All
The minutes for both sessions have been uploaded, with many thanks to Paul
Hoffman.
Please take a moment to look them over, and if you made a comment, that
your comments were transcribed accurately.
https://www.ietf.org/proceedings/108/minutes/minutes-108-dnsop-00.txt
Please send any corrections or updates to the chairs
thanks
tim
<https://github.com/DNSOP/wg-materials/blob/master/dnsop-ietf108/dnsop-ietf108-minutes.txt>
DNS Operations (DNSOP) Working Group
IETF 108
29 July 2020
Sessions 1 and 2
Tim Wicinski, Suzanne Woolf, Benno Overeinder
Minutes by Paul Hoffman
Only things that are said at the mic line noted, not text from the slides
Administrivia
Normal review of old work, preview of new work
Is thinking of opening tup discussion of terminology
Fragmentation Avoidance in DNS, draft-ietf-dnsop-avoid-fragmentation
Kazunori Fujiwara
No comments came from the floor
Service binding and parameter specification via the DNS,
draft-ietf-dnsop-svcb-https
Ben Schwartz
Ready for WG Last Call
Benno: Are you coordinating interop testing, or should the chairs?
Ben: Authors have not done any yet, want advice on how that should work
Range of implementors that are known
Benno: Will mobilize developers for WG Last Call
Suzanne: Need adequate cross-area review
Ben: Implications go up to the application area
Tommy Pauly: Apple has an implementation of this
Actively in beta, but not all features currently
Some networks don't play well with new RRtypes
Allison Mankin: Impressed with progress
Hoping that the interop testing focuses on large DNS providers
Salesforce will try to encourage among their vendors
Benno: Interop before WG Last Call
Suzanne: Want more WG review now, don't wait for WG Last Call
The DELEGATION_ONLY DNSKEY flag, draft-ietf-dnsop-delegation-only
Paul Wouters
No comments from the floor
Benno: Would like to see more feedback from the WG
PaulW: Got private feedback that there is interest
Parameterized Nameserver Delegation with NS2 and NS2T, draft-tapril-ns2
Tim April
PaulH: Need to coordinate across WGs
Peter van Dijk: Has different draft in DPRIVE
Ben: Also overlaps with "adaptive DNS" proposal in ADD
Would like to see them all, maybe combined
Sam Weiler: Have you thought of the processing rules if it is only in
the parent?
Tim: Authoritative in the child
Jim Reid: Would be better to settle on one WG to deal with this
Suzanne: There should be one place
Puneet Sood: In Section 3.1, the EDNSO size is in conflict with current
proposals
Should try to keep to a minimum how much information goes into
the records
Ben: Doesn't need to take this down to one draft
PaulH: Please look at these as use cases, not drafts
Benno: Will coordinate with other WGs
Initializing a DNS Resolver with Priming Queries, draft-klh-dnsop-rfc8109bis
Paul Hoffman
No questions from the floor
The chairs tested the hum tool
Hum for adoption: strong
Hum against adoption: weak
Wes Hardaker: It is not clear if people who don't hum count as humming
weakly
Revised IANA Considerations for DNSSEC, draft-hoffman-dnssec-iana-cons
Paul Hoffman
Sam: S/MIME and TLS are end-to-end, DNSSEC is in the middle
IPsec is similar
Viktor Dukhovni: Agree with Sam about importance of the middle
Ben: Not a strong feeling
TLS ciphersuites are larger spaces
TLS client certificate types, also single octet, might also be
relevant
PGP has IETF review
Fairly diverse range of practices
Jim Reid: should adopt, make similar to other WGs
Needs to be more flexible
Should add mandatory or optional to implement
Ondřej Surý: Camel issues
Interop is more important in DNSSEC than in TLS world
Clients and servers are upgraded more slowly
Should be careful about relaxing the requirement
Maybe want guidance from CFRG before we accept new algorithms
Warren Kumari: standards track feels like endorsing
Likes RFC required
Still needs to go through a process
Some TLS registries has notes in them
Interop is important, which argues for why we should make the
registry easier to get into
Mike St Johns: point-to-multipoint system
Could have different policies for TSIG
How do we get/maintain interop?
National crypto should be second signature on standard crypto
Valery Smyslov: In favor of adoption to make more consistent
Will not place high bar so national crypto can get code points
without too much dificulty
Daniel Kahn Gilmore: Using PGP and TLS as examples is bad because they
have negotiation
Want a minimum number of ciphersuites for DNS
Benno: good discussion here and on mailing list
DNS Access Denied Error page, draft-reddy-dnsop-error-page
Tirumaleswar Reddy
Ben: This is not a good use of the HTTPS record type
HTTPS is a way to reach the page
Not compatible with DNSSEC if there is a validating stub answer
Restrictions might not be implementable in web browsers
Even then, not actually safe due to phishing
Tiru: that's why it has to be a trusted DoH or DoT server
Jim: Breaks the DNS protocol because the answer is not what the client
asked
Tiru: comes in the Additional section
And only comes with extended error codes
Jonathan Reed: Appreciates a draft that helps end users despite
implementation concerns
Wes Hardaker: This is not safe even if it is a trusted DoH or DoT
Allows malicious ISPs who have MITMs
Tiru: must be a trusted DoH or DoT
Erid Orth: General support for solving this problem
We can't trust this protocol as-is
Bad idea to do anything for forging results
Maybe put in EDNS0
Warren: No hats, hate the idea of DNS filtering, so we need a way to
make it as non-harmful as possible
Needs signals from the browser to the users if something like
this is done
Needs input from browser vendors first
Eric Rescorla: Doesn't think Firefox would be interested to this
Wants to keep the interface to themselves, not to farm it out
to resolvers
Trusted resolvers are trusting with user data, not with the data
Viktor: The Additional section is OK
DoT resolver often makes unauthenticated requests and creates
false sense of security
464XLAT/NAT64 Optimization, draft-ietf-v6ops-464xlat-optimization
Jordi Palet Martinez
Work in V6OPS WG that relates to DNSOP
Please have the discussion in V6OPS, not in DNSOP
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop