Hi,
I'm not sure if this helps the discussion, but Knot DNS implements "DS push", an automated DDNS update updating the DS (not NS) at parent. It's mostly intended for single-organization parent-child relations, where TSIG (or soon DDNSoQ) can be configured easily.
Libor

Dne 25. 10. 23 v 17:30 Johan Stenstam napsal(a):
Hi Joe,

On 25 Oct 2023, at 11:32, Joe Abley <jab...@strandkip.nl> wrote:

On 25 Oct 2023, at 10:10, Johan Stenstam 
<johan.stenstam=40internetstiftelsen...@dmarc.ietf.org> wrote:

So now there’s a new draft, that further extends the same core idea (locate the 
target for the information being sent via a DNS lookup in the parent zone). 
However, the new draft (draft-johani-dnsop-delegation-mgmt-via-ddns-00) 
proposes that instead of sending a NOTIFY (triggering a scan from the 
recipient) the child sends a DNS UPDATE containing the exact change with a 
signature that can be verified by the recipient.
I am not at all familiar with SIG(0), so bear with me. What is the key 
distribution mechanism for the DNS UPDATE originator's public key? RFC 2931 
suggests an unsigned KEY RR, I think?
My answer is “whatever mechanism the child and parent is using today for 
communicating critical information like that”. The thing here is that I do not 
primarily expect the TLD registries to change from the current path of either 
no automation of synchronisation of delegation information OR running a CDS 
(and perhaps CSYNC) scanner.

The problem I have with that is that this leaves out major parts of the 
namespace. I.e. I want a mechanism that works for the University of Foobar to 
automate the delegation information for a ~100 departments. I want a mechanism 
that works for the Stockholm Health Care district to deal with hundreds of 
hospitals, care givers and other parts of the local health care infora 
structure. Etc. Neither of those have DNS as a major focus, DNSSEC even less 
and they are extremely unlikely to run any CDS and/or CSYNC scanners in the 
foreseeable future.

So what do all these parents that are not registries use today? All sorts of 
semi crappy mechanisms, from email, via webforms to various local APIs, etc. 
All of these mechanisms have drawbacks, all have security issues and all of 
them have a certain failure rate because there is manual labor involved.

I want to completely get rid of the manual part of maintaining existing 
delegations and the proposal is to transport the public key to the parent in 
any way that is acceptable to both child and parent. I don’t think an unsigned 
KEY RR is a particularly attractive alternative, but I have nothing against a 
DNSSEC signed KEY RR.

Johan

PS. In the case where the parent *is* a registry, and there are registrars then 
I think an EPP extension for the submission of the public SIG(0) keys will work 
just fine. But, as I said, that’s not my primary goal at this time.


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to