randy@psg.com> wrote:

One detail.
 
>  o The value of authenticated denial is not clear, for some it is important,
>    for others it is only a nice but sometimes expensive property.

I would like to know if there will be a new version of the OPT-in
draft that allows opt-in only over delegation records? ( I am still
afraid that 'security status' on a level more granular than zone level
will make troubleshooting of verifiers a difficult exercise. Reducing
the usability of OPT-in to delegations only might help to keep
deployment limited to only the largest (g|c)TLDs. I understood
'delegation only' was considdered for a new version of the draft.)

--Olaf

P.S. I love the idea to have DNSSEC in a workable state by summer.


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 03:18:26 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA06157
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 03:18:26 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16Jrsj-000NAd-00
	for namedroppers-data@psg.com; Thu, 27 Dec 2001 23:56:45 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16Jrsj-000NAX-00
	for namedroppers@ops.ietf.org; Thu, 27 Dec 2001 23:56:45 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16Jrsj-000Nvb-00
	for namedroppers@ops.ietf.org; Thu, 27 Dec 2001 23:56:45 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <20011227101446.284405ec.olaf@ripe.net>
Message-ID: <Pine.LNX.4.33.0112272222050.17797-100000@spratly.nominum.com>
Date: Thu, 27 Dec 2001 22:25:59 -0800 (PST)
From: Brian Wellington <bwelling@xbill.org>
To: "Olaf M. Kolkman" <olaf@ripe.net>
cc: <namedroppers@ops.ietf.org>
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Thu, 27 Dec 2001, Olaf M. Kolkman wrote:

> On Fri, 21 Dec 2001 15:15:50 -0800
> Olafur Gudmundsson <ogud@ogud.com>, Randy Bush <randy@psg.com> wrote:
> 
> One detail.
>  
> >  o The value of authenticated denial is not clear, for some it is important,
> >    for others it is only a nice but sometimes expensive property.
> 
> I would like to know if there will be a new version of the OPT-in
> draft that allows opt-in only over delegation records? ( I am still
> afraid that 'security status' on a level more granular than zone level
> will make troubleshooting of verifiers a difficult exercise. Reducing
> the usability of OPT-in to delegations only might help to keep
> deployment limited to only the largest (g|c)TLDs. I understood
> 'delegation only' was considdered for a new version of the draft.)

This was suggested on the conference call, but was not generally agreed
upon.  One reasons is that it makes verifiers more complicated, since they
not only need to verify the NXT records, but then additionally verify that
the record is a delegation (granted, this is not too hard).  Also, the
restriction of opt-in to large delegating zones can be seen as a
disadvantage.

If the goal is to restrict the use of opt-in, this would do it, but I
don't know if that's the goal.

Brian



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 03:58:20 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA06478
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 03:58:18 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16JsYc-000O1h-00
	for namedroppers-data@psg.com; Fri, 28 Dec 2001 00:40:02 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16JsYc-000O1a-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 00:40:02 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16JsYc-000Ph6-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 00:40:02 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20011228093335.300b78f3.olaf@ripe.net>
In-Reply-To: <Pine.LNX.4.33.0112272222050.17797-100000@spratly.nominum.com>
References: <20011227101446.284405ec.olaf@ripe.net>
	<Pine.LNX.4.33.0112272222050.17797-100000@spratly.nominum.com>
Date: Fri, 28 Dec 2001 09:33:35 +0100
From: "Olaf M. Kolkman" <olaf@ripe.net>
To: namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Thu, 27 Dec 2001 22:25:59 -0800 (PST)
Brian Wellington <bwelling@xbill.org> wrote:

> If the goal is to restrict the use of opt-in, this would do it, but I
> don't know if that's the goal.

I am for restricting the use of opt-in; if we allow the use of OPT-IN in
end nodes of the DNS tree I fear that DNSSEC has lost is usefulness for
protecting the DNS infrastructure. 

The reason is that securing the DNS as a whole is IMHO the whole
purpose of the game. If we allow administrators to sign only a few RRs
in a zone (which we do with non restricted OPT-IN) then we might end
up in a situation where only the records that might be useful in a PKI
context are signed.

If we want to secure the DNS then security should not be optional on
RR level because then the path of least resistance will be chosen and
we end up with only a few RRs signed in each zone.


Second argument is, again, from the view of the resolver
administrator. Who would set up a verifying cache if the cost of
trouble shooting is to high. Troubleshooting costs would be high if
authenticated denial of existence is lost at end node zones. Mind you
that the first use of DNSSEC would be securing large caches. (That is
one of of our major goals within the DISI project, getting zones
secured and getting ISPs to verify them).

I realize these are not a purely technical argument but zone and
resolver operators are humans. Humans tend to tale the path of least
resistance. 

As you know I am not pro OPT-IN but I understand it's need. As argued
long ago I think that OPT-IN should be used only in a few (g|t)LD
zones and as a transition mechanism, any other use would not help
securing the DNS. Designing the protocol in such a way that it can
only be used for delegating zones and as a transition mechanism is I
thing a Good Thing (TM).


Pheww... Happy  new year all.

--Olaf









--Olaf


---------------------------------------------------------------------
  Olaf M. Kolkman      |  RIPE NCC DISI Project     
     -----------       |      ---------------	     ----------------
  RIPE NCC             |  Phone:   +31 20 535 4444   | 
  Singel 258           |  Fax:     +31 20 535 4445   | 
  1016 AB Amsterdam    |  http://www.ripe.net/disi   | 
  The Netherlands      |  OKolkman@ripe.net          | 


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 04:27:10 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA06158
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 03:18:26 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16JrtA-000NAu-00
	for namedroppers-data@psg.com; Thu, 27 Dec 2001 23:57:12 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16Jrt9-000NAo-00
	for namedroppers@ops.ietf.org; Thu, 27 Dec 2001 23:57:11 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16Jrt9-000NwN-00
	for namedroppers@ops.ietf.org; Thu, 27 Dec 2001 23:57:11 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <20011228075044.B22180@outpost.ds9a.nl>
References: <E16HYtK-000IR8-00@rip.psg.com> <20011227101446.284405ec.olaf@ripe.net>
In-Reply-To: <20011227101446.284405ec.olaf@ripe.net>; from olaf@ripe.net on Thu, Dec 27, 2001 at 10:14:46AM +0100
Date: Fri, 28 Dec 2001 07:50:44 +0100
From: bert hubert <ahu@ds9a.nl>
To: "Olaf M. Kolkman" <olaf@ripe.net>
Cc: namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Thu, Dec 27, 2001 at 10:14:46AM +0100, Olaf M. Kolkman wrote:

> deployment limited to only the largest (g|c)TLDs. I understood
> 'delegation only' was considdered for a new version of the draft.)
> 
> --Olaf
> 
> P.S. I love the idea to have DNSSEC in a workable state by summer.

I seem to keep hammering this point - have clientside people been involved
yet? The vast majority of DNS lookups right now are A queries, and most of
those come from the browser.

So far the admirable enthousiasm for DNSSEC has come from specs writers but
before finalizing, it is absolutely vital to get the browser people
involved. DNSSEC is going nowhere if they aren't going to use it! And they
may not use it if DNSSEC is unable to offer semantics that their users are
going to be interested in.

Getting Mozilla involved ought to be easy.

Regards,

bert

-- 
http://www.PowerDNS.com          Versatile DNS Software & Services
http://www.tk                              the dot in .tk
Netherlabs BV / Rent-a-Nerd.nl           - Nerd Available -
Linux Advanced Routing & Traffic Control: http://ds9a.nl/lartc


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 12:07:32 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09665
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 12:07:32 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16K06i-0003an-00
	for namedroppers-data@psg.com; Fri, 28 Dec 2001 08:43:44 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16K06h-0003ah-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 08:43:43 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16K06h-000C0Y-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 08:43:43 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <20011227101446.284405ec.olaf@ripe.net>
Message-ID: <20011228111431.V13525-100000@node10c4d.a2000.nl>
Date: Fri, 28 Dec 2001 12:06:10 +0100 (CET)
From: Roy Arends <Roy.Arends@nominum.com>
To: "Olaf M. Kolkman" <olaf@ripe.net>
Cc: <namedroppers@ops.ietf.org>
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Thu, 27 Dec 2001, Olaf M. Kolkman wrote:

> On Fri, 21 Dec 2001 15:15:50 -0800
> Olafur Gudmundsson <ogud@ogud.com>, Randy Bush <randy@psg.com> wrote:
>
> One detail.
>
> >  o The value of authenticated denial is not clear, for some it is important,
> >    for others it is only a nice but sometimes expensive property.
>
> I would like to know if there will be a new version of the OPT-in
> draft that allows opt-in only over delegation records? ( I am still
> afraid that 'security status' on a level more granular than zone level
> will make troubleshooting of verifiers a difficult exercise. Reducing
> the usability of OPT-in to delegations only might help to keep
> deployment limited to only the largest (g|c)TLDs. I understood
> 'delegation only' was considdered for a new version of the draft.)

We are not talking about authenticated [denial of] existence in general,
only about authenticated [denial of] existence of unsecured names.

Imagine going into a tourist office (.city), the only authoritative
place in town to get the authenticatable, verifiable information from.

I ask for the address of "hall.city".

The "hall.city" delegation is not secured.

The clerk is going to tell me "it exist".......

That's not really helpful now, is it. I can't go anywhere else to look it
up (it's the only authoritative place in town) and I'm left with a
statement that "hall.city exists"

(I knew it existed, that's why I came in that office for the address in
the first place)

I call that "false sense of security".

Oh, and "we" are not giving anything up, "we" give a choice to the
domain holder.

Roy



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 12:07:35 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09683
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 12:07:33 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16K07c-0003bx-00
	for namedroppers-data@psg.com; Fri, 28 Dec 2001 08:44:40 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16K07c-0003br-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 08:44:40 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16K07c-000C29-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 08:44:40 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <20011228115746.080acab6.olaf@ripe.net>
Message-ID: <20011228121117.H13525-100000@node10c4d.a2000.nl>
Date: Fri, 28 Dec 2001 12:59:23 +0100 (CET)
From: Roy Arends <Roy.Arends@nominum.com>
To: "Olaf M. Kolkman" <olaf@ripe.net>
Cc: Roy Arends <Roy.Arends@nominum.com>, <namedroppers@ops.ietf.org>
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Fri, 28 Dec 2001, Olaf M. Kolkman wrote:

> On Fri, 28 Dec 2001 11:14:01 +0100 (CET)
> Roy Arends <Roy.Arends@nominum.com> wrote:
>
> >
> > Restricting the use would be possible, but is, in reality, useless. If I
> > could not leave a single name (end node) unsigned, I might delegate it
> > away as an unsigned zone.
> >
>
> That is indeed possible, just as it is possible in RFC 2535. But, it
> is clear what the status of the delegated zone is. All records are
> verifiable unsecure.

That status is also very clear with opt-in. It signals unambiguously if a
record is signed or not.

> If we want to secure the infrastructure we should build a protocol
> that goes for maximum effect. My argument is that OPT-IN in
> non-delegating zones will help in building a PKI but not secure the
> infrastructure.

Only signing records will help to secure the infrastructure, regardless of
Opt-in or 2535.

> Administrators of large caches will not turn verification on if only a
> few records in a few zones are signed;  It is to expensive to
> troubleshoot and there is little to gain.  I think we are far from
> having the applications or their host os-es doing their own
> verification, so if administrators do not turn their caches into
> verifying caches then DNSSEC has failed to secure the infrastructure.

I hear so many stories about the future of DNSSEC, I'll refrain from
making statements. I'm not worried though.

> The other interest group, users that want to use the DNS as a PKI, will
> not suffer from OPT-IN.

Okay.

> I can live with OPT-IN if it is designed to be a transition mechanism
> for g|tLDs. If it is designed to be used throughout the whole tree
> DNSSEC will loose.

I'm afraid that it is very difficult (if not impossible) to restrict the
domain holder like that.

Restricting opt-in to delegations only is merely a psychological
restriction. The domain holder can legally "route" around that restriction
easily.

Roy



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 12:07:38 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09703
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 12:07:38 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16K06A-0003Zr-00
	for namedroppers-data@psg.com; Fri, 28 Dec 2001 08:43:10 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16K06A-0003Zl-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 08:43:10 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16K06A-000BzV-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 08:43:10 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20011228115746.080acab6.olaf@ripe.net>
In-Reply-To: <20011228111127.D13525-100000@node10c4d.a2000.nl>
References: <20011228093335.300b78f3.olaf@ripe.net>
	<20011228111127.D13525-100000@node10c4d.a2000.nl>
Date: Fri, 28 Dec 2001 11:57:46 +0100
From: "Olaf M. Kolkman" <olaf@ripe.net>
To: Roy Arends <Roy.Arends@nominum.com>
Cc: namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Fri, 28 Dec 2001 11:14:01 +0100 (CET)
Roy Arends <Roy.Arends@nominum.com> wrote:

> 
> Restricting the use would be possible, but is, in reality, useless. If I
> could not leave a single name (end node) unsigned, I might delegate it
> away as an unsigned zone.
> 

That is indeed possible, just as it is possible in RFC 2535. But, it
is clear what the status of the delegated zone is. All records are
verifiable unsecure. 

If we want to secure the infrastructure we should build a protocol
that goes for maximum effect. My argument is that OPT-IN in
non-delegating zones will help in building a PKI but not secure the
infrastructure.

Administrators of large caches will not turn verification on if only a
few records in a few zones are signed; It is to expensive to
troubleshoot and there is little to gain.  I think we are far from
having the applications or their host os-es doing their own
verification, so if administrators do not turn their caches into
verifying caches then DNSSEC has failed to secure the infrastructure.

The other interest group, users that want to use the DNS as a PKI, will
not suffer from OPT-IN. The verification will be done by the specially
designed applications. They are not interested in fully signed zones,
they just want to get to that one RR and need to verify it.

I can live with OPT-IN if it is designed to be a transition mechanism
for g|tLDs. If it is designed to be used throughout the whole tree
DNSSEC will loose. 


--Olaf



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 12:09:19 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09741
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 12:09:19 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16K09T-0003dn-00
	for namedroppers-data@psg.com; Fri, 28 Dec 2001 08:46:35 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16K09T-0003dh-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 08:46:35 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16K09T-000C5G-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 08:46:35 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <20011228075044.B22180@outpost.ds9a.nl>
References: <E16HYtK-000IR8-00@rip.psg.com>
	<20011227101446.284405ec.olaf@ripe.net> 
	<20011228075044.B22180@outpost.ds9a.nl>
Message-Id: <1009549526.18055.18.camel@egyptian-gods.mit.edu>
Subject: Re: DS and Opt-in - a proposal
From: Greg Hudson <ghudson@mit.edu>
To: bert hubert <ahu@ds9a.nl>
Cc: namedroppers@ops.ietf.org
Date: 28 Dec 2001 09:25:26 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Fri, 2001-12-28 at 01:50, bert hubert wrote:
> I seem to keep hammering this point - have clientside people been involved
> yet? The vast majority of DNS lookups right now are A queries, and most of
> those come from the browser.

In the Unix world, at least, the applications shouldn't have to get
involved, just the recursive resolver (named, traditionally) and to some
extent the stub resolver in libc.  The application may be interested in
knowing whether a DNS record was signed, but even if it doesn't care, a
signed record can't be subverted by DNS spoofing.

I don't know enough about the non-Unix world (which, admittedly, is
where most of the users are) to comment on it.



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 12:23:27 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA10009
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 12:23:27 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16K0Vc-00042n-00
	for namedroppers-data@psg.com; Fri, 28 Dec 2001 09:09:28 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16K0Vb-00042h-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 09:09:27 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16K0Vb-000Cgf-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 09:09:27 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: Message from "Olaf M. Kolkman" <olaf@ripe.net> 
	of "Fri, 28 Dec 2001 09:33:35 +0100."
	<20011228093335.300b78f3.olaf@ripe.net> 
Message-Id: <20011228170902.BC73528EE9@as.vix.com>
From: Paul Vixie <paul@vix.com>
To: namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal 
Date: Fri, 28 Dec 2001 09:09:02 -0800
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> From: "Olaf M. Kolkman" <olaf@ripe.net>
> ...
> The reason is that securing the DNS as a whole is IMHO the whole
> purpose of the game. If we allow administrators to sign only a few RRs
> in a zone (which we do with non restricted OPT-IN) then we might end
> up in a situation where only the records that might be useful in a PKI
> context are signed.
> 
> If we want to secure the DNS then security should not be optional on
> RR level because then the path of least resistance will be chosen and
> we end up with only a few RRs signed in each zone.
> ...

>From a zone administrator's point of view, given the tools I know exist
today and which I expect will be created within the first few years, it
is _vastly_ less resistive to sign the whole zone than to sign just parts
of it related to PKI.

I agree with your goals.  Let's secure the infrastructure.  However, the
way the bits are falling out is that restricting opt-in to delegations 
would *add* complexity, and only for administrative/nontechnical reasons.
Even though DNSSEC doesn't demonstrate much in the way of good protocol
design, there remains a principle of good protocol design to "put in only
what you need."  Your proposal would be an addition, and it isn't needed
since zone administrators *can* secure the whole infrastructure without it.


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 12:56:10 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA10281
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 12:56:10 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16K17D-0004lz-00
	for namedroppers-data@psg.com; Fri, 28 Dec 2001 09:48:19 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16K17D-0004lt-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 09:48:19 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16K17D-000Dmh-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 09:48:19 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
References: <20011228115746.080acab6.olaf@ripe.net>
	<20011228121117.H13525-100000@node10c4d.a2000.nl>
Message-Id: <E16K16j-000Dli-00@rip.psg.com>
From: Randy Bush <randy@psg.com>
To: Roy Arends <Roy.Arends@nominum.com>
Cc: namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal
Date: Fri, 28 Dec 2001 09:47:49 -0800
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

>> I can live with OPT-IN if it is designed to be a transition mechanism
>> for g|tLDs. If it is designed to be used throughout the whole tree
>> DNSSEC will loose.
> I'm afraid that it is very difficult (if not impossible) to restrict the
> domain holder like that.

yup.  create a feature and 95% of the uses of it will be unnecessary and
stoopid.  so only create features when they're *really* needed and well-
scoped.  though i am still personally a bit uncomfortable with opt-in for
reasons related to this, the likely harm of unneeded uses seems low, and
the verisign gang whine soooo pathetically :-).

randy


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 12:59:37 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09685
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 12:07:34 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16K059-0003Z9-00
	for namedroppers-data@psg.com; Fri, 28 Dec 2001 08:42:07 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16K059-0003Z3-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 08:42:07 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16K058-000Bxk-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 08:42:06 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <20011228093335.300b78f3.olaf@ripe.net>
Message-ID: <20011228111127.D13525-100000@node10c4d.a2000.nl>
Date: Fri, 28 Dec 2001 11:14:01 +0100 (CET)
From: Roy Arends <Roy.Arends@nominum.com>
To: "Olaf M. Kolkman" <olaf@ripe.net>
Cc: <namedroppers@ops.ietf.org>
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Fri, 28 Dec 2001, Olaf M. Kolkman wrote:

> On Thu, 27 Dec 2001 22:25:59 -0800 (PST)
> Brian Wellington <bwelling@xbill.org> wrote:
>
> > If the goal is to restrict the use of opt-in, this would do it, but I
> > don't know if that's the goal.
>
> I am for restricting the use of opt-in; if we allow the use of OPT-IN in
> end nodes of the DNS tree I fear that DNSSEC has lost is usefulness for
> protecting the DNS infrastructure.

Restricting the use would be possible, but is, in reality, useless. If I
could not leave a single name (end node) unsigned, I might delegate it
away as an unsigned zone.

Roy



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 14:05:01 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA10794
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 14:05:01 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16K27e-0005gQ-00
	for namedroppers-data@psg.com; Fri, 28 Dec 2001 10:52:50 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16K27d-0005gK-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 10:52:49 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16K27d-000FXP-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 10:52:49 -0800
Message-ID: <20011228185152.GA6144@research.netsol.com>
References: <20011227101446.284405ec.olaf@ripe.net> <20011228111431.V13525-100000@node10c4d.a2000.nl>
Mime-Version: 1.0
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature";
	micalg=sha1; boundary="wac7ysb48OaltWcw"
Content-Disposition: inline
In-Reply-To: <20011228111431.V13525-100000@node10c4d.a2000.nl>
Date: Fri, 28 Dec 2001 13:51:52 -0500
From: Mike Schiraldi <raldi@research.netsol.com>
Cc: namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk


--wac7ysb48OaltWcw
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

> That's not really helpful now, is it. I can't go anywhere else to look it
> up (it's the only authoritative place in town) and I'm left with a
> statement that "hall.city exists"

To put it another way, in an opt-in zone, a middleman can take a domain name
that does not exist and make it appear that an unsecure domain exists at
that name.

This is not considered a big deal at the TLD level, because even under RFC
2535, a middleman could do that with the following four steps:

1. Go to www.nsi.com
2. Type the nonexistant domain into the textbox and press enter
3. Pay $35
4. Point your new unsecure domain anywhere you'd like

However, this is a concern at other levels. For example, if ibm.com was
opt-in, a middleman could make it look like an unsecure delegation called
corporate.ibm.com existed and thereby make it look like his computers were
part of IBM's network. But that's the security tradeoff you make when your
zone is opt-in.

I think that end user zones SHOULD NOT be opt-in, but whether they MUST NOT
be is up for debate. Which is less of a headache? So far, i'm not sure.


--=20
Mike Schiraldi
VeriSign Applied Research

--wac7ysb48OaltWcw
Content-Type: application/x-pkcs7-signature
Content-Disposition: attachment; filename="smime.p7s"
Content-Transfer-Encoding: base64
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--wac7ysb48OaltWcw--


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Fri Dec 28 19:08:49 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA12932
	for <dnsext-archive@lists.ietf.org>; Fri, 28 Dec 2001 19:08:48 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16K6qu-0009qh-00
	for namedroppers-data@psg.com; Fri, 28 Dec 2001 15:55:52 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16K6qu-0009qb-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 15:55:52 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16K6qu-000Ndv-00
	for namedroppers@ops.ietf.org; Fri, 28 Dec 2001 15:55:52 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112272350.fBRNo7M06768@syn.hamachi.org>
In-Reply-To: Message from "Larson, Matt" <mlarson@verisign.com> 
   of "Thu, 20 Dec 2001 16:04:02 EST." <3CD14E451751BD42BA48AAA50B07BAD6EEFCBE@vsvapostal3.bkup6> 
From: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
To: "Larson, Matt" <mlarson@verisign.com>
Cc: "'Bill Sommerfeld'" <sommerfeld@orchard.arlington.ma.us>,
        namedroppers@ops.ietf.org
Subject: Re: Protection of unsecured delegations 
Date: Thu, 27 Dec 2001 18:50:07 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> Maybe I'm the only one, but I'm sorry, I don't understand your [b] or [c].
> 
> For [b], what do you mean "return the first trusted answer" and "first
> non-trusted answer"?  I don't understand "first" in this context.

"What Paul Vixie said" 

Most resolvers can be configured with a search path of domains to try
for unqualified names in some order.. i.e., at work I have something
along the lines of:

search east.sun.com sun.com

in my resolv.conf file.  

					- Bill


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sat Dec 29 10:39:32 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA28048
	for <dnsext-archive@lists.ietf.org>; Sat, 29 Dec 2001 10:39:30 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16KLFJ-000MK0-00
	for namedroppers-data@psg.com; Sat, 29 Dec 2001 07:18:01 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16KLFJ-000MJu-00
	for namedroppers@ops.ietf.org; Sat, 29 Dec 2001 07:18:01 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16KLFJ-000MgA-00
	for namedroppers@ops.ietf.org; Sat, 29 Dec 2001 07:18:01 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <20011229084531.A12666@outpost.ds9a.nl>
References: <E16HYtK-000IR8-00@rip.psg.com> <20011227101446.284405ec.olaf@ripe.net> <20011228075044.B22180@outpost.ds9a.nl> <1009549526.18055.18.camel@egyptian-gods.mit.edu>
In-Reply-To: <1009549526.18055.18.camel@egyptian-gods.mit.edu>; from ghudson@mit.edu on Fri, Dec 28, 2001 at 09:25:26AM -0500
Date: Sat, 29 Dec 2001 08:45:31 +0100
From: bert hubert <ahu@ds9a.nl>
To: Greg Hudson <ghudson@mit.edu>
Cc: namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Fri, Dec 28, 2001 at 09:25:26AM -0500, Greg Hudson wrote:
> On Fri, 2001-12-28 at 01:50, bert hubert wrote:
> > I seem to keep hammering this point - have clientside people been involved
> > yet? The vast majority of DNS lookups right now are A queries, and most of
> > those come from the browser.
> 
> In the Unix world, at least, the applications shouldn't have to get
> involved, just the recursive resolver (named, traditionally) and to some
> extent the stub resolver in libc.  The application may be interested in

You must live in a parallel universe from mine. The application developer
has needs. If DNSSEC is unable to meet, or worse, not interested in those
needs, s/he will ignore it. It is not a unix question.

> I don't know enough about the non-Unix world (which, admittedly, is
> where most of the users are) to comment on it.

There is no difference. Right now DNSSEC is purely academic with some
laboratory experiments. Some fairy may come along and suddenly make all user
applications DNSSEC aware, but don't count on it. It's not that you write
the RFC and suddenly people start implementing it.

Just saying 'it is transparent from an applications' point of view' does not
cut it. 

Interesting to note is that I'm told that IE has its own resolver, separate
from the regular windows one.

Regards,

bert

-- 
http://www.PowerDNS.com          Versatile DNS Software & Services
http://www.tk                              the dot in .tk
Netherlabs BV / Rent-a-Nerd.nl           - Nerd Available -
Linux Advanced Routing & Traffic Control: http://ds9a.nl/lartc


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sat Dec 29 14:33:54 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA29652
	for <dnsext-archive@lists.ietf.org>; Sat, 29 Dec 2001 14:33:54 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16KP0f-000Onh-00
	for namedroppers-data@psg.com; Sat, 29 Dec 2001 11:19:09 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16KP0f-000Onb-00
	for namedroppers@ops.ietf.org; Sat, 29 Dec 2001 11:19:09 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16KP0f-0002yt-00
	for namedroppers@ops.ietf.org; Sat, 29 Dec 2001 11:19:09 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200112291913.fBTJDXi33137@bartok.sidn.nl>
In-reply-to: Your message of Fri, 28 Dec 2001 09:47:49 -0800.
             <E16K16j-000Dli-00@rip.psg.com> 
To: Randy Bush <randy@psg.com>
cc: Roy Arends <Roy.Arends@nominum.com>, namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal 
Date: Sat, 29 Dec 2001 20:13:33 +0100
From: Jaap Akkerhuis <jaap@sidn.nl>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

Folks,

    though i am still personally a bit uncomfortable with opt-in for
    reasons related to this, the likely harm of unneeded uses seems low, and
    the verisign gang whine soooo pathetically :-).

What me personally disturbs about this discussion is that there is
so little technical or operational content in the whining. Apart
from the somewhat dogmatic statement ``my XX-million customers will
complain'', I have been told that ``Yes, we can sign but the current
technology cannot provide the footprint we need to service a secure
com. zone''. (Statements like these were made in Salt Lake City).
Up to now, I haven't seeen any numbers supporting this statement.

I would really like to see some numbers, hard facts or at least
some data to support why an opt-in is needed.

	jaap

PS. Why do I want to see this? About two years ago (around that
	time anyway) arguments were floating around that it would
	be impossible to do DNSSEC because signing big zones was
	close to be impossible.  These arguments turned about to
	be hearsay.  Yes, signing big zones is hard but doable.

	Now convince me that an opt-in DNSSEC solution is really 
	needed.


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sat Dec 29 15:06:54 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA29931
	for <dnsext-archive@lists.ietf.org>; Sat, 29 Dec 2001 15:06:54 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16KPd2-000PAo-00
	for namedroppers-data@psg.com; Sat, 29 Dec 2001 11:58:48 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16KPd1-000PAi-00
	for namedroppers@ops.ietf.org; Sat, 29 Dec 2001 11:58:47 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16KPd1-00043K-00
	for namedroppers@ops.ietf.org; Sat, 29 Dec 2001 11:58:47 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
References: <E16K16j-000Dli-00@rip.psg.com>
	<200112291913.fBTJDXi33137@bartok.sidn.nl>
Message-Id: <E16KPck-00042W-00@rip.psg.com>
From: Randy Bush <randy@psg.com>
To: Jaap Akkerhuis <jaap@sidn.nl>
Cc: namedroppers <namedroppers@ops.ietf.org>
Subject: Re: DS and Opt-in - a proposal 
Date: Sat, 29 Dec 2001 11:58:30 -0800
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> I would really like to see some numbers, hard facts or at least
> some data to support why an opt-in is needed.

we certainly have enough hacks on this beast already.

randy


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sun Dec 30 01:15:39 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA05642
	for <dnsext-archive@lists.ietf.org>; Sun, 30 Dec 2001 01:15:37 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16KZ15-0004Gb-00
	for namedroppers-data@psg.com; Sat, 29 Dec 2001 22:00:15 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16KZ14-0004GV-00
	for namedroppers@ops.ietf.org; Sat, 29 Dec 2001 22:00:14 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16KZ14-000JlU-00
	for namedroppers@ops.ietf.org; Sat, 29 Dec 2001 22:00:14 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <20011229084531.A12666@outpost.ds9a.nl>
References: <E16HYtK-000IR8-00@rip.psg.com>
	<20011227101446.284405ec.olaf@ripe.net>
	<20011228075044.B22180@outpost.ds9a.nl>
	<1009549526.18055.18.camel@egyptian-gods.mit.edu> 
	<20011229084531.A12666@outpost.ds9a.nl>
Message-Id: <1009691870.18055.20.camel@egyptian-gods.mit.edu>
Subject: Re: DS and Opt-in - a proposal
From: Greg Hudson <ghudson@mit.edu>
To: bert hubert <ahu@ds9a.nl>
Cc: namedroppers@ops.ietf.org
Date: 30 Dec 2001 00:57:50 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Sat, 2001-12-29 at 02:45, bert hubert wrote:
> > In the Unix world, at least, the applications shouldn't have to get
> > involved, just the recursive resolver (named, traditionally) and to some
> > extent the stub resolver in libc.  The application may be interested in
> 
> You must live in a parallel universe from mine. The application developer
> has needs. If DNSSEC is unable to meet, or worse, not interested in those
> needs, s/he will ignore it. It is not a unix question.

What needs?

Your initial message said "DNSSEC is going nowhere if they [browsers]
aren't going to use it!"  I was arguing that DNSSEC is useful even if
browsers stay the same as the are, at least in the Unix world.  If:

  * DNSSEC is deployed at the root,
  * the recursive resolver is DNSSEC-aware and knows the root's key,
  * com, amazon.com, and www.amazon.com are signed, and
  * the path from the stub resolver to the recursive resolver isn't easy
    to attack (because they're on the same machine, the path is behind a
    firewall which the attacker can't get behind, or the path is
    protected by TSIG)

then it becomes prohibitively difficult to spoof the address of
www.amazon.com, even if the browser is completely ignorant of DNSSEC. 
That's a win over the current situation, where it is relatively easy to
spoof that address (especially if you can watch the query, but in many
cases even if you can't).

> There is no difference. Right now DNSSEC is purely academic with some
> laboratory experiments. Some fairy may come along and suddenly make all user
> applications DNSSEC aware, but don't count on it. It's not that you write
> the RFC and suddenly people start implementing it.

The only reason I can think of why most user applications would need to
be DNSSEC-aware is to convey to the user whether a domain is signed or
not.  Since most users don't understand what that means, I don't think
that's the most important part of DNSSEC.

> Just saying 'it is transparent from an applications' point of view' does not
> cut it. 

Why not?

> Interesting to note is that I'm told that IE has its own resolver, separate
> from the regular windows one.

Its own stub resolver or its own recursive resolver?  If the latter
(which I somewhat doubt; it wouldn't work so well with firewalls), then
like any other recursive resolver, that would need to implement DNSSEC
in order to benefit.



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Sun Dec 30 15:30:17 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA17785
	for <dnsext-archive@lists.ietf.org>; Sun, 30 Dec 2001 15:30:16 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16Km7i-000Bgu-00
	for namedroppers-data@psg.com; Sun, 30 Dec 2001 11:59:58 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16Km7h-000Bgo-00
	for namedroppers@ops.ietf.org; Sun, 30 Dec 2001 11:59:57 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16Km7h-000GbK-00
	for namedroppers@ops.ietf.org; Sun, 30 Dec 2001 11:59:57 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: Message from Greg Hudson <ghudson@mit.edu> 
	of "30 Dec 2001 00:57:50 EST."
	<1009691870.18055.20.camel@egyptian-gods.mit.edu> 
Message-Id: <20011230162149.9C9D728EE8@as.vix.com>
From: Paul Vixie <paul@vix.com>
To: namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal 
Date: Sun, 30 Dec 2001 08:21:49 -0800
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> Your initial message said "DNSSEC is going nowhere if they [browsers]
> aren't going to use it!"  I was arguing that DNSSEC is useful even if
> browsers stay the same as the are, at least in the Unix world.  If:
> 
>   * DNSSEC is deployed at the root,
>   * the recursive resolver is DNSSEC-aware and knows the root's key,
>   * com, amazon.com, and www.amazon.com are signed, and
>   * the path from the stub resolver to the recursive resolver isn't easy
>     to attack (because they're on the same machine, the path is behind a
>     firewall which the attacker can't get behind, or the path is
>     protected by TSIG)
> 
> then it becomes prohibitively difficult to spoof the address of
> www.amazon.com, even if the browser is completely ignorant of DNSSEC. 
> That's a win over the current situation, where it is relatively easy to
> spoof that address (especially if you can watch the query, but in many
> cases even if you can't).

<AOL>ME TOO!</AOL>


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 31 01:18:57 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA23397
	for <dnsext-archive@lists.ietf.org>; Mon, 31 Dec 2001 01:18:56 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16KvW7-00086U-00
	for namedroppers-data@psg.com; Sun, 30 Dec 2001 22:01:47 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16KvW7-00086O-00
	for namedroppers@ops.ietf.org; Sun, 30 Dec 2001 22:01:47 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16KvW6-000N9d-00
	for namedroppers@ops.ietf.org; Sun, 30 Dec 2001 22:01:46 -0800
Message-Id: <200112310106.fBV16nH07447@gamma.isi.edu>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary=NextPart
To: IETF-Announce: ;
Subject: RFC 3226 on DNSSEC and IPv6 A6 requirements
Cc: rfc-ed@ISI.EDU, namedroppers@ops.ietf.org
Date: Sun, 30 Dec 2001 17:06:49 -0800
From: RFC Editor <rfc-ed@ISI.EDU>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk


--NextPart


A new Request for Comments is now available in online RFC libraries.


        RFC 3226

        Title:	    DNSSEC and IPv6 A6 aware server/resolver message
                    size requirements
        Author(s):  O. Gudmundsson
        Status:     Standards Track
	Date:       December 2001
        Mailbox:    ogud@ogud.com
        Pages:      6
        Characters: 12078
        Updates:    2874, 2535

        I-D Tag:    draft-ietf-dnsext-message-size-04.txt

        URL:        ftp://ftp.rfc-editor.org/in-notes/rfc3226.txt


This document mandates support for EDNS0 (Extension Mechanisms for
DNS) in DNS entities claiming to support either DNS Security
Extensions or A6 records.  This requirement is necessary because these
new features increase the size of DNS messages.  If EDNS0 is not
supported fall back to TCP will happen, having a detrimental impact on
query latency and DNS server load.  This document updates RFC 2535
and RFC 2874, by adding new requirements.


This document is a product of the DNS Extensions Working Group of the
IETF.

This is now a Proposed Standard Protocol.

This document specifies an Internet standards track protocol for
the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the
"Internet Official Protocol Standards" (STD 1) for the
standardization state and status of this protocol.  Distribution
of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to IETF-REQUEST@IETF.ORG.  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to RFC-DIST-REQUEST@RFC-EDITOR.ORG.

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to rfc-info@RFC-EDITOR.ORG with the message body 
help: ways_to_get_rfcs.  For example:

        To: rfc-info@RFC-EDITOR.ORG
        Subject: getting rfcs

        help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to RFC-Manager@RFC-EDITOR.ORG.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.echo 
Submissions for Requests for Comments should be sent to
RFC-EDITOR@RFC-EDITOR.ORG.  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...

Below is the data which will enable a MIME compliant Mail Reader 
implementation to automatically retrieve the ASCII version
of the RFCs.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type:  Message/External-body;
        access-type="mail-server";
        server="RFC-INFO@RFC-EDITOR.ORG"

Content-Type: text/plain
Content-ID: <011230170456.RFC@RFC-EDITOR.ORG>

RETRIEVE: rfc
DOC-ID: rfc3226

--OtherAccess
Content-Type:   Message/External-body;
        name="rfc3226.txt";
        site="ftp.isi.edu";
        access-type="anon-ftp";
        directory="in-notes"

Content-Type: text/plain
Content-ID: <011230170456.RFC@RFC-EDITOR.ORG>

--OtherAccess--
--NextPart--


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 31 01:19:57 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA23410
	for <dnsext-archive@lists.ietf.org>; Mon, 31 Dec 2001 01:19:56 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16KvZB-00087x-00
	for namedroppers-data@psg.com; Sun, 30 Dec 2001 22:04:57 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16KvZA-00087r-00
	for namedroppers@ops.ietf.org; Sun, 30 Dec 2001 22:04:56 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16KvZA-000NEo-00
	for namedroppers@ops.ietf.org; Sun, 30 Dec 2001 22:04:56 -0800
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
X-AntiVirus: scanned by AMaViS 0.2.1
To: IETF-Announce: ;
Subject: RFC 3225 on Indicating Resolver Support of DNSSEC
Cc: rfc-ed@ISI.EDU, namedroppers@ops.org
Date: Sun, 30 Dec 2001 17:04:36 -0800
From: RFC Editor <rfc-ed@ISI.EDU>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Message-Id: <E16KvZB-00087x-00@psg.com>


A new Request for Comments is now available in online RFC libraries.


        RFC 3225

        Title:	    Indicating Resolver Support of DNSSEC
        Author(s):  D. Conrad
        Status:     Standards Track
	Date:       December 2001
        Mailbox:    david.conrad@nominum.com
        Pages:      6
        Characters: 11548
        Updates/Obsoletes/SeeAlso:  None

        I-D Tag:    draft-ietf-dnsext-dnssec-okbit-03.txt

        URL:        ftp://ftp.rfc-editor.org/in-notes/rfc3225.txt


In order to deploy DNSSEC (Domain Name System Security Extensions)
operationally, DNSSEC aware servers should only perform automatic
inclusion of DNSSEC RRs when there is an explicit indication that the
resolver can understand those RRs.  This document proposes the use of
a bit in the EDNS0 header to provide that explicit indication and
describes the necessary protocol changes to implement that
notification. 

This document is a product of the DNS Extensions Working Group of the
IETF. 

This is now a Proposed Standard Protocol.

This document specifies an Internet standards track protocol for
the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the
"Internet Official Protocol Standards" (STD 1) for the
standardization state and status of this protocol.  Distribution
of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to IETF-REQUEST@IETF.ORG.  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to RFC-DIST-REQUEST@RFC-EDITOR.ORG.

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to rfc-info@RFC-EDITOR.ORG with the message body 
help: ways_to_get_rfcs.  For example:

        To: rfc-info@RFC-EDITOR.ORG
        Subject: getting rfcs

        help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to RFC-Manager@RFC-EDITOR.ORG.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.echo 
Submissions for Requests for Comments should be sent to
RFC-EDITOR@RFC-EDITOR.ORG.  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...

Below is the data which will enable a MIME compliant Mail Reader 
implementation to automatically retrieve the ASCII version
of the RFCs.

to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
--NextPart--


From owner-namedroppers@ops.ietf.org  Mon Dec 31 12:49:17 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA05599
	for <dnsext-archive@lists.ietf.org>; Mon, 31 Dec 2001 12:49:17 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16L6Gi-000616-00
	for namedroppers-data@psg.com; Mon, 31 Dec 2001 09:30:36 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16L6Gi-000610-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 09:30:36 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16L6Gi-000IkI-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 09:30:36 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <20011231112814.B14853@outpost.ds9a.nl>
References: <ghudson@mit.edu> <20011230162149.9C9D728EE8@as.vix.com>
In-Reply-To: <20011230162149.9C9D728EE8@as.vix.com>; from paul@vix.com on Sun, Dec 30, 2001 at 08:21:49AM -0800
Date: Mon, 31 Dec 2001 11:28:14 +0100
From: bert hubert <ahu@ds9a.nl>
To: Paul Vixie <paul@vix.com>
Cc: namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Sun, Dec 30, 2001 at 08:21:49AM -0800, Paul Vixie wrote:

> > Your initial message said "DNSSEC is going nowhere if they [browsers]
> > aren't going to use it!"  I was arguing that DNSSEC is useful even if
> > browsers stay the same as the are, at least in the Unix world.  If:
(...)
> <AOL>ME TOO!</AOL>

Aha. So we don't care about the implementors and clients of DNSSEC because
we've all figured it out on our own. That is not a sound engineering
principle. Oh well. Good luck in your ivory tower.

Regards,

bert

-- 
http://www.PowerDNS.com          Versatile DNS Software & Services
http://www.tk                              the dot in .tk
Netherlabs BV / Rent-a-Nerd.nl           - Nerd Available -
Linux Advanced Routing & Traffic Control: http://ds9a.nl/lartc


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 31 13:00:53 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA05691
	for <dnsext-archive@lists.ietf.org>; Mon, 31 Dec 2001 13:00:52 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16L6aq-0006HX-00
	for namedroppers-data@psg.com; Mon, 31 Dec 2001 09:51:24 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16L6ap-0006HR-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 09:51:23 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16L6ap-000JHV-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 09:51:23 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <3C1E3607B37295439F7C409EFBA08E680E284C@COL-581-EXS01>
From: "Loomis, Rip" <GILBERT.R.LOOMIS@saic.com>
To: "'Greg Hudson'" <ghudson@mit.edu>, bert hubert <ahu@ds9a.nl>
Cc: namedroppers@ops.ietf.org
Subject: RE: DS and Opt-in - a proposal
Date: Mon, 31 Dec 2001 10:23:05 -0500
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

The message below is the best expression that I've seen
yet of how the "initial fielding" of DNSSEC signed zones
will actually help things.  However, I think that
both of you are correct...

Both Netscape and IE include some DNS-related internal
capabilities--but I believe (as do others) that it's 
just a cache for data received through the normal system
gethostbyname() [or equivalent function].  In other words,
the browser will cache the results of the first "lookup"
of www.aol.com and will initiate subsequent connections
without a DNS lookup.  What the browser *won't* do is directly
try to recurse through the hierarchy, or understand any part
of the DNSSEC signing--at least for now.

The critical piece that's missing is the policy-enforcement
piece.  The end-user (browser/client) will likely not know
anything about DNSSEC-- so the recursive server needs to
decide, based on policy, which of the following information
is "safe" or "correct" (or trusted) enough to be passed to
the browser:
  - Signed data, signed by a key that is directly trusted
  - Signed data, signed by a key that is indirectly trusted
	(trust verified all the way back up to a trusted key
	 like .mil)
  - Signed data, signed by a key that is not trusted
	(which means that it could be bad, could be an impostor,
	 or could just be signed because some other "island"
	 of signed zones exists and we don't have a trust
	 relationship with that island)
  - Unsigned data.

As of right now, we trust all four.  At some point in the
*near* future, we need a configurable capability to trust only
the first two, but to alert to the existence of three and
four. That's great...but at that point, we need a way for
the browser to indicate that there are different degrees of
trust in the provided information--which sounds to me as
though DNSSEC *won't* just be transparent to the client.
(Either that, or we need lwresd or something similar on
every single client system--and don't get me started on
that.)

If all the zones which anyone *ever* needs to contact are
signed, then the problem becomes easier--which was your
stated situation.  However, I think that's an unrealistic
scenario for at least the next several years--and in the
meantime, we either need to have a configurable trust
policy, or we gain minimal benefit from DNSSEC signed
zones.  The best example I have of how to do this is the
MS IE 5.x+ configuration options for "trusted sites",
"local intranet", etc.  Not everyone will know the
difference between signed and unsigned DNS data--but there
should be a way for users (or sysadmins) to limit which
types of DNS data are acceptable.  This should likely
be a system-wide config file, though, rather than a 
browser issue--which means it really is an OS-level
issue.  (This was the path that led to lwresd, IIRC.)

Unless we find a way to ease the transition while still providing
a useful security enhancement, IMHO we're going to have trouble
getting signed zones into the "commonly used" category.

--
Rip Loomis
Senior Systems Security Engineer
SAIC Center for Information Security Technology 

> -----Original Message-----
> From: Greg Hudson [mailto:ghudson@mit.edu]
> Sent: Sunday, 30 December, 2001 00:58
> To: bert hubert
> Cc: namedroppers@ops.ietf.org
> Subject: Re: DS and Opt-in - a proposal
> 
> 
> On Sat, 2001-12-29 at 02:45, bert hubert wrote:
> > > In the Unix world, at least, the applications shouldn't 
> have to get
> > > involved, just the recursive resolver (named, 
> traditionally) and to some
> > > extent the stub resolver in libc.  The application may be 
> interested in
> > 
> > You must live in a parallel universe from mine. The 
> application developer
> > has needs. If DNSSEC is unable to meet, or worse, not 
> interested in those
> > needs, s/he will ignore it. It is not a unix question.
> 
> What needs?
> 
> Your initial message said "DNSSEC is going nowhere if they [browsers]
> aren't going to use it!"  I was arguing that DNSSEC is useful even if
> browsers stay the same as the are, at least in the Unix world.  If:
> 
>   * DNSSEC is deployed at the root,
>   * the recursive resolver is DNSSEC-aware and knows the root's key,
>   * com, amazon.com, and www.amazon.com are signed, and
>   * the path from the stub resolver to the recursive resolver 
> isn't easy
>     to attack (because they're on the same machine, the path 
> is behind a
>     firewall which the attacker can't get behind, or the path is
>     protected by TSIG)
> 
> then it becomes prohibitively difficult to spoof the address of
> www.amazon.com, even if the browser is completely ignorant of DNSSEC. 
> That's a win over the current situation, where it is 
> relatively easy to
> spoof that address (especially if you can watch the query, but in many
> cases even if you can't).
> 
> > There is no difference. Right now DNSSEC is purely academic 
> with some
> > laboratory experiments. Some fairy may come along and 
> suddenly make all user
> > applications DNSSEC aware, but don't count on it. It's not 
> that you write
> > the RFC and suddenly people start implementing it.
> 
> The only reason I can think of why most user applications 
> would need to
> be DNSSEC-aware is to convey to the user whether a domain is signed or
> not.  Since most users don't understand what that means, I don't think
> that's the most important part of DNSSEC.
> 
> > Just saying 'it is transparent from an applications' point 
> of view' does not
> > cut it. 
> 
> Why not?
> 
> > Interesting to note is that I'm told that IE has its own 
> resolver, separate
> > from the regular windows one.
> 
> Its own stub resolver or its own recursive resolver?  If the latter
> (which I somewhat doubt; it wouldn't work so well with 
> firewalls), then
> like any other recursive resolver, that would need to implement DNSSEC
> in order to benefit.


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 31 13:04:00 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA05724
	for <dnsext-archive@lists.ietf.org>; Mon, 31 Dec 2001 13:03:59 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16L6gX-0006N9-00
	for namedroppers-data@psg.com; Mon, 31 Dec 2001 09:57:17 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16L6gX-0006N3-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 09:57:17 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16L6gX-000JR9-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 09:57:17 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <20011231180211.A30218@outpost.ds9a.nl>
References: <3C1E3607B37295439F7C409EFBA08E680E284C@COL-581-EXS01>
In-Reply-To: <3C1E3607B37295439F7C409EFBA08E680E284C@COL-581-EXS01>; from GILBERT.R.LOOMIS@saic.com on Mon, Dec 31, 2001 at 10:23:05AM -0500
Date: Mon, 31 Dec 2001 18:02:11 +0100
From: bert hubert <ahu@ds9a.nl>
To: "Loomis, Rip" <GILBERT.R.LOOMIS@saic.com>
Cc: "'Greg Hudson'" <ghudson@mit.edu>, namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Mon, Dec 31, 2001 at 10:23:05AM -0500, Loomis, Rip wrote:

> Both Netscape and IE include some DNS-related internal
> capabilities--but I believe (as do others) that it's 
> just a cache for data received through the normal system
> gethostbyname() [or equivalent function].  In other words,

Piet Barber informed me that IE will query *all* configured resolvers
simultaneously and use the first answer it receives. I hope this is not the
default Windows behaviour!

> four. That's great...but at that point, we need a way for
> the browser to indicate that there are different degrees of
> trust in the provided information--which sounds to me as
> though DNSSEC *won't* just be transparent to the client.

Exactly. This is what I mean. And instead of theorizing from our comfortable
speccing desks, I think we should just ask the people designing browsers. I
can contact the Mozilla people if needed, if they aren't reading this list
yet.

> Unless we find a way to ease the transition while still providing
> a useful security enhancement, IMHO we're going to have trouble
> getting signed zones into the "commonly used" category.

We can try to push DNSSEC but it would be far better to create a DNSSEC
'pull' from the browser community. Same probably holds for MTAs.

Regards,

bert 

-- 
http://www.PowerDNS.com          Versatile DNS Software & Services
http://www.tk                              the dot in .tk
Netherlabs BV / Rent-a-Nerd.nl           - Nerd Available -
Linux Advanced Routing & Traffic Control: http://ds9a.nl/lartc


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 31 13:05:31 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA05737
	for <dnsext-archive@lists.ietf.org>; Mon, 31 Dec 2001 13:05:31 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16L6gn-0006Nk-00
	for namedroppers-data@psg.com; Mon, 31 Dec 2001 09:57:33 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16L6gn-0006Ne-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 09:57:33 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16L6gn-000JRc-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 09:57:33 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: Message from bert hubert <ahu@ds9a.nl> 
	of "Mon, 31 Dec 2001 11:28:14 +0100."
	<20011231112814.B14853@outpost.ds9a.nl> 
Message-Id: <20011231170631.35F8128EE8@as.vix.com>
From: Paul Vixie <paul@vix.com>
To: namedroppers@ops.ietf.org
Subject: Re: DS and Opt-in - a proposal 
Date: Mon, 31 Dec 2001 09:06:31 -0800
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

> > <AOL>ME TOO!</AOL>
> 
> Aha. So we don't care about the implementors and clients of DNSSEC because
> we've all figured it out on our own. That is not a sound engineering
> principle. Oh well. Good luck in your ivory tower.

to paraphrase mr. bush, "that ain't what was said."

dnssec does not require any api changes or client changes in order to make
a large number of dns lookups more secure.  if zone servers and full resolvers
("authoritative and recursive nameservers") implement it, and if stub 
resolvers ("clients") use TSIG or some other secure last-mile channel (doors?
IPSec?) to reach their local recursive nameservers, then "security" will go
"up."

of course, a dnssec-aware api that would allow for dnssec-aware clients would
also help explore ways to make things more secure, and we should do it.

but we do not have to have a new api or change any clients before DNSSEC can
be at least initially effective.

so, welcome to my ivory tower.  (you were already inside.)


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 31 13:06:05 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA05748
	for <dnsext-archive@lists.ietf.org>; Mon, 31 Dec 2001 13:06:04 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16L6gA-0006Mk-00
	for namedroppers-data@psg.com; Mon, 31 Dec 2001 09:56:54 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16L6g9-0006Md-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 09:56:53 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16L6g9-000JQT-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 09:56:53 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
In-Reply-To: <200112291913.fBTJDXi33137@bartok.sidn.nl>
Message-ID: <20011231150625.M22579-100000@node10c4d.a2000.nl>
Date: Mon, 31 Dec 2001 17:54:30 +0100 (CET)
From: Roy Arends <Roy.Arends@nominum.com>
To: Jaap Akkerhuis <jaap@sidn.nl>
Cc: Randy Bush <randy@psg.com>, Roy Arends <Roy.Arends@nominum.com>,
        <namedroppers@ops.ietf.org>
Subject: Re: DS and Opt-in - a proposal 
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

On Sat, 29 Dec 2001, Jaap Akkerhuis wrote:

> Folks,
>
>     though i am still personally a bit uncomfortable with opt-in for
>     reasons related to this, the likely harm of unneeded uses seems low, and
>     the verisign gang whine soooo pathetically :-).
>
> What me personally disturbs about this discussion is that there is
> so little technical or operational content in the whining.

I was glad that in SLC we've put the layer 8/9 arguements aside and could
finally focus on the protocol itself. Anyway:

Optin improves the protocol because:

  o it gives a choice between 2535 or opt-in. (the domain-holder can make
    that choice)
  o opt-in gets rid of unwanted/unnecessary crypto. (the domain-holder
    decides what is necessary and what not).

Conclusion, a smaller zone to manage, a smaller zone to service, a smaller
zone to handle. And still, the signed data will be as secure as with 2535,
the unsigned data will be as secure as with 1035. There is no ambiguity
anymore as in "this unsigned data might be spoofed[1035], but
exists[2535]". Everyone gets what they want. If one is "a bit
uncomfortable with" or is "personally disturbed" by opt-in, sign the zone
2535-style. You have that choice :-)

> Apart from the somewhat dogmatic statement ``my XX-million customers
> will complain'', I have been told that ``Yes, we can sign but the
> current technology cannot provide the footprint we need to service a
> secure com. zone''. (Statements like these were made in Salt Lake
> City). Up to now, I haven't seeen any numbers supporting this
> statement.

I find it very reasonable to accept/believe that serving a zone 2535 style
is more costly then serving an opt-in style zone.

> I would really like to see some numbers, hard facts or at least
> some data to support why an opt-in is needed.
>
> 	jaap
>
> PS. Why do I want to see this? About two years ago (around that
> 	time anyway) arguments were floating around that it would
> 	be impossible to do DNSSEC because signing big zones was
> 	close to be impossible.  These arguments turned about to
> 	be hearsay.  Yes, signing big zones is hard but doable.
>
> 	Now convince me that an opt-in DNSSEC solution is really
> 	needed.

Should large investments in operational hardware be made for a protocol
requirement that is unwanted by some, just because we can ? Since a
domain-holder will be confronted with the extra costs, without having a
choice, it will be calculated through to the sub-domain-holder. If that is
going to happen, we're even further away from deployment.

Now convince me that an opt-in DNSSEC solution really will hurt,
security-wise.



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 31 14:50:51 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA06378
	for <dnsext-archive@lists.ietf.org>; Mon, 31 Dec 2001 14:50:50 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16L8L4-0007oU-00
	for namedroppers-data@psg.com; Mon, 31 Dec 2001 11:43:14 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16L8L3-0007oN-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 11:43:13 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16L8L3-000MA4-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 11:43:13 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <20011231194825.A525@keyser.soze.com>
References: <3C1E3607B37295439F7C409EFBA08E680E284C@COL-581-EXS01> <20011231180211.A30218@outpost.ds9a.nl>
In-Reply-To: <20011231180211.A30218@outpost.ds9a.nl>; from ahu@ds9a.nl on Mon, Dec 31, 2001 at 06:02:11PM +0100
Date: Mon, 31 Dec 2001 19:48:25 +0100
From: Stefan Arentz <stefan.arentz@soze.com>
To: namedroppers@ops.ietf.org
Cc: bert hubert <ahu@ds9a.nl>
Subject: Re: DS and Opt-in - a proposal
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Content-Transfer-Encoding: 7bit

[ as this thread has drifted from protocol to ops, could it please be
  moved to dnsop@cafax.se?  thanks.  -- randy ]

On Mon, Dec 31, 2001 at 06:02:11PM +0100, bert hubert wrote:
> On Mon, Dec 31, 2001 at 10:23:05AM -0500, Loomis, Rip wrote:
> 
> > Both Netscape and IE include some DNS-related internal
> > capabilities--but I believe (as do others) that it's 
> > just a cache for data received through the normal system
> > gethostbyname() [or equivalent function].  In other words,
> 
> Piet Barber informed me that IE will query *all* configured resolvers
> simultaneously and use the first answer it receives. I hope this is not the
> default Windows behaviour!


Windows 2000 with MSIE 5.5 does not do this in it's default configuration. It
queries the first nameserver configured. The second nameserver is only queried
when the first one does not give back any response.

I just tested this with a tcpdump on two resolving nameservers.

MSIE does indeed have a cache and unfortunately it does not adhere to the
TTLs on DNS records. Tested with a A record with TTL=60.

  Stefan



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 31 18:33:40 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA08025
	for <dnsext-archive@lists.ietf.org>; Mon, 31 Dec 2001 18:33:40 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16LBen-000APx-00
	for namedroppers-data@psg.com; Mon, 31 Dec 2001 15:15:49 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16LBem-000APr-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 15:15:48 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16LBem-0001es-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 15:15:48 -0800
Message-ID: <2F3EC696EAEED311BB2D009027C3F4F4058698DF@vhqpostal.verisign.com>
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary="----_=_NextPart_000_01C1924A.D5ABB600"
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: "'Roy Arends'" <Roy.Arends@nominum.com>, Jaap Akkerhuis <jaap@sidn.nl>
Cc: Randy Bush <randy@psg.com>, namedroppers@ops.ietf.org
Subject: RE: DS and Opt-in - a proposal 
Date: Mon, 31 Dec 2001 14:31:05 -0800
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_000_01C1924A.D5ABB600
Content-Type: text/plain;
	charset="iso-8859-1"

> Now convince me that an opt-in DNSSEC solution really will hurt,
> security-wise.

To clarify the issue here. The one difference in the security of a
fully signed zone and an Opt-in zone is that if the zone is fully
signed and contains the domains A, B, D it is not possible to insert
a zone C.

If however the zone is an opt-in zone and B is not signed so 
the NXT record spans A->D it is possible to insert a record C.

While such an attack may be an issue in some zones it is not an issue
in dotcom since anyone can insert a record C at will by paying $35
or so for the unused name.

So perhaps we need the appropriate statement in the RFC to the effect
don't use this if the attack is significant. However I strongly suspect
that no domain is going to grow to very large size if it is hard to insert
records through the kocher procedures.

		Phill

Phillip Hallam-Baker FBCS C.Eng.
Principal Scientist
VeriSign Inc.
pbaker@verisign.com
781 245 6996 x227



------_=_NextPart_000_01C1924A.D5ABB600
Content-Type: application/octet-stream;
	name="Phillip Hallam-Baker (E-mail).vcf"
Content-Disposition: attachment;
	filename="Phillip Hallam-Baker (E-mail).vcf"

BEGIN:VCARD
VERSION:2.1
N:Hallam-Baker;Phillip
FN:Phillip Hallam-Baker (E-mail)
ORG:VeriSign
TITLE:Principal Consultant
TEL;WORK;VOICE:(781) 245-6996 x227
EMAIL;PREF;INTERNET:hallam@verisign.com
REV:20010214T163732Z
END:VCARD

------_=_NextPart_000_01C1924A.D5ABB600--


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


From owner-namedroppers@ops.ietf.org  Mon Dec 31 18:50:37 2001
Received: from psg.com (exim@psg.com [147.28.0.62])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA08139
	for <dnsext-archive@lists.ietf.org>; Mon, 31 Dec 2001 18:50:36 -0500 (EST)
Received: from lserv by psg.com with local (Exim 3.33 #1)
	id 16LC2Q-000AkD-00
	for namedroppers-data@psg.com; Mon, 31 Dec 2001 15:40:14 -0800
Received: from rip.psg.com ([147.28.0.39])
	by psg.com with esmtp (Exim 3.33 #1)
	id 16LC2Q-000Ak7-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 15:40:14 -0800
Received: from randy by rip.psg.com with local (Exim 3.33 #1)
	id 16LC2Q-0002I4-00
	for namedroppers@ops.ietf.org; Mon, 31 Dec 2001 15:40:14 -0800
Message-ID: <2F3EC696EAEED311BB2D009027C3F4F4058698E0@vhqpostal.verisign.com>
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary="----_=_NextPart_000_01C19253.3A31D610"
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: "'Loomis, Rip'" <GILBERT.R.LOOMIS@saic.com>,
        "'Greg Hudson'" <ghudson@mit.edu>, bert hubert <ahu@ds9a.nl>
Cc: namedroppers@ops.ietf.org
Subject: RE: DS and Opt-in - a proposal
Date: Mon, 31 Dec 2001 15:31:09 -0800
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_000_01C19253.3A31D610
Content-Type: text/plain;
	charset="iso-8859-1"

Actually most Web browsers at one point implemented their own
DNS lookup routines back in 1995. This is because the then
interface to DNS only returned one IP address for a name lookup.

People were implementing silly rotating DNS server hacks
to try to spread out the load amongst their HTTP servers
on the more extreeme sites (NCSA Mosaic download). So we
put a requirement in the spec to do the job properly.

This turned out to require bypass of the O/S DNS interface
on many platforms because it either failed to return multiple
IP addresses for the same name or in some cases because the
O/S implementation had taken it upon itself to implement some
brain-damaged quasi-DNS scheme.
 

Phillip Hallam-Baker FBCS C.Eng.
Principal Scientist
VeriSign Inc.
pbaker@verisign.com
781 245 6996 x227


> -----Original Message-----
> From: Loomis, Rip [mailto:GILBERT.R.LOOMIS@saic.com]
> Sent: Monday, December 31, 2001 10:23 AM
> To: 'Greg Hudson'; bert hubert
> Cc: namedroppers@ops.ietf.org
> Subject: RE: DS and Opt-in - a proposal
> 
> 
> The message below is the best expression that I've seen
> yet of how the "initial fielding" of DNSSEC signed zones
> will actually help things.  However, I think that
> both of you are correct...
> 
> Both Netscape and IE include some DNS-related internal
> capabilities--but I believe (as do others) that it's 
> just a cache for data received through the normal system
> gethostbyname() [or equivalent function].  In other words,
> the browser will cache the results of the first "lookup"
> of www.aol.com and will initiate subsequent connections
> without a DNS lookup.  What the browser *won't* do is directly
> try to recurse through the hierarchy, or understand any part
> of the DNSSEC signing--at least for now.
> 
> The critical piece that's missing is the policy-enforcement
> piece.  The end-user (browser/client) will likely not know
> anything about DNSSEC-- so the recursive server needs to
> decide, based on policy, which of the following information
> is "safe" or "correct" (or trusted) enough to be passed to
> the browser:
>   - Signed data, signed by a key that is directly trusted
>   - Signed data, signed by a key that is indirectly trusted
> 	(trust verified all the way back up to a trusted key
> 	 like .mil)
>   - Signed data, signed by a key that is not trusted
> 	(which means that it could be bad, could be an impostor,
> 	 or could just be signed because some other "island"
> 	 of signed zones exists and we don't have a trust
> 	 relationship with that island)
>   - Unsigned data.
> 
> As of right now, we trust all four.  At some point in the
> *near* future, we need a configurable capability to trust only
> the first two, but to alert to the existence of three and
> four. That's great...but at that point, we need a way for
> the browser to indicate that there are different degrees of
> trust in the provided information--which sounds to me as
> though DNSSEC *won't* just be transparent to the client.
> (Either that, or we need lwresd or something similar on
> every single client system--and don't get me started on
> that.)
> 
> If all the zones which anyone *ever* needs to contact are
> signed, then the problem becomes easier--which was your
> stated situation.  However, I think that's an unrealistic
> scenario for at least the next several years--and in the
> meantime, we either need to have a configurable trust
> policy, or we gain minimal benefit from DNSSEC signed
> zones.  The best example I have of how to do this is the
> MS IE 5.x+ configuration options for "trusted sites",
> "local intranet", etc.  Not everyone will know the
> difference between signed and unsigned DNS data--but there
> should be a way for users (or sysadmins) to limit which
> types of DNS data are acceptable.  This should likely
> be a system-wide config file, though, rather than a 
> browser issue--which means it really is an OS-level
> issue.  (This was the path that led to lwresd, IIRC.)
> 
> Unless we find a way to ease the transition while still providing
> a useful security enhancement, IMHO we're going to have trouble
> getting signed zones into the "commonly used" category.
> 
> --
> Rip Loomis
> Senior Systems Security Engineer
> SAIC Center for Information Security Technology 
> 
> > -----Original Message-----
> > From: Greg Hudson [mailto:ghudson@mit.edu]
> > Sent: Sunday, 30 December, 2001 00:58
> > To: bert hubert
> > Cc: namedroppers@ops.ietf.org
> > Subject: Re: DS and Opt-in - a proposal
> > 
> > 
> > On Sat, 2001-12-29 at 02:45, bert hubert wrote:
> > > > In the Unix world, at least, the applications shouldn't 
> > have to get
> > > > involved, just the recursive resolver (named, 
> > traditionally) and to some
> > > > extent the stub resolver in libc.  The application may be 
> > interested in
> > > 
> > > You must live in a parallel universe from mine. The 
> > application developer
> > > has needs. If DNSSEC is unable to meet, or worse, not 
> > interested in those
> > > needs, s/he will ignore it. It is not a unix question.
> > 
> > What needs?
> > 
> > Your initial message said "DNSSEC is going nowhere if they 
> [browsers]
> > aren't going to use it!"  I was arguing that DNSSEC is 
> useful even if
> > browsers stay the same as the are, at least in the Unix world.  If:
> > 
> >   * DNSSEC is deployed at the root,
> >   * the recursive resolver is DNSSEC-aware and knows the root's key,
> >   * com, amazon.com, and www.amazon.com are signed, and
> >   * the path from the stub resolver to the recursive resolver 
> > isn't easy
> >     to attack (because they're on the same machine, the path 
> > is behind a
> >     firewall which the attacker can't get behind, or the path is
> >     protected by TSIG)
> > 
> > then it becomes prohibitively difficult to spoof the address of
> > www.amazon.com, even if the browser is completely ignorant 
> of DNSSEC. 
> > That's a win over the current situation, where it is 
> > relatively easy to
> > spoof that address (especially if you can watch the query, 
> but in many
> > cases even if you can't).
> > 
> > > There is no difference. Right now DNSSEC is purely academic 
> > with some
> > > laboratory experiments. Some fairy may come along and 
> > suddenly make all user
> > > applications DNSSEC aware, but don't count on it. It's not 
> > that you write
> > > the RFC and suddenly people start implementing it.
> > 
> > The only reason I can think of why most user applications 
> > would need to
> > be DNSSEC-aware is to convey to the user whether a domain 
> is signed or
> > not.  Since most users don't understand what that means, I 
> don't think
> > that's the most important part of DNSSEC.
> > 
> > > Just saying 'it is transparent from an applications' point 
> > of view' does not
> > > cut it. 
> > 
> > Why not?
> > 
> > > Interesting to note is that I'm told that IE has its own 
> > resolver, separate
> > > from the regular windows one.
> > 
> > Its own stub resolver or its own recursive resolver?  If the latter
> > (which I somewhat doubt; it wouldn't work so well with 
> > firewalls), then
> > like any other recursive resolver, that would need to 
> implement DNSSEC
> > in order to benefit.
> 
> 
> to unsubscribe send a message to 
> namedroppers-request@ops.ietf.org with
> the word 'unsubscribe' in a single line as the message text body.
> 


------_=_NextPart_000_01C19253.3A31D610
Content-Type: application/octet-stream;
	name="Phillip Hallam-Baker (E-mail).vcf"
Content-Disposition: attachment;
	filename="Phillip Hallam-Baker (E-mail).vcf"

BEGIN:VCARD
VERSION:2.1
N:Hallam-Baker;Phillip
FN:Phillip Hallam-Baker (E-mail)
ORG:VeriSign
TITLE:Principal Consultant
TEL;WORK;VOICE:(781) 245-6996 x227
EMAIL;PREF;INTERNET:hallam@verisign.com
REV:20010214T163732Z
END:VCARD

------_=_NextPart_000_01C19253.3A31D610--


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.


