On Mon, 7 Jul 2025, Willem Toorop wrote:
This draft came from the Poisonlicious hackathon project at the Netnod/DNS-OARC/RIPE-NCC DNS Hackathon that was held this spring in Stockholm. The -00 version was posted by Stephane just after the hackathon, and this new version has (some) of the feedback on that processed. I have been recruiting among the Open Source DNS Resolver vendors for co-authors, to warrant unanimity at least among some of the possible implementers, and I am very happy to announce that I managed to persuade Ondřej Surý (ISC) and Otto Moerbeek (PowerDNS) to join. We have been granted 10 minute agenda time in the 11:30 - 13:00 (CEST) DNSOP slot, and I am very much looking forward to present and discuss this idea then there.
Great :) But :P The resolver must send only data that it is sure of (for instance by DNSSEC validation or because it came with the AA bit from the queried server). Since all of the network of resolvers are in the same organizational domain, they MUST agree on the same policy for this assessment. Please also define a mode that does not have authentication, and that only shares DNSSEC validatable data. This will allow for a pool.ntp.org style cooperation of untrusted partners. The peer is not supposed to do DNSSEC validation (there is not always all the necessary data in the message). Please allow for a mode that only sends complete RRsets with RRSIG, does use validation and maybe even support RFC 7901 ? The privacy considerations could mention adding some fuzz to TTL to try and combat some fingerprinting of data/users. Paul _______________________________________________ DNSOP mailing list -- dnsop@ietf.org To unsubscribe send an email to dnsop-le...@ietf.org