
From lutz@iks-jena.de  Fri Jul  1 00:25:55 2011
Return-Path: <lutz@iks-jena.de>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A77F521F862B for <dnsext@ietfa.amsl.com>; Fri,  1 Jul 2011 00:25:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 90S5GDIll8Ls for <dnsext@ietfa.amsl.com>; Fri,  1 Jul 2011 00:25:55 -0700 (PDT)
Received: from annwfn.iks-jena.de (annwfn-eth.iks-jena.de [IPv6:2001:4bd8:0:104:20a:e4ff:fe80:3138]) by ietfa.amsl.com (Postfix) with ESMTP id B406B21F852B for <dnsext@ietf.org>; Fri,  1 Jul 2011 00:25:53 -0700 (PDT)
X-SMTP-Sender: IPv6:2001:4bd8:0:666:248:54ff:fe12:ee3f
Received: from belenus.iks-jena.de (belenus.iks-jena.de [IPv6:2001:4bd8:0:666:248:54ff:fe12:ee3f]) by annwfn.iks-jena.de (8.14.3/8.14.1) with ESMTP id p617PmgA004667 for <dnsext@ietf.org>; Fri, 1 Jul 2011 09:25:50 +0200
X-MSA-Host: belenus.iks-jena.de
Received: (from lutz@localhost) by belenus.iks-jena.de (8.14.3/8.14.1/Submit) id p617PjlP026449; Fri, 1 Jul 2011 09:25:45 +0200
From: Lutz Donnerhacke <lutz@iks-jena.de>
Message-Id: <201107010725.p617PjlP026449@belenus.iks-jena.de>
To: dnsext@ietf.org
In-Reply-To: <BANLkTimEvMXeCUsDe+OE5TkgJ3Bc-FDEog@mail.gmail.com>
Date: Fri, 1 Jul 2011 09:25:45 +0200
User-Agent: slrn/pre0.9.9-77 (Linux)
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] Insecure Delegation Proofs
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Jul 2011 07:25:55 -0000

You wrote:
> Since the insecure NS records are not signed (at all!), they can be spoofed.
> (IMHO, the lack of signature on NS (without DS) is uncool in the
> extreme. Having NS RRSIGs, even though they are not authoritative,
> would still have been compatible with opt-out. But that ship has
> sailed, as they say.)

Glue is never signed, because it's impossible to distinguish algorithmically
between an answer from the zone or its parent zone. It is possible to copy
the glue records from the authoritive servers and include those (deeper)
signed records as glue, but the validator can't really make benefit from.

That's why the key material is distributed in two record types:
 DNSKEY contained by the zone
 DS containted by the parent zone

A zone is not allowed to sign or respond with its own DS records and a
parent zone is not allowed to sign or respond with the child DNSKEY records.

Moving a special record of the zone into the parent allows the resolver to
distinguish the various delegation levels and complete the delegation chain
by asking for DS records explicitly (to overcome the grandparent problem).

Consequently the RRSIG of a response from the parent zone can only cover the
DS (because it's authoritive) and not the NS (because it's glue). OTOH the
RRSIG of a response from the child zone has to cover at least the DNSKEY,
NS, and SOA records (because they are authoritive and needed for a correct
setup) and never DS (because it's not in scope).

For the usual historical remarks, let me point out, that the early DNSSEC
idea was to put the whole key material into the parent zone (KEY with SEP
bit) and the client zone (KEY without SEP bit).

> The attack is, to over-write a *signed* NS (with DS), by an unsigned
> NS (with no DS or any other DNSSEC record).

Sorry, I do not get it. Why should an unsigned NS record be accepted at all?
If the zone y.z is signed, there is either an signed DS for x.y.z or an
NSEC(3) record covering x.y.z. Only in this case the response from the
parent is correct. And even in this case the attacker can simply modify the
NS (glue) entries on the fly.

> The defense is, to check the hash of any unsigned NS, and if it
> matches an NSEC3 with opt-out, it clearly is a forgery and should be
> discarded.

Why? That's a legitim response from a parent zone.

> To prevent this NS hijacking, the NS has to be hashed.

There is no way to prevent glue modifications at all.


From davidb@verisign.com  Fri Jul  1 06:28:42 2011
Return-Path: <davidb@verisign.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CD1011E80CF for <dnsext@ietfa.amsl.com>; Fri,  1 Jul 2011 06:28:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.999
X-Spam-Level: 
X-Spam-Status: No, score=-5.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_37=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o1oxDp+8dZk6 for <dnsext@ietfa.amsl.com>; Fri,  1 Jul 2011 06:28:41 -0700 (PDT)
Received: from exprod6og104.obsmtp.com (exprod6og104.obsmtp.com [64.18.1.187]) by ietfa.amsl.com (Postfix) with ESMTP id 926A711E80CA for <dnsext@ietf.org>; Fri,  1 Jul 2011 06:28:40 -0700 (PDT)
Received: from osprey.verisign.com ([216.168.239.75]) (using TLSv1) by exprod6ob104.postini.com ([64.18.5.12]) with SMTP ID DSNKTg3LhvZrlDZi7RI/npXeyITIXHCZ7ghQ@postini.com; Fri, 01 Jul 2011 06:28:40 PDT
Received: from dul1wnexcn01.vcorp.ad.vrsn.com (dul1wnexcn01.vcorp.ad.vrsn.com [10.170.12.138]) by osprey.verisign.com (8.13.6/8.13.4) with ESMTP id p61DSbG9011325; Fri, 1 Jul 2011 09:28:37 -0400
Received: from dul1wnexcn04.vcorp.ad.vrsn.com ([10.170.12.139]) by dul1wnexcn01.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 1 Jul 2011 09:28:37 -0400
Received: from BRN1WNEXCAS01.vcorp.ad.vrsn.com ([10.173.152.205]) by dul1wnexcn04.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 1 Jul 2011 09:28:36 -0400
Received: from BRN1WNEXCAS02.vcorp.ad.vrsn.com (10.173.152.206) by brn1wnexcas01.vcorp.ad.vrsn.com (10.173.152.205) with Microsoft SMTP Server (TLS) id 14.1.289.1; Fri, 1 Jul 2011 09:28:36 -0400
Received: from BRN1WNEXMBX01.vcorp.ad.vrsn.com ([::1]) by brn1wnexcas02.vcorp.ad.vrsn.com ([::1]) with mapi id 14.01.0289.001; Fri, 1 Jul 2011 09:28:35 -0400
From: "Blacka, David" <davidb@verisign.com>
To: Sean Wells <snwells82@gmail.com>
Thread-Topic: [dnsext] Insecure Delegation Proofs
Thread-Index: AQHMN1qUpwJKDDaAkEemA95misk0TZTXueeA
Date: Fri, 1 Jul 2011 13:28:35 +0000
Message-ID: <DB8097F2-72B0-448F-9607-7BA3F7473315@verisign.com>
References: <BANLkTinRXEmhC_5ikFfoXczat6+4UPJ1pA@mail.gmail.com>
In-Reply-To: <BANLkTinRXEmhC_5ikFfoXczat6+4UPJ1pA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.173.152.4]
Content-Type: multipart/signed; boundary="Apple-Mail-36-507233839"; protocol="application/pkcs7-signature"; micalg=sha1
MIME-Version: 1.0
X-OriginalArrivalTime: 01 Jul 2011 13:28:36.0786 (UTC) FILETIME=[C83B8920:01CC37F2]
Cc: "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] Insecure Delegation Proofs
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Jul 2011 13:28:42 -0000

--Apple-Mail-36-507233839
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


On Jun 30, 2011, at 3:18 PM, Sean Wells wrote:

> Hi,
>=20
> DNSSEC bis updates document states:
>=20
> [RFC4035] Section
> =
5.2<http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-bis-updates-12#sec=
tion-5.2>specifies
> that a validator, when proving a
>=20
>   delegation is not secure, needs to check for the absence of the DS
>   and SOA bits in the NSEC (or NSEC3) type bitmap.  The validator also
>   needs to check for the presence of the NS bit in the matching NSEC
>   (or NSEC3) RR (proving that there is, indeed, a delegation), or
>   alternately make sure that the delegation is covered by an NSEC3 RR
>   with the Opt-Out flag set.  If this is not checked, spoofed unsigned
>   delegations might be used to claim that an existing signed record is
>   not signed.
>=20
>=20
> The last sentence is confusing: what is a "spoofed unsigned
> delegation" ? Let us say that there are two delegations one of which
> is secure.

A spoofed unsigned delegation is a spoofed response in the form of a =
referral ("delegation" basically means referral here) without a DS =
RRset.

> a.com is secure, so there is a DS record in com
>=20
> b.com is insecure, so there is a NSEC record for b.com in com with DS,
> SOA bits not set but the NS bit set.
>=20
>=20
> I am looking up the DS record for "a.com". The attacker is responding
> the NSEC record for b.com (or it was already in my cache). In this
> case, the owner name does not match the SNAME (a.com). I thought we
> checked the bitmap of the NSEC only if the owner name matches. This
> NSEC record might still be accepted depending on what is there in the
> "Next domain field". Is this the attack that is being described ?

No.  This attack is about obscuring non-delegation names (i.e., and =
"existing signed record") with the spoofed delegation.  So, imagine you =
have a signed zone, foo.example.  In that zone, you have an RRset that =
an attacker wants to change: secure.foo.example/A.  Now, there exists an =
NSEC record for secure.foo.example: =20

  secure.foo.example NSEC secure2.foo.example A NSEC RRSIG

So, when a client asks for secure.foo.example/A, the attacker spoofs a =
response that looks like this:

  secure.foo.example NS bad-ns1.attacker.example.
  secure.foo.example NS bad-ns2.attacker.example.
  secure.foo.example NSEC secure2.foo.example A NSEC RRSIG
  secure.foo.example RRSIG NSEC ...

That is, the attacker uses the existing NSEC for secure.foo.example.  =
Note however, that this NSEC record's type map does not have the DS bit =
set.  So, if you are a naive validator, you might just follow the =
referral, noting it is insecure (because the DS bit isn't set), but fail =
to notice that it shouldn't have been a delegation at all.  Hence the =
advice.

--
David Blacka                          <davidb@verisign.com>=20
Principal Engineer      Verisign Infrastructure Engineering


--Apple-Mail-36-507233839
Content-Disposition: attachment; filename="smime.p7s"
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
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==

--Apple-Mail-36-507233839--

From marka@isc.org  Thu Jun 30 17:58:43 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC4F911E8090 for <dnsext@ietfa.amsl.com>; Thu, 30 Jun 2011 17:58:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.667
X-Spam-Level: 
X-Spam-Status: No, score=-2.667 tagged_above=-999 required=5 tests=[AWL=-0.068, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xu5HqunC7rW1 for <dnsext@ietfa.amsl.com>; Thu, 30 Jun 2011 17:58:43 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id F009E11E8085 for <dnsext@ietf.org>; Thu, 30 Jun 2011 17:58:42 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 6FF03C942B for <dnsext@ietf.org>; Fri,  1 Jul 2011 00:58:31 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 0C148216C7B for <dnsext@ietf.org>; Fri,  1 Jul 2011 00:58:31 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 137A4115480D for <dnsext@ietf.org>; Fri,  1 Jul 2011 10:58:29 +1000 (EST)
Date: Fri, 01 Jul 2011 10:58:29 +1000
Message-Id: <20110701005829.137A4115480D@drugs.dv.isc.org>
From: marka@isc.org
To: undisclosed-recipients:;
X-Mailman-Approved-At: Fri, 01 Jul 2011 08:54:13 -0700
Subject: Re: [dnsext] DNAME?
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Jul 2011 00:58:43 -0000

------- Blind-Carbon-Copy

To: "Jon F." <pikel.m95@gmail.com>
Cc: Timothe Litt <litt@acm.org>, bind-users@isc.org
From: Mark Andrews <marka@isc.org>
References: <45336A86FEAC4E029843F665D31B588A@sb.litts.net> <BANLkTim=MAAu1y+XH7yziBMRZNvx30zzFQ@mail.gmail.com>
Subject: Re: DNAME?
In-reply-to: Your message of "Thu, 30 Jun 2011 15:10:38 EST."
             <BANLkTim=MAAu1y+XH7yziBMRZNvx30zzFQ@mail.gmail.com>
Date: Fri, 01 Jul 2011 10:58:29 +1000


In message <BANLkTim=MAAu1y+XH7yziBMRZNvx30zzFQ@mail.gmail.com>, "Jon F." write
s:
> I have a similar set up to that and it works. Have you checked the logs to
> make sure the zone properly loaded? I'm assuming the zone data you posted
> below is from the example.us zone but your first question makes it sound
> like you put it in a seperate zone. That would explain the SERVFAIL if the
> zone data never loaded but the server was authoritative. It does need to be
> in the .us.
> 
> 
> ;; ANSWER SECTION:
> example.com.           60      IN      DNAME   example.net.
> test.example.com.     60      IN      CNAME   test.example.net.
> test.example.net.       60      IN      A       127.0.0.1
> 
> 
> 
> And that's with zone data like this:
> example.com.  IN NS ns1.example.net.
> example.com.   IN NS ns2.example.net.
> example.com.  IN A 10.0.0.1
> example.com. IN DNAME example.net.
> 
> 
> Truthfully I haven't looked at DNAME's in a long time so I'm unsure how to
> do it fully for a domain without adding an A record as well. But what your
> doing works, it's just not very pretty. Someone may have a better way.

There is an outstanding proposals for BNAME.  This would be added
to the parent zone instead of NS records and would synthesis CNAMEs
records for the domain and its children.

This has got bogged down in IETF politics over how to fix idn rather
that be allowed to stand on its own merits.

Mark
- -- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

------- End of Blind-Carbon-Copy

From snwells82@gmail.com  Fri Jul  1 09:49:21 2011
Return-Path: <snwells82@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9D481F0C95 for <dnsext@ietfa.amsl.com>; Fri,  1 Jul 2011 09:49:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.531
X-Spam-Level: 
X-Spam-Status: No, score=-3.531 tagged_above=-999 required=5 tests=[AWL=-0.533, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_37=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U7Z4I4ajt7XX for <dnsext@ietfa.amsl.com>; Fri,  1 Jul 2011 09:49:21 -0700 (PDT)
Received: from mail-vw0-f44.google.com (mail-vw0-f44.google.com [209.85.212.44]) by ietfa.amsl.com (Postfix) with ESMTP id B63C11F0C92 for <dnsext@ietf.org>; Fri,  1 Jul 2011 09:49:20 -0700 (PDT)
Received: by vws12 with SMTP id 12so3058611vws.31 for <dnsext@ietf.org>; Fri, 01 Jul 2011 09:49:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=AdPzzg0/7YrdMRN8WsBqhFbCXw13WQknz6/TsTQmjVo=; b=YUwZcYt+KtgQ/zoWLm00qME0Ny5BFU02jQ079xKQP6w66kPonPmkBHtWMcsxhofyeN ZyNbR8eTjBYs8dS+59TxSm90QKyTro3o6OJZ/hvmdY2iyCKKZF/pfO2IV4edYs6PTiq9 4dTKOCucKYqSztb2lP0a9d4e9n4sqS5IkKsNo=
MIME-Version: 1.0
Received: by 10.220.213.202 with SMTP id gx10mr1359123vcb.77.1309538959946; Fri, 01 Jul 2011 09:49:19 -0700 (PDT)
Received: by 10.220.198.200 with HTTP; Fri, 1 Jul 2011 09:49:19 -0700 (PDT)
In-Reply-To: <DB8097F2-72B0-448F-9607-7BA3F7473315@verisign.com>
References: <BANLkTinRXEmhC_5ikFfoXczat6+4UPJ1pA@mail.gmail.com> <DB8097F2-72B0-448F-9607-7BA3F7473315@verisign.com>
Date: Fri, 1 Jul 2011 09:49:19 -0700
Message-ID: <BANLkTi=OnJGEnH9nMLb3AndrSG-RNgR7CQ@mail.gmail.com>
From: Sean Wells <snwells82@gmail.com>
To: "Blacka, David" <davidb@verisign.com>
Content-Type: multipart/alternative; boundary=bcaec54eef9a86f4e404a704cce8
Cc: "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] Insecure Delegation Proofs
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Jul 2011 16:49:21 -0000

--bcaec54eef9a86f4e404a704cce8
Content-Type: text/plain; charset=ISO-8859-1

On Fri, Jul 1, 2011 at 6:28 AM, Blacka, David <davidb@verisign.com> wrote:

>
> On Jun 30, 2011, at 3:18 PM, Sean Wells wrote:
>
> > Hi,
> >
> > DNSSEC bis updates document states:
> >
> > [RFC4035] Section
> > 5.2<
> http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-bis-updates-12#section-5.2
> >specifies
> > that a validator, when proving a
> >
> >   delegation is not secure, needs to check for the absence of the DS
> >   and SOA bits in the NSEC (or NSEC3) type bitmap.  The validator also
> >   needs to check for the presence of the NS bit in the matching NSEC
> >   (or NSEC3) RR (proving that there is, indeed, a delegation), or
> >   alternately make sure that the delegation is covered by an NSEC3 RR
> >   with the Opt-Out flag set.  If this is not checked, spoofed unsigned
> >   delegations might be used to claim that an existing signed record is
> >   not signed.
> >
> >
> > The last sentence is confusing: what is a "spoofed unsigned
> > delegation" ? Let us say that there are two delegations one of which
> > is secure.
>
> A spoofed unsigned delegation is a spoofed response in the form of a
> referral ("delegation" basically means referral here) without a DS RRset.
>
> > a.com is secure, so there is a DS record in com
> >
> > b.com is insecure, so there is a NSEC record for b.com in com with DS,
> > SOA bits not set but the NS bit set.
> >
> >
> > I am looking up the DS record for "a.com". The attacker is responding
> > the NSEC record for b.com (or it was already in my cache). In this
> > case, the owner name does not match the SNAME (a.com). I thought we
> > checked the bitmap of the NSEC only if the owner name matches. This
> > NSEC record might still be accepted depending on what is there in the
> > "Next domain field". Is this the attack that is being described ?
>
> No.  This attack is about obscuring non-delegation names (i.e., and
> "existing signed record") with the spoofed delegation.  So, imagine you have
> a signed zone, foo.example.  In that zone, you have an RRset that an
> attacker wants to change: secure.foo.example/A.  Now, there exists an NSEC
> record for secure.foo.example:
>
>  secure.foo.example NSEC secure2.foo.example A NSEC RRSIG
>
> So, when a client asks for secure.foo.example/A, the attacker spoofs a
> response that looks like this:
>
>  secure.foo.example NS bad-ns1.attacker.example.
>  secure.foo.example NS bad-ns2.attacker.example.
>  secure.foo.example NSEC secure2.foo.example A NSEC RRSIG
>  secure.foo.example RRSIG NSEC ...
>
> That is, the attacker uses the existing NSEC for secure.foo.example.  Note
> however, that this NSEC record's type map does not have the DS bit set.  So,
> if you are a naive validator, you might just follow the referral, noting it
> is insecure (because the DS bit isn't set), but fail to notice that it
> shouldn't have been a delegation at all.  Hence the advice.
>
> Ah! got it. An example always makes it much clearer. This is not even an
attack. I could have looked up a name (that does not exist) earlier that
resulted in the NSEC record in my cache and later when I look up the DS
record, this would answer it.  I suggest we reword the last sentence to make
it clearer.  Something like:

       As every authoritative name in the zone has a valid NSEC record, it
could potentially answer a question
       that is looking for a DS record for any such name. Checking the NS
bit makes sure that this NSEC record
       will not be mistaken for a unsigned delegation.

does that sound right ? I wouldn't even call it an attack. The best way is
to show the above example in the appendix.

thanks
Sean

--
> David Blacka                          <davidb@verisign.com>
> Principal Engineer      Verisign Infrastructure Engineering
>
>


-- 
Sean

--bcaec54eef9a86f4e404a704cce8
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Fri, Jul 1, 2011 at 6:28 AM, Blacka, =
David <span dir=3D"ltr">&lt;<a href=3D"mailto:davidb@verisign.com">davidb@v=
erisign.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div class=3D"im"><br>
On Jun 30, 2011, at 3:18 PM, Sean Wells wrote:<br>
<br>
&gt; Hi,<br>
&gt;<br>
&gt; DNSSEC bis updates document states:<br>
&gt;<br>
&gt; [RFC4035] Section<br>
</div>&gt; 5.2&lt;<a href=3D"http://tools.ietf.org/html/draft-ietf-dnsext-d=
nssec-bis-updates-12#section-5.2" target=3D"_blank">http://tools.ietf.org/h=
tml/draft-ietf-dnsext-dnssec-bis-updates-12#section-5.2</a>&gt;specifies<br=
>

<div class=3D"im">&gt; that a validator, when proving a<br>
&gt;<br>
&gt; =A0 delegation is not secure, needs to check for the absence of the DS=
<br>
&gt; =A0 and SOA bits in the NSEC (or NSEC3) type bitmap. =A0The validator =
also<br>
&gt; =A0 needs to check for the presence of the NS bit in the matching NSEC=
<br>
&gt; =A0 (or NSEC3) RR (proving that there is, indeed, a delegation), or<br=
>
&gt; =A0 alternately make sure that the delegation is covered by an NSEC3 R=
R<br>
&gt; =A0 with the Opt-Out flag set. =A0If this is not checked, spoofed unsi=
gned<br>
&gt; =A0 delegations might be used to claim that an existing signed record =
is<br>
&gt; =A0 not signed.<br>
&gt;<br>
&gt;<br>
&gt; The last sentence is confusing: what is a &quot;spoofed unsigned<br>
&gt; delegation&quot; ? Let us say that there are two delegations one of wh=
ich<br>
&gt; is secure.<br>
<br>
</div>A spoofed unsigned delegation is a spoofed response in the form of a =
referral (&quot;delegation&quot; basically means referral here) without a D=
S RRset.<br>
<div class=3D"im"><br>
&gt; <a href=3D"http://a.com" target=3D"_blank">a.com</a> is secure, so the=
re is a DS record in com<br>
&gt;<br>
&gt; <a href=3D"http://b.com" target=3D"_blank">b.com</a> is insecure, so t=
here is a NSEC record for <a href=3D"http://b.com" target=3D"_blank">b.com<=
/a> in com with DS,<br>
&gt; SOA bits not set but the NS bit set.<br>
&gt;<br>
&gt;<br>
&gt; I am looking up the DS record for &quot;<a href=3D"http://a.com" targe=
t=3D"_blank">a.com</a>&quot;. The attacker is responding<br>
&gt; the NSEC record for <a href=3D"http://b.com" target=3D"_blank">b.com</=
a> (or it was already in my cache). In this<br>
&gt; case, the owner name does not match the SNAME (<a href=3D"http://a.com=
" target=3D"_blank">a.com</a>). I thought we<br>
&gt; checked the bitmap of the NSEC only if the owner name matches. This<br=
>
&gt; NSEC record might still be accepted depending on what is there in the<=
br>
&gt; &quot;Next domain field&quot;. Is this the attack that is being descri=
bed ?<br>
<br>
</div>No. =A0This attack is about obscuring non-delegation names (i.e., and=
 &quot;existing signed record&quot;) with the spoofed delegation. =A0So, im=
agine you have a signed zone, foo.example. =A0In that zone, you have an RRs=
et that an attacker wants to change: secure.foo.example/A. =A0Now, there ex=
ists an NSEC record for secure.foo.example:<br>

<br>
 =A0secure.foo.example NSEC secure2.foo.example A NSEC RRSIG<br>
<br>
So, when a client asks for secure.foo.example/A, the attacker spoofs a resp=
onse that looks like this:<br>
<br>
 =A0secure.foo.example NS bad-ns1.attacker.example.<br>
 =A0secure.foo.example NS bad-ns2.attacker.example.<br>
 =A0secure.foo.example NSEC secure2.foo.example A NSEC RRSIG<br>
 =A0secure.foo.example RRSIG NSEC ...<br>
<br>
That is, the attacker uses the existing NSEC for secure.foo.example. =A0Not=
e however, that this NSEC record&#39;s type map does not have the DS bit se=
t. =A0So, if you are a naive validator, you might just follow the referral,=
 noting it is insecure (because the DS bit isn&#39;t set), but fail to noti=
ce that it shouldn&#39;t have been a delegation at all. =A0Hence the advice=
.<br>

<font color=3D"#888888"><br></font></blockquote><div>Ah! got it. An example=
 always makes it much clearer. This is not even an attack. I could have loo=
ked up a name (that does not exist) earlier that resulted in the NSEC recor=
d in my cache and later when I look up the DS record, this would answer it.=
 =A0I suggest we reword the last sentence to make it clearer. =A0Something =
like:</div>
<div><br></div><div>=A0 =A0 =A0 =A0As every authoritative name in the zone =
has a valid NSEC record, it could potentially answer a question</div><div>=
=A0 =A0 =A0 =A0that is looking for a DS record for any such name.=A0Checkin=
g the NS bit makes sure=A0that this NSEC record</div>
<div>=A0 =A0 =A0 =A0will not be mistaken for a unsigned delegation.</div><d=
iv><br></div><div>does that sound right ? I wouldn&#39;t even call it an at=
tack. The best way is to show the above example in the appendix.=A0</div><d=
iv><br>
</div><div>thanks</div><div>Sean</div><div><br></div><blockquote class=3D"g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex;"><font color=3D"#888888">
--<br>
David Blacka =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0&lt;<a href=
=3D"mailto:davidb@verisign.com">davidb@verisign.com</a>&gt;<br>
Principal Engineer =A0 =A0 =A0Verisign Infrastructure Engineering<br>
<br>
</font></blockquote></div><br><br clear=3D"all"><br>-- <br>Sean<br>

--bcaec54eef9a86f4e404a704cce8--

From davidb@verisign.com  Fri Jul  1 10:53:07 2011
Return-Path: <davidb@verisign.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF2B711E809F for <dnsext@ietfa.amsl.com>; Fri,  1 Jul 2011 10:53:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.999
X-Spam-Level: 
X-Spam-Status: No, score=-5.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_37=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xxffgeRLz8UY for <dnsext@ietfa.amsl.com>; Fri,  1 Jul 2011 10:53:07 -0700 (PDT)
Received: from exprod6og106.obsmtp.com (exprod6og106.obsmtp.com [64.18.1.191]) by ietfa.amsl.com (Postfix) with ESMTP id 6984011E8078 for <dnsext@ietf.org>; Fri,  1 Jul 2011 10:53:06 -0700 (PDT)
Received: from peregrine.verisign.com ([216.168.239.74]) (using TLSv1) by exprod6ob106.postini.com ([64.18.5.12]) with SMTP ID DSNKTg4JgHu2KrX8timwAfIBsACgcwk0j94q@postini.com; Fri, 01 Jul 2011 10:53:06 PDT
Received: from dul1wnexcn03.vcorp.ad.vrsn.com (dul1wnexcn03.vcorp.ad.vrsn.com [10.170.12.113]) by peregrine.verisign.com (8.13.6/8.13.4) with ESMTP id p61Hr4Mo030522;  Fri, 1 Jul 2011 13:53:04 -0400
Received: from dul1wnexcn04.vcorp.ad.vrsn.com ([10.170.12.139]) by dul1wnexcn03.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 1 Jul 2011 13:53:03 -0400
Received: from BRN1WNEXCAS01.vcorp.ad.vrsn.com ([10.173.152.205]) by dul1wnexcn04.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 1 Jul 2011 13:53:03 -0400
Received: from BRN1WNEXCAS02.vcorp.ad.vrsn.com (10.173.152.206) by brn1wnexcas01.vcorp.ad.vrsn.com (10.173.152.205) with Microsoft SMTP Server (TLS) id 14.1.289.1; Fri, 1 Jul 2011 13:53:03 -0400
Received: from BRN1WNEXMBX01.vcorp.ad.vrsn.com ([::1]) by brn1wnexcas02.vcorp.ad.vrsn.com ([::1]) with mapi id 14.01.0289.001; Fri, 1 Jul 2011 13:53:02 -0400
From: "Blacka, David" <davidb@verisign.com>
To: Sean Wells <snwells82@gmail.com>
Thread-Topic: [dnsext] Insecure Delegation Proofs
Thread-Index: AQHMN1qUpwJKDDaAkEemA95misk0TZTXueeAgAA4FYCAABHOAA==
Date: Fri, 1 Jul 2011 17:53:02 +0000
Message-ID: <3294DE6F-0618-4083-8AE8-254EF8618087@verisign.com>
References: <BANLkTinRXEmhC_5ikFfoXczat6+4UPJ1pA@mail.gmail.com> <DB8097F2-72B0-448F-9607-7BA3F7473315@verisign.com> <BANLkTi=OnJGEnH9nMLb3AndrSG-RNgR7CQ@mail.gmail.com>
In-Reply-To: <BANLkTi=OnJGEnH9nMLb3AndrSG-RNgR7CQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.173.152.4]
Content-Type: multipart/signed; boundary="Apple-Mail-38-523100696"; protocol="application/pkcs7-signature"; micalg=sha1
MIME-Version: 1.0
X-OriginalArrivalTime: 01 Jul 2011 17:53:03.0730 (UTC) FILETIME=[B9AB0D20:01CC3817]
Cc: "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] Insecure Delegation Proofs
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Jul 2011 17:53:07 -0000

--Apple-Mail-38-523100696
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


On Jul 1, 2011, at 12:49 PM, Sean Wells wrote:

> On Fri, Jul 1, 2011 at 6:28 AM, Blacka, David <davidb@verisign.com> =
wrote:
>=20
>>=20
>> On Jun 30, 2011, at 3:18 PM, Sean Wells wrote:
>>=20
>>> Hi,
>>>=20
>>> DNSSEC bis updates document states:
>>>=20
>>> [RFC4035] Section
>>> 5.2<
>> =
http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-bis-updates-12#section=
-5.2
>>> specifies
>>> that a validator, when proving a
>>>=20
>>>  delegation is not secure, needs to check for the absence of the DS
>>>  and SOA bits in the NSEC (or NSEC3) type bitmap.  The validator =
also
>>>  needs to check for the presence of the NS bit in the matching NSEC
>>>  (or NSEC3) RR (proving that there is, indeed, a delegation), or
>>>  alternately make sure that the delegation is covered by an NSEC3 RR
>>>  with the Opt-Out flag set.  If this is not checked, spoofed =
unsigned
>>>  delegations might be used to claim that an existing signed record =
is
>>>  not signed.
>>>=20
>>>=20
>>> The last sentence is confusing: what is a "spoofed unsigned
>>> delegation" ? Let us say that there are two delegations one of which
>>> is secure.
>>=20
>> A spoofed unsigned delegation is a spoofed response in the form of a
>> referral ("delegation" basically means referral here) without a DS =
RRset.
>>=20
>>> a.com is secure, so there is a DS record in com
>>>=20
>>> b.com is insecure, so there is a NSEC record for b.com in com with =
DS,
>>> SOA bits not set but the NS bit set.
>>>=20
>>>=20
>>> I am looking up the DS record for "a.com". The attacker is =
responding
>>> the NSEC record for b.com (or it was already in my cache). In this
>>> case, the owner name does not match the SNAME (a.com). I thought we
>>> checked the bitmap of the NSEC only if the owner name matches. This
>>> NSEC record might still be accepted depending on what is there in =
the
>>> "Next domain field". Is this the attack that is being described ?
>>=20
>> No.  This attack is about obscuring non-delegation names (i.e., and
>> "existing signed record") with the spoofed delegation.  So, imagine =
you have
>> a signed zone, foo.example.  In that zone, you have an RRset that an
>> attacker wants to change: secure.foo.example/A.  Now, there exists an =
NSEC
>> record for secure.foo.example:
>>=20
>> secure.foo.example NSEC secure2.foo.example A NSEC RRSIG
>>=20
>> So, when a client asks for secure.foo.example/A, the attacker spoofs =
a
>> response that looks like this:
>>=20
>> secure.foo.example NS bad-ns1.attacker.example.
>> secure.foo.example NS bad-ns2.attacker.example.
>> secure.foo.example NSEC secure2.foo.example A NSEC RRSIG
>> secure.foo.example RRSIG NSEC ...
>>=20
>> That is, the attacker uses the existing NSEC for secure.foo.example.  =
Note
>> however, that this NSEC record's type map does not have the DS bit =
set.  So,
>> if you are a naive validator, you might just follow the referral, =
noting it
>> is insecure (because the DS bit isn't set), but fail to notice that =
it
>> shouldn't have been a delegation at all.  Hence the advice.


>> Ah! got it. An example always makes it much clearer. This is not even =
an
> attack. I could have looked up a name (that does not exist) earlier =
that
> resulted in the NSEC record in my cache and later when I look up the =
DS
> record, this would answer it. =20

This is an attack.  The attack is where the bogus NS records come from.

> I suggest we reword the last sentence to make
> it clearer.  Something like:
>=20
>       As every authoritative name in the zone has a valid NSEC record, =
it
> could potentially answer a question
>       that is looking for a DS record for any such name. Checking the =
NS
> bit makes sure that this NSEC record
>       will not be mistaken for a unsigned delegation.
>=20
> does that sound right ? I wouldn't even call it an attack. The best =
way is
> to show the above example in the appendix.

No, it doesn't sound quite correct.  "it could potentially answer a =
question that is looking for a DS..." is true, but irrelevant to this =
case.  The case that this advice is guarding against isn't that specific =
to qtype.  I'm not going to claim that the current language is as clear =
as it could be, but this replacement text doesn't quite work, either.

--
David Blacka                          <davidb@verisign.com>=20
Principal Engineer      Verisign Infrastructure Engineering


--Apple-Mail-38-523100696
Content-Disposition: attachment; filename="smime.p7s"
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
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==

--Apple-Mail-38-523100696--

From snwells82@gmail.com  Fri Jul  1 11:33:07 2011
Return-Path: <snwells82@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B19B11E8080 for <dnsext@ietfa.amsl.com>; Fri,  1 Jul 2011 11:33:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.442
X-Spam-Level: 
X-Spam-Status: No, score=-3.442 tagged_above=-999 required=5 tests=[AWL=-0.444, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_37=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HsnYhgfmJUkG for <dnsext@ietfa.amsl.com>; Fri,  1 Jul 2011 11:33:06 -0700 (PDT)
Received: from mail-vx0-f172.google.com (mail-vx0-f172.google.com [209.85.220.172]) by ietfa.amsl.com (Postfix) with ESMTP id 1915811E8126 for <dnsext@ietf.org>; Fri,  1 Jul 2011 11:33:06 -0700 (PDT)
Received: by vxi40 with SMTP id 40so3139196vxi.31 for <dnsext@ietf.org>; Fri, 01 Jul 2011 11:33:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=bMzCRDJ/dnOyqmV5pmsMFfuuEHKoHtF0BJfS5FO+Dy8=; b=GPG/9xMRhNOngtb3p3elP3JSeLkp2/sLOEutb93zqII4MYnwvT1pRNIS8PvGh0s2n0 G0Ur0TUnPbDQO1LU52w9k9dm96SMgDDC1Qs+bK+oow+9SWNvU7scmo0hyw7zrXOu+a9t u4V94LtCpJw/G406T8vkHTxaz5u+er9H0VTBo=
MIME-Version: 1.0
Received: by 10.220.118.195 with SMTP id w3mr1229811vcq.112.1309545185247; Fri, 01 Jul 2011 11:33:05 -0700 (PDT)
Received: by 10.220.198.200 with HTTP; Fri, 1 Jul 2011 11:33:05 -0700 (PDT)
In-Reply-To: <3294DE6F-0618-4083-8AE8-254EF8618087@verisign.com>
References: <BANLkTinRXEmhC_5ikFfoXczat6+4UPJ1pA@mail.gmail.com> <DB8097F2-72B0-448F-9607-7BA3F7473315@verisign.com> <BANLkTi=OnJGEnH9nMLb3AndrSG-RNgR7CQ@mail.gmail.com> <3294DE6F-0618-4083-8AE8-254EF8618087@verisign.com>
Date: Fri, 1 Jul 2011 11:33:05 -0700
Message-ID: <BANLkTikfyFNoB2+Ch3f1txhTXjqjmwkTeg@mail.gmail.com>
From: Sean Wells <snwells82@gmail.com>
To: "Blacka, David" <davidb@verisign.com>
Content-Type: multipart/alternative; boundary=00032555853e9580a804a7063f8a
Cc: "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] Insecure Delegation Proofs
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Jul 2011 18:33:07 -0000

--00032555853e9580a804a7063f8a
Content-Type: text/plain; charset=ISO-8859-1

On Fri, Jul 1, 2011 at 10:53 AM, Blacka, David <davidb@verisign.com> wrote:

>
> On Jul 1, 2011, at 12:49 PM, Sean Wells wrote:
>
> > On Fri, Jul 1, 2011 at 6:28 AM, Blacka, David <davidb@verisign.com>
> wrote:
> >
> >>
> >> On Jun 30, 2011, at 3:18 PM, Sean Wells wrote:
> >>
> >>> Hi,
> >>>
> >>> DNSSEC bis updates document states:
> >>>
> >>> [RFC4035] Section
> >>> 5.2<
> >>
> http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-bis-updates-12#section-5.2
> >>> specifies
> >>> that a validator, when proving a
> >>>
> >>>  delegation is not secure, needs to check for the absence of the DS
> >>>  and SOA bits in the NSEC (or NSEC3) type bitmap.  The validator also
> >>>  needs to check for the presence of the NS bit in the matching NSEC
> >>>  (or NSEC3) RR (proving that there is, indeed, a delegation), or
> >>>  alternately make sure that the delegation is covered by an NSEC3 RR
> >>>  with the Opt-Out flag set.  If this is not checked, spoofed unsigned
> >>>  delegations might be used to claim that an existing signed record is
> >>>  not signed.
> >>>
> >>>
> >>> The last sentence is confusing: what is a "spoofed unsigned
> >>> delegation" ? Let us say that there are two delegations one of which
> >>> is secure.
> >>
> >> A spoofed unsigned delegation is a spoofed response in the form of a
> >> referral ("delegation" basically means referral here) without a DS
> RRset.
> >>
> >>> a.com is secure, so there is a DS record in com
> >>>
> >>> b.com is insecure, so there is a NSEC record for b.com in com with DS,
> >>> SOA bits not set but the NS bit set.
> >>>
> >>>
> >>> I am looking up the DS record for "a.com". The attacker is responding
> >>> the NSEC record for b.com (or it was already in my cache). In this
> >>> case, the owner name does not match the SNAME (a.com). I thought we
> >>> checked the bitmap of the NSEC only if the owner name matches. This
> >>> NSEC record might still be accepted depending on what is there in the
> >>> "Next domain field". Is this the attack that is being described ?
> >>
> >> No.  This attack is about obscuring non-delegation names (i.e., and
> >> "existing signed record") with the spoofed delegation.  So, imagine you
> have
> >> a signed zone, foo.example.  In that zone, you have an RRset that an
> >> attacker wants to change: secure.foo.example/A.  Now, there exists an
> NSEC
> >> record for secure.foo.example:
> >>
> >> secure.foo.example NSEC secure2.foo.example A NSEC RRSIG
> >>
> >> So, when a client asks for secure.foo.example/A, the attacker spoofs a
> >> response that looks like this:
> >>
> >> secure.foo.example NS bad-ns1.attacker.example.
> >> secure.foo.example NS bad-ns2.attacker.example.
> >> secure.foo.example NSEC secure2.foo.example A NSEC RRSIG
> >> secure.foo.example RRSIG NSEC ...
> >>
> >> That is, the attacker uses the existing NSEC for secure.foo.example.
>  Note
> >> however, that this NSEC record's type map does not have the DS bit set.
>  So,
> >> if you are a naive validator, you might just follow the referral, noting
> it
> >> is insecure (because the DS bit isn't set), but fail to notice that it
> >> shouldn't have been a delegation at all.  Hence the advice.
>
>
> >> Ah! got it. An example always makes it much clearer. This is not even an
> > attack. I could have looked up a name (that does not exist) earlier that
> > resulted in the NSEC record in my cache and later when I look up the DS
> > record, this would answer it.
>
> This is an attack.  The attack is where the bogus NS records come from.
>
> Hmm.. perhaps i am misunderstanding something then. Is it possible for this
to happen even without an attack ? Just by merely using the NSEC record to
answer the question (wrongly) ?


> > I suggest we reword the last sentence to make
> > it clearer.  Something like:
> >
> >       As every authoritative name in the zone has a valid NSEC record, it
> > could potentially answer a question
> >       that is looking for a DS record for any such name. Checking the NS
> > bit makes sure that this NSEC record
> >       will not be mistaken for a unsigned delegation.
> >
> > does that sound right ? I wouldn't even call it an attack. The best way
> is
> > to show the above example in the appendix.
>
> No, it doesn't sound quite correct.  "it could potentially answer a
> question that is looking for a DS..." is true, but irrelevant to this case.
>  The case that this advice is guarding against isn't that specific to qtype.
>  I'm not going to claim that the current language is as clear as it could
> be, but this replacement text doesn't quite work, either.
>
> Section 5.2 in RFC 4035 is about authenticating referrals where the DS
RRSets are being looked up. Why is this irrelevant to this case ? Perhaps,
this section is more than 5.2 and i am not reading it properly.




> --
> David Blacka                          <davidb@verisign.com>
> Principal Engineer      Verisign Infrastructure Engineering
>
>
Sean

--00032555853e9580a804a7063f8a
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Fri, Jul 1, 2011 at 10:53 AM, Blacka,=
 David <span dir=3D"ltr">&lt;<a href=3D"mailto:davidb@verisign.com">davidb@=
verisign.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div><div></div><div class=3D"h5"><br>
On Jul 1, 2011, at 12:49 PM, Sean Wells wrote:<br>
<br>
&gt; On Fri, Jul 1, 2011 at 6:28 AM, Blacka, David &lt;<a href=3D"mailto:da=
vidb@verisign.com">davidb@verisign.com</a>&gt; wrote:<br>
&gt;<br>
&gt;&gt;<br>
&gt;&gt; On Jun 30, 2011, at 3:18 PM, Sean Wells wrote:<br>
&gt;&gt;<br>
&gt;&gt;&gt; Hi,<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; DNSSEC bis updates document states:<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; [RFC4035] Section<br>
&gt;&gt;&gt; 5.2&lt;<br>
&gt;&gt; <a href=3D"http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-bis=
-updates-12#section-5.2" target=3D"_blank">http://tools.ietf.org/html/draft=
-ietf-dnsext-dnssec-bis-updates-12#section-5.2</a><br>
&gt;&gt;&gt; specifies<br>
&gt;&gt;&gt; that a validator, when proving a<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; =A0delegation is not secure, needs to check for the absence of=
 the DS<br>
&gt;&gt;&gt; =A0and SOA bits in the NSEC (or NSEC3) type bitmap. =A0The val=
idator also<br>
&gt;&gt;&gt; =A0needs to check for the presence of the NS bit in the matchi=
ng NSEC<br>
&gt;&gt;&gt; =A0(or NSEC3) RR (proving that there is, indeed, a delegation)=
, or<br>
&gt;&gt;&gt; =A0alternately make sure that the delegation is covered by an =
NSEC3 RR<br>
&gt;&gt;&gt; =A0with the Opt-Out flag set. =A0If this is not checked, spoof=
ed unsigned<br>
&gt;&gt;&gt; =A0delegations might be used to claim that an existing signed =
record is<br>
&gt;&gt;&gt; =A0not signed.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; The last sentence is confusing: what is a &quot;spoofed unsign=
ed<br>
&gt;&gt;&gt; delegation&quot; ? Let us say that there are two delegations o=
ne of which<br>
&gt;&gt;&gt; is secure.<br>
&gt;&gt;<br>
&gt;&gt; A spoofed unsigned delegation is a spoofed response in the form of=
 a<br>
&gt;&gt; referral (&quot;delegation&quot; basically means referral here) wi=
thout a DS RRset.<br>
&gt;&gt;<br>
&gt;&gt;&gt; <a href=3D"http://a.com" target=3D"_blank">a.com</a> is secure=
, so there is a DS record in com<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; <a href=3D"http://b.com" target=3D"_blank">b.com</a> is insecu=
re, so there is a NSEC record for <a href=3D"http://b.com" target=3D"_blank=
">b.com</a> in com with DS,<br>
&gt;&gt;&gt; SOA bits not set but the NS bit set.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; I am looking up the DS record for &quot;<a href=3D"http://a.co=
m" target=3D"_blank">a.com</a>&quot;. The attacker is responding<br>
&gt;&gt;&gt; the NSEC record for <a href=3D"http://b.com" target=3D"_blank"=
>b.com</a> (or it was already in my cache). In this<br>
&gt;&gt;&gt; case, the owner name does not match the SNAME (<a href=3D"http=
://a.com" target=3D"_blank">a.com</a>). I thought we<br>
&gt;&gt;&gt; checked the bitmap of the NSEC only if the owner name matches.=
 This<br>
&gt;&gt;&gt; NSEC record might still be accepted depending on what is there=
 in the<br>
&gt;&gt;&gt; &quot;Next domain field&quot;. Is this the attack that is bein=
g described ?<br>
&gt;&gt;<br>
&gt;&gt; No. =A0This attack is about obscuring non-delegation names (i.e., =
and<br>
&gt;&gt; &quot;existing signed record&quot;) with the spoofed delegation. =
=A0So, imagine you have<br>
&gt;&gt; a signed zone, foo.example. =A0In that zone, you have an RRset tha=
t an<br>
&gt;&gt; attacker wants to change: secure.foo.example/A. =A0Now, there exis=
ts an NSEC<br>
&gt;&gt; record for secure.foo.example:<br>
&gt;&gt;<br>
&gt;&gt; secure.foo.example NSEC secure2.foo.example A NSEC RRSIG<br>
&gt;&gt;<br>
&gt;&gt; So, when a client asks for secure.foo.example/A, the attacker spoo=
fs a<br>
&gt;&gt; response that looks like this:<br>
&gt;&gt;<br>
&gt;&gt; secure.foo.example NS bad-ns1.attacker.example.<br>
&gt;&gt; secure.foo.example NS bad-ns2.attacker.example.<br>
&gt;&gt; secure.foo.example NSEC secure2.foo.example A NSEC RRSIG<br>
&gt;&gt; secure.foo.example RRSIG NSEC ...<br>
&gt;&gt;<br>
&gt;&gt; That is, the attacker uses the existing NSEC for secure.foo.exampl=
e. =A0Note<br>
&gt;&gt; however, that this NSEC record&#39;s type map does not have the DS=
 bit set. =A0So,<br>
&gt;&gt; if you are a naive validator, you might just follow the referral, =
noting it<br>
&gt;&gt; is insecure (because the DS bit isn&#39;t set), but fail to notice=
 that it<br>
&gt;&gt; shouldn&#39;t have been a delegation at all. =A0Hence the advice.<=
br>
<br>
<br>
&gt;&gt; Ah! got it. An example always makes it much clearer. This is not e=
ven an<br>
&gt; attack. I could have looked up a name (that does not exist) earlier th=
at<br>
&gt; resulted in the NSEC record in my cache and later when I look up the D=
S<br>
&gt; record, this would answer it.<br>
<br>
</div></div>This is an attack. =A0The attack is where the bogus NS records =
come from.<br>
<div class=3D"im"><br></div></blockquote><div>Hmm.. perhaps i am misunderst=
anding something then. Is it possible for this to happen even without an at=
tack ? Just by merely using the NSEC record to answer the question (wrongly=
) ?</div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex;"><div class=3D"im">
&gt; I suggest we reword the last sentence to make<br>
&gt; it clearer. =A0Something like:<br>
&gt;<br>
&gt; =A0 =A0 =A0 As every authoritative name in the zone has a valid NSEC r=
ecord, it<br>
&gt; could potentially answer a question<br>
&gt; =A0 =A0 =A0 that is looking for a DS record for any such name. Checkin=
g the NS<br>
&gt; bit makes sure that this NSEC record<br>
&gt; =A0 =A0 =A0 will not be mistaken for a unsigned delegation.<br>
&gt;<br>
&gt; does that sound right ? I wouldn&#39;t even call it an attack. The bes=
t way is<br>
&gt; to show the above example in the appendix.<br>
<br>
</div>No, it doesn&#39;t sound quite correct. =A0&quot;it could potentially=
 answer a question that is looking for a DS...&quot; is true, but irrelevan=
t to this case. =A0The case that this advice is guarding against isn&#39;t =
that specific to qtype. =A0I&#39;m not going to claim that the current lang=
uage is as clear as it could be, but this replacement text doesn&#39;t quit=
e work, either.<br>

<div><div></div><div class=3D"h5"><br></div></div></blockquote><div>Section=
 5.2 in RFC 4035 is about authenticating referrals where the DS RRSets are =
being looked up. Why is this irrelevant to this case ? Perhaps, this sectio=
n is more than 5.2 and i am not reading it properly.</div>
<div><br></div><div><br></div><div>=A0</div><blockquote class=3D"gmail_quot=
e" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;"=
><div><div class=3D"h5">
--<br>
David Blacka =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0&lt;<a href=
=3D"mailto:davidb@verisign.com">davidb@verisign.com</a>&gt;<br>
Principal Engineer =A0 =A0 =A0Verisign Infrastructure Engineering<br>
<br></div></div></blockquote><div><br></div><div>Sean=A0</div></div><br><br=
>

--00032555853e9580a804a7063f8a--

From internet-drafts@ietf.org  Tue Jul  5 09:11:03 2011
Return-Path: <internet-drafts@ietf.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D1D721F85D2; Tue,  5 Jul 2011 09:11:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.59
X-Spam-Level: 
X-Spam-Status: No, score=-102.59 tagged_above=-999 required=5 tests=[AWL=0.009, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pcnMPYEB-JrY; Tue,  5 Jul 2011 09:11:02 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C53DF21F85CC; Tue,  5 Jul 2011 09:11:01 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 3.55
Message-ID: <20110705161101.23937.25957.idtracker@ietfa.amsl.com>
Date: Tue, 05 Jul 2011 09:11:01 -0700
Cc: dnsext@ietf.org
Subject: [dnsext] I-D Action: draft-ietf-dnsext-ecdsa-01.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Jul 2011 16:11:03 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies. This draft is a work item of the DNS Extensions Working Group of the I=
ETF.

	Title           : Elliptic Curve DSA for DNSSEC
	Author(s)       : Paul Hoffman
                          Wouter Wijngaards
	Filename        : draft-ietf-dnsext-ecdsa-01.txt
	Pages           : 8
	Date            : 2011-07-05

   This document describes how to specify Elliptic Curve DSA keys and
   signatures in DNSSEC.  It lists curves of different sizes, and uses
   the SHA-2 family of hashes for signatures.


A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-ecdsa-01.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

This Internet-Draft can be retrieved at:
ftp://ftp.ietf.org/internet-drafts/draft-ietf-dnsext-ecdsa-01.txt

From internet-drafts@ietf.org  Wed Jul  6 06:50:13 2011
Return-Path: <internet-drafts@ietf.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BB6021F872E; Wed,  6 Jul 2011 06:50:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.582
X-Spam-Level: 
X-Spam-Status: No, score=-102.582 tagged_above=-999 required=5 tests=[AWL=0.017, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id btb+Hi8u5ruH; Wed,  6 Jul 2011 06:50:12 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8438321F863E; Wed,  6 Jul 2011 06:50:12 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 3.55
Message-ID: <20110706135012.13666.6167.idtracker@ietfa.amsl.com>
Date: Wed, 06 Jul 2011 06:50:12 -0700
Cc: dnsext@ietf.org
Subject: [dnsext] I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jul 2011 13:50:13 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies. This draft is a work item of the DNS Extensions Working Group of the I=
ETF.

	Title           : Signaling Cryptographic Algorithm Understanding in DNSSEC
	Author(s)       : Steve Crocker
                          Scott Rose
	Filename        : draft-ietf-dnsext-dnssec-algo-signal-02.txt
	Pages           : 8
	Date            : 2011-07-06

   The DNS Security Extensions (DNSSEC) were developed to provide origin
   authentication and integrity protection for DNS data by using digital
   signatures.  These digital signatures can be generated using
   different algorithms.  This draft sets out to specify a way for
   validating end-system resolvers to signal to a server which
   cryptographic algorithms they support.



A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-algo-signal-02=
.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

This Internet-Draft can be retrieved at:
ftp://ftp.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-algo-signal-02.=
txt

From scottr.nist@gmail.com  Wed Jul  6 07:01:08 2011
Return-Path: <scottr.nist@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AFC9D21F84E3 for <dnsext@ietfa.amsl.com>; Wed,  6 Jul 2011 07:01:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 80C+AjxBuzKs for <dnsext@ietfa.amsl.com>; Wed,  6 Jul 2011 07:01:08 -0700 (PDT)
Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by ietfa.amsl.com (Postfix) with ESMTP id 1776621F84E2 for <dnsext@ietf.org>; Wed,  6 Jul 2011 07:01:05 -0700 (PDT)
Received: from 107-140.antd.nist.gov (107-140.antd.nist.gov [129.6.140.107]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id p66E0lrM009650 for <dnsext@ietf.org>; Wed, 6 Jul 2011 10:00:49 -0400
From: Scott Rose <scottr.nist@gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Wed, 6 Jul 2011 10:00:47 -0400
References: <20110706135012.13666.6167.idtracker@ietfa.amsl.com>
To: dnsext@ietf.org
Message-Id: <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com>
Mime-Version: 1.0 (Apple Message framework v1084)
X-Mailer: Apple Mail (2.1084)
X-NIST-MailScanner: Found to be clean
X-NIST-MailScanner-From: scottr.nist@gmail.com
Subject: [dnsext] Fwd: I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jul 2011 14:01:08 -0000

An updated version of the algo-signal draft to address the issues in =
WGLC.  Specific changes:

1.  Changed the wording in 3.4.1 to remove the RFC2119 wording on =
setting the DO bit. =20

2. Changed section 4 wording to indicate DNS proxy systems and added a =
ref to RFC 5625.

3. fixed some typos and minor wording changes to stress that the DAU =
option is for signaling only and does not specify any change to how =
servers construct a response.

Scott

Begin forwarded message:

> From: internet-drafts@ietf.org
> Date: July 6, 2011 9:50:12 AM EDT
> To: i-d-announce@ietf.org
> Cc: dnsext@ietf.org
> Subject: [dnsext] I-D Action: =
draft-ietf-dnsext-dnssec-algo-signal-02.txt
>=20
> A New Internet-Draft is available from the on-line Internet-Drafts =
directories. This draft is a work item of the DNS Extensions Working =
Group of the IETF.
>=20
> 	Title           : Signaling Cryptographic Algorithm =
Understanding in DNSSEC
> 	Author(s)       : Steve Crocker
>                          Scott Rose
> 	Filename        : draft-ietf-dnsext-dnssec-algo-signal-02.txt
> 	Pages           : 8
> 	Date            : 2011-07-06
>=20
>   The DNS Security Extensions (DNSSEC) were developed to provide =
origin
>   authentication and integrity protection for DNS data by using =
digital
>   signatures.  These digital signatures can be generated using
>   different algorithms.  This draft sets out to specify a way for
>   validating end-system resolvers to signal to a server which
>   cryptographic algorithms they support.
>=20
>=20
>=20
> A URL for this Internet-Draft is:
> =
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-algo-signal-0=
2.txt
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>=20
> This Internet-Draft can be retrieved at:
> =
ftp://ftp.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-algo-signal-02=
.txt
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext


From ogud@ogud.com  Wed Jul  6 14:17:55 2011
Return-Path: <ogud@ogud.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1E2421F8A8A for <dnsext@ietfa.amsl.com>; Wed,  6 Jul 2011 14:17:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.392
X-Spam-Level: 
X-Spam-Status: No, score=-106.392 tagged_above=-999 required=5 tests=[AWL=0.207, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tzp0Q3fQn-Kh for <dnsext@ietfa.amsl.com>; Wed,  6 Jul 2011 14:17:55 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 1441B21F8A8B for <dnsext@ietf.org>; Wed,  6 Jul 2011 14:17:54 -0700 (PDT)
Received: from [IPv6:::1] (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p66LHr8P031561 for <dnsext@ietf.org>; Wed, 6 Jul 2011 17:17:54 -0400 (EDT) (envelope-from ogud@ogud.com)
Message-ID: <4E14D100.5010705@ogud.com>
Date: Wed, 06 Jul 2011 17:17:52 -0400
From: Olafur Gudmundsson <ogud@ogud.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2.18) Gecko/20110616 Thunderbird/3.1.11
MIME-Version: 1.0
To: dnsext@ietf.org
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.68 on 10.20.30.4
Subject: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jul 2011 21:17:55 -0000

Dear Colleagues

This message starts a Working Group Last Call for
"Elliptic Curve DSA for DNSSEC" located at
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-ecdsa-01.txt
This document is on Standards track.

This WGLC will conclude on midnight on July 21'th UTC.

Please review the document and sent a statement that you reviewed the
document.  If the review raises any issues, please note what they are.
Remember that we need a minimum of 5 reviewers.


     Olafur & Andrew

From Ed.Lewis@neustar.biz  Thu Jul  7 08:13:54 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB81521F885E for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 08:13:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -107.932
X-Spam-Level: 
X-Spam-Status: No, score=-107.932 tagged_above=-999 required=5 tests=[AWL=0.667, BAYES_00=-2.599, GB_I_LETTER=-2, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7RnbC3aSy3Qx for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 08:13:53 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 2624921F885D for <dnsext@ietf.org>; Thu,  7 Jul 2011 08:13:51 -0700 (PDT)
Received: from tkel-lt61.cis.neustar.com (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p67FDnbP037529; Thu, 7 Jul 2011 11:13:49 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [192.168.129.195] by tkel-lt61.cis.neustar.com (PGP Universal service); Thu, 07 Jul 2011 11:13:50 -0400
X-PGP-Universal: processed; by tkel-lt61.cis.neustar.com on Thu, 07 Jul 2011 11:13:50 -0400
Mime-Version: 1.0
Message-Id: <a06240803ca3b79fc6d32@[192.168.129.195]>
In-Reply-To: <4E14D100.5010705@ogud.com>
References: <4E14D100.5010705@ogud.com>
Date: Thu, 7 Jul 2011 11:13:28 -0400
To: Olafur Gudmundsson <ogud@ogud.com>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.68 on 10.20.30.4
Cc: dnsext@ietf.org
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jul 2011 15:13:55 -0000

At 17:17 -0400 7/6/11, Olafur Gudmundsson wrote:

>This message starts a Working Group Last Call for
>"Elliptic Curve DSA for DNSSEC" located at
>http://www.ietf.org/internet-drafts/draft-ietf-dnsext-ecdsa-01.txt
>This document is on Standards track.

I have some minor comments and some questions.

First, and this may fall into "style", "ECDSA" is not expanded in the 
Introduction (but it is in the abstract).  My preference has been to 
expand letters the first use in the main body of the document.

A more significant comment is that there is no reference defining 
ECDSA.  In particular, this paragraph:

#   This document defines the DNSKEY and RRSIG resource records (RRs) of
#   two new signing algorithms: ECDSA with curve P-256 and SHA-256, and
#   ECDSA with curve P-384 and SHA-384.  This document also defines the
#   DS RR for the SHA-384 one-way hash algorithm; the associated DS RR
#   for SHA-256 is already defined in RFC 4509 [RFC4509].

Lacks any document defining ECDSA.  In the references there are two 
FIPS listed.

(Mind you, I am not well read in cryptography.  For the most part I 
don't care for the details.  I'm just asking for a pointer where I 
could go read more if I cared.)

And my question.

When I saw the dreaded "DSA" I immediately harked back to the fact 
that is slower where it matters - verfication - than RSA.  And the 
draft does address this:

#  However, validating RSA signatures is significantly faster than validating
#  ECDSA signatures (about 5 times faster in some implementations).

 From what I gather, the case for ECDSA is that the keys and 
signatures is that they are shorter.

#  ECDSA keys are much shorter than RSA keys; at this size, the 
difference is 256
#  versus 3072 bits.  Similarly, ECDSA signatures are much shorter 
than RSA signatures.

Caveats I cut out here, because I'm no cryptogeek, is that the 
"shorter" is within the same "strengths" (whatever "strength" means) 
of protection.  I'm taking for granted, this is a pound of oranges 
vs. a pound of apples comparison.

What is set up here is the classic - "Space vs. Time" tradeoff.

So here's the question to the authors/experts on this.  Is the 
tradeoff worth it?  Is the extra slowness in validation worth the 
savings in bytes?  I haven't seen much evidence that larger DNSSEC 
responses are killing us - and I don't mean to say that there isn't a 
problem looming, but I don't see any evidence.  So I wonder about the 
value of the lost time (which is something DNS gets hammered with by 
web site operators).

This isn't a situation in which I can contribute text, but I would 
like to see a paragraph or two at least hypothesizing on the tradeoff 
and why ECDSA might be better than the current state of operations. 
Switching to ECDSA for the current 60+ signed TLDs and root would 
take some effort, would it be worth it?

(Yeah, the latter question is one for operators.  I'm asking for the 
experts prognostication if they are willing.)

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis             
NeuStar                    You can leave a voice message at +1-571-434-5468

I'm overly entertained.

From paul.hoffman@vpnc.org  Thu Jul  7 08:47:22 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C076A21F88EF for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 08:47:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.737
X-Spam-Level: 
X-Spam-Status: No, score=-103.737 tagged_above=-999 required=5 tests=[AWL=0.862, BAYES_00=-2.599, GB_I_LETTER=-2, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pt+Ye2ystKjv for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 08:47:22 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 9FC1921F88E8 for <dnsext@ietf.org>; Thu,  7 Jul 2011 08:47:21 -0700 (PDT)
Received: from [10.20.30.101] (50-0-66-4.dsl.dynamic.fusionbroadband.com [50.0.66.4] (may be forged)) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p67FlBfY092636 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 7 Jul 2011 08:47:11 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <a06240803ca3b79fc6d32@[192.168.129.195]>
Date: Thu, 7 Jul 2011 08:47:19 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <A6C96D41-1FAB-4B85-9BEE-D69C8EE7F3B2@vpnc.org>
References: <4E14D100.5010705@ogud.com> <a06240803ca3b79fc6d32@[192.168.129.195]>
To: Edward Lewis <ed.lewis@neustar.biz>
X-Mailer: Apple Mail (2.1084)
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jul 2011 15:47:22 -0000

On Jul 7, 2011, at 8:13 AM, Edward Lewis wrote:

> At 17:17 -0400 7/6/11, Olafur Gudmundsson wrote:
>=20
>> This message starts a Working Group Last Call for
>> "Elliptic Curve DSA for DNSSEC" located at
>> http://www.ietf.org/internet-drafts/draft-ietf-dnsext-ecdsa-01.txt
>> This document is on Standards track.
>=20
> I have some minor comments and some questions.
>=20
> First, and this may fall into "style", "ECDSA" is not expanded in the =
Introduction (but it is in the abstract).  My preference has been to =
expand letters the first use in the main body of the document.

Good catch, will do.

> A more significant comment is that there is no reference defining =
ECDSA.  In particular, this paragraph:
>=20
> #   This document defines the DNSKEY and RRSIG resource records (RRs) =
of
> #   two new signing algorithms: ECDSA with curve P-256 and SHA-256, =
and
> #   ECDSA with curve P-384 and SHA-384.  This document also defines =
the
> #   DS RR for the SHA-384 one-way hash algorithm; the associated DS RR
> #   for SHA-256 is already defined in RFC 4509 [RFC4509].
>=20
> Lacks any document defining ECDSA.  In the references there are two =
FIPS listed.

It is not just in the references: Section 3 points directly to the FIPS =
document that defines the curves used in ECDSA.

> (Mind you, I am not well read in cryptography.  For the most part I =
don't care for the details.  I'm just asking for a pointer where I could =
go read more if I cared.)

FIPS 186-3, as listed in Section 3. Not that I'm recommending it, mind =
you.

> And my question.
>=20
> When I saw the dreaded "DSA" I immediately harked back to the fact =
that is slower where it matters - verfication - than RSA.  And the draft =
does address this:
>=20
> #  However, validating RSA signatures is significantly faster than =
validating
> #  ECDSA signatures (about 5 times faster in some implementations).
>=20
> =46rom what I gather, the case for ECDSA is that the keys and =
signatures is that they are shorter.
>=20
> #  ECDSA keys are much shorter than RSA keys; at this size, the =
difference is 256
> #  versus 3072 bits.  Similarly, ECDSA signatures are much shorter =
than RSA signatures.
>=20
> Caveats I cut out here, because I'm no cryptogeek, is that the =
"shorter" is within the same "strengths" (whatever "strength" means) of =
protection.  I'm taking for granted, this is a pound of oranges vs. a =
pound of apples comparison.
>=20
> What is set up here is the classic - "Space vs. Time" tradeoff.
>=20
> So here's the question to the authors/experts on this.  Is the =
tradeoff worth it? =20

Yes.

> Is the extra slowness in validation worth the savings in bytes? =20

That is not the only tradeoff. The strength of RSA keys goes down year =
after year, but the strength of ECDSA keys hasn't declined at all. For =
sites that require a certain strength and want that strength year after =
year, they have to increase the length of their RSA keys.

> I haven't seen much evidence that larger DNSSEC responses are killing =
us - and I don't mean to say that there isn't a problem looming, but I =
don't see any evidence.  So I wonder about the value of the lost time =
(which is something DNS gets hammered with by web site operators).

That is going to depend on the preferences of who is doing the =
measurements. ECDSA allows the hosts who have a particular set of =
priorities to use smaller keys that don't degrade; RSA allows hosts who =
don't feel the need for as much security to use keys that will validate =
somewhat faster.

> This isn't a situation in which I can contribute text, but I would =
like to see a paragraph or two at least hypothesizing on the tradeoff =
and why ECDSA might be better than the current state of operations. =
Switching to ECDSA for the current 60+ signed TLDs and root would take =
some effort, would it be worth it?

Please, no. That kind of pie-in-the-sky speculation does not belong in a =
technical document such as this. If you feel like writing such a =
document in DNSOP, great, but it really doesn't belong here.=20

> (Yeah, the latter question is one for operators.  I'm asking for the =
experts prognostication if they are willing.)


Not willing.

--Paul Hoffman


From Ed.Lewis@neustar.biz  Thu Jul  7 10:39:08 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8162D1F0C49 for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 10:39:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -107.099
X-Spam-Level: 
X-Spam-Status: No, score=-107.099 tagged_above=-999 required=5 tests=[AWL=-0.500, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MG-K6X9-lM8F for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 10:39:08 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 92CE31F0C44 for <dnsext@ietf.org>; Thu,  7 Jul 2011 10:39:05 -0700 (PDT)
Received: from tkel-lt61.cis.neustar.com (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p67Hd3eq038457; Thu, 7 Jul 2011 13:39:03 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [192.168.129.195] by tkel-lt61.cis.neustar.com (PGP Universal service); Thu, 07 Jul 2011 13:39:04 -0400
X-PGP-Universal: processed; by tkel-lt61.cis.neustar.com on Thu, 07 Jul 2011 13:39:04 -0400
Mime-Version: 1.0
Message-Id: <a06240802ca3b9d4fb4a0@[192.168.129.195]>
In-Reply-To: <A6C96D41-1FAB-4B85-9BEE-D69C8EE7F3B2@vpnc.org>
References: <4E14D100.5010705@ogud.com> <a06240803ca3b79fc6d32@[192.168.129.195]> <A6C96D41-1FAB-4B85-9BEE-D69C8EE7F3B2@vpnc.org>
Date: Thu, 7 Jul 2011 13:32:08 -0400
To: Paul Hoffman <paul.hoffman@vpnc.org>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.68 on 10.20.30.4
Cc: Edward Lewis <ed.lewis@neustar.biz>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jul 2011 17:39:08 -0000

At 8:47 -0700 7/7/11, Paul Hoffman wrote:
>It is not just in the references: Section 3 points directly to the 
>FIPS document that defines the curves used in ECDSA.

Then the nit - please add the refernce earlier.

>>  Is the extra slowness in validation worth the savings in bytes?

>That is not the only tradeoff. The strength of RSA keys goes down year
>after year, but the strength of ECDSA keys hasn't declined at all. For
>sites that require a certain strength and want that strength year after
>year, they have to increase the length of their RSA keys.

>That is going to depend on the preferences of who is doing the measurements.
>ECDSA allows the hosts who have a particular set of priorities to use
>smaller keys that don't degrade; RSA allows hosts who don't feel the need
>for as much security to use keys that will validate somewhat faster.

I'd like to see those words in the doc.

>Please, no. That kind of pie-in-the-sky speculation does not belong
>in a technical document such as this.

Ok, I get that.

>>   asking for the experts prognostication if they are willing.
>Not willing.

Chicken ;)
-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

I'm overly entertained.

From paul.hoffman@vpnc.org  Thu Jul  7 10:54:19 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E76291F0C68 for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 10:54:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.766
X-Spam-Level: 
X-Spam-Status: No, score=-102.766 tagged_above=-999 required=5 tests=[AWL=-0.167, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kVrNC2DjknXT for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 10:54:19 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 347A61F0C61 for <dnsext@ietf.org>; Thu,  7 Jul 2011 10:54:19 -0700 (PDT)
Received: from [10.20.30.101] (50-0-66-4.dsl.dynamic.fusionbroadband.com [50.0.66.4] (may be forged)) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p67Hs8Y7099043 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 7 Jul 2011 10:54:09 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <a06240802ca3b9d4fb4a0@[192.168.129.195]>
Date: Thu, 7 Jul 2011 10:54:17 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <851F09C9-78CE-4F56-8F25-5806C8979BB9@vpnc.org>
References: <4E14D100.5010705@ogud.com> <a06240803ca3b79fc6d32@[192.168.129.195]> <A6C96D41-1FAB-4B85-9BEE-D69C8EE7F3B2@vpnc.org> <a06240802ca3b9d4fb4a0@[192.168.129.195]>
To: Edward Lewis <ed.lewis@neustar.biz>
X-Mailer: Apple Mail (2.1084)
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jul 2011 17:54:20 -0000

On Jul 7, 2011, at 10:32 AM, Edward Lewis wrote:

> At 8:47 -0700 7/7/11, Paul Hoffman wrote:
>> It is not just in the references: Section 3 points directly to the =
FIPS document that defines the curves used in ECDSA.
>=20
> Then the nit - please add the refernce earlier.

Will do.

>>> Is the extra slowness in validation worth the savings in bytes?
>=20
>> That is not the only tradeoff. The strength of RSA keys goes down =
year
>> after year, but the strength of ECDSA keys hasn't declined at all. =
For
>> sites that require a certain strength and want that strength year =
after
>> year, they have to increase the length of their RSA keys.
>=20
>> That is going to depend on the preferences of who is doing the =
measurements.
>> ECDSA allows the hosts who have a particular set of priorities to use
>> smaller keys that don't degrade; RSA allows hosts who don't feel the =
need
>> for as much security to use keys that will validate somewhat faster.
>=20
> I'd like to see those words in the doc.

Not unless others in the WG really want this. Other docs that have =
described different crypto algorithms (such as different hash functions) =
haven't had such descriptions, and I think that's a good thing. Crypto =
protocol descriptions should not be telling people how to consider them.

--Paul Hoffman


From Ed.Lewis@neustar.biz  Thu Jul  7 11:05:20 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0EEB1F0C82 for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 11:05:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.999
X-Spam-Level: 
X-Spam-Status: No, score=-106.999 tagged_above=-999 required=5 tests=[AWL=-0.400, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y9wE03S0IJ37 for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 11:05:19 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id CFAF41F0C81 for <dnsext@ietf.org>; Thu,  7 Jul 2011 11:05:18 -0700 (PDT)
Received: from tkel-lt61.cis.neustar.com (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p67I5Gbx038691; Thu, 7 Jul 2011 14:05:17 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [192.168.129.195] by tkel-lt61.cis.neustar.com (PGP Universal service); Thu, 07 Jul 2011 14:05:17 -0400
X-PGP-Universal: processed; by tkel-lt61.cis.neustar.com on Thu, 07 Jul 2011 14:05:17 -0400
Mime-Version: 1.0
Message-Id: <a06240803ca3ba586a181@[192.168.129.195]>
In-Reply-To: <851F09C9-78CE-4F56-8F25-5806C8979BB9@vpnc.org>
References: <4E14D100.5010705@ogud.com> <a06240803ca3b79fc6d32@[192.168.129.195]> <A6C96D41-1FAB-4B85-9BEE-D69C8EE7F3B2@vpnc.org> <a06240802ca3b9d4fb4a0@[192.168.129.195]> <851F09C9-78CE-4F56-8F25-5806C8979BB9@vpnc.org>
Date: Thu, 7 Jul 2011 14:05:14 -0400
To: Paul Hoffman <paul.hoffman@vpnc.org>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.68 on 10.20.30.4
Cc: Edward Lewis <ed.lewis@neustar.biz>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jul 2011 18:05:20 -0000

At 10:54 -0700 7/7/11, Paul Hoffman wrote:

>Not unless others in the WG really want this. Other docs that have
>described different crypto algorithms (such as different hash functions)
>haven't had such descriptions, and I think that's a good thing. Crypto
>protocol descriptions should not be telling people how to consider them.

But this is a DNS document and we need all the help we can get when 
it comes to understanding crypto, at least as far as it's role in 
DNSSEC deployments.
-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

I'm overly entertained.

From ogud@ogud.com  Thu Jul  7 11:18:06 2011
Return-Path: <ogud@ogud.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B15A1F0C85 for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 11:18:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.496
X-Spam-Level: 
X-Spam-Status: No, score=-106.496 tagged_above=-999 required=5 tests=[AWL=0.103, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CrR+GFoODkQT for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 11:18:05 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 7D73D1F0C81 for <dnsext@ietf.org>; Thu,  7 Jul 2011 11:18:05 -0700 (PDT)
Received: from [IPv6:::1] (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p67II442038800 for <dnsext@ietf.org>; Thu, 7 Jul 2011 14:18:04 -0400 (EDT) (envelope-from ogud@ogud.com)
Message-ID: <4E15F85A.5090905@ogud.com>
Date: Thu, 07 Jul 2011 14:18:02 -0400
From: Olafur Gudmundsson <ogud@ogud.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2.18) Gecko/20110616 Thunderbird/3.1.11
MIME-Version: 1.0
To: dnsext@ietf.org
References: <4E14D100.5010705@ogud.com>	<a06240803ca3b79fc6d32@[192.168.129.195]>	<A6C96D41-1FAB-4B85-9BEE-D69C8EE7F3B2@vpnc.org>	<a06240802ca3b9d4fb4a0@[192.168.129.195]>	<851F09C9-78CE-4F56-8F25-5806C8979BB9@vpnc.org> <a06240803ca3ba586a181@[192.168.129.195]>
In-Reply-To: <a06240803ca3ba586a181@[192.168.129.195]>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.68 on 10.20.30.4
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jul 2011 18:18:06 -0000

On 07/07/2011 2:05 PM, Edward Lewis wrote:
> At 10:54 -0700 7/7/11, Paul Hoffman wrote:
>
>> Not unless others in the WG really want this. Other docs that have
>> described different crypto algorithms (such as different hash functions)
>> haven't had such descriptions, and I think that's a good thing. Crypto
>> protocol descriptions should not be telling people how to consider them.
>
> But this is a DNS document and we need all the help we can get when it
> comes to understanding crypto, at least as far as it's role in DNSSEC
> deployments.


<chair-hat=on>

I tend to agree with Paul on this one, this is not appropriate content 
for a code allocation document.

I think something like this might be published as BCP in a separate 
document.

	Olafur

From scottr.nist@gmail.com  Thu Jul  7 11:23:21 2011
Return-Path: <scottr.nist@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 373161F0C67 for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 11:23:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fvf80tr4F610 for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 11:23:20 -0700 (PDT)
Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by ietfa.amsl.com (Postfix) with ESMTP id 4A5E321F85A6 for <dnsext@ietf.org>; Thu,  7 Jul 2011 11:23:20 -0700 (PDT)
Received: from h222003.nist.gov (h222003.nist.gov [129.6.222.3]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id p67IN3pO022800 for <dnsext@ietf.org>; Thu, 7 Jul 2011 14:23:09 -0400
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Apple Message framework v1084)
From: Scott Rose <scottr.nist@gmail.com>
In-Reply-To: <851F09C9-78CE-4F56-8F25-5806C8979BB9@vpnc.org>
Date: Thu, 7 Jul 2011 14:23:03 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <D7951FB1-AE0A-4252-884B-1F444B2635F2@gmail.com>
References: <4E14D100.5010705@ogud.com> <a06240803ca3b79fc6d32@[192.168.129.195]> <A6C96D41-1FAB-4B85-9BEE-D69C8EE7F3B2@vpnc.org> <a06240802ca3b9d4fb4a0@[192.168.129.195]> <851F09C9-78CE-4F56-8F25-5806C8979BB9@vpnc.org>
To: DNSEXT Working Group <dnsext@ietf.org>
X-Mailer: Apple Mail (2.1084)
X-NIST-MailScanner: Found to be clean
X-NIST-MailScanner-From: scottr.nist@gmail.com
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jul 2011 18:23:21 -0000

On Jul 7, 2011, at 1:54 PM, Paul Hoffman wrote:

>>>> Is the extra slowness in validation worth the savings in bytes?
>>=20
>>> That is not the only tradeoff. The strength of RSA keys goes down =
year
>>> after year, but the strength of ECDSA keys hasn't declined at all. =
For
>>> sites that require a certain strength and want that strength year =
after
>>> year, they have to increase the length of their RSA keys.
>>=20
>>> That is going to depend on the preferences of who is doing the =
measurements.
>>> ECDSA allows the hosts who have a particular set of priorities to =
use
>>> smaller keys that don't degrade; RSA allows hosts who don't feel the =
need
>>> for as much security to use keys that will validate somewhat faster.
>>=20
>> I'd like to see those words in the doc.
>=20
> Not unless others in the WG really want this. Other docs that have =
described different crypto algorithms (such as different hash functions) =
haven't had such descriptions, and I think that's a good thing. Crypto =
protocol descriptions should not be telling people how to consider them.
>=20

I don't think it is needed in this doc, since it was never considered to =
be needed in any other algorithm spec doc.  Sounds like something like =
that would belong in a larger DNSSEC crypto considerations document =
since similar text would be desired for other algorithms and not just =
ECDSA.

Scott


> --Paul Hoffman
>=20
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext


From hallam@gmail.com  Thu Jul  7 16:36:07 2011
Return-Path: <hallam@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 377DA21F86FC for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 16:36:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.705
X-Spam-Level: 
X-Spam-Status: No, score=-2.705 tagged_above=-999 required=5 tests=[AWL=-0.773, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, SARE_HTML_USL_OBFU=1.666]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uAiLcC68K-Kw for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 16:36:06 -0700 (PDT)
Received: from mail-gw0-f44.google.com (mail-gw0-f44.google.com [74.125.83.44]) by ietfa.amsl.com (Postfix) with ESMTP id 6FBF721F86F5 for <dnsext@ietf.org>; Thu,  7 Jul 2011 16:36:06 -0700 (PDT)
Received: by gwb20 with SMTP id 20so703406gwb.31 for <dnsext@ietf.org>; Thu, 07 Jul 2011 16:36:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=JnRnHC0KAhHDXcXVoYJyhxFG1ATet8TC+/jeNn9eVto=; b=X4GOxxeM1me14NwrvE/c9iyNo9YtNEeJaYrYNpP2nOyKlsYMA49RTUzNfrM38t9FxZ UFoJV9UZ/MqI+sLvX0VuPoTy9Fcz9QIb2LWmTJkkHhuJ6/pssHIvrwPeOkbhEV2u4LM7 4u9p1+r9R1ORjWwOXuYVdBWenewGkM5TBMGQI=
MIME-Version: 1.0
Received: by 10.100.249.8 with SMTP id w8mr1230183anh.168.1310081765857; Thu, 07 Jul 2011 16:36:05 -0700 (PDT)
Received: by 10.100.93.12 with HTTP; Thu, 7 Jul 2011 16:36:05 -0700 (PDT)
In-Reply-To: <4E14D100.5010705@ogud.com>
References: <4E14D100.5010705@ogud.com>
Date: Thu, 7 Jul 2011 19:36:05 -0400
Message-ID: <CAMm+Lwio7m9d90nUY4vcyCPXOGMunM2K0NdOaOz44ew8CosA_w@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Olafur Gudmundsson <ogud@ogud.com>
Content-Type: multipart/alternative; boundary=00163691ff4c47da3504a7832e86
Cc: dnsext@ietf.org
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jul 2011 23:36:07 -0000

--00163691ff4c47da3504a7832e86
Content-Type: text/plain; charset=ISO-8859-1

Section 8:

"The cryptographic strength of ECDSA with curve P-256 or P-384 is
   generally considered to be equivalent to half the size of the key, or
   128 bits and 192 bits, respectively. "


This should be 'Work Factor'

Whit Diffie corrected me on this while I was speaking at a conference. Work
factor is the way to think about it. 128 bits does not in itself imply a
difficulty, the difficulty of 128 bit RSA being rather different to 128 bit
AES.


On Wed, Jul 6, 2011 at 5:17 PM, Olafur Gudmundsson <ogud@ogud.com> wrote:

> Dear Colleagues
>
> This message starts a Working Group Last Call for
> "Elliptic Curve DSA for DNSSEC" located at
> http://www.ietf.org/internet-**drafts/draft-ietf-dnsext-**ecdsa-01.txt<http://www.ietf.org/internet-drafts/draft-ietf-dnsext-ecdsa-01.txt>
> This document is on Standards track.
>
> This WGLC will conclude on midnight on July 21'th UTC.
>
> Please review the document and sent a statement that you reviewed the
> document.  If the review raises any issues, please note what they are.
> Remember that we need a minimum of 5 reviewers.
>
>
>    Olafur & Andrew
> ______________________________**_________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/**listinfo/dnsext<https://www.ietf.org/mailman/listinfo/dnsext>
>



-- 
Website: http://hallambaker.com/

--00163691ff4c47da3504a7832e86
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div><div>Section 8:</div><div><br></div><div>&quot;The cryptographic stren=
gth of ECDSA with curve P-256 or P-384 is</div><div>=A0 =A0generally consid=
ered to be equivalent to half the size of the key, or</div><div>=A0 =A0128 =
bits and 192 bits, respectively. &quot;</div>
<div><br></div><div><br></div><div>This should be &#39;Work Factor&#39;</di=
v></div><div><br></div><div>Whit Diffie corrected me on this while I was sp=
eaking at a conference. Work factor is the way to think about it. 128 bits =
does not in itself imply a difficulty, the difficulty of 128 bit RSA being =
rather different to 128 bit AES.</div>
<div><br></div><br><div class=3D"gmail_quote">On Wed, Jul 6, 2011 at 5:17 P=
M, Olafur Gudmundsson <span dir=3D"ltr">&lt;<a href=3D"mailto:ogud@ogud.com=
">ogud@ogud.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" =
style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
Dear Colleagues<br>
<br>
This message starts a Working Group Last Call for<br>
&quot;Elliptic Curve DSA for DNSSEC&quot; located at<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-dnsext-ecdsa-01.t=
xt" target=3D"_blank">http://www.ietf.org/internet-<u></u>drafts/draft-ietf=
-dnsext-<u></u>ecdsa-01.txt</a><br>
This document is on Standards track.<br>
<br>
This WGLC will conclude on midnight on July 21&#39;th UTC.<br>
<br>
Please review the document and sent a statement that you reviewed the<br>
document. =A0If the review raises any issues, please note what they are.<br=
>
Remember that we need a minimum of 5 reviewers.<br>
<br>
<br>
 =A0 =A0Olafur &amp; Andrew<br>
______________________________<u></u>_________________<br>
dnsext mailing list<br>
<a href=3D"mailto:dnsext@ietf.org" target=3D"_blank">dnsext@ietf.org</a><br=
>
<a href=3D"https://www.ietf.org/mailman/listinfo/dnsext" target=3D"_blank">=
https://www.ietf.org/mailman/<u></u>listinfo/dnsext</a><br>
</blockquote></div><br><br clear=3D"all"><br>-- <br>Website: <a href=3D"htt=
p://hallambaker.com/">http://hallambaker.com/</a><br><br>

--00163691ff4c47da3504a7832e86--

From paul.hoffman@vpnc.org  Thu Jul  7 17:47:27 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F294721F8A05 for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 17:47:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.73
X-Spam-Level: 
X-Spam-Status: No, score=-102.73 tagged_above=-999 required=5 tests=[AWL=-0.131, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YC5-tRhwT1Qm for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 17:47:26 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id F16D221F89C1 for <dnsext@ietf.org>; Thu,  7 Jul 2011 17:47:25 -0700 (PDT)
Received: from [10.20.30.101] (50-0-66-4.dsl.dynamic.fusionbroadband.com [50.0.66.4] (may be forged)) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p680lDSf016971 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 7 Jul 2011 17:47:13 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <CAMm+Lwio7m9d90nUY4vcyCPXOGMunM2K0NdOaOz44ew8CosA_w@mail.gmail.com>
Date: Thu, 7 Jul 2011 17:47:21 -0700
Content-Transfer-Encoding: 7bit
Message-Id: <08FA6A18-9737-4A50-B3EB-7B731D98A36A@vpnc.org>
References: <4E14D100.5010705@ogud.com> <CAMm+Lwio7m9d90nUY4vcyCPXOGMunM2K0NdOaOz44ew8CosA_w@mail.gmail.com>
To: Phillip Hallam-Baker <hallam@gmail.com>
X-Mailer: Apple Mail (2.1084)
Cc: dnsext@ietf.org, Olafur Gudmundsson <ogud@ogud.com>
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jul 2011 00:47:27 -0000

On Jul 7, 2011, at 4:36 PM, Phillip Hallam-Baker wrote:

> Section 8:
> 
> "The cryptographic strength of ECDSA with curve P-256 or P-384 is
>    generally considered to be equivalent to half the size of the key, or
>    128 bits and 192 bits, respectively. "
> 
> 
> This should be 'Work Factor'

Sounds fine.

--Paul Hoffman


From johnl@iecc.com  Thu Jul  7 18:37:26 2011
Return-Path: <johnl@iecc.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5728B21F89B1 for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 18:37:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.22
X-Spam-Level: 
X-Spam-Status: No, score=-110.22 tagged_above=-999 required=5 tests=[AWL=0.979, BAYES_00=-2.599, HABEAS_ACCREDITED_SOI=-4.3, RCVD_IN_BSP_TRUSTED=-4.3, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T440AqwgvjYD for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 18:37:25 -0700 (PDT)
Received: from leila.iecc.com (leila6.iecc.com [IPv6:2001:470:1f07:1126:0:4c:6569:6c61]) by ietfa.amsl.com (Postfix) with ESMTP id 9A63421F89AC for <dnsext@ietf.org>; Thu,  7 Jul 2011 18:37:25 -0700 (PDT)
Received: (qmail 64865 invoked from network); 8 Jul 2011 01:37:24 -0000
Received: from gal.iecc.com (64.57.183.53) by mail2.iecc.com with SMTP; 8 Jul 2011 01:37:24 -0000
Received: (qmail 51583 invoked from network); 8 Jul 2011 01:37:24 -0000
Received: from mail1.iecc.com (64.57.183.56) by mail1.iecc.com with QMQP; 8 Jul 2011 01:37:24 -0000
Date: 8 Jul 2011 01:37:02 -0000
Message-ID: <20110708013702.4496.qmail@joyce.lan>
From: "John Levine" <johnl@iecc.com>
To: dnsext@ietf.org
In-Reply-To: <a06240803ca3ba586a181@[192.168.129.195]>
Organization: 
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 7bit
Cc: Ed.Lewis@neustar.biz
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jul 2011 01:37:26 -0000

>But this is a DNS document and we need all the help we can get when 
>it comes to understanding crypto, at least as far as it's role in 
>DNSSEC deployments.

I'd rather keep the documents that describe the bits on the wire
separate from the documents that opine about how one should choose
what bits to send.  The former should be highly stable, the latter can
evolve somewhat as we understand better what the deployment issues
are.

It's not exactly a BCP, since I gather there isn't a whole lot of
practice with new algs in DNSSEC.  It's more of a BHP or BPP
(Hypothetical or Proposed).

R's,
John

From matthijs@nlnetlabs.nl  Thu Jul  7 23:30:48 2011
Return-Path: <matthijs@nlnetlabs.nl>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7054A21F892D for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 23:30:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p3lrZkDj3OeI for <dnsext@ietfa.amsl.com>; Thu,  7 Jul 2011 23:30:47 -0700 (PDT)
Received: from open.nlnetlabs.nl (open.nlnetlabs.nl [IPv6:2001:7b8:206:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6EBB521F8922 for <dnsext@ietf.org>; Thu,  7 Jul 2011 23:30:44 -0700 (PDT)
Received: from [192.168.1.13] (ip123-112-174-82.adsl2.static.versatel.nl [82.174.112.123]) (authenticated bits=0) by open.nlnetlabs.nl (8.14.4/8.14.4) with ESMTP id p686UfpE045519 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <dnsext@ietf.org>; Fri, 8 Jul 2011 08:30:42 +0200 (CEST) (envelope-from matthijs@nlnetlabs.nl)
Message-ID: <4E16A411.8080802@nlnetlabs.nl>
Date: Fri, 08 Jul 2011 08:30:41 +0200
From: Matthijs Mekking <matthijs@NLnetLabs.nl>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.17) Gecko/20110516 Thunderbird/3.1.10
MIME-Version: 1.0
To: dnsext@ietf.org
References: <4E14D100.5010705@ogud.com>
In-Reply-To: <4E14D100.5010705@ogud.com>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.7 (open.nlnetlabs.nl [213.154.224.1]); Fri, 08 Jul 2011 08:30:42 +0200 (CEST)
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jul 2011 06:30:48 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I have read this document and have no further comments.

Best regards,
  Matthijs

On 07/06/2011 11:17 PM, Olafur Gudmundsson wrote:
> Dear Colleagues
> 
> This message starts a Working Group Last Call for
> "Elliptic Curve DSA for DNSSEC" located at
> http://www.ietf.org/internet-drafts/draft-ietf-dnsext-ecdsa-01.txt
> This document is on Standards track.
> 
> This WGLC will conclude on midnight on July 21'th UTC.
> 
> Please review the document and sent a statement that you reviewed the
> document.  If the review raises any issues, please note what they are.
> Remember that we need a minimum of 5 reviewers.
> 
> 
>     Olafur & Andrew
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJOFqQRAAoJEA8yVCPsQCW5G5gH/jx+OOdBOLJPKegAfFdItqLH
nhiPkPKg6HgkBdeuv8KwyAv0bYLbdy/XiR/ib3IMDsgZGJX+uH99cX9v1H+BmvHk
jCKPYfDvWFCiKcmoT8YaKYqKl4MqVTSRKXS6e3Dy4ONVCwtfu6x08gXDGb0++ICk
g5WqWTBXIcyF4ZgG4AbP92uuLlZE+wCMwFIoxXR55FUpftJ+c9P+ucCfhefwuEUy
/XGJl1sD6cOQGXHcXOfevFDBKH1Wtq/qxMupPxHcUWSANS+tOtW8Z1jKEi4oZFti
/4a3/+CJJUsMmJgAqgCy4tyLp/LwvDkzYSHDmZVj50lIv+0M791P0E542hm0uzk=
=P6SP
-----END PGP SIGNATURE-----

From bert.hubert@netherlabs.nl  Fri Jul  8 03:57:19 2011
Return-Path: <bert.hubert@netherlabs.nl>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B0F521F86B1 for <dnsext@ietfa.amsl.com>; Fri,  8 Jul 2011 03:57:19 -0700 (PDT)
X-Quarantine-ID: <nPMhW+YBwRnU>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BAD HEADER SECTION, Improper folded header field made up entirely of whitespace (char 20 hex): X-Spam_report: ...that system for details.\n \n Content previ[...]
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level: 
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nPMhW+YBwRnU for <dnsext@ietfa.amsl.com>; Fri,  8 Jul 2011 03:57:18 -0700 (PDT)
Received: from xs.powerdns.com (xs.powerdns.com [IPv6:2001:888:2000:1d::2]) by ietfa.amsl.com (Postfix) with ESMTP id E9EF821F856E for <dnsext@ietf.org>; Fri,  8 Jul 2011 03:57:09 -0700 (PDT)
Received: from mail-fx0-f54.google.com ([209.85.161.54]) by xs.powerdns.com with esmtpsa (TLS1.0:RSA_ARCFOUR_SHA1:16) (Exim 4.71) (envelope-from <bert.hubert@netherlabs.nl>) id 1Qf8k5-0006eU-IM for dnsext@ietf.org; Fri, 08 Jul 2011 12:57:07 +0200
Received: by fxe4 with SMTP id 4so2452556fxe.27 for <dnsext@ietf.org>; Fri, 08 Jul 2011 03:57:00 -0700 (PDT)
Received: by 10.223.65.197 with SMTP id k5mr2893666fai.26.1310122620128; Fri, 08 Jul 2011 03:57:00 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.124.209 with HTTP; Fri, 8 Jul 2011 03:56:40 -0700 (PDT)
In-Reply-To: <4E14D100.5010705@ogud.com>
References: <4E14D100.5010705@ogud.com>
From: bert hubert <bert.hubert@netherlabs.nl>
Date: Fri, 8 Jul 2011 12:56:40 +0200
Message-ID: <CA+wr5LW28OEtCGz1Ue4_VpCh7WkUOqbgS=BCJJnnNMH_3wnC-Q@mail.gmail.com>
To: Olafur Gudmundsson <ogud@ogud.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-Spam_score: -2.9
X-Spam_score_int: -28
X-Spam_bar: --
X-Spam_report: Spam detection software, running on the system "xs.powerdns.com", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email.  If you have any questions, see the administrator of that system for details.  Content preview:  On Wed, Jul 6, 2011 at 11:17 PM, Olafur Gudmundsson <ogud@ogud.com> wrote: > Please review the document and sent a statement that you reviewed the > document. If the review raises any issues, please note what they are. > Remember that we need a minimum of 5 reviewers. [...]   Content analysis details:   (-2.9 points, 5.0 required)  pts rule name              description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1% [score: 0.0000]
Cc: dnsext@ietf.org
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jul 2011 10:57:19 -0000

On Wed, Jul 6, 2011 at 11:17 PM, Olafur Gudmundsson <ogud@ogud.com> wrote:
> Please review the document and sent a statement that you reviewed the
> document. =A0If the review raises any issues, please note what they are.
> Remember that we need a minimum of 5 reviewers.

I have read this document and also the other reviews. I think this
document should go ahead, with two clarifications, one of which is
new.
The first clarification is moving up the definition of ECDSA, but this
has been noted already and Paul is going to fix it.

The second one is that the document describes a signature as 'r|s'. In
such cases, an implementor is always left wondering where r ends and s
begins. In the case of 'r' and 's' both needing their full amount of
bits, this is easy - the '|' goes exactly down the middle.

But it is possible that either r or s fits in one octet less (or more
even!). The same goes for x and y.

It is helpful therefore to add a sentence that r and s are both
left-padded to their full length or, alternatively, that r and s
occupy the same number of octets in an answer (and the same goes for x
and y).

PowerDNS already includes support for ECDSA in the 3.0 prereleases,
and we use the 'cut down the middle' rule.
http://wiki.powerdns.com/trac/browser/trunk/pdns/pdns/cryptoppsigners.cc#L1=
19

But I'd love to see some text that makes it official. A suggestion
might be as the new third paragraph of section 4:
"Implementations will ensure that when concatenating the halves of a
coordinate, each half takes up the same amount of octets, allowing for
the unambiguous reconstruction of the coordinate on reception".

   Bert

From ahu@xs.powerdns.com  Fri Jul  8 04:08:30 2011
Return-Path: <ahu@xs.powerdns.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66A0621F8870 for <dnsext@ietfa.amsl.com>; Fri,  8 Jul 2011 04:08:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.588
X-Spam-Level: 
X-Spam-Status: No, score=-0.588 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FAKE_REPLY_C=2.012, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9Kai1jGlsiLD for <dnsext@ietfa.amsl.com>; Fri,  8 Jul 2011 04:08:29 -0700 (PDT)
Received: from xs.powerdns.com (xs.powerdns.com [IPv6:2001:888:2000:1d::2]) by ietfa.amsl.com (Postfix) with ESMTP id 8A18521F87ED for <dnsext@ietf.org>; Fri,  8 Jul 2011 04:08:29 -0700 (PDT)
Received: from ahu by xs.powerdns.com with local (Exim 4.71) (envelope-from <ahu@xs.powerdns.com>) id 1Qf8v6-000754-Nk for dnsext@ietf.org; Fri, 08 Jul 2011 13:08:28 +0200
Date: Fri, 8 Jul 2011 13:08:28 +0200
From: bert hubert <bert.hubert@netherlabs.nl>
To: dnsext@ietf.org
Message-ID: <20110708110828.GA15836@xs.powerdns.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.20 (2009-06-14)
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jul 2011 11:08:30 -0000

On Wed, Jul 6, 2011 at 11:17 PM, Olafur Gudmundsson <ogud@ogud.com> wrote:
> Please review the document and sent a statement that you reviewed the
> document. =A0If the review raises any issues, please note what they are.
> Remember that we need a minimum of 5 reviewers.

I have read this document and also the other reviews. I think this
document should go ahead, with two clarifications, one of which is
new.
The first clarification is moving up the definition of ECDSA, but this
has been noted already and Paul is going to fix it.

The second one is that the document describes a signature as 'r|s'. In
such cases, an implementor is always left wondering where r ends and s
begins. In the case of 'r' and 's' both needing their full amount of
bits, this is easy - the '|' goes exactly down the middle.

But it is possible that either r or s fits in one octet less (or more
even!). The same goes for x and y.

It is helpful therefore to add a sentence that r and s are both
left-padded to their full length or, alternatively, that r and s
occupy the same number of octets in an answer (and the same goes for x
and y).

PowerDNS already includes support for ECDSA in the 3.0 prereleases,
and we use the 'cut down the middle' rule.
http://wiki.powerdns.com/trac/browser/trunk/pdns/pdns/cryptoppsigners.cc#L1=
19

But I'd love to see some text that makes it official. A suggestion
might be as the new third paragraph of section 4:
"Implementations will ensure that when concatenating the halves of a
coordinate, each half takes up the same amount of octets, allowing for
the unambiguous reconstruction of the coordinate on reception".

   Bert

From scottr.nist@gmail.com  Fri Jul  8 05:26:47 2011
Return-Path: <scottr.nist@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B18F21F8998 for <dnsext@ietfa.amsl.com>; Fri,  8 Jul 2011 05:26:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V7sCZjTWXrdb for <dnsext@ietfa.amsl.com>; Fri,  8 Jul 2011 05:26:47 -0700 (PDT)
Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by ietfa.amsl.com (Postfix) with ESMTP id DD84821F8991 for <dnsext@ietf.org>; Fri,  8 Jul 2011 05:26:46 -0700 (PDT)
Received: from 107-140.antd.nist.gov (107-140.antd.nist.gov [129.6.140.107]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id p68CQZUK027854 for <dnsext@ietf.org>; Fri, 8 Jul 2011 08:26:37 -0400
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Apple Message framework v1084)
From: Scott Rose <scottr.nist@gmail.com>
In-Reply-To: <4E14D100.5010705@ogud.com>
Date: Fri, 8 Jul 2011 08:26:35 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <564B3EB6-8E63-4CF2-AB5D-143124ACDF1C@gmail.com>
References: <4E14D100.5010705@ogud.com>
To: DNSEXT Working Group <dnsext@ietf.org>
X-Mailer: Apple Mail (2.1084)
X-NIST-MailScanner: Found to be clean
X-NIST-MailScanner-From: scottr.nist@gmail.com
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jul 2011 12:26:47 -0000

I have read the draft and have no additional comments.  I support it =
going forward.

Scott

On Jul 6, 2011, at 5:17 PM, Olafur Gudmundsson wrote:

> Dear Colleagues
>=20
> This message starts a Working Group Last Call for
> "Elliptic Curve DSA for DNSSEC" located at
> http://www.ietf.org/internet-drafts/draft-ietf-dnsext-ecdsa-01.txt
> This document is on Standards track.
>=20
> This WGLC will conclude on midnight on July 21'th UTC.
>=20
> Please review the document and sent a statement that you reviewed the
> document.  If the review raises any issues, please note what they are.
> Remember that we need a minimum of 5 reviewers.
>=20
>=20
>    Olafur & Andrew
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext


From miekg@atoom.net  Fri Jul  8 05:27:29 2011
Return-Path: <miekg@atoom.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A52A721F88A7 for <dnsext@ietfa.amsl.com>; Fri,  8 Jul 2011 05:27:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n8RxJN4Acjfd for <dnsext@ietfa.amsl.com>; Fri,  8 Jul 2011 05:27:29 -0700 (PDT)
Received: from elektron.atoom.net (cl-201.ede-01.nl.sixxs.net [IPv6:2001:7b8:2ff:c8::2]) by ietfa.amsl.com (Postfix) with ESMTP id 1CD5B21F8681 for <dnsext@ietf.org>; Fri,  8 Jul 2011 05:27:29 -0700 (PDT)
Received: by elektron.atoom.net (Postfix, from userid 1000) id 5C9203FFF3; Fri,  8 Jul 2011 14:27:27 +0200 (CEST)
Date: Fri, 8 Jul 2011 14:27:27 +0200
From: Miek Gieben <miek@miek.nl>
To: dnsext@ietf.org
Message-ID: <20110708122727.GA2845@miek.nl>
Mail-Followup-To: dnsext@ietf.org
References: <20110708110828.GA15836@xs.powerdns.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="MGYHOYXEY6WxJCY8"
Content-Disposition: inline
In-Reply-To: <20110708110828.GA15836@xs.powerdns.com>
User-Agent: Vim/Mutt/Linux
X-Home: www.miek.nl
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jul 2011 12:27:29 -0000

--MGYHOYXEY6WxJCY8
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

[ Quoting bert hubert at 13:08 on July  8 in "Re: [dnsext] WGLC: Elliptic Curve D"... ]
> On Wed, Jul 6, 2011 at 11:17 PM, Olafur Gudmundsson <ogud@ogud.com> wrote:
> > Please review the document and sent a statement that you reviewed the
> > document. =A0If the review raises any issues, please note what they are.
> > Remember that we need a minimum of 5 reviewers.

> But I'd love to see some text that makes it official. A suggestion
> might be as the new third paragraph of section 4:
> "Implementations will ensure that when concatenating the halves of a
> coordinate, each half takes up the same amount of octets, allowing for
> the unambiguous reconstruction of the coordinate on reception".

I've read the draft and support its publication, but I also like to
see the text propposed by Bert to be included.

Regards,
    Miek

--MGYHOYXEY6WxJCY8
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4W968ACgkQJYuFzziA0PZStgCffpLoJuzJ/bs+XwHqFAUKHsYS
clQAoOIYipiAOuHVRefzbKiLHHRXqK7q
=hVar
-----END PGP SIGNATURE-----

--MGYHOYXEY6WxJCY8--

From wouter@nlnetlabs.nl  Sat Jul  9 03:34:28 2011
Return-Path: <wouter@nlnetlabs.nl>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F78921F8752 for <dnsext@ietfa.amsl.com>; Sat,  9 Jul 2011 03:34:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.752
X-Spam-Level: 
X-Spam-Status: No, score=-1.752 tagged_above=-999 required=5 tests=[AWL=-0.248, BAYES_00=-2.599, HELO_EQ_NL=0.55, HOST_EQ_NL=1.545,  RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WSRm4zxkBHZ1 for <dnsext@ietfa.amsl.com>; Sat,  9 Jul 2011 03:34:26 -0700 (PDT)
Received: from spalding.dds.nl (spalding.dds.nl [85.17.178.135]) by ietfa.amsl.com (Postfix) with ESMTP id 2E63521F8751 for <dnsext@ietf.org>; Sat,  9 Jul 2011 03:34:25 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by spalding.dds.nl (Postfix) with ESMTP id 58C1362806E for <dnsext@ietf.org>; Sat,  9 Jul 2011 12:34:24 +0200 (CEST)
Received: from [192.168.254.2] (195-241-9-117.adsl.dds.nl [195.241.9.117]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by spalding.dds.nl (Postfix) with ESMTPSA id 60A87628075 for <dnsext@ietf.org>; Sat,  9 Jul 2011 12:34:18 +0200 (CEST)
Message-ID: <4E182EAB.9080803@nlnetlabs.nl>
Date: Sat, 09 Jul 2011 12:34:19 +0200
From: "W.C.A. Wijngaards" <wouter@nlnetlabs.nl>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.18) Gecko/20110616 SUSE/3.1.11 Thunderbird/3.1.11
MIME-Version: 1.0
To: dnsext@ietf.org
References: <20110708110828.GA15836@xs.powerdns.com> <20110708122727.GA2845@miek.nl>
In-Reply-To: <20110708122727.GA2845@miek.nl>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: clamav-milter 0.97 at spalding
X-Virus-Status: Clean
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jul 2011 10:34:28 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/08/2011 02:27 PM, Miek Gieben wrote:
> [ Quoting bert hubert at 13:08 on July  8 in "Re: [dnsext] WGLC: Elliptic Curve D"... ]
>> On Wed, Jul 6, 2011 at 11:17 PM, Olafur Gudmundsson <ogud@ogud.com> wrote:
>>> Please review the document and sent a statement that you reviewed the
>>> document. =A0If the review raises any issues, please note what they are.
>>> Remember that we need a minimum of 5 reviewers.
> 
>> But I'd love to see some text that makes it official. A suggestion
>> might be as the new third paragraph of section 4:
>> "Implementations will ensure that when concatenating the halves of a
>> coordinate, each half takes up the same amount of octets, allowing for
>> the unambiguous reconstruction of the coordinate on reception".
> 
> I've read the draft and support its publication, but I also like to
> see the text propposed by Bert to be included.

I have not actually checked this, but the bit length of P256 and P384
are divisible by 8 (divisible by 64 even).  Hence the width of these
variables in octets is a whole number of octets?

Are you proposing some sort of variable length encoding?  I would prefer
simplicity.

Best regards,
   Wouter
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.15 (GNU/Linux)
Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org/
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=pFTk
-----END PGP SIGNATURE-----

From mstjohns@comcast.net  Sat Jul  9 08:01:15 2011
Return-Path: <mstjohns@comcast.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D989B21F87C6 for <dnsext@ietfa.amsl.com>; Sat,  9 Jul 2011 08:01:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id twmF0LN71VdQ for <dnsext@ietfa.amsl.com>; Sat,  9 Jul 2011 08:01:15 -0700 (PDT)
Received: from qmta06.westchester.pa.mail.comcast.net (qmta06.westchester.pa.mail.comcast.net [76.96.62.56]) by ietfa.amsl.com (Postfix) with ESMTP id 4A37221F87C5 for <dnsext@ietf.org>; Sat,  9 Jul 2011 08:01:15 -0700 (PDT)
Received: from omta23.westchester.pa.mail.comcast.net ([76.96.62.74]) by qmta06.westchester.pa.mail.comcast.net with comcast id 5qip1h0051c6gX856r1FCr; Sat, 09 Jul 2011 15:01:15 +0000
Received: from Mike-PC3.comcast.net ([68.83.217.57]) by omta23.westchester.pa.mail.comcast.net with comcast id 5r1E1h00r1EtFYL3jr1EVq; Sat, 09 Jul 2011 15:01:15 +0000
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Sat, 09 Jul 2011 11:01:10 -0400
To: "W.C.A. Wijngaards" <wouter@nlnetlabs.nl>,dnsext@ietf.org
From: Michael StJohns <mstjohns@comcast.net>
In-Reply-To: <4E182EAB.9080803@nlnetlabs.nl>
References: <20110708110828.GA15836@xs.powerdns.com> <20110708122727.GA2845@miek.nl> <4E182EAB.9080803@nlnetlabs.nl>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Message-Id: <20110709150115.4A37221F87C5@ietfa.amsl.com>
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jul 2011 15:01:16 -0000

Note below.

At 06:34 AM 7/9/2011, W.C.A. Wijngaards wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>>> But I'd love to see some text that makes it official. A suggestion
>>> might be as the new third paragraph of section 4:
>>> "Implementations will ensure that when concatenating the halves of a
>>> coordinate, each half takes up the same amount of octets, allowing for
>>> the unambiguous reconstruction of the coordinate on reception".
>> 
>> I've read the draft and support its publication, but I also like to
>> see the text propposed by Bert to be included.
>
>I have not actually checked this, but the bit length of P256 and P384
>are divisible by 8 (divisible by 64 even).  Hence the width of these
>variables in octets is a whole number of octets?
>
>Are you proposing some sort of variable length encoding?  I would prefer
>simplicity.


I'm pretty sure what Olafur is saying is that one possible encoding for an integer is no leading zeros, or additional leading zeros if the high bit is set.    e.g. 00000056abcd1234.... 56abcd1234).  You want to be clear that the point is encoded as 2N octets, where N is 16 for P256 and 24 for P384.

I'm coming to this late, otherwise I would have strongly recommended using the well-defined point encoding from X9.6 - of 2N+1 where the first octet is 04 to indicate uncompressed.  The saving of one byte seems to be short-sighted as this is yet another form of public key that tools will have to understand - pretty much every tool/library I know of will require the "04" be prepended to the key bytes before the key can be loaded for verification.  (See RFC 5480, section 2.2 for better text on how to do the encoding)

Mike





From miekg@atoom.net  Sat Jul  9 10:07:35 2011
Return-Path: <miekg@atoom.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B23D221F87C7 for <dnsext@ietfa.amsl.com>; Sat,  9 Jul 2011 10:07:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yU4-dbL2Jcng for <dnsext@ietfa.amsl.com>; Sat,  9 Jul 2011 10:07:35 -0700 (PDT)
Received: from elektron.atoom.net (cl-201.ede-01.nl.sixxs.net [IPv6:2001:7b8:2ff:c8::2]) by ietfa.amsl.com (Postfix) with ESMTP id 2AB9821F877B for <dnsext@ietf.org>; Sat,  9 Jul 2011 10:07:35 -0700 (PDT)
Received: by elektron.atoom.net (Postfix, from userid 1000) id 1A1A13FFCA; Sat,  9 Jul 2011 19:07:29 +0200 (CEST)
Date: Sat, 9 Jul 2011 19:07:29 +0200
From: Miek Gieben <miek@miek.nl>
To: dnsext@ietf.org
Message-ID: <20110709170729.GA7877@miek.nl>
Mail-Followup-To: dnsext@ietf.org
References: <20110708110828.GA15836@xs.powerdns.com> <20110708122727.GA2845@miek.nl> <4E182EAB.9080803@nlnetlabs.nl> <20110709150115.4A37221F87C5@ietfa.amsl.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="FL5UXtIhxfXey3p5"
Content-Disposition: inline
In-Reply-To: <20110709150115.4A37221F87C5@ietfa.amsl.com>
User-Agent: Vim/Mutt/Linux
X-Home: www.miek.nl
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jul 2011 17:07:35 -0000

--FL5UXtIhxfXey3p5
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

[ Quoting Michael StJohns at 11:01 on July  9 in "Re: [dnsext] WGLC: Elliptic Curve D"... ]
> I'm coming to this late, otherwise I would have strongly recommended
> using the well-defined point encoding from X9.6 - of 2N+1 where the
> first octet is 04 to indicate uncompressed.  The saving of one byte
> seems to be short-sighted as this is yet another form of public key
> that tools will have to understand - pretty much every tool/library
> I know of will require the "04" be prepended to the key bytes before
> the key can be loaded for verification.  (See RFC 5480, section 2.2
> for better text on how to do the encoding)

+1

I now understand why my ecdsa library has Marshal/Unmarshal functions,
and why I could not use them in this case.

Regards,
    Miek

--FL5UXtIhxfXey3p5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4YitEACgkQJYuFzziA0PberwCfdvm6PNZHntsAID2W2Z5o7Rx8
Z5AAnAgbZgqPYiJVVzAxYL31IoXbZ0fD
=Wsbs
-----END PGP SIGNATURE-----

--FL5UXtIhxfXey3p5--

From internet-drafts@ietf.org  Mon Jul 11 09:04:25 2011
Return-Path: <internet-drafts@ietf.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DB5221F8C71; Mon, 11 Jul 2011 09:04:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DAoZZRX-z8HY; Mon, 11 Jul 2011 09:04:25 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4543D21F8E7B; Mon, 11 Jul 2011 09:04:24 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 3.55
Message-ID: <20110711160424.4108.54615.idtracker@ietfa.amsl.com>
Date: Mon, 11 Jul 2011 09:04:24 -0700
Cc: dnsext@ietf.org
Subject: [dnsext] I-D Action: draft-ietf-dnsext-dnssec-bis-updates-13.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Jul 2011 16:04:25 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies. This draft is a work item of the DNS Extensions Working Group of the I=
ETF.

	Title           : Clarifications and Implementation Notes for DNSSECbis
	Author(s)       : Samuel Weiler
                          David Blacka
	Filename        : draft-ietf-dnsext-dnssec-bis-updates-13.txt
	Pages           : 15
	Date            : 2011-07-11

   This document is a collection of technical clarifications to the
   DNSSECbis document set.  It is meant to serve as a resource to
   implementors as well as a repository of DNSSECbis errata.


A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-bis-updates-13=
.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

This Internet-Draft can be retrieved at:
ftp://ftp.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-bis-updates-13.=
txt

From weiler@tislabs.com  Mon Jul 11 09:20:11 2011
Return-Path: <weiler@tislabs.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAD1E21F8E36 for <dnsext@ietfa.amsl.com>; Mon, 11 Jul 2011 09:20:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g4Cimo1O4XZG for <dnsext@ietfa.amsl.com>; Mon, 11 Jul 2011 09:20:11 -0700 (PDT)
Received: from walnut.tislabs.com (walnut.tislabs.com [192.94.214.200]) by ietfa.amsl.com (Postfix) with ESMTP id 6EDAB11E8088 for <dnsext@ietf.org>; Mon, 11 Jul 2011 09:20:03 -0700 (PDT)
Received: from nova.tislabs.com (unknown [10.66.1.77]) by walnut.tislabs.com (Postfix) with ESMTP id EBD7928B003C; Mon, 11 Jul 2011 12:20:02 -0400 (EDT)
Received: from nova.tislabs.com (nova.tislabs.com [10.66.1.77]) by nova.tislabs.com (Postfix) with ESMTP id D11A71F8032; Mon, 11 Jul 2011 12:20:02 -0400 (EDT)
Date: Mon, 11 Jul 2011 12:20:02 -0400 (EDT)
From: weiler@tislabs.com
To: Matthijs Mekking <matthijs@NLnetLabs.nl>
In-Reply-To: <4D938CC3.1020103@nlnetlabs.nl>
Message-ID: <alpine.LRH.2.00.1107111218350.2932@nova.tislabs.com>
References: <alpine.BSF.2.00.1011180553250.83352@fledge.watson.org> <4CE51293.5040605@nlnetlabs.nl> <a06240801c9101620d463@192.168.128.163> <22284.1290447209@nsa.vix.com> <4CF4D54B.5000407@nlnetlabs.nl> <20110310223438.978E9C0E902@drugs.dv.isc.org> <4D79DDFA.3010006@nlnetlabs.nl> <alpine.BSF.2.00.1103140901170.99213@fledge.watson.org> <20110314213319.A2799C8CA0B@drugs.dv.isc.org> <alpine.BSF.2.00.1103141750530.74870@fledge.watson.org> <a06240800c9a50cf4632a@10.31.200.110> <AANLkTimUUa5zkr+hZH4jR-euENg_n=9EwtRVBN-cxr9_@mail.gmail.com> <a06240802c9a7b6cb4cc3@192.168.1.105> <AANLkTin+hMZ-27VjkQq7_44zNguMiefhxbgGD+-XZxPP@mail.gmail.com> <a06240802c9a7e0807069@10.31.200.117> <AANLkTi=4co5mS3RYhK1BvUMOm54wgNAMeKtk3_Zm0ff1@mail.gmail.com> <a06240802c9a93d762e13@[10.31.200.112]> <a06240803c9a9417e1fe8@[10.31.200.112]> <4D938CC3.1020103@nlnetlabs.nl>
User-Agent: Alpine 2.00 (LRH 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Cc: Edward Lewis <Ed.Lewis@neustar.biz>, dnsext@ietf.org
Subject: Re: [dnsext] Clarifying the mandatory algorithm rules
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Jul 2011 16:20:11 -0000

On Wed, 30 Mar 2011, Matthijs Mekking wrote:

> Ok, so let's try to come to a reasonable clarifying text:

Many thanks to both Matthijs and Ed for proposing clarifying text.  I just 
added this to dnssec-bis-updates, using a mix of text from Matthijs, Ed, 
and myself.

-- Sam

From weiler@tislabs.com  Mon Jul 11 09:24:24 2011
Return-Path: <weiler@tislabs.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29D7E11E8088 for <dnsext@ietfa.amsl.com>; Mon, 11 Jul 2011 09:24:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EOb9vVgiOXbp for <dnsext@ietfa.amsl.com>; Mon, 11 Jul 2011 09:24:23 -0700 (PDT)
Received: from walnut.tislabs.com (walnut.tislabs.com [192.94.214.200]) by ietfa.amsl.com (Postfix) with ESMTP id 8002511E80B1 for <dnsext@ietf.org>; Mon, 11 Jul 2011 09:24:02 -0700 (PDT)
Received: from nova.tislabs.com (unknown [10.66.1.77]) by walnut.tislabs.com (Postfix) with ESMTP id 38CB328B0048; Mon, 11 Jul 2011 12:24:02 -0400 (EDT)
Received: from nova.tislabs.com (nova.tislabs.com [10.66.1.77]) by nova.tislabs.com (Postfix) with ESMTP id 291201F8033; Mon, 11 Jul 2011 12:24:02 -0400 (EDT)
Date: Mon, 11 Jul 2011 12:24:02 -0400 (EDT)
From: weiler@tislabs.com
To: "W.C.A. Wijngaards" <wouter@nlnetlabs.nl>
In-Reply-To: <4C5986E7.4020400@nlnetlabs.nl>
Message-ID: <alpine.LRH.2.00.1107111222100.2932@nova.tislabs.com>
References: <4C5986E7.4020400@nlnetlabs.nl>
User-Agent: Alpine 2.00 (LRH 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Cc: dnsext@ietf.org
Subject: Re: [dnsext] algorithm rollover
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Jul 2011 16:24:24 -0000

While this dicussion (on this list) seemed to conclude that most of these 
changes belong in other docs, I did add one piece from it to 
dnssec-bis-updates:

> In dnssecbis-updates, ...a zone MAY contain RRSIG's for an DNSKEY
> that does not exist in the DNSKEY RRset.

-- Sam

From warren@kumari.net  Wed Jul 13 12:54:00 2011
Return-Path: <warren@kumari.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E11811E808C for <dnsext@ietfa.amsl.com>; Wed, 13 Jul 2011 12:54:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.499
X-Spam-Level: 
X-Spam-Status: No, score=-102.499 tagged_above=-999 required=5 tests=[AWL=0.100, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LGnvHk-vs+Wu for <dnsext@ietfa.amsl.com>; Wed, 13 Jul 2011 12:54:00 -0700 (PDT)
Received: from vimes.kumari.net (vimes.kumari.net [198.186.192.250]) by ietfa.amsl.com (Postfix) with ESMTP id D01A111E8135 for <dnsext@ietf.org>; Wed, 13 Jul 2011 12:53:56 -0700 (PDT)
Received: from dot.her.corp.google.com (unknown [74.202.225.33]) by vimes.kumari.net (Postfix) with ESMTPSA id 4D95E1B409DA; Wed, 13 Jul 2011 15:53:56 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Warren Kumari <warren@kumari.net>
In-Reply-To: <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com>
Date: Wed, 13 Jul 2011 15:53:55 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <4EE862D0-592A-420C-BECA-66B9B53A9B72@kumari.net>
References: <20110706135012.13666.6167.idtracker@ietfa.amsl.com> <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com>
To: Scott Rose <scottr.nist@gmail.com>
X-Mailer: Apple Mail (2.1084)
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Fwd: I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Jul 2011 19:54:00 -0000

On Jul 6, 2011, at 10:00 AM, Scott Rose wrote:

> An updated version of the algo-signal draft to address the issues in =
WGLC.  Specific changes:
>=20
> 1.  Changed the wording in 3.4.1 to remove the RFC2119 wording on =
setting the DO bit. =20
>=20
> 2. Changed section 4 wording to indicate DNS proxy systems and added a =
ref to RFC 5625.
>=20
> 3. fixed some typos and minor wording changes to stress that the DAU =
option is for signaling only and does not specify any change to how =
servers construct a response.
>=20
> Scott

Oooh, I like this version....

Some simple nits:

Section1: Introduction:

O: "for use with DNSSEC (see . "
C: Somethings missing here :-P

O: "by which a client query can signal a set of algorithms it =
implements."
P: "by which a client query can signal a set of algorithms which it =
implements.
C: or "that" or something ?

Section 2
O: "for the DNSSEC Algorithm Understood (DAU)"
P: for the DNSSEC Algorithms Understood (DAU)"
C: Plural?

O: "DNSSEC algorithm codes are 1 octet long so this value is the number =
of octets."
P: ""
C: Is this sentence needed? I don't have proposed text, but I found it =
broke the flow of the text...

Section 3.1:
O: "So optimal setting of the DAU"
P: "Optimal setting of the DAU"

Section 3.2:
O: "This way thee validating stub resolver"
P: "This way the validating stub resolver"
C: 'thee" is *so* last century...

Section 3.4.1:
O: "A validating recursive resolver sets..."
C: It *might* be interesting to somewhere also include a flag saying if =
the DAU was included because the client did so, or if the recursive did =
so because of local policy...=20

Section 6:
O: "Zone administrators that are planning"
P: "Zone administrators who are planning"
C: Just sounds better (IMO).


W

>=20
> Begin forwarded message:
>=20
>> From: internet-drafts@ietf.org
>> Date: July 6, 2011 9:50:12 AM EDT
>> To: i-d-announce@ietf.org
>> Cc: dnsext@ietf.org
>> Subject: [dnsext] I-D Action: =
draft-ietf-dnsext-dnssec-algo-signal-02.txt
>>=20
>> A New Internet-Draft is available from the on-line Internet-Drafts =
directories. This draft is a work item of the DNS Extensions Working =
Group of the IETF.
>>=20
>> 	Title           : Signaling Cryptographic Algorithm =
Understanding in DNSSEC
>> 	Author(s)       : Steve Crocker
>>                         Scott Rose
>> 	Filename        : draft-ietf-dnsext-dnssec-algo-signal-02.txt
>> 	Pages           : 8
>> 	Date            : 2011-07-06
>>=20
>>  The DNS Security Extensions (DNSSEC) were developed to provide =
origin
>>  authentication and integrity protection for DNS data by using =
digital
>>  signatures.  These digital signatures can be generated using
>>  different algorithms.  This draft sets out to specify a way for
>>  validating end-system resolvers to signal to a server which
>>  cryptographic algorithms they support.
>>=20
>>=20
>>=20
>> A URL for this Internet-Draft is:
>> =
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-algo-signal-0=
2.txt
>>=20
>> Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/
>>=20
>> This Internet-Draft can be retrieved at:
>> =
ftp://ftp.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-algo-signal-02=
.txt
>> _______________________________________________
>> dnsext mailing list
>> dnsext@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsext
>=20
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>=20


From rwfranks@gmail.com  Thu Jul 14 12:01:08 2011
Return-Path: <rwfranks@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC5E721F87C3 for <dnsext@ietfa.amsl.com>; Thu, 14 Jul 2011 12:01:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.299
X-Spam-Level: 
X-Spam-Status: No, score=-3.299 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tWvgQZ4UmqXF for <dnsext@ietfa.amsl.com>; Thu, 14 Jul 2011 12:01:08 -0700 (PDT)
Received: from mail-qw0-f44.google.com (mail-qw0-f44.google.com [209.85.216.44]) by ietfa.amsl.com (Postfix) with ESMTP id C84A411E81EC for <dnsext@ietf.org>; Thu, 14 Jul 2011 12:00:21 -0700 (PDT)
Received: by qwc23 with SMTP id 23so364013qwc.31 for <dnsext@ietf.org>; Thu, 14 Jul 2011 12:00:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; bh=V8bqRgRGWX5Wdt3w7i300CaVu1LlqmaQSw9QUkqbuV0=; b=k8C4JhVYcHgIsHZL+HMsxTb+LXH7eNn/8DCCzDYb3jFlvgOr1w5Mt3clDMsHjWC9Jk 0ywXa39a8W6q64tOygSRf/nO0EYbYrrxjeCCGtubfd46sKYfbGwK4wQodLDvV900S2Vj xnS5DOaCdDI2UALIpYiW9XCR41UnozhYRoFuc=
Received: by 10.229.251.70 with SMTP id mr6mr1779569qcb.276.1310670021119; Thu, 14 Jul 2011 12:00:21 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.229.245.136 with HTTP; Thu, 14 Jul 2011 11:59:59 -0700 (PDT)
In-Reply-To: <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com>
References: <20110706135012.13666.6167.idtracker@ietfa.amsl.com> <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com>
From: Dick Franks <rwfranks@gmail.com>
Date: Thu, 14 Jul 2011 19:59:59 +0100
Message-ID: <CAKW6Ri4_eLtVhi+1m54gzE+tkZ717EZ96A3BiAM321GV0pocug@mail.gmail.com>
To: Scott Rose <scottr.nist@gmail.com>, =?UTF-8?B?UGF0cmlrIEbDpGx0c3Ryw7Zt?= <paf@cisco.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-Mailman-Approved-At: Thu, 14 Jul 2011 12:32:45 -0700
Cc: dnsext@ietf.org
Subject: Re: [dnsext] I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jul 2011 19:23:41 -0000

Scott, Patrik,

I find myself roused from dnsext lurking mode by what  appears to be a
conflict between draft02 of this proposal and the requirements of
RFC2671, which has somehow slipped through review.

RFC2671 defines OPT record wire-format <rdata> to be a list of
elements of the form:

    <option-code><option-length>[<option data>]

This permits an uncomprehending implementation to parse a list
containing options it does not recognise. For this to work,
implementations must regard <option-data> as opaque.

Using the following example based on the text of section 2 of draft02,

    DAU  2  [ RSASHA256 RSASHA1 ]  1  [RSASH1]


The uncomprehending implementation in my brain parses this as:

    <option-code> =3D DAU

    <option-length> =3D 2

    <option-data> =3D ( RSHASHA256 RSASHA1 )


    <option-code> =3D 1

    <option-length> =3D RSASHA1

game over!


Either, the internal structure of DAU will need to be changed to
conform to RFC2671,

    DAU  5  2  [ RSASHA256 RSASHA1 ]  1  [RSASH1]


or the proposal reworked to define two new options:


    ALGU  2  [ RSASHA256 RSASHA1 ]


    HASHU  1  [RSASH1]


which, separated, may also find applications beyond DNSSEC.


I apologise for raining on your parade.

--Dick



On 6 July 2011 15:00, Scott Rose <scottr.nist@gmail.com> wrote:
> An updated version of the algo-signal draft to address the issues in WGLC=
. =C2=A0Specific changes:
>
> 1. =C2=A0Changed the wording in 3.4.1 to remove the RFC2119 wording on se=
tting the DO bit.
>
> 2. Changed section 4 wording to indicate DNS proxy systems and added a re=
f to RFC 5625.
>
> 3. fixed some typos and minor wording changes to stress that the DAU opti=
on is for signaling only and does not specify any change to how servers con=
struct a response.
>
> Scott
>
> Begin forwarded message:
>
>> From: internet-drafts@ietf.org
>> Date: July 6, 2011 9:50:12 AM EDT
>> To: i-d-announce@ietf.org
>> Cc: dnsext@ietf.org
>> Subject: [dnsext] I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.tx=
t
>>
>> A New Internet-Draft is available from the on-line Internet-Drafts direc=
tories. This draft is a work item of the DNS Extensions Working Group of th=
e IETF.
>>
>> =C2=A0 =C2=A0 =C2=A0 Title =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Signalin=
g Cryptographic Algorithm Understanding in DNSSEC
>> =C2=A0 =C2=A0 =C2=A0 Author(s) =C2=A0 =C2=A0 =C2=A0 : Steve Crocker
>> =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0Scott Rose
>> =C2=A0 =C2=A0 =C2=A0 Filename =C2=A0 =C2=A0 =C2=A0 =C2=A0: draft-ietf-dn=
sext-dnssec-algo-signal-02.txt
>> =C2=A0 =C2=A0 =C2=A0 Pages =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 8
>> =C2=A0 =C2=A0 =C2=A0 Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 201=
1-07-06
>>

From rwfranks@gmail.com  Thu Jul 14 15:07:29 2011
Return-Path: <rwfranks@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 568A821F8B4F for <dnsext@ietfa.amsl.com>; Thu, 14 Jul 2011 15:07:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.977
X-Spam-Level: 
X-Spam-Status: No, score=-102.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fuRNrmDaROl8 for <dnsext@ietfa.amsl.com>; Thu, 14 Jul 2011 15:07:28 -0700 (PDT)
Received: from mail-qw0-f44.google.com (mail-qw0-f44.google.com [209.85.216.44]) by ietfa.amsl.com (Postfix) with ESMTP id 9D0A321F8B4C for <dnsext@ietf.org>; Thu, 14 Jul 2011 15:07:28 -0700 (PDT)
Received: by qwc23 with SMTP id 23so451687qwc.31 for <dnsext@ietf.org>; Thu, 14 Jul 2011 15:07:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:sender:in-reply-to:references:from:date :x-google-sender-auth:message-id:subject:to:content-type :content-transfer-encoding; bh=p0qCcV4G9CSoZu+mnndSz2VCW+scr4gt/4bGVSsDhjQ=; b=jb1j3NYzSO9LuIA2o7OvpIKGZanvAGJL4sMddXHQ33KB5eWTckwdDsObo0IAjS7WqR NdQ8gTR/hSvdZaraye8KBTPsMvSsshBtAZH8lWWxNbOtbBwic0z1FUNW8cacKAZgVQLG nOddq4oct+tm0PW/zbuBJF9lC2Oyb5em9EN3k=
Received: by 10.229.64.148 with SMTP id e20mr1973810qci.162.1310681248118; Thu, 14 Jul 2011 15:07:28 -0700 (PDT)
MIME-Version: 1.0
Sender: rwfranks@gmail.com
Received: by 10.229.245.136 with HTTP; Thu, 14 Jul 2011 15:07:08 -0700 (PDT)
In-Reply-To: <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com>
References: <20110706135012.13666.6167.idtracker@ietfa.amsl.com> <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com>
From: Dick Franks <rwfranks@acm.org>
Date: Thu, 14 Jul 2011 23:07:08 +0100
X-Google-Sender-Auth: TUO44TFx21-NKar0LIAwFpL90RI
Message-ID: <CAKW6Ri5wYiAOZRM9Ex4Ptukcy8MbiAq2HAJ3a3pcSDecnnmjPg@mail.gmail.com>
To: dnsext@ietf.org
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Subject: Re: [dnsext] I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jul 2011 22:07:29 -0000

I find myself roused from dnsext lurking mode by what  appears to be a
conflict between draft02 of this proposal and the requirements of
RFC2671, which has somehow slipped through review.

RFC2671 defines OPT record wire-format <rdata> to be a list of
elements of the form:

   <option-code><option-length>[<option data>]

This permits an uncomprehending implementation to parse a list
containing options it does not recognise. For this to work,
implementations must regard <option-data> as opaque.

Using the following example based on the text of section 2 of draft02,

   DAU  2  [ RSASHA256 RSASHA1 ]  1  [RSASH1]


The uncomprehending implementation in my brain parses this as:

   <option-code> =3D DAU

   <option-length> =3D 2

   <option-data> =3D ( RSHASHA256 RSASHA1 )


   <option-code> =3D 1

   <option-length> =3D RSASHA1

game over!


Either, the internal structure of DAU will need to be changed to
conform to RFC2671,

   DAU  5  2  [ RSASHA256 RSASHA1 ]  1  [RSASH1]

or the proposal reworked to define two new options:

   ALGU  2  [ RSASHA256 RSASHA1 ]

   HASHU  1  [RSASH1]

which, separated, may also find applications beyond DNSSEC.


I apologise for raining on your parade.

--Dick



On 6 July 2011 15:00, Scott Rose <scottr.nist@gmail.com> wrote:
> An updated version of the algo-signal draft to address the issues in WGLC=
. =C2=A0Specific changes:
>
> 1. =C2=A0Changed the wording in 3.4.1 to remove the RFC2119 wording on se=
tting the DO bit.
>
> 2. Changed section 4 wording to indicate DNS proxy systems and added a re=
f to RFC 5625.
>
> 3. fixed some typos and minor wording changes to stress that the DAU opti=
on is for signaling only and does not specify any change to how servers con=
struct a response.
>
> Scott
>
> Begin forwarded message:
>
>> From: internet-drafts@ietf.org
>> Date: July 6, 2011 9:50:12 AM EDT
>> To: i-d-announce@ietf.org
>> Cc: dnsext@ietf.org
>> Subject: [dnsext] I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.tx=
t
>>
>> A New Internet-Draft is available from the on-line Internet-Drafts direc=
tories. This draft is a work item of the DNS Extensions Working Group of th=
e IETF.
>>
>> =C2=A0 =C2=A0 =C2=A0 Title =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Signalin=
g Cryptographic Algorithm Understanding in DNSSEC
>> =C2=A0 =C2=A0 =C2=A0 Author(s) =C2=A0 =C2=A0 =C2=A0 : Steve Crocker
>> =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0Scott Rose
>> =C2=A0 =C2=A0 =C2=A0 Filename =C2=A0 =C2=A0 =C2=A0 =C2=A0: draft-ietf-dn=
sext-dnssec-algo-signal-02.txt
>> =C2=A0 =C2=A0 =C2=A0 Pages =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 8
>> =C2=A0 =C2=A0 =C2=A0 Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 201=
1-07-06
>>
>> =C2=A0 The DNS Security Extensions (DNSSEC) were developed to provide or=
igin
>> =C2=A0 authentication and integrity protection for DNS data by using dig=
ital
>> =C2=A0 signatures. =C2=A0These digital signatures can be generated using
>> =C2=A0 different algorithms. =C2=A0This draft sets out to specify a way =
for
>> =C2=A0 validating end-system resolvers to signal to a server which
>> =C2=A0 cryptographic algorithms they support.
>>
>>
>>
>> A URL for this Internet-Draft is:
>> http://www.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-algo-signal=
-02.txt
>>
>> Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/
>>
>> This Internet-Draft can be retrieved at:
>> ftp://ftp.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-algo-signal-=
02.txt
>> _______________________________________________
>> dnsext mailing list
>> dnsext@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsext
>
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>

From rwfranks@gmail.com  Fri Jul 15 08:44:13 2011
Return-Path: <rwfranks@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E76E21F891D for <dnsext@ietfa.amsl.com>; Fri, 15 Jul 2011 08:44:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.977
X-Spam-Level: 
X-Spam-Status: No, score=-102.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JI6qLVQV4qba for <dnsext@ietfa.amsl.com>; Fri, 15 Jul 2011 08:44:13 -0700 (PDT)
Received: from mail-qw0-f44.google.com (mail-qw0-f44.google.com [209.85.216.44]) by ietfa.amsl.com (Postfix) with ESMTP id DD3EB21F88E1 for <dnsext@ietf.org>; Fri, 15 Jul 2011 08:44:12 -0700 (PDT)
Received: by qwc23 with SMTP id 23so933270qwc.31 for <dnsext@ietf.org>; Fri, 15 Jul 2011 08:44:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:sender:in-reply-to:references:from:date :x-google-sender-auth:message-id:subject:to:content-type :content-transfer-encoding; bh=6tizICZIGCwEftUbrPJOF14eUUNdcULS4+3Jbn4P/U0=; b=i+VuOY0QdEXjYIxb9VeSWkeZwOxmp7MCxrMaiot94wrpPHO7VoWLhWCiN4tpkzx+mr S5QNjLbkb/7aAaYUMCHmKX+g/GTMIkxWl3soB9/dLsZiRscU5qOZc3D9bVm0suXBlUbq qlAq1keop58mxHLFo1MXv4+60kQb4qwqTVhEc=
Received: by 10.229.235.200 with SMTP id kh8mr2534134qcb.200.1310744652282; Fri, 15 Jul 2011 08:44:12 -0700 (PDT)
MIME-Version: 1.0
Sender: rwfranks@gmail.com
Received: by 10.229.245.136 with HTTP; Fri, 15 Jul 2011 08:43:51 -0700 (PDT)
In-Reply-To: <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com>
References: <20110706135012.13666.6167.idtracker@ietfa.amsl.com> <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com>
From: Dick Franks <rwfranks@acm.org>
Date: Fri, 15 Jul 2011 16:43:51 +0100
X-Google-Sender-Auth: s_sLLGFobo20JA0Z4X79rjNIM0k
Message-ID: <CAKW6Ri7nqn48C7XeQD4w-PDne1JABKkLPiXoj_e9jXiSw3Wz_w@mail.gmail.com>
To: dnsext@ietf.org
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Subject: Re: [dnsext] Fwd: I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jul 2011 15:44:13 -0000

Scott, Patrik,

I find myself roused from dnsext lurking mode by what  appears to be a
conflict between draft02 of this proposal and the requirements of
RFC2671, which has somehow slipped through review.

RFC2671 defines OPT record wire-format <rdata> to be a list of
elements of the form:

   <option-code><option-length>[<option data>]

This permits an uncomprehending implementation to parse a list
containing options it does not recognise. For this to work,
implementations must regard <option-data> as opaque.

Using the following example based on the text of section 2 of draft02,

   DAU  2  [ RSASHA256 RSASHA1 ]  1  [RSASH1]


The uncomprehending implementation in my brain parses this as:

   <option-code> =3D DAU

   <option-length> =3D 2

   <option-data> =3D ( RSHASHA256 RSASHA1 )


   <option-code> =3D 1

   <option-length> =3D RSASHA1

game over!

Either, the internal structure of DAU will need to be changed to
conform to RFC2671,

   DAU  5  2  [ RSASHA256 RSASHA1 ]  1  [RSASH1]

or the proposal reworked to define two new options:

   ALGU  2  [ RSASHA256 RSASHA1 ]

   HASHU  1  [RSASH1]

which, separated, may also find applications beyond DNSSEC.


I apologise for raining on your parade.

--Dick



On 6 July 2011 15:00, Scott Rose <scottr.nist@gmail.com> wrote:
> An updated version of the algo-signal draft to address the issues in WGLC=
. =C2=A0Specific changes:
>
> 1. =C2=A0Changed the wording in 3.4.1 to remove the RFC2119 wording on se=
tting the DO bit.
>
> 2. Changed section 4 wording to indicate DNS proxy systems and added a re=
f to RFC 5625.
>
> 3. fixed some typos and minor wording changes to stress that the DAU opti=
on is for signaling only and does not specify any change to how servers con=
struct a response.
>
> Scott
>
> Begin forwarded message:
>
>> From: internet-drafts@ietf.org
>> Date: July 6, 2011 9:50:12 AM EDT
>> To: i-d-announce@ietf.org
>> Cc: dnsext@ietf.org
>> Subject: [dnsext] I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.tx=
t
>>
>> A New Internet-Draft is available from the on-line Internet-Drafts direc=
tories. This draft is a work item of the DNS Extensions Working Group of th=
e IETF.
>>
>> =C2=A0 =C2=A0 =C2=A0 Title =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Signalin=
g Cryptographic Algorithm Understanding in DNSSEC
>> =C2=A0 =C2=A0 =C2=A0 Author(s) =C2=A0 =C2=A0 =C2=A0 : Steve Crocker
>> =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0Scott Rose
>> =C2=A0 =C2=A0 =C2=A0 Filename =C2=A0 =C2=A0 =C2=A0 =C2=A0: draft-ietf-dn=
sext-dnssec-algo-signal-02.txt
>> =C2=A0 =C2=A0 =C2=A0 Pages =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 8
>> =C2=A0 =C2=A0 =C2=A0 Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 201=
1-07-06
>>
>> =C2=A0 The DNS Security Extensions (DNSSEC) were developed to provide or=
igin
>> =C2=A0 authentication and integrity protection for DNS data by using dig=
ital
>> =C2=A0 signatures. =C2=A0These digital signatures can be generated using
>> =C2=A0 different algorithms. =C2=A0This draft sets out to specify a way =
for
>> =C2=A0 validating end-system resolvers to signal to a server which
>> =C2=A0 cryptographic algorithms they support.
>>
>>
>>
>> A URL for this Internet-Draft is:
>> http://www.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-algo-signal=
-02.txt
>>
>> Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/
>>
>> This Internet-Draft can be retrieved at:
>> ftp://ftp.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-algo-signal-=
02.txt
>> _______________________________________________
>> dnsext mailing list
>> dnsext@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsext
>
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>

From scottr.nist@gmail.com  Fri Jul 15 11:48:36 2011
Return-Path: <scottr.nist@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2454121F8C0C for <dnsext@ietfa.amsl.com>; Fri, 15 Jul 2011 11:48:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VF+Lqh+MV4Du for <dnsext@ietfa.amsl.com>; Fri, 15 Jul 2011 11:48:35 -0700 (PDT)
Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by ietfa.amsl.com (Postfix) with ESMTP id C5F0F21F8B17 for <dnsext@ietf.org>; Fri, 15 Jul 2011 11:48:12 -0700 (PDT)
Received: from 107-140.antd.nist.gov (107-140.antd.nist.gov [129.6.140.107]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id p6FIlubw027863; Fri, 15 Jul 2011 14:47:57 -0400
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Scott Rose <scottr.nist@gmail.com>
In-Reply-To: <CAKW6Ri4_eLtVhi+1m54gzE+tkZ717EZ96A3BiAM321GV0pocug@mail.gmail.com>
Date: Fri, 15 Jul 2011 14:47:56 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <B234693D-F482-4EEA-B37B-897DF729C957@gmail.com>
References: <20110706135012.13666.6167.idtracker@ietfa.amsl.com> <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com> <CAKW6Ri4_eLtVhi+1m54gzE+tkZ717EZ96A3BiAM321GV0pocug@mail.gmail.com>
To: Dick Franks <rwfranks@gmail.com>
X-Mailer: Apple Mail (2.1084)
X-NIST-MailScanner: Found to be clean
X-NIST-MailScanner-From: scottr.nist@gmail.com
Cc: dnsext@ietf.org
Subject: Re: [dnsext] I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jul 2011 18:48:36 -0000

Thanks for the comment.  I will have to double check and fix the example =
as necessary.

Scott

On Jul 14, 2011, at 2:59 PM, Dick Franks wrote:

> Scott, Patrik,
>=20
> I find myself roused from dnsext lurking mode by what  appears to be a
> conflict between draft02 of this proposal and the requirements of
> RFC2671, which has somehow slipped through review.
>=20
> RFC2671 defines OPT record wire-format <rdata> to be a list of
> elements of the form:
>=20
>    <option-code><option-length>[<option data>]
>=20
> This permits an uncomprehending implementation to parse a list
> containing options it does not recognise. For this to work,
> implementations must regard <option-data> as opaque.
>=20
> Using the following example based on the text of section 2 of draft02,
>=20
>    DAU  2  [ RSASHA256 RSASHA1 ]  1  [RSASH1]
>=20
>=20
> The uncomprehending implementation in my brain parses this as:
>=20
>    <option-code> =3D DAU
>=20
>    <option-length> =3D 2
>=20
>    <option-data> =3D ( RSHASHA256 RSASHA1 )
>=20
>=20
>    <option-code> =3D 1
>=20
>    <option-length> =3D RSASHA1
>=20
> game over!
>=20
>=20
> Either, the internal structure of DAU will need to be changed to
> conform to RFC2671,
>=20
>    DAU  5  2  [ RSASHA256 RSASHA1 ]  1  [RSASH1]
>=20
>=20
> or the proposal reworked to define two new options:
>=20
>=20
>    ALGU  2  [ RSASHA256 RSASHA1 ]
>=20
>=20
>    HASHU  1  [RSASH1]
>=20
>=20
> which, separated, may also find applications beyond DNSSEC.
>=20
>=20
> I apologise for raining on your parade.
>=20
> --Dick
>=20
>=20
>=20
> On 6 July 2011 15:00, Scott Rose <scottr.nist@gmail.com> wrote:
>> An updated version of the algo-signal draft to address the issues in =
WGLC.  Specific changes:
>>=20
>> 1.  Changed the wording in 3.4.1 to remove the RFC2119 wording on =
setting the DO bit.
>>=20
>> 2. Changed section 4 wording to indicate DNS proxy systems and added =
a ref to RFC 5625.
>>=20
>> 3. fixed some typos and minor wording changes to stress that the DAU =
option is for signaling only and does not specify any change to how =
servers construct a response.
>>=20
>> Scott
>>=20
>> Begin forwarded message:
>>=20
>>> From: internet-drafts@ietf.org
>>> Date: July 6, 2011 9:50:12 AM EDT
>>> To: i-d-announce@ietf.org
>>> Cc: dnsext@ietf.org
>>> Subject: [dnsext] I-D Action: =
draft-ietf-dnsext-dnssec-algo-signal-02.txt
>>>=20
>>> A New Internet-Draft is available from the on-line Internet-Drafts =
directories. This draft is a work item of the DNS Extensions Working =
Group of the IETF.
>>>=20
>>>       Title           : Signaling Cryptographic Algorithm =
Understanding in DNSSEC
>>>       Author(s)       : Steve Crocker
>>>                          Scott Rose
>>>       Filename        : draft-ietf-dnsext-dnssec-algo-signal-02.txt
>>>       Pages           : 8
>>>       Date            : 2011-07-06
>>>=20


From paf@cisco.com  Mon Jul 18 00:18:19 2011
Return-Path: <paf@cisco.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 519D621F8568 for <dnsext@ietfa.amsl.com>; Mon, 18 Jul 2011 00:18:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.144
X-Spam-Level: 
X-Spam-Status: No, score=-10.144 tagged_above=-999 required=5 tests=[AWL=0.155, BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FKEmxmkzHReY for <dnsext@ietfa.amsl.com>; Mon, 18 Jul 2011 00:18:18 -0700 (PDT)
Received: from ams-iport-1.cisco.com (ams-iport-1.cisco.com [144.254.224.140]) by ietfa.amsl.com (Postfix) with ESMTP id 5DB6421F87BC for <dnsext@ietf.org>; Mon, 18 Jul 2011 00:18:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=paf@cisco.com; l=3424; q=dns/txt; s=iport; t=1310973498; x=1312183098; h=subject:mime-version:from:in-reply-to:date:cc: content-transfer-encoding:message-id:references:to; bh=+KR/5uudWSyHYzNks94q+XawtLR1bwC+bCH2uQgvCig=; b=UDYxgqLGlWxKR82BDoRy9tGa2facyh6OTBMe6XUEik/kP5BEgLza9zNc C57dxWzkzX4IxGkJzx6yuc7kRjndgjAzHz6jTi2AwboxGd2zS58oufCaW 72wThMUzjDwFkXVUBwOOzhGvbEoMNX5SuJ/j2//rPu3zhUhSCR2wAAtzP Q=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av0EABfdI06Q/khM/2dsb2JhbABTp253iHylH500hV1fBJJmiWCGdw
X-IronPort-AV: E=Sophos;i="4.67,221,1309737600"; d="scan'208";a="102831805"
Received: from ams-core-3.cisco.com ([144.254.72.76]) by ams-iport-1.cisco.com with ESMTP; 18 Jul 2011 07:18:01 +0000
Received: from ams3-vpn-dhcp5777.cisco.com (ams3-vpn-dhcp5777.cisco.com [10.61.86.144]) by ams-core-3.cisco.com (8.14.3/8.14.3) with ESMTP id p6I7I0jf015004; Mon, 18 Jul 2011 07:18:01 GMT
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=iso-8859-1
From: =?iso-8859-1?Q?Patrik_F=E4ltstr=F6m?= <paf@cisco.com>
In-Reply-To: <B234693D-F482-4EEA-B37B-897DF729C957@gmail.com>
Date: Mon, 18 Jul 2011 09:18:00 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <FB89CC71-FF14-49C0-BAE2-04455B83A801@cisco.com>
References: <20110706135012.13666.6167.idtracker@ietfa.amsl.com> <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com> <CAKW6Ri4_eLtVhi+1m54gzE+tkZ717EZ96A3BiAM321GV0pocug@mail.gmail.com> <B234693D-F482-4EEA-B37B-897DF729C957@gmail.com>
To: Scott Rose <scottr.nist@gmail.com>
X-Mailer: Apple Mail (2.1084)
Cc: dnsext@ietf.org, Dick Franks <rwfranks@gmail.com>
Subject: Re: [dnsext] I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Jul 2011 07:18:19 -0000

Sorry for not responding earlier, but I have been on PTO... Scott, =
thanks for having a look at this.

   Patrik F=E4ltstr=F6m
   Distinguished Consulting Engineer
   Office of the CTO

   For corporate legal information go to:
   http://www.cisco.com/web/about/doing_business/legal/cri/index.html


On 15 jul 2011, at 20.47, Scott Rose wrote:

> Thanks for the comment.  I will have to double check and fix the =
example as necessary.
>=20
> Scott
>=20
> On Jul 14, 2011, at 2:59 PM, Dick Franks wrote:
>=20
>> Scott, Patrik,
>>=20
>> I find myself roused from dnsext lurking mode by what  appears to be =
a
>> conflict between draft02 of this proposal and the requirements of
>> RFC2671, which has somehow slipped through review.
>>=20
>> RFC2671 defines OPT record wire-format <rdata> to be a list of
>> elements of the form:
>>=20
>>   <option-code><option-length>[<option data>]
>>=20
>> This permits an uncomprehending implementation to parse a list
>> containing options it does not recognise. For this to work,
>> implementations must regard <option-data> as opaque.
>>=20
>> Using the following example based on the text of section 2 of =
draft02,
>>=20
>>   DAU  2  [ RSASHA256 RSASHA1 ]  1  [RSASH1]
>>=20
>>=20
>> The uncomprehending implementation in my brain parses this as:
>>=20
>>   <option-code> =3D DAU
>>=20
>>   <option-length> =3D 2
>>=20
>>   <option-data> =3D ( RSHASHA256 RSASHA1 )
>>=20
>>=20
>>   <option-code> =3D 1
>>=20
>>   <option-length> =3D RSASHA1
>>=20
>> game over!
>>=20
>>=20
>> Either, the internal structure of DAU will need to be changed to
>> conform to RFC2671,
>>=20
>>   DAU  5  2  [ RSASHA256 RSASHA1 ]  1  [RSASH1]
>>=20
>>=20
>> or the proposal reworked to define two new options:
>>=20
>>=20
>>   ALGU  2  [ RSASHA256 RSASHA1 ]
>>=20
>>=20
>>   HASHU  1  [RSASH1]
>>=20
>>=20
>> which, separated, may also find applications beyond DNSSEC.
>>=20
>>=20
>> I apologise for raining on your parade.
>>=20
>> --Dick
>>=20
>>=20
>>=20
>> On 6 July 2011 15:00, Scott Rose <scottr.nist@gmail.com> wrote:
>>> An updated version of the algo-signal draft to address the issues in =
WGLC.  Specific changes:
>>>=20
>>> 1.  Changed the wording in 3.4.1 to remove the RFC2119 wording on =
setting the DO bit.
>>>=20
>>> 2. Changed section 4 wording to indicate DNS proxy systems and added =
a ref to RFC 5625.
>>>=20
>>> 3. fixed some typos and minor wording changes to stress that the DAU =
option is for signaling only and does not specify any change to how =
servers construct a response.
>>>=20
>>> Scott
>>>=20
>>> Begin forwarded message:
>>>=20
>>>> From: internet-drafts@ietf.org
>>>> Date: July 6, 2011 9:50:12 AM EDT
>>>> To: i-d-announce@ietf.org
>>>> Cc: dnsext@ietf.org
>>>> Subject: [dnsext] I-D Action: =
draft-ietf-dnsext-dnssec-algo-signal-02.txt
>>>>=20
>>>> A New Internet-Draft is available from the on-line Internet-Drafts =
directories. This draft is a work item of the DNS Extensions Working =
Group of the IETF.
>>>>=20
>>>>      Title           : Signaling Cryptographic Algorithm =
Understanding in DNSSEC
>>>>      Author(s)       : Steve Crocker
>>>>                         Scott Rose
>>>>      Filename        : draft-ietf-dnsext-dnssec-algo-signal-02.txt
>>>>      Pages           : 8
>>>>      Date            : 2011-07-06
>>>>=20
>=20


From rwfranks@gmail.com  Mon Jul 18 03:19:45 2011
Return-Path: <rwfranks@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D0A521F8B9E for <dnsext@ietfa.amsl.com>; Mon, 18 Jul 2011 03:19:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.486
X-Spam-Level: 
X-Spam-Status: No, score=-3.486 tagged_above=-999 required=5 tests=[AWL=0.113,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id abZrUb7ExGa3 for <dnsext@ietfa.amsl.com>; Mon, 18 Jul 2011 03:19:44 -0700 (PDT)
Received: from mail-qw0-f44.google.com (mail-qw0-f44.google.com [209.85.216.44]) by ietfa.amsl.com (Postfix) with ESMTP id 0091521F8B9C for <dnsext@ietf.org>; Mon, 18 Jul 2011 03:19:43 -0700 (PDT)
Received: by qwc23 with SMTP id 23so2444040qwc.31 for <dnsext@ietf.org>; Mon, 18 Jul 2011 03:19:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; bh=er9NWRfwgcUynQgnslNZ1HHhEG30MIkBFxr8h1R3CQQ=; b=AJNCFB5Sdp1z743fcsvKFSsQ9pNScMauiOxYgCNF62WkQgc2zVV5J4Ying/2DeP+tn q0Kan1cK0+f2GciNp8xJXdLxF60WQ/PMBwBIvBnQauoedgOCLruq6JqlRyjgWOrJW8sT 9EngJPT42qdhGfaVvduxOFscGZNrwj41jA3rw=
Received: by 10.229.235.200 with SMTP id kh8mr4314465qcb.200.1310984383176; Mon, 18 Jul 2011 03:19:43 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.229.245.136 with HTTP; Mon, 18 Jul 2011 03:19:23 -0700 (PDT)
In-Reply-To: <B234693D-F482-4EEA-B37B-897DF729C957@gmail.com>
References: <20110706135012.13666.6167.idtracker@ietfa.amsl.com> <4158B8A7-7773-4819-90F4-BF6F7973B1C7@gmail.com> <CAKW6Ri4_eLtVhi+1m54gzE+tkZ717EZ96A3BiAM321GV0pocug@mail.gmail.com> <B234693D-F482-4EEA-B37B-897DF729C957@gmail.com>
From: Dick Franks <rwfranks@gmail.com>
Date: Mon, 18 Jul 2011 11:19:23 +0100
Message-ID: <CAKW6Ri57gbuOBiSkOB2CSMs-=q4UGwm_XkdLvfqcc=cxBfCUWg@mail.gmail.com>
To: Scott Rose <scottr.nist@gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] I-D Action: draft-ietf-dnsext-dnssec-algo-signal-02.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Jul 2011 10:19:45 -0000

The issue here is (in)compatibility with RFC2671(4.4) and
RFC2671bis(6.2), not a problem with the example.

--Dick



2011/7/15 Scott Rose <scottr.nist@gmail.com>:
> Thanks for the comment. =C2=A0I will have to double check and fix the exa=
mple as necessary.
>
> Scott
>

From ajs@anvilwalrusden.com  Mon Jul 18 15:20:15 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4061621F865E for <dnsext@ietfa.amsl.com>; Mon, 18 Jul 2011 15:20:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fQi41yiMrpis for <dnsext@ietfa.amsl.com>; Mon, 18 Jul 2011 15:20:11 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 3929421F863E for <dnsext@ietf.org>; Mon, 18 Jul 2011 15:20:11 -0700 (PDT)
Received: from shinkuro.com (69-196-144-230.dsl.teksavvy.com [69.196.144.230]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 19E531ECB41C for <dnsext@ietf.org>; Mon, 18 Jul 2011 22:20:10 +0000 (UTC)
Date: Mon, 18 Jul 2011 18:20:04 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsext@ietf.org
Message-ID: <20110718222004.GW40026@shinkuro.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: [dnsext] ICANN Variant Issues Project initial definitions document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Jul 2011 22:20:15 -0000

No hat.

Dear colleagues,

Apologies if you see this note elsewhere.  The ICANN Variant Issues
Project has previously drawn attention to its activities on this list.
I wanted to draw people's attention to some definitions that were
offered to the teams as part of their work.  They're available from
https://community.icann.org/download/attachments/16842765/initial_definitions_2011-07-15-clean.pdf?version=1&modificationDate=1310760720000.

The project is publishing these definitions in an effort to ensure
they get as wide review as possible.  If you wish to make comments, it
would be ideal if you were to do so on the vip mailing list
(https://mm.icann.org/mailman/listinfo/vip).  If that doesn't suit
your fancy, feel free to send your comments to me and I'll see that
they get passed along.  Please do not use the DNS Extensions mailing
list for discussion.

I should note, as a matter of full disclosure, that ICANN has me
consulting on the vip work.

Best regards,

Andrew

-- 
Andrew Sullivan
ajs@anvilwalrusden.com

From ietf-ipr@ietf.org  Thu Jul 21 10:35:39 2011
Return-Path: <ietf-ipr@ietf.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DF9021F85EC; Thu, 21 Jul 2011 10:35:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.408
X-Spam-Level: 
X-Spam-Status: No, score=-102.408 tagged_above=-999 required=5 tests=[AWL=0.191, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pnbc77v-Z3ug; Thu, 21 Jul 2011 10:35:39 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D58821F85A3; Thu, 21 Jul 2011 10:35:39 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: IETF Secretariat <ietf-ipr@ietf.org>
To: paul.hoffman@vpnc.org, wouter@nlnetlabs.nl
X-Test-IDTracker: no
Message-ID: <20110721173539.7393.16439.idtracker@ietfa.amsl.com>
Date: Thu, 21 Jul 2011 10:35:39 -0700
Cc: ogud@ogud.com, dnsext@ietf.org, jari.arkko@piuha.net, rdroms.ietf@gmail.com, ipr-announce@ietf.org
Subject: [dnsext] IPR Disclosure: Certicom Corp's Statement of IPR Related to	draft-ietf-dnsext-ecdsa-00
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jul 2011 17:35:39 -0000

Dear Paul Hoffman, Wouter Wijngaards:

 An IPR disclosure that pertains to your Internet-Draft entitled "Elliptic =
Curve
DSA for DNSSEC" (draft-ietf-dnsext-ecdsa) was submitted to the IETF Secreta=
riat
on 2011-07-21 and has been posted on the "IETF Page of Intellectual Property
Rights Disclosures" (https://datatracker.ietf.org/ipr/1597/). The title of =
the
IPR disclosure is "Certicom Corp's Statement of IPR Related to draft-ietf-
dnsext-ecdsa-00."");

The IETF Secretariat


From snwells82@gmail.com  Thu Jul 21 15:19:52 2011
Return-Path: <snwells82@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 471F621F8793 for <dnsext@ietfa.amsl.com>; Thu, 21 Jul 2011 15:19:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.679
X-Spam-Level: 
X-Spam-Status: No, score=-3.679 tagged_above=-999 required=5 tests=[AWL=-0.081, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pBFs3z3YjhSB for <dnsext@ietfa.amsl.com>; Thu, 21 Jul 2011 15:19:51 -0700 (PDT)
Received: from mail-vx0-f172.google.com (mail-vx0-f172.google.com [209.85.220.172]) by ietfa.amsl.com (Postfix) with ESMTP id BCFC721F8784 for <dnsext@ietf.org>; Thu, 21 Jul 2011 15:19:51 -0700 (PDT)
Received: by vxi40 with SMTP id 40so1524927vxi.31 for <dnsext@ietf.org>; Thu, 21 Jul 2011 15:19:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; bh=y1Q9U5at+zGzG4HKHiDpi+ly2egLzj67vnwnwtEOGdA=; b=A4RxHXH1nvYyHF5ROriUEtoOlE075SoUU+vH8NFZaBgKP9/piDngQmdaAoi0Vb+byT pzfk9NsKwkOXK9ul2SjgOAjgU8yV9DbDYnycOh00A3LRMpKtkcMEhWyGCr+L4oUDNMaf gYHCy+tPsvmCJhV/Lg4ovZEYGV/cEsxPDt8mo=
MIME-Version: 1.0
Received: by 10.221.11.79 with SMTP id pd15mr234786vcb.122.1311286790959; Thu, 21 Jul 2011 15:19:50 -0700 (PDT)
Received: by 10.220.193.77 with HTTP; Thu, 21 Jul 2011 15:19:50 -0700 (PDT)
Date: Thu, 21 Jul 2011 15:19:50 -0700
Message-ID: <CANokk3JSeOkXUsQ7HFFcDiUcbNTd5jqJOhRNqp13r4YEE3T7UQ@mail.gmail.com>
From: Sean Wells <snwells82@gmail.com>
To: "<dnsext@ietf.org>" <dnsext@ietf.org>
Content-Type: multipart/alternative; boundary=bcaec54b45345fb29604a89bbf14
Subject: [dnsext] CNAME response to DS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jul 2011 22:19:52 -0000

--bcaec54b45345fb29604a89bbf14
Content-Type: text/plain; charset=ISO-8859-1

Hi,

I was unable to find anything in RFC 4035 regarding this. If I lookup a DS
and receive a CNAME response back, how should this be treated ?

- Ignore
- validate the CNAME response and assume that DS does not exist ?
- follow the CNAME and continue to look for a DS ?

What do implementations do today ?

thanks
Sean

--bcaec54b45345fb29604a89bbf14
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi,<div><br></div><div>I was unable to find anything in RFC 4035 regarding =
this. If I lookup a DS and receive a CNAME response back, how should this b=
e treated ?</div><div><br></div><div>- Ignore</div><div>- validate the CNAM=
E response and assume that DS does not exist ?</div>
<div>- follow the CNAME and continue to look for a DS ?<br clear=3D"all"><b=
r></div><div>What do implementations do today ?</div><div><br></div><div>th=
anks<br>Sean<br>
</div>

--bcaec54b45345fb29604a89bbf14--

From marka@isc.org  Thu Jul 21 15:35:16 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 830C821F86AD for <dnsext@ietfa.amsl.com>; Thu, 21 Jul 2011 15:35:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.607
X-Spam-Level: 
X-Spam-Status: No, score=-2.607 tagged_above=-999 required=5 tests=[AWL=-0.008, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bs523NT7e2Sm for <dnsext@ietfa.amsl.com>; Thu, 21 Jul 2011 15:35:16 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id EBC1921F86AC for <dnsext@ietf.org>; Thu, 21 Jul 2011 15:35:15 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 1F46CC94C0; Thu, 21 Jul 2011 22:35:05 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id D8FB7216C7B; Thu, 21 Jul 2011 22:35:04 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 0B534120F7E9; Fri, 22 Jul 2011 08:35:02 +1000 (EST)
To: Sean Wells <snwells82@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <CANokk3JSeOkXUsQ7HFFcDiUcbNTd5jqJOhRNqp13r4YEE3T7UQ@mail.gmail.com>
In-reply-to: Your message of "Thu, 21 Jul 2011 15:19:50 MST." <CANokk3JSeOkXUsQ7HFFcDiUcbNTd5jqJOhRNqp13r4YEE3T7UQ@mail.gmail.com>
Date: Fri, 22 Jul 2011 08:35:02 +1000
Message-Id: <20110721223502.0B534120F7E9@drugs.dv.isc.org>
Cc: "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] CNAME response to DS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jul 2011 22:35:16 -0000

In message <CANokk3JSeOkXUsQ7HFFcDiUcbNTd5jqJOhRNqp13r4YEE3T7UQ@mail.gmail.com>
, Sean Wells writes:
> Hi,
> 
> I was unable to find anything in RFC 4035 regarding this. If I lookup a DS
> and receive a CNAME response back, how should this be treated ?
> 
> - Ignore
> - validate the CNAME response and assume that DS does not exist ?
> - follow the CNAME and continue to look for a DS ?

Since a CNAME + NS can't exist at the same node and DS only exists where
NS records exist you treat it as DS not existing at QNAME.
 
> What do implementations do today ?

Treat it as indicating the DS does not exist.

That said it would be clearer and safer if there were specs to say that
CNAME records MUST NOT be followed when processing DS queries.

Mark
> thanks
> Sean
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From rstruik.ext@gmail.com  Thu Jul 21 16:01:21 2011
Return-Path: <rstruik.ext@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B1B711E8075 for <dnsext@ietfa.amsl.com>; Thu, 21 Jul 2011 16:01:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8msm06hzuDds for <dnsext@ietfa.amsl.com>; Thu, 21 Jul 2011 16:01:20 -0700 (PDT)
Received: from mail-yi0-f44.google.com (mail-yi0-f44.google.com [209.85.218.44]) by ietfa.amsl.com (Postfix) with ESMTP id CAA5811E8071 for <dnsext@ietf.org>; Thu, 21 Jul 2011 16:01:19 -0700 (PDT)
Received: by yie30 with SMTP id 30so981207yie.31 for <dnsext@ietf.org>; Thu, 21 Jul 2011 16:01:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; bh=DFgfPgeMDxi/VDSlRfrlQA/RO58dwOV9ZS+IMr8Poqg=; b=RRJ7+gBIbIsA0ggS4z1P2X3ohHBZZQg6p4xI19iHLlM9RoIZ1c0sRChmPEnrPYwr4h Blti2qd+QFACsRMoRrxCKhvxzRtXVB/p6C63WKXQn9ysFExEEn1HM0MnNKRp4amGZ4PY XUcgtSSETlJgy7kx8nJ7fRlshiywtC24N+ZDE=
Received: by 10.150.236.18 with SMTP id j18mr1318430ybh.84.1311289279307; Thu, 21 Jul 2011 16:01:19 -0700 (PDT)
Received: from [192.168.1.100] (CPE0013100e2c51-CM00186851d6f6.cpe.net.cable.rogers.com [99.231.117.243]) by mx.google.com with ESMTPS id j21sm1380373ybg.25.2011.07.21.16.01.17 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 21 Jul 2011 16:01:18 -0700 (PDT)
Message-ID: <4E28AFB3.8020503@gmail.com>
Date: Thu, 21 Jul 2011 19:01:07 -0400
From: Rene Struik <rstruik.ext@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64; rv:5.0) Gecko/20110624 Thunderbird/5.0
MIME-Version: 1.0
To: Olafur Gudmundsson <ogud@ogud.com>
References: <4E14D100.5010705@ogud.com>
In-Reply-To: <4E14D100.5010705@ogud.com>
X-Enigmail-Version: 1.2
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] WGLC: Elliptic Curve DSA
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jul 2011 23:01:21 -0000

Dear colleagues:

Please find below my editorial and technical comments on draft-ietf-dnsext-ecdsa-01.

Best regards, Rene

==

Summary of the draft:
The draft specifies two two elliptic curve signature algorithms for use with DNSSEC that were heretoforth not defined,
viz. ECDSA with suite B curves and hash functions at 128-bit and 192-bit crypto bit strength). As pointed out, the main 
rationale for doing so are that use of ECDSA and ECDSA public keys (a) allows smaller size data fields; (b) may allow
computational savings; (c) introduces algorithms with crypto primitives of equivalent cryptographic bit strength.

==

Summary of comments:

1) Editorial:
The draft would benefit from tightening up some of the language, especially since this may lower the chance of confusing 
noncryptographic people.

2) Technical:
The draft results in data fields of size 4n octets, where n is the octet-length of the underlying curve. In fact, one can 
do better and use data fields of size 3n octets, without loss of functionality.

==

Detailed comments:

--

I. Editorial and semi-editorial comments:

(E-a) p.2, Clause 1, first para: 
With RSA, "key" should read "modulus" (e.g., "using 1024 or 2048 bit moduli"). The same remark applies to interchanges 
of keys and moduli with RSA, e.g., third para ("3072-bit keys").

(E-b) p.2, Clause 1, second para:
I suggest adding the following references: 
(1) for P-256 and P-384, xref FIPS Pub 186-3; 
(2) for ECDSA, xref FIPS Pub 186-3 (esp. necessary, so as to specify how to map hash output (bit string) to an integer in Zn); 
(3) SHA-256 and SHA-384, xref FIPS Pub 180-3.
{Note RS: With the availability of RFC 6090 "Fundamentals of ECC", should one refer that RFC as well, besides FIPS Pub 186-3?}

(E-c) p.2, Clause 1, second para:
Replace DS RR by delegating signer resource record (DS RR).

(E-d) p.2, Clause 1, third para:
This para suggests that public keys on the curve P-256 have size 256 bits, but this conflicts the representation in Clause 4, 
first para, where their (affine) representation is 512 bits.
{BTW - I strongly suggest using "octet" units, rather than "bits", since this seems to better align with other crypto-related 
IETF documents, and non-IETF documents (ANSI, SECG, etc.).}

(E-e) p.2, Clause 1, third para:
This para attemts to quantify comparisons of the size of RSA and ECDSA public keys, but does omit this for RSA signatures and ECDSA
signatures. Suggest to correct (for 128-bit crypto bit strength).

(E-f) p.2, Clause 1, fourth para, l.2:
The term "matching" is somewhat unfortunate: why not state that the curve and the hash function are picked with the same cryptographic
bit design strength?

(E-g) p.2, Clause 1, fourth para, l.6:
Unkeyed hash functions do not have a key, so please replace "...is half the length of the key" by "... is half the output size (in bits)".
{Note RS: please note the "(in bits)" phrase, which should also be added to the corresponding statement on cryptographic bit strength for 
public keys (cf. same para, l.4-5: change to "...is half the bit-length of the key"). 

(E-h) p.2, Clause 1, fourth para, l.6:
Replace "using matched strength" by "using the same cryptographic bit strength".

(E-i) p.2, Clause 1, fourth para, l.7:
The notion of "weaker half" of a signature algorithm is somewhat confusing, since, e.g., with ECDSA, while the strength is not entirely 
proven (to my knowledge), it depends on at least three factors, including (1) underlying hash function; (2) underlying ECDHP; 
(3) ECDSA peculiarities. Changing "choosing the weaker half of" by "choosing the weaker cryptographic primitive [or: component] of the 
signature algorithm.

(E-j) p.2, Clause 1, fourth para, l.7-10:
The RSA example would be clearer if one would state that RSA with 2048 modulus is believed to have 112 bit cryptographic bit strength,
since then the discussion about equivalent bit strength becomes simply an exercise in comparing this with the presumed strength of
SHA-256 (half the output size or 128-256/2).

(E-k) p.2, Clause 1, fifth para:
Performance of cryptographic operations is highly platform-dependent, so absolute numbers should be avoided at almost all cost. Moreover, it
is (of course) dependent on the crypto primitive in question -- something that is not mentioned (e.g., is the factor 5x computational advantage
ECDSA signing compared to RSA signing for P-256 vs. RSA-3072, or for something else?). I would suggest to replace "Signing with ECDSA is" by 
"signing with ECDSA may be" and adopt the corresponding absolute language for the verification numbers accordingly as well. Moreover, please 
pick a curve for which these numbers apply. 
{Note RS: as a side note: to illustrate that one has to be careful here, please cf. to Slide 48 of
http://www.ietf.org/proceedings/78/slides/saag-7.pdf, which suggests that for some platforms, both signing and verification for ECDSA is faster
than with RSA (and not just signing, as in this draft).}

(E-l) p.3, Clause 1, sixth para, l.4:
Perhaps, replace "is copied liberally from" by "borrows heavily from"?

(E-m) p.3, Clause 2, l.2:
Replace "the implementation of SHA-384 in DNSSEC" by "the use of SHA-256 in DNSSEC" (after all, now it seems one discusses the implementations 
of SHA-256 and SHA-384 themselves [at least, to me, as nonnative speaker]).

(E-n) p.3, Clause 3:
This clause discusses the need for corresponding parties to have access to the same system-wide parameters, in casu for ECDSA. 
However, the remainder of this clause only talks about the elliptic curve domain parameters (P-256, resp. P-384), but does not mention the 
hash function (SHA-x, etc.) underlying ECDSA, the encoding rules (bit/octet order, etc.) for messages to be signed, etc. This is confusing.

(E-o) p.3, Clause 4, first para:
The x- and y-coordinates of public key Q should be properly introduced. Of course, crypto people know that this corresponds to the affine
representation of points on the corresponding prime curve, but this should be left less as guess work.
In fact, I would strongly urge to use the same representation convention for public keys as used elsewhere, such as, e.g., wiht RFC 3279 
(Clause 2.3.5, ECPoint), with ANSI X9.62-1999 (4.3.6), or with SEC1 or RFC5480. This format nicely allows unique representation of the point
of infinity (0x00), affine points (0x04 | x | y), and compressed points (PC=0x02 or 0x03 | x). Thus, one can represent Q as (0x04 | x | y).

(E-p) p.3, Clause 4, second para:
The signature components r and s are integers, but r | s is an octet string. Please add the following text a the end of the paragraph:
"where "r" and "s" are represented each as octet string, with size the octet size of the (prime) order of the underlying prime curve.

(E-q) p.4, Clause 4, third para:
The two bulletized items should also refer to the underlying ECDSA specification (FIPS Pub 186-3) as well.

(E-r) p.4, Clause 4, fourth para, l.1:
It seems that one cannot state "MUST support" and then offer an "and/or" option. Suggest to change this to support for both signing *and* 
verification (so as to avoid ambiguities here).

(E-s) p.4, Clause 5, second para, l.3:
Not sure why one would not just refer to SHA-1 (which is Algorithm 1, as defined in Clause 11 of RFC 5155). If one somehow does not wish
to admit to using SHA-1, it would really help to add clause numbers, so as to help the reader find all this (some IETF specifications are 
extremely large and making life easier should be explicit goal of writing).

(E-t) p.4, Clause 6, second para:
The picks for TBA-1, TBA-2, and TBA-3 are really obscure; this is much clearer once one disects the examples in Clause 6.1 ff. Also here, 
why not make life easier on the reader and change the last sentence to "The examples use the following algorithm codes:
Code 4 for ECDSAP256SHA256 (TBA-1), ...", etc?

(E-u) p.6, Clause 8, l.2:
Again, please change "half the size of the key" to "half the bit-size of the underlying curve". (Considering the pick in Clause 4 for Q, half 
of the key would be the bit-size of the curve, rather than half the bit-size).

(E-v) pp.3-4, Clause 4 (or, perhaps, more general remark):
Currently, the clause does not make for easy reading, since it just defines the signature format and the public key format and does not
even hint at the clauses in the corresponding base line documentation (RFC 4033,4034, 4035) where all this "falls into place".
I would strongly suggest adding more clues, so as to make this for less esoteric reading. Why not include some text that captures the following
(here, mentioned for 128-bit crypto strength):
The DNSKEY Resource Record is defined in RFC 4034, Clause 2.1.
-the algorithm field (RFC4034, 2.1.3) is set to ECDSAP256SHA256 {TBA-1};
-the public key is set to the representation for the public key introduced in Clause 4;
etc.
Note RS: RFC 4034 already includes Algorithm Type 4 for ECC (cf. Annex A.1), but currently this is undefined.

--

II. Technical comments:

(T-a) p.3, Clause 4, first para:
In this para, the ECDSA signature is 2n octet field, as is the public key Q, where n is the octet size of the order of the underlying curve.
Since the size of the public key Q is important (cf., also Clause 1, third para, last sentence), why not be somewhat more economical here and
represent Q by its x-coordinate only? This does not seem to lead to any loss of functionality, whereas shaving off 25% of the data field 
overhead, from 4n octets to 3n octets. Some details follow:

Underlying motivation:
(1) The point of sending the public key Q along seems to be that one has an identifier for the public signature verification key that one also has
in a white list on the verifier's machine? (If one does not have a white list check on the verifier, the authentication procedure is completely
broken, since then anyone can produce valid signatures.) This assertion seems to be validated by Clause 5.3.1 of RFC 4035 (which discusses 
authentication).
(2) To identify a public key Q residing on a verifier's machine, one does not need the entire public key; the x-coordinate suffices: after all,
no two public signature verification keys belonging to valid signers will have the same x-coordinate (for otherwise, one knows the private key 
of the other).

Suggested improvement:
The above assertions lead to the following 33% size improvement, with following (very modest) changes required:

1) Signing side:
-Clause 4, first para:
Represent the public key Q by its x-coordinate, rather than by the pair x-coordinate and y-coordinate (here, we denote the result by Q');
-Data to be signed: hash data with Q' included, rather than Q (this has no security implications at all, as one can easily see).

2) When verifying an ECDSA signature, "decompress" first:
- Use Q' as index to recover the key Q at verifier's machine;
- Use Q to veerify the ECDSA signature by computing R'=(1/s) (eG +rQ), where e= h(m,Q') and checking that f(R')=r (mathematical short-cut 
notation for ECDSA signature verification).

Final notes RS:
1) If one wishes, one could send either Q'=x-coordinate of Q or Q itself (in case one somehow feels that one needs options (should not be 
necessary, though)). In that case, the "normal" representation of elliptic curve points -- affine representation of Q = (0x04, x, y); new 
x-coordinate only representation Q' = (0x01, x) would do. This does (a) not conflict any ECPoint representations already in use; (b) this does 
allow different representations of the public key in the DNSKEY RR (RFC 4034, Clause 2.1.4), so doing away with need to define new algorithm id 
(RFC 4034, Clause 2.1.3).
2) RFC 4035, Clause 5.1.3 (authentication procedure) already caters for the scenario that one may have "more than one match", so - if one really 
wishes one could compute both Q and -Q from Q' (i.e., compute both (x,y) and (x,-y) given x-coordinate Q') and run the authentication algorithm 
as already specified. 
2) Security is exactly the same as with original construct.
3) There are no nontechnical considerations to be concerned about (note that Q' does not provide any insight on the y-coordinate of Q).

Best regards, Rene




On 06/07/2011 5:17 PM, Olafur Gudmundsson wrote:
> Dear Colleagues
>
> This message starts a Working Group Last Call for
> "Elliptic Curve DSA for DNSSEC" located at
> http://www.ietf.org/internet-drafts/draft-ietf-dnsext-ecdsa-01.txt
> This document is on Standards track.
>
> This WGLC will conclude on midnight on July 21'th UTC.
>
> Please review the document and sent a statement that you reviewed the
> document.  If the review raises any issues, please note what they are.
> Remember that we need a minimum of 5 reviewers.
>
>
>     Olafur & Andrew
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext


-- 
email: rstruik.ext@gmail.com
Skype: rstruik
cell: +1 (647) 867-5658
USA Google voice: +1 (415) 690-7363


From paul@xelerance.com  Thu Jul 21 16:41:48 2011
Return-Path: <paul@xelerance.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E13BD11E8079 for <dnsext@ietfa.amsl.com>; Thu, 21 Jul 2011 16:41:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.512
X-Spam-Level: 
X-Spam-Status: No, score=-6.512 tagged_above=-999 required=5 tests=[AWL=0.087,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6C5SOI5rjb8F for <dnsext@ietfa.amsl.com>; Thu, 21 Jul 2011 16:41:48 -0700 (PDT)
Received: from newtla.xelerance.com (newtla.xelerance.com [193.110.157.143]) by ietfa.amsl.com (Postfix) with ESMTP id 4DAFA11E8071 for <dnsext@ietf.org>; Thu, 21 Jul 2011 16:41:48 -0700 (PDT)
Received: from newtla.xelerance.com (newtla.xelerance.com [127.0.0.1]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by newtla.xelerance.com (Postfix) with ESMTP id 52705570FF; Thu, 21 Jul 2011 19:42:24 -0400 (EDT)
Date: Thu, 21 Jul 2011 19:42:24 -0400 (EDT)
From: Paul Wouters <paul@xelerance.com>
To: Mark Andrews <marka@isc.org>
In-Reply-To: <20110721223502.0B534120F7E9@drugs.dv.isc.org>
Message-ID: <alpine.LFD.1.10.1107211940390.4359@newtla.xelerance.com>
References: <CANokk3JSeOkXUsQ7HFFcDiUcbNTd5jqJOhRNqp13r4YEE3T7UQ@mail.gmail.com> <20110721223502.0B534120F7E9@drugs.dv.isc.org>
User-Agent: Alpine 1.10 (LFD 962 2008-03-14)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Cc: "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] CNAME response to DS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jul 2011 23:41:49 -0000

On Fri, 22 Jul 2011, Mark Andrews wrote:

>> - validate the CNAME response and assume that DS does not exist ?
>> - follow the CNAME and continue to look for a DS ?
>
> Since a CNAME + NS can't exist at the same node and DS only exists where
> NS records exist you treat it as DS not existing at QNAME.
>
>> What do implementations do today ?
>
> Treat it as indicating the DS does not exist.
>
> That said it would be clearer and safer if there were specs to say that
> CNAME records MUST NOT be followed when processing DS queries.

I've seen these too. Usually these are broken setups where a wildcard for
any RRTYPE is returned with the CNAME, eg using dig -t TYPE666 would also
return a CNAME.

I don't think people mean these domains to go down with a broken DS chain :)

Paul

From paf@cisco.com  Thu Jul 21 23:30:56 2011
Return-Path: <paf@cisco.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B795111E8079 for <dnsext@ietfa.amsl.com>; Thu, 21 Jul 2011 23:30:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.175
X-Spam-Level: 
X-Spam-Status: No, score=-10.175 tagged_above=-999 required=5 tests=[AWL=0.124, BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O8poyaDZcMdM for <dnsext@ietfa.amsl.com>; Thu, 21 Jul 2011 23:30:56 -0700 (PDT)
Received: from ams-iport-2.cisco.com (ams-iport-2.cisco.com [144.254.224.141]) by ietfa.amsl.com (Postfix) with ESMTP id AD9D811E8085 for <dnsext@ietf.org>; Thu, 21 Jul 2011 23:30:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=paf@cisco.com; l=550; q=dns/txt; s=iport; t=1311316256; x=1312525856; h=subject:mime-version:from:in-reply-to:date:cc: content-transfer-encoding:message-id:references:to; bh=HG4pGpqODn4aHScsBBvtMNJTTGDall80pwtE8u37cGY=; b=lcwafjvNA8eoKKH1BLgrHBdhq9hL9M08YOcjAOERWAm9MNsNinnEdwTV NNyGYP/pBlKxrs2Arrj4KR1o0r3uKh7UR/tKtUX5WWa29Na2sMHmzuqVr zz2Ozh0gzyv97nOm4OAtMJZ8NQBQPtmYWnTWQm9E5F0onL6PnD/tamQGB s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av0EAMsYKU6Q/khN/2dsb2JhbABTp0F3iHyeHZ4thWBfBJJukGE
X-IronPort-AV: E=Sophos;i="4.67,245,1309737600"; d="scan'208";a="43853516"
Received: from ams-core-4.cisco.com ([144.254.72.77]) by ams-iport-2.cisco.com with ESMTP; 22 Jul 2011 06:30:36 +0000
Received: from dhcp-10-55-92-237.cisco.com (dhcp-10-55-92-237.cisco.com [10.55.92.237]) by ams-core-4.cisco.com (8.14.3/8.14.3) with ESMTP id p6M6UYHn014761; Fri, 22 Jul 2011 06:30:35 GMT
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: =?iso-8859-1?Q?Patrik_F=E4ltstr=F6m?= <paf@cisco.com>
In-Reply-To: <alpine.LFD.1.10.1107211940390.4359@newtla.xelerance.com>
Date: Fri, 22 Jul 2011 08:30:35 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <F2D91DF4-6019-4D2A-B765-9B700E16EB27@cisco.com>
References: <CANokk3JSeOkXUsQ7HFFcDiUcbNTd5jqJOhRNqp13r4YEE3T7UQ@mail.gmail.com> <20110721223502.0B534120F7E9@drugs.dv.isc.org> <alpine.LFD.1.10.1107211940390.4359@newtla.xelerance.com>
To: Paul Wouters <paul@xelerance.com>
X-Mailer: Apple Mail (2.1084)
Cc: "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] CNAME response to DS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jul 2011 06:30:56 -0000

On 22 jul 2011, at 01.42, Paul Wouters wrote:

> Usually these are broken setups where a wildcard for
> any RRTYPE is returned with the CNAME, eg using dig -t TYPE666 would =
also
> return a CNAME.

Broken?

If one have the following:

$ORIGIN example.com.

@ IN SOA ...
@ IN NS ...
foo.example.com. IN A 192.168.1.1
bar IN CNAME foo.example.com.

Then it will return the CNAME for the a query for TYPE666 and owner =
bar.example.com.

Or what part of your statement do I not understand before morning =
coffee...

   Patrik


From Ed.Lewis@neustar.biz  Fri Jul 22 05:40:18 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1110D21F8762 for <dnsext@ietfa.amsl.com>; Fri, 22 Jul 2011 05:40:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.285
X-Spam-Level: 
X-Spam-Status: No, score=-106.285 tagged_above=-999 required=5 tests=[AWL=-0.886, BAYES_00=-2.599, J_CHICKENPOX_37=0.6, J_CHICKENPOX_47=0.6, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GpBvcbb5ZlAj for <dnsext@ietfa.amsl.com>; Fri, 22 Jul 2011 05:40:17 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 69B6721F8606 for <dnsext@ietf.org>; Fri, 22 Jul 2011 05:40:17 -0700 (PDT)
Received: from Work-Laptop-2.local (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p6MCeDXh078058; Fri, 22 Jul 2011 08:40:13 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [10.31.200.124] by Work-Laptop-2.local (PGP Universal service); Fri, 22 Jul 2011 08:40:14 -0400
X-PGP-Universal: processed; by Work-Laptop-2.local on Fri, 22 Jul 2011 08:40:14 -0400
Mime-Version: 1.0
Message-Id: <a06240802ca4f19acafab@[192.168.129.53]>
In-Reply-To: <20110721223502.0B534120F7E9@drugs.dv.isc.org>
References: <CANokk3JSeOkXUsQ7HFFcDiUcbNTd5jqJOhRNqp13r4YEE3T7UQ@mail.gmail.com> <20110721223502.0B534120F7E9@drugs.dv.isc.org>
Date: Fri, 22 Jul 2011 08:31:43 -0400
To: Mark Andrews <marka@isc.org>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.71 on 10.20.30.4
Cc: "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] CNAME response to DS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jul 2011 12:40:18 -0000

At 8:35 +1000 7/22/11, Mark Andrews wrote:

>Since a CNAME + NS can't exist at the same node and DS only exists where
>NS records exist you treat it as DS not existing at QNAME.

Yes, but, what if we have three zones?

FIRST ZONE has these plus more records

$ORIGIN zone.example.

www.example.   CNAME  www.place.tld.
                RRSIG  CNAME

and SECOND ZONE has these plus more records

$ORIGIN place.tld.

www            NS     ns1.server.tld.
www            DS     keyid=123
                RRSIG  DS

and THIRD ZONE has these records

$ORIGIN www.place.tld.
@              SOA    soa-params
                RRSIG  SOA
                NS     ns1.server.tld.
                RRSIG  NS
                DNSKEY keyid=123
                RRSIG  DNSKEY
                AAAA   ::1
                RRSIG  AAAA
                NSEC   www.place.tld. SOA NS DNSKEY AAAA NSEC RRSIG
                RRSIG  NSEC

And the query begins : dig www.example. AAAA?

The answer would be

www.example.     CNAME  www.place.tld.
www.place.tld.   AAAA   ::1.

Adding in DNSSEC, I can see how this all would work out and why the 
DS query that would be needed would still make sense and work in the 
specification.

Of course, a smart verifier would just verify the original CNAME and 
then realize it has to work down a different path to validate the 
AAAA.  But when a cut point is used as a the terminal point, you can 
work it out like it's just another CNAME.

The deal is - when a domain name appears in a lookup as a result of 
being in a CNAME RDATA, it ceases to be useful as a cut point.  But 
since the DS is not in the usual place, you just have to know where 
to get it.

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

I'm overly entertained.

From paul@xelerance.com  Fri Jul 22 06:58:01 2011
Return-Path: <paul@xelerance.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6ED2D21F8581 for <dnsext@ietfa.amsl.com>; Fri, 22 Jul 2011 06:58:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.366
X-Spam-Level: 
X-Spam-Status: No, score=-6.366 tagged_above=-999 required=5 tests=[AWL=-0.067, BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E9TSTurSlrpF for <dnsext@ietfa.amsl.com>; Fri, 22 Jul 2011 06:58:00 -0700 (PDT)
Received: from newtla.xelerance.com (newtla.xelerance.com [193.110.157.143]) by ietfa.amsl.com (Postfix) with ESMTP id C164321F856D for <dnsext@ietf.org>; Fri, 22 Jul 2011 06:58:00 -0700 (PDT)
Received: from newtla.xelerance.com (newtla.xelerance.com [127.0.0.1]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by newtla.xelerance.com (Postfix) with ESMTP id CD31857101; Fri, 22 Jul 2011 09:58:39 -0400 (EDT)
Date: Fri, 22 Jul 2011 09:58:39 -0400 (EDT)
From: Paul Wouters <paul@xelerance.com>
To: =?ISO-8859-15?Q?Patrik_F=E4ltstr=F6m?= <paf@cisco.com>
In-Reply-To: <F2D91DF4-6019-4D2A-B765-9B700E16EB27@cisco.com>
Message-ID: <alpine.LFD.1.10.1107220953310.4833@newtla.xelerance.com>
References: <CANokk3JSeOkXUsQ7HFFcDiUcbNTd5jqJOhRNqp13r4YEE3T7UQ@mail.gmail.com> <20110721223502.0B534120F7E9@drugs.dv.isc.org> <alpine.LFD.1.10.1107211940390.4359@newtla.xelerance.com> <F2D91DF4-6019-4D2A-B765-9B700E16EB27@cisco.com>
User-Agent: Alpine 1.10 (LFD 962 2008-03-14)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=ISO-8859-15; format=flowed
Content-Transfer-Encoding: 8BIT
Cc: "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] CNAME response to DS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jul 2011 13:58:01 -0000

On Fri, 22 Jul 2011, Patrik Fältström wrote:

>> Usually these are broken setups where a wildcard for
>> any RRTYPE is returned with the CNAME, eg using dig -t TYPE666 would also
>> return a CNAME.
>
> Broken?
>
> If one have the following:
>
> $ORIGIN example.com.
>
> @ IN SOA ...
> @ IN NS ...
> foo.example.com. IN A 192.168.1.1
> bar IN CNAME foo.example.com.
>
> Then it will return the CNAME for the a query for TYPE666 and owner bar.example.com.
>
> Or what part of your statement do I not understand before morning coffee...

I saw the following

$ORIGIN example.com

@ IN SOA ...
@ IN NS ...
* IN * CNAME foo.other.com.

So every RRTYPE including DS would point to foo.other.com, but no DS
record exists at foo.other.com, only an A recor. Turned out this was
some hacked up perl-Net-DNS based nameserver (and some very questioable
domain names being used that are now dead)

Paul

From internet-drafts@ietf.org  Tue Jul 26 04:33:30 2011
Return-Path: <internet-drafts@ietf.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 168A321F8C6C; Tue, 26 Jul 2011 04:33:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.577
X-Spam-Level: 
X-Spam-Status: No, score=-102.577 tagged_above=-999 required=5 tests=[AWL=0.022, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2U6TkSN+UllT; Tue, 26 Jul 2011 04:33:29 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8401721F8C55; Tue, 26 Jul 2011 04:33:29 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 3.56
Message-ID: <20110726113329.7777.15693.idtracker@ietfa.amsl.com>
Date: Tue, 26 Jul 2011 04:33:29 -0700
Cc: dnsext@ietf.org
Subject: [dnsext] I-D Action: draft-ietf-dnsext-rfc2672bis-dname-24.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jul 2011 11:33:30 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies. This draft is a work item of the DNS Extensions Working Group of the I=
ETF.

	Title           : DNAME Redirection in the DNS
	Author(s)       : Scott Rose
                          Wouter Wijngaards
	Filename        : draft-ietf-dnsext-rfc2672bis-dname-24.txt
	Pages           : 20
	Date            : 2011-07-26

   The DNAME record provides redirection for a sub-tree of the domain
   name tree in the DNS system.  That is, all names that end with a
   particular suffix are redirected to another part of the DNS.  This is
   a revision to the original specification in RFC 2672 as well as
   updating RFC 3363 and RFC 4294 to align with this revision.



A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-rfc2672bis-dname-24.t=
xt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

This Internet-Draft can be retrieved at:
ftp://ftp.ietf.org/internet-drafts/draft-ietf-dnsext-rfc2672bis-dname-24.txt

From scottr.nist@gmail.com  Tue Jul 26 04:57:07 2011
Return-Path: <scottr.nist@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD1C021F8C43 for <dnsext@ietfa.amsl.com>; Tue, 26 Jul 2011 04:57:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wIWRUfJ7qNJM for <dnsext@ietfa.amsl.com>; Tue, 26 Jul 2011 04:57:07 -0700 (PDT)
Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by ietfa.amsl.com (Postfix) with ESMTP id 2691321F8B6B for <dnsext@ietf.org>; Tue, 26 Jul 2011 04:57:03 -0700 (PDT)
Received: from 107-140.antd.nist.gov (107-140.antd.nist.gov [129.6.140.107]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id p6QBuuZJ014538 for <dnsext@ietf.org>; Tue, 26 Jul 2011 07:56:56 -0400
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Apple Message framework v1084)
From: Scott Rose <scottr.nist@gmail.com>
In-Reply-To: <20110726113329.7777.15693.idtracker@ietfa.amsl.com>
Date: Tue, 26 Jul 2011 07:56:55 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <A3D7CA9F-D5DD-4DAD-B38E-B51D69FC3E0D@gmail.com>
References: <20110726113329.7777.15693.idtracker@ietfa.amsl.com>
To: DNSEXT Working Group <dnsext@ietf.org>
X-Mailer: Apple Mail (2.1084)
X-NIST-MailScanner: Found to be clean
X-NIST-MailScanner-From: scottr.nist@gmail.com
Subject: Re: [dnsext] I-D Action: draft-ietf-dnsext-rfc2672bis-dname-24.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jul 2011 11:57:07 -0000

This version only contains 2 wording changes brought up during last call =
from the AD's.  The wording was changed in the title and intro to stress =
that this is a revision and not just an update.

Scott

On Jul 26, 2011, at 7:33 AM, Internet-Drafts@ietf.org wrote:

> A New Internet-Draft is available from the on-line Internet-Drafts =
directories. This draft is a work item of the DNS Extensions Working =
Group of the IETF.
>=20
> 	Title           : DNAME Redirection in the DNS
> 	Author(s)       : Scott Rose
>                          Wouter Wijngaards
> 	Filename        : draft-ietf-dnsext-rfc2672bis-dname-24.txt
> 	Pages           : 20
> 	Date            : 2011-07-26
>=20
>   The DNAME record provides redirection for a sub-tree of the domain
>   name tree in the DNS system.  That is, all names that end with a
>   particular suffix are redirected to another part of the DNS.  This =
is
>   a revision to the original specification in RFC 2672 as well as
>   updating RFC 3363 and RFC 4294 to align with this revision.
>=20
>=20
>=20
> A URL for this Internet-Draft is:
> =
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-rfc2672bis-dname-24.=
txt
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>=20
> This Internet-Draft can be retrieved at:
> =
ftp://ftp.ietf.org/internet-drafts/draft-ietf-dnsext-rfc2672bis-dname-24.t=
xt
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext


From internet-drafts@ietf.org  Tue Jul 26 10:33:39 2011
Return-Path: <internet-drafts@ietf.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A01A111E80EC; Tue, 26 Jul 2011 10:33:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.578
X-Spam-Level: 
X-Spam-Status: No, score=-102.578 tagged_above=-999 required=5 tests=[AWL=0.021, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M90XekAYrHZ7; Tue, 26 Jul 2011 10:33:39 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDEF211E8120; Tue, 26 Jul 2011 10:33:38 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 3.56
Message-ID: <20110726173338.8381.92653.idtracker@ietfa.amsl.com>
Date: Tue, 26 Jul 2011 10:33:38 -0700
Cc: dnsext@ietf.org
Subject: [dnsext] I-D Action: draft-ietf-dnsext-dnssec-bis-updates-14.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jul 2011 17:33:39 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies. This draft is a work item of the DNS Extensions Working Group of the I=
ETF.

	Title           : Clarifications and Implementation Notes for DNSSECbis
	Author(s)       : Samuel Weiler
                          David Blacka
	Filename        : draft-ietf-dnsext-dnssec-bis-updates-14.txt
	Pages           : 16
	Date            : 2011-07-26

   This document is a collection of technical clarifications to the
   DNSSECbis document set.  It is meant to serve as a resource to
   implementors as well as a repository of DNSSECbis errata.


A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-bis-updates-14=
.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

This Internet-Draft can be retrieved at:
ftp://ftp.ietf.org/internet-drafts/draft-ietf-dnsext-dnssec-bis-updates-14.=
txt

From snwells82@gmail.com  Sun Jul 31 17:51:51 2011
Return-Path: <snwells82@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50C5121F8743 for <dnsext@ietfa.amsl.com>; Sun, 31 Jul 2011 17:51:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.669
X-Spam-Level: 
X-Spam-Status: No, score=-3.669 tagged_above=-999 required=5 tests=[AWL=-0.071, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1SA0bwkkKCoZ for <dnsext@ietfa.amsl.com>; Sun, 31 Jul 2011 17:51:50 -0700 (PDT)
Received: from mail-vw0-f44.google.com (mail-vw0-f44.google.com [209.85.212.44]) by ietfa.amsl.com (Postfix) with ESMTP id BAC7E21F8741 for <dnsext@ietf.org>; Sun, 31 Jul 2011 17:51:50 -0700 (PDT)
Received: by vws12 with SMTP id 12so4880445vws.31 for <dnsext@ietf.org>; Sun, 31 Jul 2011 17:51:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; bh=O+GjIQvGrLyyDFZapfCLPepT/KrY/HzdZKlRuh3gI54=; b=GMMsy/UMv7EqSQONo7gjs1sDlkISeiqAorEd2JVWYT2UIm/LsCRJMLzR5VbAGsnmPE x5MEA1y5cBAFulyZUrKE3/EDscemDCd8d57VFYl6WQfGv7A8hc3E6u81uZVwZtoCXsVo p/XcdkeV1zeU4AIJraVXWhD4C8nYF8MNOGHkY=
MIME-Version: 1.0
Received: by 10.220.39.5 with SMTP id d5mr976179vce.213.1312159914447; Sun, 31 Jul 2011 17:51:54 -0700 (PDT)
Received: by 10.220.181.130 with HTTP; Sun, 31 Jul 2011 17:51:54 -0700 (PDT)
Date: Sun, 31 Jul 2011 17:51:54 -0700
Message-ID: <CANokk3+RE75mkTX_963QwFdOywhCZOeJdRsWba5yzU-ifXS+CQ@mail.gmail.com>
From: Sean Wells <snwells82@gmail.com>
To: "<dnsext@ietf.org>" <dnsext@ietf.org>
Content-Type: multipart/alternative; boundary=bcaec54ee67c96d2ba04a9670906
Subject: [dnsext] DNSSEC Response caching
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Aug 2011 00:51:51 -0000

--bcaec54ee67c96d2ba04a9670906
Content-Type: text/plain; charset=ISO-8859-1

Hi,

In RFC 4035, section 4.5, Response Caching:

   A security-aware resolver SHOULD cache each response as a single
   atomic entry containing the entire answer, including the named RRset
   and any associated DNSSEC RRs.  The resolver SHOULD discard the
   entire atomic entry when any of the RRs contained in it expire.



DNSSEC  RRs here includes NSECs also. For example, when processing a
wildcard answer response, NSEC also should be taken into consideration when
determining the TTL of the "atomic" entry. In section 5.3.3, the discussion
about setting the TTL does not explicitly mention this case (or other cases
where the response contains NSEC). I guess this is just a trivial omission.
Can someone clarify ?

-regards
Sean

--bcaec54ee67c96d2ba04a9670906
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi,<div><br></div><div>In RFC 4035, section 4.5, Response Caching:</div><di=
v><br></div><div><span class=3D"Apple-style-span" style=3D"font-size: 16px;=
 font-family: Times; "><pre class=3D"newpage" style=3D"font-size: 1em; marg=
in-top: 0px; margin-bottom: 0px; page-break-before: always; ">
   A security-aware resolver SHOULD cache each response as a single
   atomic entry containing the entire answer, including the named RRset
   and any associated DNSSEC RRs.  The resolver SHOULD discard the
   entire atomic entry when any of the RRs contained in it expire.</pre><pr=
e class=3D"newpage" style=3D"font-size: 1em; margin-top: 0px; margin-bottom=
: 0px; page-break-before: always; "><br></pre><pre class=3D"newpage" style=
=3D"font-size: 1em; margin-top: 0px; margin-bottom: 0px; page-break-before:=
 always; ">
<br></pre></span>DNSSEC =A0RRs here includes NSECs also. For example, when =
processing a wildcard answer response, NSEC also should be taken into consi=
deration when determining the TTL of the &quot;atomic&quot; entry. In secti=
on 5.3.3, the discussion about setting the TTL does not explicitly mention =
this case (or other cases where the response contains NSEC). I guess this i=
s just a trivial omission. Can someone clarify ?</div>
<div><br></div><div>-regards=A0<br>Sean<br>
</div>

--bcaec54ee67c96d2ba04a9670906--
