Skip to main content

DNS Security (DNSSEC) Opt-In
RFC 4956

Revision differences

Document history

Date Rev. By Action
2020-01-21
09 (System) Received changes through RFC Editor sync (added Verified Errata tag)
2015-10-14
09 (System) Notify list changed from ,  to
2007-08-10
09 Amy Vezza State Changes to RFC Published from RFC Ed Queue by Amy Vezza
2007-08-10
09 Amy Vezza [Note]: 'RFC 4956' added by Amy Vezza
2007-07-27
09 (System) RFC published
2007-04-16
09 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2007-04-10
09 (System) IANA Action state changed to No IC from In Progress
2007-04-10
09 (System) IANA Action state changed to In Progress
2007-04-07
09 Amy Vezza IESG state changed to Approved-announcement sent
2007-04-07
09 Amy Vezza IESG has approved the document
2007-04-07
09 Amy Vezza Closed "Approve" ballot
2006-11-08
09 (System) Request for Early review by SECDIR Completed. Reviewer: Radia Perlman.
2006-10-31
09 Mark Townsley [Note]: 'Waiting on dnssec experiments draft' added by Mark Townsley
2006-10-13
09 (System) Removed from agenda for telechat - 2006-10-12
2006-10-12
09 Amy Vezza State Changes to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation by Amy Vezza
2006-10-12
09 Cullen Jennings [Ballot comment]
I am basically putting in a No-obj I defer to the opinion of security ADs.
2006-10-12
09 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2006-10-12
09 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2006-10-12
09 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2006-10-12
09 David Kessens [Ballot Position Update] New position, No Objection, has been recorded by David Kessens
2006-10-11
09 Ted Hardie
[Ballot comment]
I think the working group faced a tough challeng here.  There were plenty of folks, myself included, who objected to opt-in on the …
[Ballot comment]
I think the working group faced a tough challeng here.  There were plenty of folks, myself included, who objected to opt-in on the grounds that it violated the principle of least surprise for applications that were expecting a "no" to have a reliable semantic.  I think the issues faced by large, flat zones are real, though, and that the working group met the challenge in a reasonable way--by making it possible to distinguish between those zones where the "no" has the expected semantic and those where it did not.  As the basis for further experimentation, this enough to see what troubles this creates in APIs and applications.

I do think this is enough for a proposed standard, and I would not support it as a change to the base semantics of dnssec.  After reflection, I do believe that this is enough to run a successful
experiment.  I wish more of the later decision making process were already sketched out, but that is a matter for charter and DNSSEC chair activity.
2006-10-11
09 Ted Hardie [Ballot Position Update] New position, Yes, has been recorded by Ted Hardie
2006-10-11
09 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2006-10-11
09 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2006-10-11
09 Cullen Jennings [Ballot Position Update] New position, Abstain, has been recorded by Cullen Jennings
2006-10-11
09 Russ Housley
[Ballot comment]
Opt-in allows a zone owner to avoid signing unsecured delegations,
  avoiding a huge number of digital signature operations in
  delegation-heavy zones …
[Ballot comment]
Opt-in allows a zone owner to avoid signing unsecured delegations,
  avoiding a huge number of digital signature operations in
  delegation-heavy zones (like TLDs) in which most of the delegations
  are unsecured.  Opt-in allows unsecured delegations to be spoofed
  and it allows new unsecured delegations to be inserted.

  In 2003, the DNSEXT WG failed to reach rough consensus on publishing
  opt-in on the standards track.  As I understand the result of this
  exercise, the DNSEXT WG was going to add some statement to the
  introduction of the document to indicate that they did not reach
  consensus to the content of this document, and then publish it as
  an informational RFC.  That never happened.
 
  I do not see how this experiment will lead to a better understanding
  of the security implication of opt-in.  I do not think we should
  experiment with the security model of DNSSEC.  Changes to the
  security model of DNSSEC require consensus.
2006-10-11
09 Russ Housley [Ballot Position Update] New position, Abstain, has been recorded by Russ Housley
2006-10-11
09 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2006-10-09
09 Amy Vezza State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Amy Vezza
2006-10-09
09 Brian Carpenter [Ballot comment]
I don't want to delay this draft but the Gen-ART reviewer was expecting a minor update for clarity:
http://www1.ietf.org/mail-archive/web/gen-art/current/msg01357.html
2006-10-09
09 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded by Brian Carpenter
2006-09-26
09 Mark Townsley [Ballot Position Update] New position, Yes, has been recorded for Mark Townsley
2006-09-26
09 Mark Townsley Ballot has been issued by Mark Townsley
2006-09-26
09 Mark Townsley Created "Approve" ballot
2006-09-14
09 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2006-09-06
09 Mark Townsley Placed on agenda for telechat - 2006-10-12 by Mark Townsley
2006-09-06
09 Mark Townsley Note field has been cleared by Mark Townsley
2006-08-31
09 Amy Vezza Last call sent
2006-08-31
09 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2006-08-31
09 Mark Townsley State Changes to Last Call Requested from AD Evaluation by Mark Townsley
2006-08-31
09 Mark Townsley Last Call was requested by Mark Townsley
2006-08-31
09 (System) Ballot writeup text was added
2006-08-31
09 (System) Last call text was added
2006-08-31
09 (System) Ballot approval text was added
2006-08-21
09 Mark Townsley State Changes to AD Evaluation from Publication Requested by Mark Townsley
2006-08-21
09 Mark Townsley
[Note]: 'Still in WG; no consensus to advance on standards track, continuing discussion on how to publish (info vs. experimental) and what sort of  explanatory …
[Note]: 'Still in WG; no consensus to advance on standards track, continuing discussion on how to publish (info vs. experimental) and what sort of  explanatory note to include.' added by Mark Townsley
2006-07-07
09 Dinara Suleymanova
PROTO Write-up

1) Have the chairs personally reviewed this version of the ID and do
they believe this ID is sufficiently baked to forward to …
PROTO Write-up

1) Have the chairs personally reviewed this version of the ID and do
they believe this ID is sufficiently baked to forward to the IESG
for publication?

Yes we have reviewed both document.


2) Has the document had adequate review from both key WG members and
key non-WG members? Do you have any concerns about the depth or
breadth of the reviews that have been performed?

Yes.

draft-ietf-dnsext-dnssec-opt-in has quite a long history and thorough
and in-depth discussion a few years ago also see below. Both opt-in
and dnssec-experiments have been last called together and were
reviewed (among others) by:

Sam Weiler
(http://ops.ietf.org/lists/namedroppers/namedroppers.2006/msg00576.html)
Ed Lewis
(http://ops.ietf.org/lists/namedroppers/namedroppers.2006/msg00440.html)
Andrew Sullivan
(http://ops.ietf.org/lists/namedroppers/namedroppers.2006/msg00330.html)
Mark Kosters
(http://ops.ietf.org/lists/namedroppers/namedroppers.2006/msg00309.html)
Thierry Moreau
(http://ops.ietf.org/lists/namedroppers/namedroppers.2006/msg00305.html)
Scott Rose
(http://ops.ietf.org/lists/namedroppers/namedroppers.2006/msg00316.html)
Rodney
Joffe(http://ops.ietf.org/lists/namedroppers/namedroppers.2006/
msg00335.html)
Thomas Nartan (thread starting at:
http://ops.ietf.org/lists/namedroppers/namedroppers.2006/msg00308.html).


3) Do you have concerns that the document needs more review from a
particular (broader) perspective (e.g., security, operational
complexity, someone familiar with AAA, etc.)?

No we do not.

4) Do you have any specific concerns/issues with this document that
you believe the ADs and/or IESG should be aware of? For example,
perhaps you are uncomfortable with certain parts of the document,
or whether there really is a need for it, etc., but at the same
time these issues have been discussed in the WG and the WG has
indicated it wishes to advance the document anyway.

It is probably good to have some historic background on the documents.

The OPT-in document has been around for a long time. In 2002 it lead
to heated debates which resulted in a conclusion that opt-in was
technically solid but there was no rough consensus to add opt-in to
the spec.
(http://ops.ietf.org/lists/namedroppers/namedroppers.2003/msg01007.html)

The chairs then suggested to make sure that opt-in did not end up as
an I-D tombstone but was to be published as informational
draft. Adding the boilerplate has been on the WG todo list for a very
long time.

In the mean time the working group has created DNSSECbis and has
thought about the possible transition mechanisms to DNSSEC-ter (for
deploying NSEC3). One of the possible transition mechanism can also
be used to run experiments on production systems without interfering
with production data. This technology has been described in the
dnssec-experiments draft.

After dnssec-experiments was published as an I-D, the editors of
OPT-IN (also the editor of opt-in) suggested to update OPT-IN to fit
in the frame work of dnssec-experiments, in other words opt-in being
the first application of dnssec-experiments.

Currently the OPT-IN technology is making its comeback in the NSEC3
specification. Times seem to have changed since OPT-IN does not seem
to be as contentious as 4 years ago.


5) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with
it?

We think it is solid. Active members are aware of this document and
key members of the working group have reviewed the documents. There
were no objections raised against the document. There was some
clarification work needed after version of 'experiment' and version 8
of 'opt-in.


6) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize what are they upset about.

No. See the history above.

7) Have the chairs verified that the document adheres to _all_ of the
ID nits? (see http://www.ietf.org/ID-nits.html).

yes

8) For Standards Track and BCP documents, the IESG approval
announcement includes a writeup section with the following
sections:


draft-ietf-dnsext-dnssec-experiments

This document describes how algorithm identifiers can be used to
perform experiments within a DNSSECbis environment without that the
published data is marked as "bogus" by validating resolvers that do
not partake in the experiments.

The document explains why this methodology works and describes how
experiments are to be defined.

Besides, it suggests that algorithm identifiers can be used to
introduce non-backward compatible DNSSEC features into the
protocol.

The first application of this methodology will be an experiment with
"opt-in" [draft-ietf-dnsext-dnssec-opt-in]. It is possible that the
methodology will be used for the introduction of current DNSSEC
extensions currently under development in DNSEXT, the NSEC3 work.


draft-ietf-dnsext-dnssec-opt-in

opt-in is a method to disable the authenticated denial of existence
for a range of domain names in a zone. It has been developed to
generate a sparse set of NSEC RRs in a zone that contains mostly
delegations i.e. to opt-in the secure delegations. The span of
delegations for which authenticated denial is not available is still
indicated using an NSEC resource record. 'NSEC-bit' in the type
bitmap of the NSEC RDATA is used to signal the different semantic of
the opt-in type NSEC RR.

opt-in is a methodology that is backwards incompatible with DNSSEC; in
order to perform a trial the methodology described in
draft-ietf-dnsext-dnssec-experiments is applied.



--Olaf
2006-07-06
09 Dinara Suleymanova State Changes to Publication Requested from Dead by Dinara Suleymanova
2006-07-06
09 Dinara Suleymanova Shepherding AD has been changed to Mark Townsley from Thomas Narten
2006-07-06
09 Dinara Suleymanova Intended Status has been changed to Experimental from None
2006-06-22
09 (System) New version available: draft-ietf-dnsext-dnssec-opt-in-09.txt
2006-05-05
09 (System) Document has expired
2005-11-03
09 Margaret Cullen State Changes to Dead from AD is watching by Margaret Wasserman
2005-11-03
09 Margaret Cullen
[Note]: 'Still in WG; no consensus to advance on standards track, continuing discussion on how to publish (info vs. experimental) and what sort of  explanatory …
[Note]: 'Still in WG; no consensus to advance on standards track, continuing discussion on how to publish (info vs. experimental) and what sort of  explanatory note to include.' added by Margaret Wasserman
2005-10-26
08 (System) New version available: draft-ietf-dnsext-dnssec-opt-in-08.txt
2005-07-20
07 (System) New version available: draft-ietf-dnsext-dnssec-opt-in-07.txt
2005-02-03
06 (System) New version available: draft-ietf-dnsext-dnssec-opt-in-06.txt
2003-07-16
09 Thomas Narten
Still in WG; no consensus to advance on standards track, continuing discussion on how to publish (info vs. experimental) and what sort of  explanatory note …
Still in WG; no consensus to advance on standards track, continuing discussion on how to publish (info vs. experimental) and what sort of  explanatory note to include.
2003-07-16
09 Thomas Narten Shepherding AD has been changed to Narten, Thomas from Nordmark, Erik
2003-07-16
09 Thomas Narten State Changes to AD is watching from Publication Requested by Narten, Thomas
2003-07-03
09 Allison Mankin Draft Added by Mankin, Allison
2003-03-03
05 (System) New version available: draft-ietf-dnsext-dnssec-opt-in-05.txt
2002-11-06
04 (System) New version available: draft-ietf-dnsext-dnssec-opt-in-04.txt
2002-10-14
03 (System) New version available: draft-ietf-dnsext-dnssec-opt-in-03.txt
2002-07-01
02 (System) New version available: draft-ietf-dnsext-dnssec-opt-in-02.txt
2001-11-02
01 (System) New version available: draft-ietf-dnsext-dnssec-opt-in-01.txt
2001-06-26
00 (System) New version available: draft-ietf-dnsext-dnssec-opt-in-00.txt