Thanks Suresh..

Authors, any ETA on when the revs that addresses Suresh's and EKR's Discusses?

Cheers
Terry

On 8/06/2017, 4:42 AM, "iesg on behalf of Suresh Krishnan" 
<[email protected] on behalf of [email protected]> wrote:

    Hi Stephane/Sara,
      I will be happy with either of your text proposals as they certainly 
clarify things for me.
    
    Regards
    Suresh
    
    > On Jun 7, 2017, at 6:57 PM, Sara Dickinson <[email protected]> wrote:
    > 
    > 
    >> On 6 Jun 2017, at 19:55, Suresh Krishnan <[email protected]> 
wrote:
    >> 
    >> Hi Stephane,
    >>> 
    >>> It seems there was no reply to this DISCUSS?
    >> 
    >> Yes. There was no response to this DISCUSS.
    > 
    > Apologies, I indirectly responded to a similar comment another review (in 
that we would need to update the text given that there were several comments on 
it) but hadn’t proposed any new text. The revised I-D is still being worked on.
    > 
    > 
    >> On 6 Jun 2017, at 20:21, Stephane Bortzmeyer <[email protected]> wrote:
    >>> 
    >>> The strict profile requires the DHCP server to be “secure and
    >>> trustworthy” but declines to define what it means by “secure and
    >>> trusted”. So I cannot tell if it requires anything from current DHCP
    >>> servers or not.
    > 
    > Stephane was correct in that this section was not requesting or proposing 
anything specific with regard to DHCP, only outlining a potential future use 
case. 
    > 
    > I have proposed some minor modifications to Stephane’s text below which 
could make this even clearer, however if this isn’t sufficient then I think 
moving this to an appendix would be the best option. 
    > 
    > Sara. 
    > 
    > 
    > 
    >> Proposal for a new 7.3:
    > 
    > 7.3 No configuration - dynamic discovery of ADN 
    > 
    > This section discusses the general case of a DNS client discovering both 
the authentication domain name and IP address dynamically. This is not possible 
at the time of writing by any standard means. However since, for example, a 
future DHCP extension could (in principle) provide this mechanism the required 
security properties of such mechanisms are outlined here. 
    > 
    > When using a Strict profile the dynamic discovery technique used as a 
source of authentication domain names MUST be
    > considered secure and trustworthy. This requirement does not apply when 
using an Opportunistic profile given the
    > security expectation of that profile. 
    > 
    > 7.3.1 DHCP
    > 
    > In the typical case today, a DHCP server [RFC2131] [RFC3315] provides a 
list
    > of IP addresses for DNS resolvers (see section 3.8 of [RFC2132]), but
    > does not provide a domain name for the DNS resolver, thus preventing
    > the use of most of the authentication methods described here. (All
    > those that are based on a mechanism with ADN in table 2.)
    > 
    > This document does not specify or request any DHCP extension to provide 
authentication domain names. However, if one is developed in future work the 
issues outlined in section 8 of [RFC7227] should be taken into account as 
should the Security Considerations in section 23 of [RFC3315]) . 
    > 
    > This document does not attempt to describe secured and
    > trusted relationships to DHCP servers, which is a purely DHCP
    > issue (still open, at the time of writing.)  Whilst some
    > implementation work is in progress to secure IPv6 connections for
    > DHCP, IPv4 connections have received little to no implementation
    > attention in this area.
    > 
    > 
    > 
    > 
    
    

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to