On 2/3/2021 2:31 PM, Paul Hoffman wrote:
On Jan 29, 2021, at 9:31 AM, Michael StJohns <[email protected]> wrote:
I can't support this as Standards track even though it purports to update
standards as it doesn't actually specify an implementable protocol.
Basically, this is dependent upon humans doing the right thing, rather than
specifying behavior of the protocol.
I don't understand the context of this. The draft specifies that the protocol is
changing, and now authoritative servers change the way they act from $x to $y. Where is
the "humans" part?
You're not specifying a change in how the Auth servers work AFAICT,
you're specifying a change in the data parameters for a few records
which get set by humans (and maybe enforced by tools, not necessarily by
the server). This is operational guidance rather than implementation
guidance - the servers continue to serve the data they are provided
regardless of whether its "right" with respect to this guidance.
For example, one of the texts you reference (RFC4034 Section 4) is all
about crafting the contents of the data protocol, rather than what the
server should do to enforce things. It probably should have said
instead - "The authoritative server SHOULD treat (and send) the TTL of
the NSEC RR as having the same value as the SOA minimum TTL field"
But then that gets into signing issues for the NSEC record and its
verification and you'd need to make sure that the signing part of this
is back filled to make sure that what's signed agrees with what the
server is actually sending.
8198 section 5.4 actually specifies an implementable behavior in that it
tells the client how to treat received and cached data.
For each of these, I'd recommend specifying what a client does in each of the
cases, rather than weasel wording the SHOULD with respect to the zone contents
to turn this into an implementable protocol.
Here, I agree that the draft is unclear. It should say explicitly "resolvers keep
doing $z, there is no change here". Also, for the text about authoritative servers,
I agree that changing the SHOULDs from the current standards to MUSTs.
I note that you didn't appear to accuse the authors of 4034, 4035, and 5155 of
"weasle wording" when those documents were standardized. Doing so now seems out
of line.
As a whole those documents were less specific that I would have liked.
Basically, everywhere there is a SHOULD is a possibility where some
resolvers accept the data and others reject it.
In any case where see a should, you need companion text to describe what
to do (either on the sender, or the receiver, or both) if you don't
follow that guidance.
WRT to the parent documents - as a whole they mix implementable and
human in the loop functions and there's enough of the former to place
them as Standards. But when you extract guidance paragraphs, update
them, but then don't update the client guidance on how to handle the
received data, you're not really updating the standard and hence
informational vs standard.
E.g. for each of these clauses add something similar to "The client SHOULD/MUST
reduce the effective TTL for the received NSEC RR to the lesser of the TTL of the current
SOA record, the TTL of the SOA, and the TTL of the NSEC RR record and MUST discard the
NSEC RR when that effective TTL expires."
Again, this is not about the clients, as the document says (but not clearly
enough).
And that's really the problem. The client should be able to look at
the incoming data, do a sanity check on it and then do the appropriate
things it needs for self protection. If it can't - if you don't
specify it should - then eventually something will break that's rather
unexpected and perhaps with a very large impact. If this is important
enough to make a change at the server, its certainly important enough to
require the corresponding validation change at the client.
So - not ready for last call.
Sure it is. These are normal last call comments.
Given that there was little or not actual discussion on the document, I
was quite surprised to see it go for last call. But fair - "not ready
to pass last call".
In a similar vein, I think that the section on "No updates to RFC8198" should
indeed update RFC 8198. The resolver might have the SOA in its cache, and thus could do
the right thing even if the authoritative server has not been updated.
--Paul Hoffman
Longer Discourse -
As I model the DNS, I tend think of it as having three main parts: the
data source (what used to be called the zone master file), the
authoritative servers, and the clients. This is simplistic, but bear
with me. In early days, the authoritative servers generally served
what the data provider gave them, regardless of mistakes (and somewhere
around here I have a number of very broken master files). The AS' were
pass through entities to the point that there's very little text that
says something like "The AS MUST verify.... and MUST NOT serve data that
fails that verification step". Most of the documents talk about
setting this bit or clearing that bit in the data source, but then don't
take the step of indicating that the AS must do a sanity check and
refuse to serve bogus data. E.g. if a human screws up in the provision
of the data the AS screws up.
Separate from the protocol model, most providers of modern DNS AS
implementations tend to treat the data origin tools as part and parcel
of the AS, and does some verification during the record creation
process. But that's an implementation choice, rather than a requirement
of the specification. Mostly that's not a problem, be cause we mostly
do specify the behavior of the client upon receipt of the possibly bogus
data and all of that takes place without a human in the loop.
So I'm fine with the changes to the TTL setting, but you need to impose
the requirement on the client to do the right thing even if the data
creator screws up and does the wrong thing.
Later, Mike
ps - Peter -sorry I missed your immediate response. I think the above
covers your comments as well, but feel free to bring up anything I missed.
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop