Re: [DNSOP] Martin Duke's Discuss on draft-ietf-dnsop-avoid-fragmentation-16: (with DISCUSS and COMMENT)

2024-02-29 Thread Kazunori Fujiwara
I made a mistake in my previous mail. > From: Kazunori Fujiwara > Sorry for too late reply. > Authors submitted -17 today. > >> From: Martin Duke via Datatracker >> Date: Tue, 02 Jan 2024 11:44:09 -0800 > >> Martin Duke has entered the following ballot position for >> draft-ietf-dnsop-avoid-fr

Re: [DNSOP] Martin Duke's Discuss on draft-ietf-dnsop-avoid-fragmentation-16: (with DISCUSS and COMMENT)

2024-02-29 Thread Kazunori Fujiwara
Sorry for too late reply. Authors submitted -17 today. > From: Martin Duke via Datatracker > Date: Tue, 02 Jan 2024 11:44:09 -0800 > Martin Duke has entered the following ballot position for > draft-ietf-dnsop-avoid-fragmentation-16: Discuss > > When responding, please keep the subject line int

Re: [DNSOP] [Ext] About key tags

2024-02-29 Thread Dave Lawrence
Mark Andrews writes: > Ed, your reasoning is off. The point of forbidding is to allow the > validator to safely stop as soon as possible when it is under > attack. Uh? Why can't any DNS server safely stop as soon as possible when it is under attack? Count me in the "we don't need a protocol cha

Re: [DNSOP] I-D Action: draft-ietf-dnsop-avoid-fragmentation-17.txt

2024-02-29 Thread Kazunori Fujiwara
Dear dnsop WG, Authours submitted avoid-fragmentation-17 following comments from IESG review. > Internet-Draft draft-ietf-dnsop-avoid-fragmentation-17.txt is now available. > It is a work item of the Domain Name System Operations (DNSOP) WG of the IETF. > > https://datatracker.ietf.org/doc/draft

[DNSOP] I-D Action: draft-ietf-dnsop-avoid-fragmentation-17.txt

2024-02-29 Thread internet-drafts
Internet-Draft draft-ietf-dnsop-avoid-fragmentation-17.txt is now available. It is a work item of the Domain Name System Operations (DNSOP) WG of the IETF. Title: IP Fragmentation Avoidance in DNS over UDP Authors: Kazunori Fujiwara Paul Vixie Name:draft-ietf-dnsop-avoid

Re: [DNSOP] [Ext] About key tags

2024-02-29 Thread Arnold DECHAMPS
How much would those "unnecessary expensive validations attempts" cost with modern hardware? Is it still a concern enough that they justify continuing using those tags instead of the full key? Wouldn't that limit the risk of collision? Regards, Arnold Dechamps So, I am the person who added

Re: [DNSOP] [Ext] About key tags

2024-02-29 Thread Paul Wouters
> On Feb 29, 2024, at 07:52, Edward Lewis wrote: > (If no action is taken, malicious activity might follow now that it is > described, but I have not heard of a historical case of it.) This attack was more or less described five year ago: https://essay.utwente.nl/78777/ They didn’t get to

Re: [DNSOP] [Ext] About key tags

2024-02-29 Thread Ted Lemon
I think it might be worth distinguishing between caching validators and end validators. For an end validator, doing a second validation is not going to be a serious issue. The Apple DNSSEC validator currently does not allow key tag collisions at all, but it's not yet in heavy use so I wouldn't want

Re: [DNSOP] [Ext] About key tags

2024-02-29 Thread Edward Lewis
From: DNSOP on behalf of Shumon Huque Date: Wednesday, February 28, 2024 at 16:22 To: Edward Lewis Cc: John Levine , "dnsop@ietf.org" Subject: Re: [DNSOP] [Ext] About key tags >… I think writing a BCP telling folks how to avoid collisions would make sense >though (and yes, it needs to cover

Re: [DNSOP] [Ext] About key tags

2024-02-29 Thread Joe Abley
Op 29 feb 2024 om 09:35 heeft Ralf Weber het volgende geschreven: > Bind and and other servers (egg Akamai Cacheserve) already stop/fail when > having more then two keys with a colliding key tag today. I think what at > least I want is that every key a validator has to consider has a unique k

Re: [DNSOP] [Ext] About key tags

2024-02-29 Thread Ralf Weber
Moin! On 28 Feb 2024, at 22:44, John R Levine wrote: > On Thu, 29 Feb 2024, Mark Andrews wrote: >>> If it is forbidden in the protocol, it might still happen. >> >> Ed, your reasoning is off. The point of forbidding is to allow the >> validator to safely stop as soon as possible when it is unde