If there is concern and/or confusion on deploying DS automation, a document that makes recommendations and clarifications in order to ease the deployment path sounds like a good idea.

I started reading this draft and most of the recommendations make sense to me.

I do have an issue with the flow of the document. I have to switch back and forward for the recommendations in section 2 and the rationale in section 3. Personally I think it makes the document hard to access.

About the recommendations:

2.1.  Validity Checks and Safety Measures
   2.  Parent operators (such as registries) SHOULD reduce a DS record
       set's TTL to a value between 5–15 minutes when it is updated, and
       restore the normal TTL value at a later occasion (but not before
       the old DS RRset's TTL has expired).

I understand the logic behind this, but there are also child zone operators that rely on the DS TTL in rollovers. So lowering the TTL is great for quick rollback, but note that this not necessarily speed up the rollover. Not that this is mentioned in the document, but I thought it is worthwhile to point out.

Lowering the TTL is fine, but extending obviously is not. Again not that this is mentioned, just saying it out loud.


2.2.  Reporting
   3.  Notifications to humans SHOULD be done via email.  Child DNS
       operators SHOULD be notified using a report query [RFC9567] to
       the agent domain as described in
       ([I-D.ietf-dnsop-generalized-notify], Section 4).  The same
       condition should not be reported unnecessarily frequently to the
       same recipient.

Should "should not" be "SHOULD NOT" here?


About the rationale:

3.1.  Validity Checks and Safety Measures
There is a TODO in Section 3.1.1. that sounds like it could be a perfect "MAY" recommendation.


3.2.  Reporting
   A delegation can break even without an update request to the DS
   record set.  This may occur during key rollovers ([RFC6781],
   Section 4.1) when the Child DNS operator proceeds to the next step
   early, without verifying that the delegation's DS RRset is in the
   expected state.

This feels a bit hypothetical, perhaps even a bit fearmongering. The key rollover processes described in RFC 6781 clearly say that the child have to wait until the DS RRset has been updated before continuing. So I don't understand why this is used as an example here. You might as well say "this may occur because there was a bug".


   The same condition should not be reported unnecessarily frequently to
   the same recipient (e.g., no more than twice in a row).  For example,
   when CDS and CDNSKEY records are inconsistent and prevent DS
   initialization, the registrant may be notified twice.  Additional
   notifications may be sent with some back-off mechanism (in increasing
   intervals).

   The history of DS updates should be kept and, together with the
   currently active configuration, be made accessible to the registrant
   (or their designated party) through the customer portal available for
   domain management.

This looks like two recommendations that are in the wrong section (although I think it is better to group the rationale and recommendation together per subject). These two recommendations could use the RFC 2119 uppercase format "SHOULD" instead of the lowercase "should".


3.4.2.  Impact of Manual Updates

There are some advises in this section. Is this different than recommendations?

I guess the document could use a thorough pass if there are no recommendations hidden in the rationale part. Or don't split up the recommendations from the rationale.


Best regards,
Matthijs

On 30-04-2025 20:37, Peter Thomassen wrote:
Dear DNSOP,

There are a number of loose ends regarding CDS/CDNSKEY automation, and various implementers have made different choices. Examples are questions around validity checks, timing, error reporting, locks, etc.

Some gTLD registries have undertaken to deploy CDS automation [1], but ICANN has pointed out that these issues will first have to be resolved before DS automation will be allowed functionality in the gTLD space. This seems like a reasonable position for maximizing interoperability and minimizing surprise.

The insight about these concerns and the resulting "dependency" crystalized in consultations around the creation of SAC126 [2]. As a result, the report lists them; this draft now picks up the open issues and attempts to address them.

Looking forward to your feedback.

Best,
Peter

[1]: https://www.icann-hamster.nl/ham/soac/ssac/dnssec/icann76/4.5%20Bauland%20-%20CDNSKEY%20Support%20in%20TANGO%20Registry%20Services.pdf [2]: https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-126-16-08-2024-en.pdf


-------- Forwarded Message --------
Subject: New Version Notification for draft-shetho-dnsop-ds-automation-00.txt
Date: Wed, 30 Apr 2025 11:16:16 -0700
From: [email protected]
To: Peter Thomassen <[email protected]>, Steve Sheng <[email protected]>

A new version of Internet-Draft draft-shetho-dnsop-ds-automation-00.txt has
been successfully submitted by Peter Thomassen and posted to the
IETF repository.

Name:     draft-shetho-dnsop-ds-automation
Revision: 00
Title:    Best Practice Recommendations for DS Automation
Date:     2025-04-30
Group:    Individual Submission
Pages:    21
URL: https://www.ietf.org/archive/id/draft-shetho-dnsop-ds-automation-00.txt Status: https://datatracker.ietf.org/doc/draft-shetho-dnsop-ds-automation/ HTML: https://www.ietf.org/archive/id/draft-shetho-dnsop-ds-automation-00.html HTMLized: https://datatracker.ietf.org/doc/html/draft-shetho-dnsop-ds-automation


Abstract:

    Enabling support for automatic acceptance of DS parameters from the
    Child DNS operator (via RFCs 7344, 8078, 9615) requires the parent
    operator, often a registry or registrar, to make a number of
    technical decisions.  This document describes recommendations for new
    deployments of such DS automation.



The IETF Secretariat


_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to