Re: [DNSOP] updated to draft-wing-dnsop-structured-dns-error-page-01

2021-11-10 Thread Petr Špaček
On 14. 10. 21 19:36, Dan Wing wrote: We recently published -01 of Structured Data for Filtered DNS based on WG feedback from IETF 111. We also incorporated both motivational and normative text from draft-reddy-dnsop-error-page. New version at:

Re: [DNSOP] draft-moura-dnsop-negative-cache-loop

2021-11-10 Thread Petr Špaček
On 10. 11. 21 10:31, Giovane C. M. Moura wrote: Ad the draft content: 2.  Past solutions This section somehow does not mention RFC 2308 section 7.1 which solves most of the problem if implemented. In fact BIND has an implementation of it and is not vulnerable to the TsuNAME attack (or at

Re: [DNSOP] [DNSSEC-Bootstrapping] Fwd: New Version Notification for draft-thomassen-dnsop-dnssec-bootstrapping-02.txt

2021-11-10 Thread Christian Elmerot
Coming a bit late to the discussion On 2021-11-09 22:53, Paul Wouters wrote: On Tue, 9 Nov 2021, Peter Thomassen wrote: Let's consider the bootstrapping namespace under _boot.ns1.desec.io. There would usually be NS/DS records at this name. However, it should be possible to introduce zone

Re: [DNSOP] Status of draft-ietf-dnsop-dns-error-reporting

2021-11-10 Thread Roy Arends
> On 10 Nov 2021, at 09:35, libor.peltan wrote: > > Hi Roy, > >> Change 2) There was an observation by developers that some authoritative >> servers do not parse (unknown) EDNS0 options correctly, leading to an >> additional roundtrip by the resolver. It was suggested that authoritative >>

Re: [DNSOP] draft-moura-dnsop-negative-cache-loop

2021-11-10 Thread Giovane C. M. Moura
Thanks Ralf, > I fully agree here. Most of the current or older implementations > solve this by resource limiting and had no problem with tsuName. Only > some new cloud implementations had a problems. So please don’t > require those that had working mitigations to change them. Well, not only

Re: [DNSOP] Status of draft-ietf-dnsop-dns-error-reporting

2021-11-10 Thread libor.peltan
Hi Roy, Change 2) There was an observation by developers that some authoritative servers do not parse (unknown) EDNS0 options correctly, leading to an additional roundtrip by the resolver. It was suggested that authoritative servers could return the new EDNS0 option “unsolicited”. This is

Re: [DNSOP] draft-moura-dnsop-negative-cache-loop

2021-11-10 Thread Giovane C. M. Moura
Thanks a lot, Petr. > > If I understand this correctly, TL;DR summary essentially is > """ make https://datatracker.ietf.org/doc/html/rfc2308#section-7.1 > mandatory """ > (even though your version is a bit stronger). Is that correct? > Thanks for pointing to this section. We missed it. We