Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-05-01 Thread S Moonesamy
? This is the list of TLDs affected: [snip] int.(international orgs - important) Matters related to int. are discussed in RFC 9121. It's a good idea to get some data. It's not a good idea to take a decision by fiat on matters directly related treaty-based organizations. Regards, S. Moonesamy

[DNSOP] Comments on draft-hardaker-dnsop-must-not-ecc-gost-00

2024-04-29 Thread S Moonesamy
information in the draft about those various forms of attacks. Is that like someone the audience (of the draft) is expected to know after reading the eight RFCs which are referenced by the draft? :-) Appendix C has a reference to draft-hardaker-dnsop-must-not-sha1 instead of this draft. Regards, S

Re: [DNSOP] [Ext] on private use TLDS: .interNAL -> .LAN

2024-03-06 Thread S Moonesamy
those recommendations. The IETF angle is that there is a Standards Track memo which specified what to do when special handling of a DNS label is required. Regards, S. Moonesamy ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo

Re: [DNSOP] Call for Adoption: draft-belyavskiy-rfc5933-bis

2020-06-18 Thread S Moonesamy
ll-written. It probably needs some work before it is ready for a Last Call. I suggest consideration what to do about RFC 5933 given that the intended status of the document. Regards, S. Moonesamy 1. The Security Area Directors will likely ask whether the document was reviewed by the relevan

Re: [DNSOP] Call for Adoption: draft-arends-private-use-tld

2020-06-14 Thread S Moonesamy
policies for the DNS Root Zone? Regards, S. Moonesamy ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] Client Validation - filtering validation?

2020-04-28 Thread S Moonesamy
it stalled in DNSOP. There is also a 2018 draft (expired). I vaguely recall looking at a draft. However, proposed changes were not accepted. Regards, S. Moonesamy ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo

Re: [DNSOP] Protocol Action: 'Moving DNSSEC Lookaside Validation (DLV) to Historic Status' to Proposed Standard (draft-ietf-dnsop-obsolete-dlv-02.txt)

2020-03-25 Thread S Moonesamy
RFCs [1][2] as "Informational". Regards, S. Moonesamy 1. https://www.rfc-editor.org/info/rfc4431 2. https://www.rfc-editor.org/info/rfc5074 ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] RFC 1035 vs. mandatory NS at apex?

2019-02-08 Thread S Moonesamy
". I suggest taking into consideration that RFC 1035 is part of STD 13 for errata processing. Regards, S. Moonesamy ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dns-capture-format

2018-07-07 Thread S Moonesamy
is the IPR issue? Regards, S. Moonesamy ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] Extended CNAME (ENAME)

2014-05-21 Thread S Moonesamy
Hi John, At 10:43 21-05-2014, John Levine wrote: See RFC 1123, section 5.2.2. Tony Finch already commented about RFC 1123. That section has been replaced (see RFC 5321). Section 8.7 of RFC 6409 is applicable for mail submission and CNAME. Regards, S. Moonesamy

Re: [DNSOP] Last Call: draft-ietf-dnsop-delegation-trust-maintainance-13.txt (Automating DNSSEC Delegation Trust Maintenance) to Informational RFC

2014-05-20 Thread S Moonesamy
. What does the above have to do with Security Considerations? How many of the DNSSEC-related outages are due to human error? Regards, S. Moonesamy ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] call to work on edns-client-subnet

2014-05-16 Thread S Moonesamy
. It is worthwhile to consider whether the mechanism should be standardized by the IETF. Regards, S. Moonesamy ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] call to work on edns-client-subnet

2014-05-16 Thread S Moonesamy
Hi Ted, At 04:56 16-05-2014, Ted Lemon wrote: Did you feel that your comments were adequately addressed by the working group? I gave up on reading the first response to my comments as I did not want to push back strongly; it's an effort and it can be viewed as antagonistic. Regards, S

Re: [DNSOP] Current DNSOP thread and why 1024 bits

2014-04-02 Thread S Moonesamy
to NIST SP 800-78. That document is about Cryptographic Algorithms and Key Sizes for Personal Identity Verification. Is that the NIST recommendation on which this discussion is based? Regards, S. Moonesamy ___ DNSOP mailing list DNSOP@ietf.org

Re: [DNSOP] Current DNSOP thread and why 1024 bits

2014-04-02 Thread S Moonesamy
if that will happen given the track record, but that is the roadmap. Thanks for the above information. Adding to it, 1024-bit RSA keys are allowed until 2015. There is an explanation about that recommendation, i.e. it's not only about packet size. Regards, S. Moonesamy

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-04-01 Thread S Moonesamy
the outcome of the Rollover consultation. Regards, S. Moonesamy 1. To date, despite huge efforts, no one has broken a regular 1024-bit key; in fact, the best completed attack is estimated to be the equivalent of a 700-bit key. An attacker breaking a 1024-bit signing key would need to expend