On Mon, 7 Jul 2025, Willem Toorop wrote:

This draft came from the Poisonlicious hackathon project at the 
Netnod/DNS-OARC/RIPE-NCC DNS Hackathon that was held this spring in Stockholm. 
The -00 version was
posted by Stephane just after the hackathon, and this new version has (some) of 
the feedback on that processed.
I have been recruiting among the Open Source DNS Resolver vendors for 
co-authors, to warrant unanimity at least among some of the possible 
implementers, and I am
very happy to announce that I managed to persuade Ondřej Surý (ISC) and Otto 
Moerbeek (PowerDNS) to join.
We have been granted 10 minute agenda time in the 11:30 - 13:00 (CEST) DNSOP 
slot, and I am very much looking forward to present and discuss this idea then 
there.

Great :)

But :P

        The resolver must send only data that it is sure of (for instance
        by DNSSEC validation or because it came with the AA bit from
        the queried server). Since all of the network of resolvers are
        in the same organizational domain, they MUST agree on the same
        policy for this assessment.

Please also define a mode that does not have authentication, and that
only shares DNSSEC validatable data. This will allow for a pool.ntp.org
style cooperation of untrusted partners.

        The peer is not supposed to do DNSSEC validation (there is not
        always all the necessary data in the message).

Please allow for a mode that only sends complete RRsets with RRSIG, does
use validation and maybe even support RFC 7901 ?

The privacy considerations could mention adding some fuzz to TTL to try
and combat some fingerprinting of data/users.

Paul

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to