Re: [DNSOP] Best Practices for Managing Existing Delegations When Deleting a Domain or Host

2023-07-16 Thread Viktor Dukhovni
On Tue, Jul 11, 2023 at 07:06:49PM +, Hollenbeck, Scott wrote:

> https://datatracker.ietf.org/doc/draft-hollenbeck-regext-epp-delete-bcp/
>
> The draft includes descriptions of current known practices and
> suggests that some should be avoided, some are candidates for "best",
> and there are others that haven't been used that might also be
> candidates for "best". The authors would like to learn if others agree
> with our assessments and/or can suggest improvements.

Thanks for reaching out, I'll do my best to share what I hope is a
sensible perspective.  But first some followups to already posted
feedback.

On Tue, Jul 11, 2023 at 03:22:40PM -0700, Brian Dickson wrote:

> For example, the registrar for the domain that is the parent of a host
> entry, should be able to "disavow" a particular reference (delegation
> to said host). It would be the responsibility of the other registrar
> (for the domain being disavowed) to clean up the broken delegations.
> This is basically giving authority to the DNS operator as a party to
> the situation, even if only indirectly.

Just checking the intent here, I think you're saying the "disavowal" is
potentially a case-by-case option.  So that e.g. at the time that DNS
service for a domain is discontinued, the DNS operator (perhaps via
their registrar) should be able to break drop NS records from a
*particular* delegation.

This is an interesting proposal.  It reasonably aligns with the
operational reality that it takes mutual agreement between two parties
to provide working DNS for a domain that isn't self-hosted.

In the DANE/DNSSEC survey, I am tracking almost ~350k zones (out of
~22.8M) with no SEP, roughly half of which are just lame delegations
(the listed servers return "REFUSED"), but for various reasons it is
difficult for the former DNS operator to get the delegations terminated.

The chief difficulty here is that this does not work for "external"
nameserver objects.  If we're really going to solve this problem, the
solution should I think also work for the case when the nameserver and
the client zone live in different registries.

We need a protocol by which such disavowal can happen regardless of
where the nameserver might be found.

Of course if that's too difficult to solve in a timely manner, and we
can reduce barriers in host object management within a registry, that's
fine too, and the larger goal need not hold up progress on the more
focused problem.

> Maybe having the otherwise dangling or otherwise blocking references
> converted to their respective in-bailiwick names might be a solution. E.g.
> if domain2.example had an NS record pointing to ns1.domain1.example, and
> domain1.example were deleted (or ns1.domain1.example were deleted), having
> the reference converted (by whom??) to ns1.domain2.example would suffice.
> But, that would also require picking a new IP address to use for the glue
> for that (new) host object. It's a thorny problem, a real can of worms.

In the most typical situation, the servers in question will have for
some time already discontinued DNS service for the objects to be
removed, and the dependent domain loses nothing (only gains!) from
having the no longer willing nameservers deleted.

Therefore, my take is that the delegation NS record should be simply
removed from the dependent zone.  No renaming, or other steps to paper
over the issue.  Subsequent replacement is up to the owner of the
dependent zone.  Indeed if everything was done optimally, the dependent
delegations would have proactively switched to working nameservers
first.

Now we do want to prevent accidents, and so deletion of host objects
that are still used as nameservers by zones not being deleted should
perhaps require some form of confirmation that some dependencies are
being forcibly broken.  How to do that, and whether confirmation should
actually require the requesting party to submit a second request, ...
is user interface design that should be discussed with care.  I don't
claim to have the right answer on how to balance safety vs. usability.

> This means that unrelated glue records could point at the same IP
> address, even if the host records are distinct with different owners.
> First-to-register does not guarantee that the correct ownership could
> be determined by creation time (i.e.  it's a race condition without a
> stronger mechanism.)

Explicit disavowal should be able to solve this too, if the IP addresses
targetted can be reasonably safely (multiple samples over a period of
time, or a confirmed request from the point of contact for the IP space,
...) determined to be refusing service for the disavowed zones.

So my own position is that:

- The host object owner should be able to delete it at will, with
  any friction solely to help avoid difficult to recover accidents,
  rather than prevent the nameserver owner/operator from
  discontinuing service.

- The dependent zones would then have the corresponding nameserver
  

Re: [DNSOP] Best Practices for Managing Existing Delegations When Deleting a Domain or Host

2023-07-13 Thread Brian Dickson
On Tue, Jul 11, 2023 at 12:07 PM Hollenbeck, Scott  wrote:

> Folks, we could really use feedback from people with DNS expertise to help
> document a set of best practices for managing existing DNS delegations at
> the
> TLD level when EPP domain and host objects are deleted. As described in
> this
> draft:
>
> https://datatracker.ietf.org/doc/draft-hollenbeck-regext-epp-delete-bcp/
>
> EPP includes recommendations to not blindly delete objects associated with
> existing delegations because, among other reasons, doing so can lead to
> DNS
> resolution failure. That's led some domain name registrars to implement
> creative practices that expose domains to risks of both lame delegation
> [1]
> and management hijacking. The draft includes descriptions of current known
> practices and suggests that some should be avoided, some are candidates
> for
> "best", and there are others that haven't been used that might also be
> candidates for "best". The authors would like to learn if others agree
> with
> our assessments and/or can suggest improvements.
>
> Please help. ICANN's SSAC is also looking at this issue and expert
> opinions
> will help us improve DNS resolution resilience. I plan to mention this
> quickly
> at IETF-117 given that the WG agenda is already full, but on-list
> discussion
> would be extremely valuable.
>
> Scott
>

I have a few more (random) thoughts/musings about the RRR architecture and
elements involved for EPP activity.

These are things that were probably minor when the number of gTLDs was
small, there were fewer Registrars, etc.

Also, I don't think it is necessary to address these in the short term.
Identifying them allows thinking about long term approaches, however.

The host objects that are referenced might be same-registry things (so glue
is provided with DNS responses), or different-registry things (no glue).
This leads to redundancy (same objects being defined in multiple places),
potential conflicts (first to register), inconsistencies, etc.

However, those host objects in multiple Registries *should* always be the
same real-world things that are referenced. Having a way to facilitate any
of the kinds of checks and balances being discussed for different-registry
as well as same-registry host object references is one potential issue.
E.g. deletion of host objects, requirement for consent on references,
owning Registrar, etc. are all things that might work better with some kind
of correlation to real-world hosts and their respective owners.

Similarly, it might be the case that Registrars could nominate some sort of
default server(s) as substitutes (or sacrificial servers) to replace
references to deleted host objects. This might scale better if there was
some way to share/coordinate/dereference the original host objects and
substitutes/sacrificials across Registries. This could avoid the NxM
scaling problem (N Registrars, M Registries). It might be the case that the
requirement for Registrars to supply their own substitute/sacrificial
servers could end up in e.g. ICANN accreditation agreements, for example.
This concept would not preclude outsourcing of such servers to third
parties, I don't think.

These ideas would seem to point in the direction of a model containing a
more centralized "host Registry", that might only be used for
inter-Registry EPP-related transactional activity, but not for storage of
any canonical Host information (Registrar, glue), except by reference to
the corresponding Registry (based on the name of the Host).
I'm not sure if that would be feasible, or how that would be
managed/controlled, etc. or whether that would work for non-gTLD cases
(such as CCTLDs).

Again, these are musings, not actual proposals or anything. Feedback on
these is definitely welcome.
Brian
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Best Practices for Managing Existing Delegations When Deleting a Domain or Host

2023-07-13 Thread Hollenbeck, Scott
> -Original Message-
> From: Andrew Newton 
> Sent: Thursday, July 13, 2023 1:00 PM
> To: Hollenbeck, Scott 
> Cc: brian.peter.dick...@gmail.com; dnsop@ietf.org; Registration Protocols
> Extensions 
> Subject: [EXTERNAL] Re: [DNSOP] Best Practices for Managing Existing
> Delegations When Deleting a Domain or Host
>
> Caution: This email originated from outside the organization. Do not click 
> links
> or open attachments unless you recognize the sender and know the content is
> safe.
>
> +regext
>
> IMHO, this draft should take a position on which is the actual best (even if 
> not
> current) practice, and then provide arguments to that point. Or maybe 
> provide
> pros/cons for each, because evaluating which to do has different criteria 
> for
> different people.

[SAH] We'd like to get there with community input. Consider what's in the 
draft now as an attempt to prompt discussion.

> Also, I don't believe either of the items listed in section 6 are "best".
>
> A client sponsored sacrificial nameserver means that a registrar must 
> establish
> security practices around that nameserver over the lifetime of all domains
> using it. Additionally, can registrar A simply start using the sacrificial
> nameserver of registrar B? I don't know, but if so then that's not good.

[SAH] Maybe "better than the practices to be discouraged" is a better way to 
describe them. I like the idea of adding pros and cons to better explain how 
even "better" or "best" practices might not be enough to remove all risk.

> WRT to behavioral changes in EPP, the downside is that registrars will need 
> to
> keep track of which registries implement the new behavior as it is unlikely 
> that
> all registries will switch at the same time. And EPP changes may require
> downstream changes in customer portals, etc...

[SAH] Yes, but we do have experience with deploying EPP extensions. I think 
this part is manageable.

Scott
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Best Practices for Managing Existing Delegations When Deleting a Domain or Host

2023-07-13 Thread Andrew Newton
+regext

IMHO, this draft should take a position on which is the actual best
(even if not current) practice, and then provide arguments to that
point. Or maybe provide pros/cons for each, because evaluating which
to do has different criteria for different people.

Also, I don't believe either of the items listed in section 6 are "best".

A client sponsored sacrificial nameserver means that a registrar must
establish security practices around that nameserver over the lifetime
of all domains using it. Additionally, can registrar A simply start
using the sacrificial nameserver of registrar B? I don't know, but if
so then that's not good.

WRT to behavioral changes in EPP, the downside is that registrars will
need to keep track of which registries implement the new behavior as
it is unlikely that all registries will switch at the same time. And
EPP changes may require downstream changes in customer portals, etc...

-andy


On Wed, Jul 12, 2023 at 8:47 AM Hollenbeck, Scott
 wrote:
>
> Thanks for the feedback, Brian. Notes below…
>
>
>
> From: Brian Dickson 
> Sent: Tuesday, July 11, 2023 6:23 PM
> To: Hollenbeck, Scott 
> Cc: dnsop@ietf.org
> Subject: [EXTERNAL] Re: [DNSOP] Best Practices for Managing Existing 
> Delegations When Deleting a Domain or Host
>
>
>
> Caution: This email originated from outside the organization. Do not click 
> links or open attachments unless you recognize the sender and know the 
> content is safe.
>
>
>
>
>
> On Tue, Jul 11, 2023 at 12:07 PM Hollenbeck, Scott 
>  wrote:
>
> Folks, we could really use feedback from people with DNS expertise to help
> document a set of best practices for managing existing DNS delegations at the
> TLD level when EPP domain and host objects are deleted. As described in this
> draft:
>
> https://datatracker.ietf.org/doc/draft-hollenbeck-regext-epp-delete-bcp/
>
> EPP includes recommendations to not blindly delete objects associated with
> existing delegations because, among other reasons, doing so can lead to DNS
> resolution failure. That's led some domain name registrars to implement
> creative practices that expose domains to risks of both lame delegation [1]
> and management hijacking. The draft includes descriptions of current known
> practices and suggests that some should be avoided, some are candidates for
> "best", and there are others that haven't been used that might also be
> candidates for "best". The authors would like to learn if others agree with
> our assessments and/or can suggest improvements.
>
> Please help. ICANN's SSAC is also looking at this issue and expert opinions
> will help us improve DNS resolution resilience. I plan to mention this quickly
> at IETF-117 given that the WG agenda is already full, but on-list discussion
> would be extremely valuable.
>
> Scott
>
>
>
> I believe the fundamental root problem is the "security model" (for lack of a 
> better term) for EPP. I realize EPP long predates much of the efforts in the 
> DNS world, and the fact that it didn't anticipate these problems shouldn't 
> result in any blame. That should not excuse resistance to fixing deficiencies 
> in EPP, if that is what is needed to resolve these issues.
>
>
>
> While there may be better or worse practices available within the current 
> model for EPP, sticking with what EPP currently does without including the 
> EPP model as being in scope, may be sub-optimal.
>
> [SAH] Indeed, and that’s why the draft also includes a proposal in Section 
> 6.2 to allow for deletion when necessary.
>
>
>
> The canonical situation described in the linked draft encapsulates the model 
> problems: it is possible (and in fact unavoidable) for unrelated EPP clients 
> (registrants with different registrars) to interfere with what should be 
> straightforward operations (eg deleting a host record).
>
>
>
> This issue also presents itself in permanently 100% lame delegations, where 
> the NS delegations for a domain are pointed to a DNS provider for which the 
> domain is unknown (not authoritative for the domain). That situation exposes 
> the DNS provider to arbitrary levels of abuse via open (aka "public") 
> resolvers.
>
>
>
> I think a more appropriate model would be to require (or at least facilitate) 
> bilateral control on delegations (opt-in or opt-out, basically). For example, 
> the registrar for the domain that is the parent of a host entry, should be 
> able to "disavow" a particular reference (delegation to said host). It would 
> be the responsibility of the other registrar (for the domain being disavowed) 
> to clean up the broken delegations. This is basically giving author

Re: [DNSOP] Best Practices for Managing Existing Delegations When Deleting a Domain or Host

2023-07-12 Thread Hollenbeck, Scott
Thanks for the feedback, Brian. Notes below…



From: Brian Dickson 
Sent: Tuesday, July 11, 2023 6:23 PM
To: Hollenbeck, Scott 
Cc: dnsop@ietf.org
Subject: [EXTERNAL] Re: [DNSOP] Best Practices for Managing Existing 
Delegations When Deleting a Domain or Host




Caution: This email originated from outside the organization. Do not click 
links or open attachments unless you recognize the sender and know the content 
is safe.





On Tue, Jul 11, 2023 at 12:07 PM Hollenbeck, Scott 
mailto:40verisign@dmarc.ietf.org> > wrote:

Folks, we could really use feedback from people with DNS expertise to help
document a set of best practices for managing existing DNS delegations at the
TLD level when EPP domain and host objects are deleted. As described in this
draft:

https://datatracker.ietf.org/doc/draft-hollenbeck-regext-epp-delete-bcp/ 
<https://secure-web.cisco.com/1mD4wuR1TtAFOB2p8C83LBXV6A9T65cdm1G7UhFUnZpEar4TPD81E9IyIiSlUYG1ggp_3B5szOgXkFYbf8XGjnpeWQ_G7ZFL-GtQyiGIwF9X1FZuW6zB_c3heeRhGONxZ5UcWS6JvI1cN_T1JygemfOtWS51X7Gyw3tvesEdyP1MP92JKvWvHc0gryl8AbZ2x90gh1xnrj_6yO4efIPehHCHdzTYv720UskxvRm0RiqSUFip10kkZMCBB14DARcDxDe3S9m23OWyje4i82nZalfVn0udtYT6gHT_E2nuP47xs0yyGkDKbX27vtCSIsytS/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-hollenbeck-regext-epp-delete-bcp%2F>

EPP includes recommendations to not blindly delete objects associated with
existing delegations because, among other reasons, doing so can lead to DNS
resolution failure. That's led some domain name registrars to implement
creative practices that expose domains to risks of both lame delegation [1]
and management hijacking. The draft includes descriptions of current known
practices and suggests that some should be avoided, some are candidates for
"best", and there are others that haven't been used that might also be
candidates for "best". The authors would like to learn if others agree with
our assessments and/or can suggest improvements.

Please help. ICANN's SSAC is also looking at this issue and expert opinions
will help us improve DNS resolution resilience. I plan to mention this quickly
at IETF-117 given that the WG agenda is already full, but on-list discussion
would be extremely valuable.

Scott



I believe the fundamental root problem is the "security model" (for lack of a 
better term) for EPP. I realize EPP long predates much of the efforts in the 
DNS world, and the fact that it didn't anticipate these problems shouldn't 
result in any blame. That should not excuse resistance to fixing deficiencies 
in EPP, if that is what is needed to resolve these issues.



While there may be better or worse practices available within the current 
model for EPP, sticking with what EPP currently does without including the EPP 
model as being in scope, may be sub-optimal.

[SAH] Indeed, and that’s why the draft also includes a proposal in Section 6.2 
to allow for deletion when necessary.



The canonical situation described in the linked draft encapsulates the model 
problems: it is possible (and in fact unavoidable) for unrelated EPP clients 
(registrants with different registrars) to interfere with what should be 
straightforward operations (eg deleting a host record).



This issue also presents itself in permanently 100% lame delegations, where 
the NS delegations for a domain are pointed to a DNS provider for which the 
domain is unknown (not authoritative for the domain). That situation exposes 
the DNS provider to arbitrary levels of abuse via open (aka "public") 
resolvers.



I think a more appropriate model would be to require (or at least facilitate) 
bilateral control on delegations (opt-in or opt-out, basically). For example, 
the registrar for the domain that is the parent of a host entry, should be 
able to "disavow" a particular reference (delegation to said host). It would 
be the responsibility of the other registrar (for the domain being disavowed) 
to clean up the broken delegations. This is basically giving authority to the 
DNS operator as a party to the situation, even if only indirectly.

[SAH] Agreed as noted above. If there’s more that can be done, I’ll gladly 
consider adding text.



Having the original host object owner provide the sacrificial target places 
the burden on the wrong party, somewhat analogous to "blaming the victim".

Maybe having the otherwise dangling or otherwise blocking references converted 
to their respective in-bailiwick names might be a solution. E.g. if 
domain2.example had an NS record pointing to ns1.domain1.example, and 
domain1.example were deleted (or ns1.domain1.example were deleted), having the 
reference converted (by whom??) to ns1.domain2.example would suffice. But, 
that would also require picking a new IP address to use for the glue for that 
(new) host object. It's a thorny problem, a real can of worms.



Seperate "thread" on the name/control issue:

I think there is

Re: [DNSOP] Best Practices for Managing Existing Delegations When Deleting a Domain or Host

2023-07-11 Thread Brian Dickson
On Tue, Jul 11, 2023 at 12:07 PM Hollenbeck, Scott  wrote:

> Folks, we could really use feedback from people with DNS expertise to help
> document a set of best practices for managing existing DNS delegations at
> the
> TLD level when EPP domain and host objects are deleted. As described in
> this
> draft:
>
> https://datatracker.ietf.org/doc/draft-hollenbeck-regext-epp-delete-bcp/
>
> EPP includes recommendations to not blindly delete objects associated with
> existing delegations because, among other reasons, doing so can lead to
> DNS
> resolution failure. That's led some domain name registrars to implement
> creative practices that expose domains to risks of both lame delegation
> [1]
> and management hijacking. The draft includes descriptions of current known
> practices and suggests that some should be avoided, some are candidates
> for
> "best", and there are others that haven't been used that might also be
> candidates for "best". The authors would like to learn if others agree
> with
> our assessments and/or can suggest improvements.
>
> Please help. ICANN's SSAC is also looking at this issue and expert
> opinions
> will help us improve DNS resolution resilience. I plan to mention this
> quickly
> at IETF-117 given that the WG agenda is already full, but on-list
> discussion
> would be extremely valuable.
>
> Scott
>

I believe the fundamental root problem is the "security model" (for lack of
a better term) for EPP. I realize EPP long predates much of the efforts in
the DNS world, and the fact that it didn't anticipate these problems
shouldn't result in any blame. That should not excuse resistance to fixing
deficiencies in EPP, if that is what is needed to resolve these issues.

While there may be better or worse practices available within the current
model for EPP, sticking with what EPP currently does without including the
EPP model as being in scope, may be sub-optimal.

The canonical situation described in the linked draft encapsulates the
model problems: it is possible (and in fact unavoidable) for unrelated EPP
clients (registrants with different registrars) to interfere with what
should be straightforward operations (eg deleting a host record).

This issue also presents itself in permanently 100% lame delegations, where
the NS delegations for a domain are pointed to a DNS provider for which the
domain is unknown (not authoritative for the domain). That situation
exposes the DNS provider to arbitrary levels of abuse via open (aka
"public") resolvers.

I think a more appropriate model would be to require (or at least
facilitate) bilateral control on delegations (opt-in or opt-out,
basically). For example, the registrar for the domain that is the parent of
a host entry, should be able to "disavow" a particular reference
(delegation to said host). It would be the responsibility of the other
registrar (for the domain being disavowed) to clean up the broken
delegations. This is basically giving authority to the DNS operator as a
party to the situation, even if only indirectly.

Having the original host object owner provide the sacrificial target places
the burden on the wrong party, somewhat analogous to "blaming the victim".

Maybe having the otherwise dangling or otherwise blocking references
converted to their respective in-bailiwick names might be a solution. E.g.
if domain2.example had an NS record pointing to ns1.domain1.example, and
domain1.example were deleted (or ns1.domain1.example were deleted), having
the reference converted (by whom??) to ns1.domain2.example would suffice.
But, that would also require picking a new IP address to use for the glue
for that (new) host object. It's a thorny problem, a real can of worms.

Seperate "thread" on the name/control issue:
I think there is a corresponding "blind spot" that exists, that might also
need to be addressed: the concept of ownership of IP addresses used within
"glue" records.
The DNS "NS" record uses a name as the target, and necessitates
corresponding A/ records to resolve delegations.
However, the DNS protocol does not make use of names for DNS lookups by
resolvers. DNS queries use addresses only.
This means that unrelated glue records could point at the same IP address,
even if the host records are distinct with different owners.
First-to-register does not guarantee that the correct ownership could be
determined by creation time (i.e. it's a race condition without a stronger
mechanism.)

Basically, I don't think there are any easy answers, but it definitely is a
real-world problem.

Brian
P.S. I will admit to being the author of the concept of naming things under
"empty.as112.arpa", as the creative approach that is referenced in the
draft's references. It's somewhat sneaky, but in the absence of a better
approach, directs abusive delegations into a black hole of sorts. I will
gladly endorse any better approach that avoids the burden of third-party
delegations being maintained by the first party (who may no longer be being
paid