# DNS Operations (DNSOP) Working Group ## interim-2022-dnsop-01 ### Chairs * Benno Overeinder [benno@nlnetlabs.nl](benno@nlnetlabs.nl) * Suzanne Woolf [suzworldwide@gmail.com](suzworldwide@gmail.com) * Tim Wicinski [tjw.ietf@gmail.com](tjw.ietf@gmail.com) ### IESG Overlord * Warren Kumari [warren@kumari.net](warren@kumari.net) ### Document Status * [Github](https://github.com/ietf-wg-dnsop/wg-materials/blob/main/dnsop-document-status.md) * [Datatracker](https://datatracker.ietf.org/wg/dnsop/documents/) * [Propose Slides](https://datatracker.ietf.org/meeting/interim-2022-dnsop-01/session/dnsop) ## Session interim-2021-dnsop-03 * Date: 24 May 2022 * Time: 17:00-18:00 UTC * MeetEcho: [https://meetings.conf.meetecho.com/interim/?short=45d75893-b015-4b13-b835-204c9de2b003](https://meetings.conf.meetecho.com/interim/?short=45d75893-b015-4b13-b835-204c9de2b003) * Jabber: [dnsop@jabber.ietf.org](dnsop@jabber.ietf.org) * Minutes: [https://notes.ietf.org/notes-ietf-interim-2022-dnsop-01-dnsop](https://notes.ietf.org/notes-ietf-interim-2022-dnsop-01-dnsop) * Minutes: [https://github.com/ietf-wg-dnsop/wg-materials/blob/main/interim-2022-dnsop-01/dnsop-interim-2022-01-minutes.md](https://github.com/ietf-wg-dnsop/wg-materials/blob/main/interim-2022-dnsop-01/dnsop-interim-2022-01-minutes.md) ## Agenda ### Administrivia * Agenda Bashing, Blue Sheets, etc, 10 min ### Current Working Group Business * DNSSEC Automation - https://datatracker.ietf.org/doc/draft-wisser-dnssec-automation/ - Ulrich Wisser and Shumon Huque, 25 min - Chairs Action: ksk/zsk working but need more explicit handling of CSK basic working of algorithms. but work through implementation pieces Currently has an implementation that works with dynamic updates and an interface with deSEC is in development. * Automatic DNSSEC Bootstrapping using Authenticated Signals from the Zone's Operator, - https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-bootstrapping/ - Peter Thomassen and Nils Wisiol, 25 min - Chairs Actions: https://blog.apnic.net/2022/03/08/authenticated-bootstrapping-of-dnssec-delegations/ several implementations done or in progress three issues * Issue 1: operator be required to serve bootstrapping issues for all domains? Ben Schwartz(BS): Should not be required and wrong technically Peter Thomassen(PT): maybe a political requirement Wes Hardaker: Should not unless we have a good reason BS: Do all nameserver operators of a zone must participate? PT: Only needed for the first time. If domain is insecure and multi provider, draft currently says all name servers serve bootstrapping records. * Issue 2: do we need an IANA action? Benno: Many +1 in chat to IANA action. * Issue 3: Delegations within a bootstrapping zone Solution Options 1. different record type 2. hashed naming scheme (ruled out) 3. bootstrap under \_dsauth 4. disallow CDS/CDNSKEY usage for subzone rollover 5. disallow zone cuts underneath \_dsauth 6. underscore prefix for actual signal Peter van Dijk: for No 3 - How would you know if something is the leaf domain or not? BS: can we say records carry both semantics? Can we demand they are the same? PT: They will have different cds records John Levine: Corner Case but leans toward #5 PT: people think of #6 ? PT: Easy to add new record types Nils: Ben's comment from chat - #6 needs it's own #5, strong argument. Warren Kumari: Burning code points using #1. Roger Murray: Will differences between 1 and 6 affect the scanning. Personally like #1, but maybe sending more queries. ``` [16:57:19] I was thinking some salsa maybe.... [16:57:28] something would be nice.. [16:57:42] testing (to see if input from this side of the old matrix.org integration still works) [16:57:53] it does seem to [16:57:55] or someone just breathing into a mic so we know audio works. ;) [16:59:14] I have the church bells on the hour. [16:59:16] :smiley: [16:59:48] all audio sounds bad to me [17:00:07] maybe warrens poor audio was echoing from tim [17:00:17] Tim is ruining all audio, I think (seriously) when unmuted [17:00:20] Benno sounds good [17:00:22] right [17:00:33] so I should not present then ! [17:00:46] Love the meetecho cross site scripting attack when you are not yet logged into the datatracker when going to the meetecho link [17:01:18] the conundrum of being impressed or scared.. ;) [17:01:26] Had to open a tab manually and login then go to meetecho link [17:02:14] Tim's audio is still pretty bad [17:02:25] yes [17:02:57] Thanks for letting me know - I had some real pokey connections to meetecho [17:03:26] (i now owe Peter and Vladimir a drink for getting me out of the speaking!) [17:03:38] Taking minutes in https://notes.ietf.org/notes-ietf-interim-2022-dnsop-01-dnsop?edit [17:04:34] My sound check was fine but I can't get the speaker to switch to my headset....first problem I can remember with meetecho [17:05:18] fwiw, my draft got here via dispatch not secdispatch (though IMO there's too much dispatchery in general:-) [17:05:35] Meetecho has generally worked well for me - using Edge on Windows 10 [17:05:42] Stephen, my mistake, sorry [17:05:49] no probs [17:10:02] Ulrich - could you mute [17:10:17] Much better. [17:13:15] Suggestion - add an Implementation Section in the Appendix [17:14:15] oh wait now I see it in #8 [17:14:41] feel free to contact me or Johan if anyone has any questions or comments. [17:14:54] audio is cursed today [17:14:57] Thanks Roger/Johan [17:16:23] Thank you! I have to leave, sorry [17:16:29] thanks Ulrich! [17:16:31] Thanks Ulrich! [17:19:58] https://blog.apnic.net/2022/03/08/authenticated-bootstrapping-of-dnssec-delegations/ [17:22:46] +1 to ben - saying REQUIRED there seems unnecessary and wrong technically [17:24:36] I tend to setup new zones with both external and in-balliwick NSes so also wondered about Ben's question [17:26:14] yes, reserve _dsauth [17:26:22] +1 [17:26:24] +1 [17:26:26] +1 [17:26:35] _domainkey is intermediate too, etc. etc. [17:26:41] We can help Peter [17:26:45] Registry policy for https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#underscored-globally-scoped-dns-node-names is expert review [17:26:53] I can help with IANA text. [17:26:54] One of the experts s here :-) [17:28:10] Frederico A C Neves, Paul Wouters [17:28:31] Yep thanks [17:28:32] Paul is my Expert [17:28:54] Yes i can help [17:29:20] iPhone meetecho client is …. Not easy [17:33:40] Thanks Paul! [17:39:32] my audio is not working [17:39:40] i'll go to the list later [17:39:57] Peter: Have you clicked the mic icon? [17:40:00] ok - number 3, I don't get it. How would you know if something is the leaf domain or not? [17:40:02] Ben, I did! [17:40:21] Meetecho then showed a popup saying it could not hear me. It did work right here 45 minutes ago [17:40:49] 1. sounds easiest to me. [17:40:49] ok, thanks! [17:40:54] @PVD Local muting button on your mic? [17:41:17] Andrew, that would be news! I'll debug later :) [17:42:17] It would be helpful to me if we had some examples with all records [17:44:15] Why do they need to be enumerated? [17:44:45] Vladimir, 1 may be easy now but 6 would generalize easier (lets say you want signal DNSKEYs). [17:45:09] #5 seems reasonable to me [17:45:23] #6 seems more general [17:45:28] 6 just feels wrong, no objective argument [17:45:29] Not opposed to #6 but it seems like solving a non problem [17:45:46] Does #6 actually solve the problem? [17:45:59] 6 solves the problem if a domain name does not contain _signal or _dsauth [17:46:01] What if _dsauth is actually the apex of another zone? [17:46:08] Yes, can’t zone cut at non hostname [17:46:13] we had a similar discussion in the dns error reporting draft, where these sentinels on both sides turned out to not solve things [17:46:42] Oh wait yes you can [17:46:53] you can zone cut at any non-escaped period [17:47:08] #1 is easier to communicate and avoids risks of confusion with cds/cdnskey as used to [17:47:10] So I think #6 needs its own version of #5 [17:47:14] today [17:47:17] or #3 [17:47:51] cds/cdnskey deployment has been slow [17:48:49] No hats : I think 1 is cleanest... [17:49:29] I missed what the downside to #1 is, other than burning codepoints... [17:51:30] Thanks [17:52:27] The other concern I have about this issue is that the mechanics are getting complicated, we will need very precise language around them [17:53:36] Implementing a new RRtype that's a copy of another one should be easy, surely. And only parties interested in this bootstrapping will need it, I believe. [17:53:38] yes - 1 is simple [17:53:46] Vladimir, yes [17:53:57] Will add jabber log to minutes [17:54:30] Stephen, are you ready to go next? [17:54:35] (Though I can't estimate what kind of other signalling and thus types might be useful in future.) [17:54:36] sure [17:57:41] For the record, I hope the answer is not no. I hope it's yep we know about this and can provide useful innpuit. [17:58:24] Note that this not needed for an ordinary HTTP CDN [17:59:12] Thanks Ben [17:59:57] If there was only a TLS chair in this meeting... [18:00:31] My comment from the mail included: "to my mind that makes it seem much more like it should be adopted in something like TLS, with some input / review from DNSOP / HTTPBIS…" [18:01:15] +1 on the format [18:01:18] yeah warren's correct as always:-) [18:01:20] I want to thank everyone! [18:01:30] Thank you to the chairs that make it happening [18:01:44] @sftd: "vaya con dios" :-P [18:02:12] thanks! ```