Re: [DNSOP] [DNSSEC-Bootstrapping] Fwd: New Version Notification for draft-thomassen-dnsop-dnssec-bootstrapping-02.txt

2021-11-08 Thread Peter Thomassen
On 11/9/21 3:29 AM, Paul Wouters wrote: - IPv6 reverse DNS hostnames (under ip6.arpa.) already have length 73. But would they hit 255 ? No, this was only an illustration: Had there been some standard which prevented such long names, then IPv6 reverse DNS names would not have been possible.

Re: [DNSOP] Fwd: New Version Notification for draft-thomassen-dnsop-dnssec-bootstrapping-02.txt

2021-11-08 Thread Paul Wouters
On Tue, 9 Nov 2021, Peter Thomassen wrote: This draft introduces automatic bootstrapping of DNSSEC delegations. It uses an in-band method for DNS operators to publish information about the zones they host, per-zone and with authentication. With this protocol, DS provisioning can happen

Re: [DNSOP] Benjamin Kaduk's Discuss on draft-ietf-dnsop-dns-tcp-requirements-13: (with DISCUSS and COMMENT)

2021-11-08 Thread Joe Abley
On Nov 8, 2021, at 17:35, Wessels, Duane wrote: > Is this better? > > The use of TLS places even stronger operational burdens on DNS > clients and servers. Cryptographic functions for authentication and > encryption requires additional processing. Require, not requires. I know, I know.

Re: [DNSOP] nsec3-parameters opinions gathered

2021-11-08 Thread Paul Wouters
On Mon, 8 Nov 2021, Viktor Dukhovni wrote: These points make a good starting point for a draft recommending to not use NSEC3: * Accept that sufficiently determined adversaries will mount a dictionary attack, but there won't be many of them. Make do with NSEC3 and zero iterations. * Accept

Re: [DNSOP] nsec3-parameters opinions gathered

2021-11-08 Thread Viktor Dukhovni
> On 8 Nov 2021, at 12:55 pm, A. Schulze wrote: > > sorry for maybe asking an already answered question, > but why is NSEC3 considered to have no benefit at all? My take is that NSEC3 provides little benefit beyond the initial (0th) iteration. > I'm still on "NSEC allow zone-walks while NSEC3

Re: [DNSOP] nsec3-parameters opinions gathered

2021-11-08 Thread A. Schulze
Am 05.11.21 um 20:19 schrieb Olafur Gudmundsson: > The document should strongly discourage any use of NSEC3 Hello, sorry for maybe asking an already answered question, but why is NSEC3 considered to have no benefit at all? I'm still on "NSEC allow zone-walks while NSEC3 don't" At least

Re: [DNSOP] nsec3-parameters opinions gathered

2021-11-08 Thread Viktor Dukhovni
> On 8 Nov 2021, at 6:07 am, Petr Špaček wrote: > > TL;DR > I say we should go for 0 and acknowledge in the text we are not there yet. This means reaching out to the TLD operators again... They were quite cooperative ~6 months back, but I wouldn't want to take them for granted and keep asking

Re: [DNSOP] [Ext] nsec3-parameters opinions gathered

2021-11-08 Thread Paul Vixie
Paul Hoffman wrote on 2021-11-08 08:13: On Nov 8, 2021, at 5:45 AM, Wes Hardaker wrote: ... How do you think we should specifically change that text? Instead of "low iterations count", maybe "low iterations count (preferably 0)"? +1. i suggest we also add text stating that an iteration

Re: [DNSOP] [Ext] nsec3-parameters opinions gathered

2021-11-08 Thread Paul Hoffman
On Nov 8, 2021, at 5:45 AM, Wes Hardaker wrote: > > Folks, can we boil this down to a concrete suggestion. Section 3.1 > already says this: > > First, if the operational or security features of NSEC3 are not > needed, then NSEC SHOULD be used in preference to NSEC3. NSEC3 > requires

Re: [DNSOP] nsec3-parameters opinions gathered

2021-11-08 Thread Wes Hardaker
Miek Gieben writes: > [ Quoting in "Re: [DNSOP] nsec3-parameters opinio..." ] > >The document should strongly discourage any use of NSEC3 > > I would very much see a sentence/paragraph stating this in the > document as well. Folks, can we boil this down to a concrete suggestion. Section 3.1

Re: [DNSOP] nsec3-parameters opinions gathered

2021-11-08 Thread Wes Hardaker
Petr Špaček writes: Thanks for the detail notes Petr, very helpful. > From my point of view the RFC does not need to stick to the value > currently implemented in resolvers. Good point, and maybe the right phrasing I should have used should have been "what value would implementations refuse to

Re: [DNSOP] nsec3-parameters opinions gathered

2021-11-08 Thread Petr Špaček
On 08. 11. 21 9:34, Matthijs Mekking wrote: I concur with Benno. For Bind 9, there is no technical challenge to set the iteration cap at a lower value. We prefer the value to be as low as possible, because it adds no real value at a real resource cost. But we will likely not implement

Re: [DNSOP] nsec3-parameters opinions gathered

2021-11-08 Thread Matthijs Mekking
I concur with Benno. For Bind 9, there is no technical challenge to set the iteration cap at a lower value. We prefer the value to be as low as possible, because it adds no real value at a real resource cost. But we will likely not implement blindly a maximum that will cause lots of operational