Yep, we are in a much better position than we were in 2019. Most failures are well < 1% when talking to authoritative servers. Broken firewall defaults have been fixed and mostly deployed.
> On 27 Feb 2024, at 16:41, George Michaelson <[email protected]> wrote: > > so yet again, I voice things which show my ignorance, not yours. I > thank you for the gentle clue-stick hit, it was educational. > > -G > > On Tue, Feb 27, 2024 at 12:24 PM Shumon Huque <[email protected]> wrote: >> >> On Tue, Feb 27, 2024 at 12:01 AM Mark Andrews <[email protected]> wrote: >>> >>> >>>> On 27 Feb 2024, at 15:53, George Michaelson <[email protected]> wrote: >>>> >>>> Not in any way to stop this specific draft, I wonder if this is a more >>>> general principle of exercising code points which are not marked >>>> "never to be used" and should also be raised cross-area, or in another >>>> place? >>>> >>>> Maybe the best path is to get this proved here, and then embrace-extend. >>> >>> Sure there are a lot of places where this should be done. This is going >>> to cover DNS. >> >> >> Yup, and although Mark and I have been mulling this for DNS for a number >> of years now, the general principle has also been discussed elsewhere (see >> the references to greasing) and RFC 8701 describes greasing for TLS. >> >> We should track that work too, but this draft can focus on the DNS use case. >> >> Shumon. >> -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: [email protected] _______________________________________________ DNSOP mailing list [email protected] https://www.ietf.org/mailman/listinfo/dnsop
