Dear WG,
the meeting minutes for our session at the IETF74 in San Francisco have been
posted to <http://www.ietf.org/proceedings/09mar/minutes/dnsop.txt>.
A copy is also attached below. Thanks to John, Benno and Bruce for scribing.
All typos and delays are mine.
-Peter
-----------------------------------------------------------------------------
dnsop WG minutes for IETF 74, San Francisco, US
-----------------------------------------------------------------------------
WG: DNS Operations (dnsop)
Meeting: IETF 74, San Francisco
Location: Hilton San Francisco, Continental 4
Date: Tuesday, 24 March 2009
Time: 15:20 - 17:00 (UTC-8)
Chairs: Rob Austein <[email protected]> <[email protected]>
Peter Koch <[email protected]> <[email protected]>
Minutes: John Schnizlein
Jabber: xmpp:[email protected]
J-Scribe: Bruce Campbell, Benno Overeinder
J-Script: http://jabber.ietf.org/logs/dnsop/2009-03-24.txt
http://jabber.ietf.org/logs/dnsop/2009-03-25.txt
Audio:
ftp://videolab.uoregon.edu/pub/videolab/media/ietf74/ietf74-continental_4-tues-pm.mp3
[~150MB]
WG URL: http://tools.ietf.org/wg/dnsop/
Material: https://datatracker.ietf.org/meeting/74/materials.html
Version: $Revision: 1.3 $
-----------------------------------------------------------------------------
1) Administrivia [ 15:24 {audio 2:34:08} ]
<http://www.ietf.org/proceedings/09mar/slides/dnsop-0.pdf>
No new IETF attendees, about 5 new to DNSOP WG
- Note Well
- agenda : <http://www.ietf.org/proceedings/09mar/agenda/dnsop.txt>
no changes
-----------------------------------------------------------------------------
2) Status Update [ 15:29 {audio 2:39:00} ]
- RFCs published
RFC 5358 "Preventing Use of Recursive Nameservers in Reflector Attacks"
- Internet-Drafts in RFC Editor Queue
- NONE -
- I-Ds at the IESG
- NONE -
- I-Ds in or past WGLC
- draft-ietf-dnsop-reverse-mapping-considerations-06.txt
post WGLC, EXPIRED, minor edits needed, to be sent to IESG
- draft-ietf-dnsop-respsize-11.txt
EXPIRED
- draft-ietf-dnsop-default-local-zones-08.txt
write-up in progress
- draft-ietf-dnsop-as112-under-attack-help-help-02.txt
passed WG last call - minor edits needed
write-up in progress
- draft-ietf-dnsop-name-server-management-reqs-02.txt
WGLC ends one week after IETF
5 reviewer threshold not met on list
6 people in the room other than design team members said they
read and want it to proceed, chairs asked them to submit their
position to the list.
Wes: edits are minor at this point
-----------------------------------------------------------------------------
3) WG Charter [ 15:33 {audio 2:43:30} ]
[chairs][ 0 min][15:30]
- no news, skipped -
-----------------------------------------------------------------------------
4) Active Drafts [ 15:33 {audio 2:43:38} ]
[chairs][25 min][15:30]
4.0) draft-ietf-dnsop-resolver-priming-01.txt
EXPIRED, incorporation of feedback pending
expect an update in May
draft-ietf-dnsop-as112-ops-02.txt
revived, awaiting WGLC
4.1) draft-ietf-dnsop-dnssec-trust-anchor-03.txt
Awaiting WGLC
Dmitry Burkov: required hash can limit the usefulness of this
Olaf: clarification: the hash mentioned is for the DS RR, does
not imply so for the signing algorithm; the draft should not
require use of any particular algorithm and key - agree and
don't think the text requires it.
Dmitry Burkov: prefer that it deprecate SHA-1 but not specify a
recommended algorithm
4.2) draft-ietf-dnsop-rfc4641bis-01.txt [ 15:41 {audio 2:51:05} ]
[Olaf Kolkman]
<http://www.ietf.org/proceedings/09mar/slides/dnsop-1.pdf>
Version 00 just captures RFC and errata
RFC4641 is informational because of lack of practice,
should the -bis be a BCP or informational?
removed table of key sizes and simplified the recommendation:
use 1024 bits, 2048 if concerned about security
Paul Hoffman: starting Jan 2011, NIST requires 2048 bits - will be
presented in SAAG - also has to be SHA-2, US Govt will no longer
be allowed to use RSA1024 or SHA-1
differentiation between KSK as a trust anchor (third party reliance)
or just a DS pointed at it.
key effectivity periods: KSK effectivity 2 decades or 12 months (to
exercise) but possible stability risk. guidance needed
added key algorithm rollover: essentially double signature rollover,
with sigs for each key
(non)cooperative registrars (zone maintainer) - picture looks dim in
the case of long TTLs - looking for
Antoin Verschuuren: only way to go: exchange private keys (will not
happen), disagree that the problem is there without DNSSEC - long
TTL in that case keeps old data in caches; may have to go through
insecure
Ed Lewis: last sentence on slide may be accurate because of
serial number mismatch.
Re: key lengths, recommend not saying "do this" but instead
describe tradeoffs.
Olaf: want crypto specialists to confirm that key lengths and
effectivity periods are reasonable.
Paul Hoffman: say how much longer the longer key takes to sign
Mark Andrews: missing discussion on whether to use NSEC or NSEC3
Olaf: please send to the list with what recommendations should be.
Olaf: there are other than these issues on the issue-tracker
Ondrej Sury: want longer rollover times described also, want to
wait until root is signed, so maybe longer than a year
Jaap: plan in the European Commission to write a document like this,
telling operators how to run DNSSEC
Olaf: later presentation on timing, those drafts should cross
reference each other; want to first address the open issues;
please send text to the list ASAP
-----------------------------------------------------------------------------
5) Current & New Topics [ 16:02 {audio 3:12:36} ]
5.1) draft-morris-dnsop-dnssec-key-timing-00.txt
[Johan Ihren]
<http://www.ietf.org/proceedings/09mar/slides/dnsop-2.pdf>
Olaf: How to deal with the 4641bis overlap?
Johan: there is a need to coordinate these drafts
Olaf: minimum values for the timings?
Johan: it depends - you don't get a number; you get an equation.
back to Johan's preso
deal only with key timing - not including signing because already
complicated enough
signing side still to be worked out
asking WG to take on as a WG item
Wes Hardaker: applaud the work - suggest that you structure the
document to suit the needs of people who are not very familiar with
DNSSEC.
Johan: we have haggled over this - not intended for DNSSEC zone
operators, but for software implementers. Responding to confusion
in terms of discussion.
language barrier and confusion in terminology
Wes: Missing 5011 considerations
Johan: we deliberately only deal with state transitions and
avoided dealing with distributing trust anchors.
Antoin: helpful for making policy, concerned about relation to 4641bis
Evan Hunt: suggest terminology coordination also with RFC 5011
Johan: the terminology is important, 5011 cannot change, but let's see
how to improve
Olaf: operational practices has the same issue.
Chairs postpone decision for adoption due to overlap with 4641bis.
WG is asked "Do we at least want to work on this?" Humm in favor
of support, silence for opposition
ACTION: Chairs to coordinate with editors of this and 4641bis to describe
overlap and interaction and bring appropriate question to the WG
5.2) draft-liman-tld-names-00.txt [ 16:27 {audio 3:37:00} ]
[Lars-Johan Liman]
<http://www.ietf.org/proceedings/09mar/slides/dnsop-3.pdf>
Draft was written on request from the DNS directorate
Intent to make clear what octet values are allowed in the label
closest to the DNS root. Perspective of the technical community.
Does anyone disagree label length restriction apply to the root?
[room was silent]
Hostnames (RFC 952) specification does NOT apply to TLD labels
as there is no address or MX RR for the TLD itself; anyone oppose?
Ondrej Sury: 2.3.1 of RFC 1035 specifies the label spec
Liman: it's a recommendation there, doesn't say "must"
Mark Andrews: with TLDs you don't want anything wider than RFC952
Liman: want to ignore RFC952, have something else as a basis
Mark: RFC952 is modified by RFC1123
Joe Abley: third bullet; absence of A/AAAA isn't enough for an
indicator
Ed Lewis: concerned to rule out "host" at the TLD label; should
not do policy here
Liman: inclined to follow Andrew Sullivan's recommendation from the
mailing list: this is basically policy, but has been used as basis
in other specs; thereby has become a technical specification over
the years
Francis Dupont: suggests to contact the author of RFC 1123 for
clarification of the intentions of the wording
Liman: proposed way forward: 1123 is intentional [projector died]
open up as little as possible to accomodate IDN A-labels
would like to remove chars from the current version to be RFC1123
plus what it needs for IDNs
Mark Andrews: good way forward
Andrew Sullivan: we can consult with original 1123 contributors,
but different people have interpreted thios piece of text
regardless of initial intentions; is it ambiguous and can
we clarify?
Ed Lewis: concerned about setting policy vs recording good choices
"Is the purpose to specify what we think should be TLD names
or are these safe for applications?"
Liman: Aiming at technically safe names, no policy if possible
Peter (chair): this was prompted because IDN TLDs' "xn--" is
in obvious conflict with "will be alphabetic"
The draft will continue as an individual submission until further
notice. Discussion is encouraged to continue on the DNSOP WG
mailing list. Chairs to coordinate with dnsext chairs.
-----------------------------------------------------------------------------
6) Other (non WG) Internet-Drafts [ 16:44 {audio 3:54:22} ]
- NONE -
-----------------------------------------------------------------------------
7) I/O with other WGs [ 16:44 {audio 3:54:22} ]
behave) draft-bagnulo-behave-dns64-02.txt
[Andrew Sullivan]
<http://www.ietf.org/proceedings/09mar/slides/dnsop-4.pdf>
Comments still needed especially on the case where DO=1 and CD=0;
What should a validating resolver do? Would setting the AD bit
break anything?
Confirming feedback: Is it OK to push translated A into the
additional section instead of answer section just as a debugging
hint?
The draft is now a BEHAVE WG item - more "DNS eyes" would be good.
hiprg) draft-ponomarev-hip-hit2ip-03.txt [ 16:47 {audio 3:57:00} ]
[Oleg Ponomarev]
<http://www.ietf.org/proceedings/09mar/slides/dnsop-5.pdf>
Input from the HIP research group
Olaf: why use the DNS for such a flat namespace? Could use any
database mechanism and you don't exploit any DNS advantages.
Oleg: Don't want to construct new protocol or deploy new servers.
Peter Koch: given the state of our own reverse mapping draft,
is there consensus in HIP that this is needed?
Oleg: like to have it for access control lists and logfiles
Peter: access control sets off alarm bells. Makes more sense with
HIP than with IP addresses?
Oleg: yes, it's secure in a way
Bruce Campbell: do you intend this as a per entity basis or global?
Oleg: possibly global
Olaf: Have you given consideration to the registry business going to
scale for this?
Oleg: self generated, host is able to prove its identity, so
registration is easy
Chairs point to the "Multiple Interfaces" (mif) BOF to meet
Thursday, 1510 - 1610 and the 6man WG, Tuesday, 1710-1810, which has
RFC 3484bis, draft-chown-addr-select-considerations-02.txt on its
agenda. Early DNS review is encouraged.
-----------------------------------------------------------------------------
8) A.O.B. [ 16:58 {audio 4:08:14} ]
8.0) DNSSEC, IXFR and redundant signers
[Joe Gersch]
<http://www.ietf.org/proceedings/09mar/slides/dnsop-6.pdf>
How to delete (slightly different) RRSIGs when backup signer kicks in?
Extend protocol to allow update to check for other fields while
deleting RRSIG? Any support for this IXFR extension?
Rob: need to take this to the list, proposed protocol change
suggests this is for "namedroppers" (DNSEXT)
8.1) DNS Reverse for IPv6
[Alain Durand]
v6 operators looking into reverse DNS, especially for address space
given to home users, need feedback
Alain is collecting feedback in his personal mailbox but will
send a reminder to teh DNSOP list
8.2) Trust Anchor Repository Bar BOF
[Russ Mundy]
Announcement: Bar BoF tomorrow evening about TARs
-----------------------------------------------------------------------------
Z) Meeting closed [ 17:05 {audio 4:15:26} ]
-----------------------------------------------------------------------------
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop