Re: [DNSOP] Feedback on draft-koch-dnsop-resolver-priming

2007-05-10 Thread Paul Vixie
can someone who followed the POISED effort please explain IETF's policies
around restricted IPR?  i really feel a need to avoid poisoning my thinking
by accidentally reading somebody's draft that recommends restricted IPR.  we
already know that such drafts won't pass WGLC, and i'm a member of a largish
set of people who would lodge process complaints with IESG and/or IAB if such
a draft were to somehow sneak through WGLC.  so why isn't there a rule against
submitting drafts covered by restrictive IPR in the first place?

T-M's suggestions here follow his prior IPR attack in dnsext (TAKREM), and
it's just one stupid waste of time after another for all concerned.  the only
possible beneficiary of this waste is T-M himself, if he wants to be able to
show prior art during some later patent lawsuit.  there ought to be a rule
that IPR disclosures must accompany all proposals, including mailing list
posts, and the moderator ought to simply squash anything that's encumbered.
-- 
Paul Vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Feedback on draft-koch-dnsop-resolver-priming

2007-05-11 Thread Paul Vixie
 I think this is exactly the sort of thing the IPR RFC requires for accepting
 encumbered ideas. (Although the restriction to root zone operators is a bit
 troubling.)

yes.  (also, TAKREM was offered free for GPL implementators, and so, worthless.)

 Anyways, the basic idea is that there's no need to start the flame-fest /
 endless arguments until it looks like there is actually some support for the
 idea.

i'm trying to uplevel the argument.  can we make posting to ietf WG mailing
lists contingent on IPR disclosure, and can we make it a moderation principle
that IPR'd posts will simply not be published here, ever?

my concern is that T-M's encumbered proposals will remove certain approaches
from the table.  or that once we've all heard one of his ideas, he can claim
later that any similar ideas in our work product are based on his proposals.
this feels like a mental contamination strategy and i'm angry enough about
it by now that i'm willing to raise my hand and object, for once and for all.


___
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adopt draft-koch-dnsop-resolver-priming as WG work item?

2007-06-05 Thread Paul Vixie
[EMAIL PROTECTED] (Thierry Moreau) writes:

 This question is serious, to the extent that the DNSOP activities are 
 worth the effort devoted to it by participants. So let me re-prhase the 
 question (actually the question had two facets):
 
 Is this proposed wg activity open (i.e. The IETF has basic requirements 
 for open and fair participation and for thorough consideration of 
 technical alternatives. from RFC2418 section 3)?
 
 Is this proposed wg activity already limited by the message archived at 
 http://www1.ietf.org/mail-archive/web/dnsop/current/msg05460.html ?

i'm not a wgchair or anything, so this is just my opinion.  anyone who is
going to submit proposals for dns technology should not include encumbered
IPR.  if i can't implement an RFC in BSDL F/OSS, then it's a bad RFC.  if
folks can't fetch, compile, build, install, derive from, and make money
from the BSDL F/OSS that results from implementing an RFC, then it's a bad
RFC.  if i see a bad I-D then i will object to it becoming a bad RFC.

i think this means that the answer to t-m's questions amount to no even
though asullivan's answer (it depends) is probably more accurate.  t-m
has in the past said that he wants IETF to standardize encumbered IPR so
that he can make money from license fees paid by people who deploy it.  i
think that's offensive screwheadedness and i am opposed to it.
-- 
Paul Vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-ietf-dnsop-respsize-07

2007-06-06 Thread Paul Vixie
[EMAIL PROTECTED] (Andrew Sullivan) writes:

 I note that in section 2.2.3, we have this:

A zone's name servers should be reachable by all IP transport
protocols (e.g., IPv4 and IPv6) in common use.
 
 I have read differing opinions on whether it is better to have
 protocol-dedicated servers (on the grounds that it makes
 troubleshooting in a world of poorly implemented dual stacks easier)
 or to have all-protocol name servers.  I think therefore that the
 reasoning for the above claim should be spelled out in more detail.

what i meant was that a zone should have servers reachable by every
IP transport protocol in common use, in order that the zone be reachable
by all DNS initiators no matter what IP transport protocol they're using.

i can see that the writing as quoted above is sloppy, and doesn't say what
i thought it said, and i can clean it up if the WG thinks it's important.

 Other than that, I think this is a good and useful draft, and should
 be advanced.

me too!
-- 
Paul Vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adopt draft-koch-dnsop-resolver-priming as WG work item?

2007-06-09 Thread Paul Vixie
  Mr. Paul Vixie to ISC, and the subordination relationship that can be 
  inferred from Mr. Paul Vixie's position as ISC president.
 
 Paul has never tried to control what I do as DNSOP WG co-chair, and
 clearly understands the obligations that go with my position.  Paul also
 knows me well enough to know that I'd tell him to go to hell if he ever
 did try to keep me from performing my duty as I see it, but the issue has
 never come up and I don't expect it ever will.

assuming for a moment that because rob and i are in the same management
chain my instructions were ever different than use your own best
judgement even in matters internal to isc (which would indicate that i had
more time than i actually do, and that rob had more tolerance for
foolishness than he actually does), i wonder if the above inference would
also apply to suzanne woolf in her position on the icann board and arin
advisory council, or keith mitchell in his position on the nanog program
committee and executive director of uknof and programme manager of oarc, or
any of the other times when isc employees do external public service work.

i don't know if t-m's inference is meant as isc employees are shills or
perhaps all employees are shills, but the idea certainly conflicts with
my own vision that whatever it is about someone that makes them useful at
isc probably makes them useful elsewhere, and if isc's mission is public
service, then encouraging this kind of public service would be a good
company policy.
-- 
Paul Vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adopt draft-koch-dnsop-resolver-priming as WG work item?

2007-06-11 Thread Paul Vixie
  Austein needs to avoid participating in issues that affect
  his company, its financial position, or that of his co-workers.
 
 Should Rob recuse himself from *any* matter that Paul's sent an email
 about?  What about opinions Paul may have discussed with Rob privately?
 Or just things he's vaguely thought about, without saying anything?

i'm left wondering how TAKREM could affect isc's finances, or the finances of
any of rob's coworkers.  is it possible for isc to make less money from DNS
software than what we already don't make?

i think it's time to declare troll alert! and move on.

___
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Re: AS112 for TLDs

2007-12-05 Thread Paul Vixie
[EMAIL PROTECTED] (Joe Baptista) writes:

 No it can't be done with BIND.  Very lame.  It would be a big asset to 
 root technology of the entire *. wildcard TLD label could be pointed 
 to AS112.  AS112 is truly the blackhole of this universe we call the 
 internet.  AS112 - the internet garbage can.
 
 I support using AS112 for that.  Great way to reduce the error traffic 
 at root-servers.net.

wildcards can't be cname's or ns's.  (of the many important reasons why
the suggestion is terrible, that's the first/simplest that comes to mind.)
-- 
Paul Vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] AS112 for TLDs

2008-04-14 Thread Paul Vixie
[EMAIL PROTECTED] (William F. Maton Sotomayor) writes:

 At this point, I'd like to see the current pair of drafts move forward, 
 and would cast this particular issue as the subject of some sort of 
 other document.

likewise, me.
-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] I-D ACTION:draft-licanhuang-dnsop-distributeddns-04.txt

2008-06-24 Thread Paul Vixie
[EMAIL PROTECTED] (黄理灿) writes:

 Hi,
 
 I have updated distributed DNS implementation in Ipv6.
 
 Please give your comments.
 
 Thanks.
 
 Dr. Lican Huang

thank you for your work on this.  i find no support for this assertion:

1. Introduction

   Although DNS becomes a vital component in today's Internet
   infrastructure, the existing DNS architecture will encounter
   problems in the future for the growth of the Internet.
   ...
   DNS implementation currently used may encounter overload traffic
   in root DNS servers.  ...

therefore while i find your proposed solution to be of high quality, there
is a cost in overall system complexity for adding a virtual routing layer to
the DNS, which would have to be justified by a much more complete problem
statement and an objective analysis of more than one alternative.
-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] I-D ACTION:draft-licanhuang-dnsop-distributeddns-04.txt

2008-06-25 Thread Paul Vixie
 From: 黄理灿 [EMAIL PROTECTED]
... almost all web pages was unreachable even the machine was in China
 because of root servers are located in USA.   ...

according to http://f.root-servers.org/, there are two f-root servers in
china.  if you have local contacts within china, please help us add more
root name servers there, and please help us achieve better peering at the
two sites we have (beijing and hong kong).

according to http://root-servers.org/, MOST root name servers are outside
the united states.  i know from living through the transition that this
has been true for several years now.  i also know that there have been
SOME root name servers outside the united states for more than a decade.

you are not helping your case by making assertions widely known to be false.

what's your actual agenda?  is it just that you need to show utility for
your academic work in order to finish your PhD?  if so, i can offer several
suggestions as to real problems that actually do need solutions.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Fwd: New Version Notification

2008-06-28 Thread Paul Vixie
note, i have removed the leading tab character from this author's paragraphs,
since i find it very distracting.  (a cautionary note to marka and bmanning.)

[EMAIL PROTECTED] (Phil Regnauld) writes:

 Question: How do existing implementations react to the presence of a
 single, terminal dot ?  What if an A record is published for '.' ?  I
 know it probably won't happen. but I'm also curious to know, and I think
 the document should specify this: what is the impact of this on existing
 implementations ?

i'm afraid that this will just result in a lot of QTYPE A messages sent to
the authority servers for . asking about ., and a lot of new useless RCODE 3
responses therefrom.

 Question:
   
 In some cases it can be useful to be able to identify the real master
 anyway.  But MNAME was never a reliable way of ascertaining which server
 in an NS set was the source of data, if such a source existed at all.

during the preparation of RFC 2136 we knew that SOA.MNAME was often
meaningless, and so the rule is, if it's the same as an NS.NSDNAME, then
it's the best target for an update.  the purpose of this was to avoid
having to forward updates from secondaries toward the master.  but as it
happened, noone read RFC 2136 carefully.  every second of every day, the
SOA.MNAME for 10.in-addr.arpa receives update requests from all over the
world, even though it is not also an NS.NSDNAME.

those update requests are all coming from a single vendor's implementation.

 Do people on this list think that we are losing any valuable information
 by using the convention suggested by Joe, or was it already too
 uncertain, and that no usefull debugging/troubleshooting information is
 being lost by implementing the suggested approach ?

i think it will not be correctly implemented, just as RFC 2136 was not
correctly implemented, and if people start putting SOA.MNAME=. then it
will just lead to a lot more QTYPE A queries for ..
-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Fwd: New Version Notification

2008-06-28 Thread Paul Vixie
[EMAIL PROTECTED] (Brian Dickson) writes:

 Are you certain? (And does RCODE 3 mean, as I understand it, NXDOMAIN?)

i mean of course ANCOUNT=0 RCODE=0, thank you for your correction.

 Again, hypothetically, what values for such an A RR would cause benign 
 behaviour? E.g. 127.0.0.1?
 
 Just thinking *way* outside the box

i think that if LOCALHOST. could be made to return A 127.0.0.1 and  ::1
then we could use LOCALHOST. as a meaningless value for SOA.MNAME, but that
would just be there to handle the case where RFC 2136 initiators were talking
to an SOA.MNAME that did not match any NS.NSDNAME, in which case they are
already out of spec and it's difficult to say how much effort should be spent
changing the spec further.
-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Fwd: New Version Notification

2008-06-28 Thread Paul Vixie
 Is it not the case that ANCOUNT=0 RCODE=0 responses could be cached, whilst
 failures to send DNS UPDATE messages to root servers would not be cached?

the data at hand tells me that lots of people don't cache, and those who
do only cache positives.  but in principle, yes, if the hosts who aren't
following the spec regarding using SOA.MNAME as a selection criteria among
{NS.NSDNAME} happen not to be the same hosts who aren't caching negative
or empty results, then some good could come of this.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Kaminsky on djbdns bugs (fwd)

2008-08-11 Thread Paul Vixie
the fact that masataka's proposal seemed qualitatively better to me eleven
years ago is moot.  the reason dnssec isn't deployed yet has nothing to do
with any such qualitative differences.  we are where we are, and what we've
got to do now is deploy what we've got now.  the dnssec spec at present may
be ugly but it is practicable, and there's a large body of expertise and 
running code and commercial products and interoperability testing behind it.

while i didn't enjoy watching masataka's proposal railroaded into the ditch
and while it would have taken less time to get masataka's dnssec proposal
deployable than it has taken to get to what we've got now, the silver lining
for me was that i learned how to railroad my own proposals through IETF using
the techniques i learned.  RFC 2136, RFC 2671, and RFC 2845 all exist only
because of the dirty tricks i learned by watching masataka's mistreatment.
(had i known at the outset how IETF worked, i would have worked to prevent
that mistreatment, but i was a n00b.)
-- 
Paul Vixie

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread Paul Vixie
 Paul's original proposal, C (if I interpret it correctly) applies to 
 resolver-authority-server communications, not stub-resolver 
 communications.

no, i was pretty much ruling them out period.  especially (RA=1 AND RD=0).
however, i could accept a SHOULD NOT for ADNS vs. a SHOULD for RDNS on
TCP/53 as long as we also add a SHOULD on RDNS for accept only
transactions from intended clients, most likely from within the same LAN,
campus, or ISP.  SHOULD is great since people who don't do it are still
compliant.  opendns wouldn't be in trouble.  but vendors would become
advised to set their defaults to a non-global ACL and then TCP/53 is
safer.

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread Paul Vixie
  what would it do if it had a TCP-forbidding firewall between it and its
  RDNS?
 
 Dunno, but when PowerDNS had TCP bugs in its resolver code, all the
 complaints I got were from Exchange users.

they'll cope.

 What's the rush with deprecating DNS/TCP btw? It languished in the shade for
 25 years..

that's what we said about udp port randomization after bernstein invented it.

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread Paul Vixie
 Bad example. One of the reasons we don't see more crypto per default on
 web browsing is precisely the limitations of SSL/CA's on using SSL with
 virtual host web sites. I'd hardly call the lack of port 443 a success
 story.

we don't need a reason to deprecate tcp/53 beyond what's written in rfc1035.

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Cache poisoning on DNSSEC

2008-08-20 Thread Paul Vixie
[EMAIL PROTECTED] (David Ulevitch) writes:

 ... -- My goal is not to derail DNSSEC.  It does that on its own.  My 
 goal is to make sure people don't buy into the kool-aid being poured 
 that DNSSEC is the only solution.  It isn't.

that depends on the problem statement, really.  if the problem statement is
how can we secure hop-by-hop then there are other solutions on the table
right now besides DNSSEC.  if the problem statement is how can we secure
end-to-end then there are no other solutions on the table right now.

my chosen problem statement is how can we secure end-to-end because i am
worried about corruption inside servers not just between them, and i want
to defend against provider-in-the-middle attacks (including several that
opendns currently monetizes.)
-- 
Paul Vixie

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR

2008-08-20 Thread Paul Vixie
  ... let's deprecate these bit patterns altogether for OP=QUERY:
 
  QTYPE=255
 
 Breaks some sendmail versions and qmail.

i once hacked sendmail internals, and what i remember is that it would try
a QTYPE=ANY to see if it could get both the MX and its A in one shot, on the
hopeful assumption that they had the same domain name.  an earlier version
had a bug whereby it didn't know ANY was hop-by-hop even in the presence of
RD=1, so a partial answer of A alone was taken to mean there was no MX, but
this was fixed before my son (who is now 17) was born.  no version i know of
will fail to make an explicit MX query if ANY comes up dry, or fail to make
follow-on A queries if ANY comes up without an A.

so, can you explain what you mean by breaks, both for sendmail and qmail?

  QCLASS=255
 
 QCLASS != IN seems more reasonable to me.

i don't think we should foreclose the possibility that QCLASS != IN will be
useful to somebody some day.  do you know a specific risk for QCLASS != IN?

  RA=1 AND RD=0
 
 By the responder or the initiator?

nonrecursive queries of recursive servers are a useful diagnostic but also an
information leak that can help an attacker shape their flows.  peter koch has
reminded me that a server that's both authoritative and recursive would not
be able to answer wearing its authoritative hat if this were literally
enforced, and while i think there should be no server wearing both a recursive
hat and an authoritative hat, i don't think we should legislate against it in
this proposal.  so we can't literally outlaw a bit pattern, but we can say,
if RD=0 then no non-authority data should be returned.

  and let's also make explicit that TCP is not to be used unless UDP
  returns TC or unless QTYPE=AXFR or unless UDP QTYPE=IXFR returned only
  one SOA.
 
 I strongly oppose this approach.  Unsolicited TCP has its place.

are you strongly in favour of amending RFC 1035 4.2.2 to say that responders
initiate close, or that timeouts of less than two minutes are allowed?  this
is the one of the least scalable and most vulnerable elements in all of DNS.

with rich stevens gone and nobody to complete or champion T/TCP, we're left
with several bad multipacket protocols including IP fragmentation and TCP for
handling data larger than the MTU.  i don't know how to make TCP scale for
this, it's not like TCP/80 where server operators who want to handle a million
simultaneous queries know that they'll need a lot of silicon+power to do it.

did RDP (RFC 908, RFC 1151) ever achieve critical mass?

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR

2008-08-20 Thread Paul Vixie
i answered this on namedroppers, where the thread actually belongs.

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Cache poisoning on DNSSEC

2008-08-20 Thread Paul Vixie
  no hop-by-hop solution can address the problem of a MiTM who can see
  and/or alter your queries and responses.
 
 If you have a malicious man in the middle, he will do bad things to you.
 
 DNSSEC will not stop that.

please explain how i can get undetectably bad data in a dnssec environment,
where bad means did not come from the zone editor.

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] trolls (Re: Reflectors are Evil was Re: Anycast was Re: Cache)

2008-09-03 Thread Paul Vixie
[EMAIL PROTECTED] (Danny McPherson) writes:

 Dean, I'm not going to argue this point by point with you, ...

how long is this community going to let a single person dominate its agenda?

i'm using kill-by-thread on dnsop now.  i have no idea how much i'm missing
of what's being posted, but what i really fear is what i'm missing by how much
is not being posted, because so many others have also been driven into similar
kill-by-thread exhaustion by the endless back and forth on the same small web
of interwoven topics by the same four or five people who just can't bear to
let foolish or silly or factually wrong statements go unchallenged.

an early and elementrary usenet discovery, back the low to mid 1980's, was
that some people will not change their views no matter what's said to them,
in fact they aren't really hoping for that, all they look for in replies to
their articles are hooks on which to hang a renewed restatement of whatever
they said before.  it is itinerant on all of us to not fall into the trap of
needing to set the record straight on a daily basis.  some things we don't
agree with can be left unchallenged, it won't affect the lense of history nor
the views of the silent majority of fence sitters watching the back  forth.

show some willpower, folks, please.
-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] trolls (Re: Reflectors are Evil was Re: Anycast was Re: Cache)

2008-09-03 Thread Paul Vixie
   the un-answered argument wins

only if it's never answered.  that would cross the line.

answering it every day for the rest of all of our lives crosses the other line.

(not responding publically to the personal parts of what bill said to me.)
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] measuring TCP query performance

2009-08-26 Thread Paul Vixie
 Date: Wed, 26 Aug 2009 16:39:31 -0500
 From: Michael Graff mgr...@isc.org
 ...
 since by definition, I always really need stuff.

+1.

years ago i tried to differentiate between additional data or authority
section data that a requestor could live without, vs. additional data or
authority section data that a requestor could not live without.  i wanted
to not set TC unless the stuff that would not fit was in the answer section
or was something from the authority or additional section that a requestor
could not live without.  i failed utterly to describe this in a way that
anybody else could make sense of.  i hope someone will try again, rather
than falling back to TCP for things that weren't absolutely necessary like
in-zone nameserver addresses, or dnssec metadata (if DO=1).

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] new Questions...

2009-09-03 Thread Paul Vixie
 Date: Thu, 03 Sep 2009 06:48:21 -0700
 From: Todd Glassey tglas...@earthlink.net
 
 Actually Dean - good point - the MOU was never codified in a formal
 contract meaning that the US Department of Commerce still formally owns
 the root's and so under this newly proposed cyber-control law would give
 the US President the legal authority to on a mere presidential order
 (especially a HSPD) or just a simple presidential directive can shut all
 - repeat ALL - of ARIN's and each of the root systems down since the US
 DoC still owns them.

todd, please do not feed the trolls.  the ietf saw fit to ban mr. anderson
from this mailing list (and a few others) and he's now created his own
mailing lists and added all of us to them so that he can continue posting,
but that shouldn't mean i have to read his text when included by others in
their replies, nor should we have threads hijacked in the ways that got mr.
anderson banned in the first place.

 I wonder how many of the Internet-Mavens on this list have figured that
 out...

every statement you made above is factually wrong.  so, no.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Should root-servers.net be signed

2010-03-19 Thread Paul Vixie
 From: Nicholas Weaver nwea...@icsi.berkeley.edu
 Date: Fri, 19 Mar 2010 12:48:24 -0700
 ...
 Enshrining tho shalt never fragment into the Internet Architecture is
 dangerous, and will cause far MORE problems. Having something which
 regularly exercises fragmentation as critical to the infrastructure and
 we wouldn't have this problem where 10% of the resolvers are broken WRT
 fragmentation.

+1.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] dns interface to whois? (Re: Taking Back the DNS )

2010-11-21 Thread Paul Vixie
 From: John L. Crain john.cr...@icann.org
 Date: Sun, 21 Nov 2010 09:51:45 -0800
 
 Why would we do this, who gains by adding this?
 
 I don't see the benefit.

i think it's so that folks can refuse e-mail from domains under N days
old where N is a local policy decision.  i have no direct use for it so
i'm sort of guessing here.

 Was the use case outlined?

no.  i'm guessing it's a way to do http://www.support-intelligence.com/dob/
that does not require downloading TLD zone files every day and diffing them.

---

noting that the race to register domains as fast as possible and as many
of them as possible has primarily benefitted spammers not their victims, the
good guys have built a magnificient system whose highest and best use is
against our own interests, and that kind of folly produces requests such as
this one -- stuff that in a better overall system would not be asked for.

less controversially, the data is already public, the question is
whether a standard dns schema as another interface into this public data
would be useful to enough people.  as to whether some registries might be
forced to support it when they don't see a need, that's a governance
question not a technology question, and it is: is more transparency better?

re: http://www.circleid.com/posts/20100728_taking_back_the_dns/#7331
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] dns interface to whois? (Re: Taking Back the DNS )

2010-11-22 Thread Paul Vixie
 Date: Mon, 22 Nov 2010 20:36:17 +
 From: bmann...@vacation.karoshi.com
 
 we tried this a couple time last decade with limited success.  (pre
 SRV).  it would work, if and only if there were general agreement by
 the zone admins to actually keep up w/ the data.

while i expect that it would be a gateway rather than a data transform,
and while i agree that if it's a data transform then it should be done
often enough to not get out of date, i note that i'm asking a different
question than would it work.

i'm wondering if there's enough interest to have it be worth writing it
up as a dns schema so that interested producers and consumers of this
information in this form can have a standard rendezvous (qname format)
and delivery system (TXT formats).  that's not would it work.  it's
could it ever be useful to anybody.

i am not trying to get input on technical feasibility since i think that's
pretty obvious.  nor am i trying to get input on governance like should
registries be required by icann to implement it or should icann implement
it for root, arpa, and other non-delegated zones.  just is there interest.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] dns interface to whois? (Re: Taking Back the DNS )

2010-11-22 Thread Paul Vixie
 Date: Mon, 22 Nov 2010 22:52:34 +
 From: bmann...@vacation.karoshi.com
 
   well, at least two schemas have been proposed and there was
   limited uptake either time.  perhaps times have changed.

the fact that so few people have spoken up gives me my answer -- there's
not enough interest in this to make it worth doing.  previous efforts did
not become RFC's in any form, and it seems likely that another would also
not make it.

   well, one thing that kind of makes sense is where to anchor such 
   records... two choices - a WKA such as in-addr.arpa, ip6.int,
   enum.arpa et.al.  or place the entries at each delegation point
   and sweep the tree periodically to build a stale cache of data...

in the basenote of this thread i was only proposing this for registries of
names.  so, vix._domain._whois._registry.com for vix.com, and similarly
pv15._contact._whois._registry.com for the PV15 contact in the COM registry.

i'm aware of your prior work to do this for numbers but that wasn't my topic.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] A new appoarch for identifying anycast name server instance

2011-09-27 Thread Paul Vixie
On Tuesday, September 27, 2011 09:49:03 am Masataka Ohta wrote:
 Xun wrote:
  Unicast address of an
  anycast server is very useful for many diagnostics, however, as
  DNS queries is sent to the anycast address and the path is decided
  by routing system, knowing the set of unicast address may not
  sufficient to answer that question.
 
 That is an issue better handled by IP layer.

The purpose I see in this proposal, that cannot be handled by the IP layer, is 
to tell me which anycast instance is seen by some recursive name server.  All 
our current diagnostics rely on contacting the server itself to see which 
server answers us.  The proposal now being discussed allows the DNS control 
plane to be tested.

In other words if I want to know which F-root instance I am being routed to, I 
can ask, dig @f.root-servers.net version.bind ch txt or the equivilent in 
terms of id.server.  But if i want to know which F-root node my ISP's name 
server is being routed to, I have no tools available today.  I would like to 
be able to say dig @75.75.75.75 _hostname._ns_diags.f.root-servers.net txt 
or similar.  To do that, there has to be an NS record at or below the name 
server name (or some other predictable rendezvous point in the naming system) 
and each instance must serve that zone locally with localized content.

I support the general concept of this draft.

re: http://www.isi.edu/~xunfan/research/draft-anycast-diagnostics.txt

Paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] A new appoarch for identifying anycast name server instance

2011-09-28 Thread Paul Vixie
On Tue, 27 Sep 2011 22:51:09 +0900
Masataka Ohta mo...@necom830.hpcl.titech.ac.jp wrote:

 Paul Vixie wrote:
 
  The purpose I see in this proposal, that cannot be handled by the
  IP layer, is to tell me which anycast instance is seen by some
  recursive name server.  All our current diagnostics rely on
  contacting the server itself to see which server answers us.  The
  proposal now being discussed allows the DNS control plane to be
  tested.
 
 Are you saying that end users, not name server operators, diagnose
 anycasted name servers?

no.

 Certainly, you, as an end user, can do so.

i think i could diagnose problems reported on my authority server if
i could get a recursive name server to tell me which of my anycast
instances it is talking to.

there may also be some network mapping and measurement benefits to this
proposal.
-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] A new appoarch for identifying anycast name server instance

2011-09-29 Thread Paul Vixie
On Thursday, September 29, 2011 07:34:55 am Masataka Ohta wrote:
 The problem is that the report is unreliable. As your assumption is:
  The purpose I see in this proposal, that cannot be handled by
  the IP layer, is to tell me which anycast instance is seen
  by some recursive name server.
 
 even you can't diagnose the problem, if what is broken is not
 your server but the recursive name server used by someone who
 reported the problem and you can't have access to the recursive
 name server.

that happens sometimes.  however, i often end up in an email conversation with 
a problem reporter, and i often ask them to run certain dig commands.  so, 
even if i can't reach a recursive server, a feature like this can still help 
me.

  there may also be some network mapping and measurement benefits
  to this proposal.
 
 May or may not be.

there are ~16M open recursive name servers right now.  so, i say, may.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] word wrapping and respect for standards

2011-09-29 Thread Paul Vixie
On Thursday, September 29, 2011 03:36:26 pm Nicholas Weaver wrote:
 Word wrapping MUST be done on the recipient side, not on the sender side,
 unless you want to maintain ridiculous conventions like text lines are at
 most 72 characters, monospaced which were obsolete two decades ago.
 
 And in this case particular case, blame Microsoft.
 
 Apple on their mailer for the longest time implemented a standard method,
 format=flowed, intended to please BOTH mail readers that can word-wrap and
 mail readers that can't.  But they dropped this way back in 10.6.2,
 because Microsoft never recognized it right.
 
 Given the choice between pleasing a few recipients who cling to an obsolete
 convention with obsolete tools and pleasing the very large population of
 recipients with a tool unwilling to accept a standard which could please
 both, Apple went with the natural choice: it is the mail reader's
 responsibility to word wrap to the reader's own display parameters.

format=flowed gave the nec'y hint, told my user agent that the text was meant 
to be wrapped.  in the absence of this hint, i don't get word wrapping because 
the columns might be fixed.  (like code fragments or similar.)  so i do blame 
microsoft for not doing the right thing with format=flowed, but i also blame 
apple for going off-rails and violating the principle of least astonishment 
for an unknown but nonshrinking population of non-microsoft e-mail readers.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Sanity check

2011-10-27 Thread Paul Vixie
On Thursday, October 27, 2011 10:06:25 Havard Eidnes wrote:
 I wonder if I could please have someone say whether they agree
 with me on this one:
 ...
 My claim is that it is a Registry Error for the operator of the
 registry for the 'z' domain to permit this to happen, as it
 violates the basic idea of what a delegation means.
 ...

i'm +1 with this interpretation. not just because implementations do not all 
do the same thing in the presence of this data pattern, but because in recent 
decades we've adopted a mount point semantics view of dns delegations. this 
should be written down somewhere, because the rfc 1034 rules about scan down 
the tree looking for a delegation logic does not mesh well with the closest 
enclosure logic that most implementations actually follow.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Data model and field names for DNS in JSON or XML

2012-01-18 Thread Paul Vixie
On 1/18/2012 7:06 PM, W.C.A. Wijngaards wrote:
  this sounds very cool; is there an internet draft or tech note
  describing the protocol so that others may also implement this?

 It exists to bypass deep inspection firewalls, and it works.  The plain
 DNS format as you would use over TCP, but then on an SSL connection, so
 its encrypted by SSLv3.  Uses port number 443 (the https port, no other
 use of that protocol, but then, because of SSL the firewall should not
 be able to tell).

alas, DPI can tell the difference between HTTPS and TLS in a TCP/443
stream. (the Tor guys told me this.)

 The SSL-certificates are there to make the SSL connection look legit to
 the firewall.  The DNSSEC inside the DNS wireformat provides
 authentication.

 There could be a technote or draft for it, but really: TCP-style-DNS
 inside SSL for transport.  That should tell enough for an implementation?

it's not enough. in particular, the order in which it's probed (compared
to EDNS0 UDP, EDNS0 TCP, old style UDP, old style TCP) should be
specified. the NS RRset gives no hint of the name server's capabilities.
and the IETF definition of interoperable depends not just on
independent implementations being able to talk to each other, but
independent implementations both based on the same specification that
can also talk to each other.




signature.asc
Description: OpenPGP digital signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [rssac] [I-D Action: draft-rssac-dnsop-rfc2870bis-04.txt]

2012-02-11 Thread Paul Vixie
On 2/11/2012 5:25 PM, Paul Hoffman wrote:
 On Feb 9, 2012, at 1:39 PM, bmann...@vacation.karoshi.com wrote:

 I think that starting work on such a draft is a great idea -BUT- in the mean 
 time
 do not let perfect get in the way of good enough.
 Just to be clear: a good handful of people, me included, have said that the 
 wording in the current doc is not good enough, or only good enough if you 
 squint hard. It is clearly much worse than the document that this is supposed 
 to replace.

wearing my rfc 2010 co-author hat: +1.

paul

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [I-D Action: draft-rssac-dnsop-rfc2870bis-04.txt]

2012-02-14 Thread Paul Vixie
On 2/14/2012 5:20 PM, David Conrad wrote:
 ...
 I agree, however I'd think a better approach would be to write a BCP for 
 important DNS servers, not a document that sets up false expectations or 
 assumptions.

+1. there are a lot of important non-root dns servers, and the collected
wisdom of all of there operators would be a good thing to gather and
peer-review and publish.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Batch Multiple Query Packet

2012-02-27 Thread Paul Vixie
On 2012-02-28 12:27 AM, Edward Lewis wrote:
 At 13:35 -0500 2/27/12, Hector Santos wrote:
 If it doesn't already exist or not considered in the past as an
 unfeasible concept, I am interest in seeing if this is something
 worth pursuing.

 One (not the only, Ohta replied with another) of the oft-cited
 obstacles is the presence of only one RCODE field in the packet. (What
 if one query would be NXDOMAIN and the other has an answer?)


indeed, this is why multiple queries were not supported in the original
DNS, and it's why EDNS doesn't have it either. the number of signalling
bits needed to explain what went on with the multiple queries made
folks' heads explode. the logic is still online if you want to see it:
http://nsa.vix.com/~vixie/edns1.txt.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Batch Multiple Query Packet

2012-02-28 Thread Paul Vixie
On 2/28/2012 3:28 AM, Hector Santos wrote:
 Paul Vixie wrote:
 ... http://nsa.vix.com/~vixie/edns1.txt.

 Thanks Paul. Great material.

 I'm just winging it at this point.

 First, I was focusing on the batching of related types, i.e. a
 protocol with new RR type but has an initial default intro record and
 fallback to TXT.  The goal is to have a single call that will yield a
 managed result to assist with the current concerns and waste
 associated with the migration of TXT to the new RR type usage.

the way this was handled for MX was to have A (and later ) as
additional data for the MX QTYPE.

we should have made QTYPE  include type A as additional data. we
still can.

we should have amended QTYPE A to include type  as additional data.
we still can.

using additional data for this is great since if it's missing you query
for it but it won't always be missing.

 Second, I considered there is no room for a packet count, but I was
 thinking of simply bundling two separate packets, i.e. 2*RR for the
 UPD send and how would the servers read this.

RCODE FORMERR.

this means the initiator would have to be prepared to try again with
discrete queries. this is a form of protocol negotiation -- the fact of
a responder's nonsupport would have to be discovered (and cached for a
while) by each initiator. this is already happening for EDNS. i would
recommend against adding more responder state to initiators.

this would also mean that when it works you've got one round trip and
when it doesn't work you've got either three (assuming you don't blast
#2 and #3 without inter-record gap) or two round trips (if you use blast
on #2 and #3.)

 If DNS servers will barf, then never mind. :)

yes.

 But if its offers a way to perform this concept with no breakage,
 perhaps the server will just read the first one and act on it or it
 will process the residual packet as well.  Of course, the client will
 still need to manage the responses with all the potential delays.

 Again, just winging it. I don't like kludges. :)

please consider additional data, or blast.

paul

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Batch Multiple Query Packet

2012-02-28 Thread Paul Vixie
On 2/28/2012 5:57 PM, Nicholas Weaver wrote:
 But since if you could coalesce you could do parallel, this savings doesn't 
 help latency much at all: just the transit time for 50B out and 50B back.  If 
 anything, parallel will be BETTER on the latency since batching would 
 probably require a coalesced response, while parallel is just that, parallel, 
 so if the first record is more useful, it can be acted on immediately.

parallel (what i called blast) is great solution for things that don't
run at scale. but the lock-step serialization that we get from the MX
approach (where the A/ RRset may be in the additional data section
and so we have to wait for the first answer before we ask the second or
third question) has a feedback loop effect on rate limiting. it's not as
good as tcp windowing but it does tend to avoid WRED in core and edge
router egress buffers.

all i'm saying is, we have to be careful about too much parallelism
since UDP unlike TCP has no windowing of its own.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] 2 internet drafts relevant to DNSOP

2012-03-10 Thread paul vixie
joe, et al,

your draft-gersch-dnsop-revdns-cidr-01 is very clean and simple; the
draft and the design are of admirable quality. as a co-author of RFC
2317 i agree that it does not suit the needs of bgp security since it
seeks only to provide a method of fully naming hosts, not networks.

importantly, i see no reference to RFC 1101 in your draft. RFC 1101
describes a way to name networks, and while at first it did not seem to
be compatible with CIDR, implementation (in netstat -r back in BSD/OS
3.1) showed that RFC 1101 was in fact not as classful as it appeared.

i recommend a review of these functions, contained in the file dns_nw.c,
present in bind8 as src/lib/irs/dns_nw.c, and also present in older
versions of bind9, as well as various versions of netbsd and athena.

static struct nwent *   get1101byaddr(struct irs_nw *, u_char *, int);
static struct nwent *   get1101byname(struct irs_nw *, const char *);
static struct nwent *   get1101answer(struct irs_nw *,
  u_char *ansbuf, int anslen,
  enum by_what by_what,
  int af, const char *name,
  const u_char *addr, int addrlen);
static struct nwent *   get1101mask(struct irs_nw *this, struct nwent *);
static int  make1101inaddr(const u_char *, int, char *, int);

you may find that some of your work has already been done for you, or,
you may find that this is related work that should be referenced in your
draft along with the reasons why your proposed method is necessary.

paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New Version Notification for draft-gersch-dnsop-revdns-cidr-00.txt

2012-03-30 Thread paul vixie
On 3/30/2012 10:19 AM, Ray Bellis wrote:
 With the current scheme it's possible to delegate longer prefixes, and this 
 is a necessary feature.

 The stuff Dan was saying about two alternate representations concerns me, 
 though.  As written, by default:

   192.168.64/18 is 1.0.m.168.192

 but

   192.168.64/24 is 64.168.192

 which is not a sub-domain of the enclosing /18 representation.

 This way lies dragons, I think...

+1.

thus my earlier observation: RFC 1101 supports classless networks even
though it didn't mean to. RFC 2317 is entirely compatible with RFC 1101
(there's only one delegation tree covering both.)

if there's a need for a new netblock-specific DNS schema like the one in
the gersch draft, then i recommend learning from what we did in RPZ,
where the prefix size is _always_ given as are all octets of the
mantissa except the :: longest-zero string which is given as .zz..
more information about RPZ can be had from:

https://deepthought.isc.org/article/AA-00525/0/Building-DNS-Firewalls-with-Response-Policy-Zones-RPZ.html

and specifically from:

https://deepthought.isc.org/article/AA-00512/0

which has the actual spec, in .txt and .pdf format.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Request to adopt draft-sotomayor-as112-ipv4-cull as WG item

2012-04-04 Thread Paul Vixie
On 2012-04-04 12:20 PM, William F. Maton Sotomayor wrote:

 It seems that after delivering my presentation on subsequent AS112
 delegations in Quebec City, I hadn't recalled what the group thought
 about adopting this work as a dnsop item. So, I'm soliciting feedback
 on this request.  I have posted version 03 for your consideration.

i think it should be adopted, but i have no time to work on it, so my
vote may not count.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] on Negative Trust Anchors

2012-04-13 Thread Paul Vixie
the information economics of this draft are all wrong. with all possible
respect for the comcast team who is actually validating signatures for
18 million subscribers and is therefore way ahead of the rest of the
industry and is encountering the problems of pioneers... this is not
supposed to be comcast's problem.

if someone that comcast's customers want to reach, blows their dnssec
out by using the wrong keys or using expired signatures or whatever,
then the problem ownership should rest with whosoever blows their dnssec
-- not with comcast. it's only because comcast is first that comcast has
to watch out for the deleterious effects of OPM (other people's
mistakes) on comcast's own customers. comcast can't afford the help desk
call volume that would come from another wrong-key failure at the social
security administration's domain.

but that doesn't make it comcast's problem. it would remain the social
security administration's problem.

we need to move quickly to the point where lots of large eyeball-facing
network operators are validating, such that any failure to properly
maintain signatures and keys and DS records, is felt most severely by
whomever's domain is thus rendered unreachable.

if everyone interested in working on this draft would take the time to
turn on validation, then we could avoid inverting the information
economics here. people who can't manage their keys and signatures
properly (and i include my own vanity zones in that, since i'm not yet
converted to the bind 9.9 way of doing things) should either expect
trouble or uplevel their game or stay out of the game.

i'm opposed to negative trust anchors, both for their security
implications if there were secure applications in existence, and for
their information economics implications.

paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] on Negative Trust Anchors

2012-04-14 Thread Paul Vixie
On 2012-04-14 1:51 AM, Doug Barton wrote:
 ... The problem, and I cannot emphasize this highly enough, is that
 there is absolutely no way for an ISP (or other end-user site doing
 recursion/validation) to determine conclusively that the failure they
 are seeing is due to a harmless stuff-up, vs. an actual security
 incident. IOW, if we do this, we might as well just abandon DNSSEC
 altogether.

this is what i was alluding to in some text up-thread:

On 2012-04-13 5:43 PM, Paul Vixie wrote:
 ... i'm opposed to negative trust anchors, ... for their security 
 implications if there were secure applications in existence, ...

because a secure application must be able to fail reliably under attack.
introducing third party bogosity breaks that failure, and it won't
matter whether it's SOPA or NTA that breaks it. if i can leave you all
with one thought its that dnssec failure must be reliable, end to end.

see also
http://www.circleid.com/posts/20121012_dns_policy_is_hop_by_hop_dns_security_is_end_to_end/.

paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] on Negative Trust Anchors

2012-04-15 Thread Paul Vixie
On 2012-04-15 4:09 PM, Patrik Fältström wrote:
 On 15 apr 2012, at 16:42, Joe Abley wrote:

 Nobody is talking about creating NTAs. NTAs already exist. The question for 
 this group is whether or not they are worth standardising.
 Fair. I am the one that extrapolate from standardizing to wide deployment.

extrapolating further, standardizing is a form of legitimization. i
argue that this would do more harm than good.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] on Negative Trust Anchors

2012-04-15 Thread Paul Vixie
On 2012-04-15 4:20 PM, Stephan Lagerholm wrote:
 ... However, the open resolvers that don't support DNSSEC are a bigger
 issue since the Service Providers' customer instantly can get what
 he believes is a better working resolver by switching to one of those.
 If we could convince 8.8.8.8 (208.67.222.222 and 4.2.2.1) to turn on
 DNSSEC validation, then there would not be any need for NTAs. ...

dnssec makes dns less reliable. that's because it's a security
technology not a resiliency technology. security makes things harder to
use and makes failures more apparent. in the real world if you put a
lock on your house or your car then you're at risk for forgetting or
losing your key and not being able to enter or use your own property.
you could mitigate that risk by removing the lock but then you'd have
other risks.

what's unique about dnssec is that if you lose your key or use the wrong
key or forget to re-sign your zones then it's not you (the property
owner) who cannot enter or use the zones, but rather, everybody else. i
don't think that asymmetry of cost changes the fundamentals. the
operators of 8.8.8.8 and so on (from the above examples) may have done a
cost:benefit analysis leading them to not deploy dnssec validation at
this time. that will make their systems more reliable in the eyes of end
users. that's true and that's inevitable.

i'm imagining that some NTA-using party notices via their syslogs that
validation is failing for some zone, and believing that access to this
zone in an unsecure way has a better cost:benefit ratio to them and to
their own customers than letting the failure propagate and so enters the
zone into the NTA... only to have it turn out later that there was a key
compromise and the failure was due to a credential or key or system
attack rather than due to someone forgetting or losing their key.

people who sign their zones must be told, early and often, that adds
risk. they will have to re-sign their zones before signatures expire,
they will have to carefully coordinate key changes with their parent
zone, they will have to keep their signing key under secure but
redundant control... and any failure by them to do any of those things
will make their zones unreachable by a large and growing audience. if
they sign anyway then any resulting failures have to be laid at their
doorstep, not at validating server operators' doorsteps.

if a secure application knows that a zone is supposed to be signed
(because there are DS RRs in the parent and the parent is signed) then
an upstream NTA will just look like a signature-stripping attacker. let
us not imagine that there will never be secure applications other than
recursive name servers (and here i'm thinking of DANE), and let us also
not imagine that every secure application (here i'm again thinking of
DANE) will have to subscribe to a trusted NTA.

dnssec is end to end, including dnssec failures, which are statistically
inevitable. i'd tell validator operators who think they need NTA's in
order to control the risks posed by zone owner errors, if you can't
stand the heat then stay out of the kitchen.

see also
http://www.circleid.com/posts/defense_in_depth_for_dnssec_applications/.

paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] on Negative Trust Anchors

2012-04-15 Thread Paul Vixie
On 2012-04-15 7:04 PM, David Conrad wrote:
 On Apr 15, 2012, at 9:37 AM, Paul Vixie wrote:
 i'd tell validator operators who think they need NTA's in
 order to control the risks posed by zone owner errors, if you can't
 stand the heat then stay out of the kitchen.
 Given the benefits provided by DNSSEC (to date) are largely invisible and the 
 costs quite non-trivial, I'd think this would ensure DNSSEC validation never 
 gets deployed, thus secure applications (such as DANE) will never exist.

 I thought we'd learned that flag day deployments don't work on the Internet 
 anymore.

i thought so too until we had world ipv6 day last year. noting that
adding a  record to www.{facebook,yahoo,google}.com has been seen to
hit all kinds of roadblocks due to teredo and other failed tunneling
mechanisms, the only way big companies will feel safe turning it on
(knowing that they'll lose 0.3% of unique eyeballs when they do) is if
they're traveling in a pack with other big companies.

so it apparently will be for dnssec. nobody should validate until
everybody validates, because otherwise the failures at the social
security administration or nasa to sign and re-sign their zones, and to
properly maintain the relationship between the keys they use and the DS
RRs their parent zones have for them, will be felt by early adopters.

ipv6 and dnssec both have incredibly strong early adopter penalties:
you can break me now, or you can break me later. i seek to avoid
legitimizing the  igor hack in bind9, and negative trust anchors.
i know that people will do this stuff but i also know that IETF should
not give either one an implicit +1.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] on Negative Trust Anchors

2012-04-15 Thread Paul Vixie
On 2012-04-15 9:07 PM, David Conrad wrote:
 I guess in the end it boils down to the philosophical question of the
 role of the IETF. If DNSOP declines to accept this topic, I suspect it
 merely means each vendor will come up with their own implementation
 with their own quirks that operators will have to wade through. I fail
 to see how this improves anything.

if you don't want something to live forever and get turned on by default
or left on across sysadmin churn, don't put it in an RFC.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] NTA... the new NAT?

2012-04-18 Thread paul vixie
On 4/17/2012 9:51 AM, Shane Kerr wrote:
 Is it just me, or does the NTA discussion remind anyone else of NAT
 discussions? And not just because they have the same letters. ;)

 Operators say, wow, here is a useful tool that can solve real-world
 problems, maybe it would be helpful to recognize these problems and
 perhaps standardize the solution?

 Protocol zealots answer, but this is bad for this long list of very
 valid reasons, so sorry about your problems but really we know better.

 If we  insist on DNS Purity, I predict a similar end state with NTA as
 with NAT: they will be almost universally deployed, and completely
 non-standard, and result in a lot of potential breakage due to
 inconsistencies and semi-broken implementations. Yay.

what potential breakage or semi-broken implementations are you thinking
of? in NAT, it's all rather broken. the fix for NAT, had the IETF been
willing to recognize this technology in spite NAT's non-purity, would
have been in the form of what we now call firewall traversal or perhaps
PnP. neither of which the world was ready for at the time, and neither
of which was something that could have been standardized soon enough to
stop bad NAT from getting out, nor standardized at a high enough
quality and relevance level at that time since in the early days noone
knew yet how many things NAT would break.

but let's continue the analogy anyway. what would have saved the world
from bad NAT was a change to the underlying connection model of the
internet -- not just an RFC that says here's how you can use 192.168
but rather one that said here's how you can preserve some aspects of
end-to-end, not break FTP, not have to reframe your TCP sessions at the
gateway layer if they might contain embedded IP addresses. in that
sense, i agree with your comparison: a fundamental change to the nature
of DNSSEC to allow for secure signalling of errors and secure signalling
of middle-man policy would definitely help us head off a generation of
bad NTA. but that's not what's on offer here.

DNSSEC currently presumes reliable end-to-end failure, and offers no way
to signal other conditions. so if somebody breaks into your primary name
server and alters your zone and either doesn't sign their changes or
signs the whole zone with some key that's not matched by your delegating
DS RRset, right now it will cause the modified content to be marked as
bad and ignored or dropped by any validating server. NTA will change
that, by adding middlemen who can decide as a matter of their own policy
to just ignore these bad or missing signatures and pass your data to
their stub clients as though DNSSEC had not been in use. that's
horrible. that's worse for deployment confidence in DNSSEC than anything
the social security administration or NASA could otherwise do by failing
to re-sign or using the wrong keys.

so i'm all for changing DNSSEC itself to accomodate these other use
cases. but i'm not on-board at all for a standardized way for middlemen
to block unwanted (by them) DNSSEC signalling. this means i'm in favour
of the thing you're suggesting (do better with DNSSEC than we did with
NAT) but i'm also opposed to the thing you're supporting (make
end-to-end DNSSEC failures less reliable). i think this means you're
offering me a false dichotomy above. let me know if i'm misreading you.

paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] NTA... the new NAT?

2012-04-18 Thread paul vixie
On 4/18/2012 6:28 PM, David Conrad wrote:
 ... Their validator, their rules. ...

that would be a fundamental change to the architecture of dnssec.

see again:
http://www.circleid.com/posts/20121012_dns_policy_is_hop_by_hop_dns_security_is_end_to_end/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] an editorial review of draft-ietf-dnsop-respsize-13

2012-04-25 Thread paul vixie
On 4/25/2012 4:58 PM, Alfred � wrote:
 It has been pointed out that the DNS Referral Response Size Issues
 I-D should not be left going to final expiry, and I have performed
 a new review of the last version, draft-ietf-dnsop-respsize-13.

 I only found a small number of remaining editorial nits -- either
 formerly overlooked or newly introduced.  You might want to take
 the opportunity of the notes below to refresh the draft.

thanks.

see below.

 (1)  Section 1

 (1.1)  1st paragraph

 a) The object of the first sentence lacks an article; the should be
supplied.

ok.

 b) In a few places, the draft uses very terse forms of precise
citations, which better should be expanded a bit for readability;
the first occurrence of this is here as well:
(see [RFC1035] 4.2.1)should say
(see [RFC1035], Section 4.2.1)   or even better
(see Section 4.2.1 of [RFC1035]) .

i don't agree. we'll make the change, since we're not going to stand on
minutiae, but for the record this is your personal style preference not
an objective style guide reference. i would actually prefer [RFC1035
4.2.1] since terseness is to me virtuous. again: you're over reaching
here, but, we'll make the change for you anyway.

 Chosing the latter form, the corrections will accumulate to:

 |  The original DNS standard limited UDP message size to 512 octets (see
 |  [RFC1035] 4.2.1).  Even though this limitation was due to the
required minimum IP reassembly limit for IPv4, it became a hard DNS
protocol limit and is not implicitly relaxed by changes in a network
layer protocol, for example to IPv6.
 --- v
 |  The original DNS standard limited the UDP message size to 512 octets
 |  (see Section 4.2.1 of [RFC1035]).  Even though this limitation was
due to the required minimum IP reassembly limit for IPv4, it became a
hard DNS protocol limit and is not implicitly relaxed by changes in a
network layer protocol, for example to IPv6.

 (1.2)  2nd paragraph

 Again, please expand the reference  (see [RFC2671] 2.3, 4.5)
 in the same way as above.

 (1.3)  4th paragraph

 Again, a definite article is missing, and also whitespace is missing
 in front of a citation -- both in the first sentence.  Please adjust:

 |  While more than twelve years passed since the publication of EDNS0
   vv   ^
 |  document[RFC2671], approximately 65% of the clients support it as
observed at a root name server and this fraction has not changed in
recent few years.  The long tail of EDNS deployment may eventually be
measured in decades.
 ---
 |  While more than twelve years passed since the publication of the
 vvv
 |  EDNS0 document [RFC2671], approximately 65% of the clients support it
as observed at a root name server and this fraction has not changed
in recent few years.  The long tail of EDNS deployment may eventually
be measured in decades.

that's all fine.

this, though:

 (2)  Section 2.3

 (2.1)  2nd paragraph

 When used as a noun, DNS should be written with the definite article:

 |  While DNS distinguishes between necessary and optional resource
records, [...]
 --- v
 |  While the DNS distinguishes between necessary and optional resource
records, [...]

The Domain Name System as abbreviated to the acronym DNS is a proper
noun. we do not write The IP even though we would write The Internet
Protocol. similarly for TCP, UDP, NFS, and so on.

 (2.2)  last paragraph

 There are two grammar flaws in the text.
 a) s/independent to/independent of/
 b) I assume that ... the DNS server _might_ just see ...
is the needed verb that you had in mind.
 So please correct:

 |  The glue record order should be independent to the version of IP used
   v^^
 |  in the query because the DNS server just see a query from an
intermediate server rather than the query from the original client.
 ---
 |  The glue record order should be independent of the version of IP used
   vvv  ^^
 |  in the query because the DNS server might just see a query from an
intermediate server rather than the query from the original client.

ok.

 (3)  Section 3, last paragraph

 According to the RFC Editor explanations of the most frequent flaws
 in grammar and style (see RFC Editor educational presentation material
 from all recent IETF meetings), which is inappropriate in Technical
 English and should be replaced by that here:

We're assuming a medium query name size of 64 since that is the
typical size seen in trace data at the time of this writing.  If
 |  Internationalized Domain Name (IDN) or any other technology which
   ^^
results in larger query names be deployed significantly in advance 

Re: [DNSOP] A good chance to get all riled up - draft-wkumari-dnsop-omniscient-as112-00

2012-06-27 Thread Paul Vixie
On 6/27/2012 6:15 PM, Joe Abley wrote:
 ...
 Adopt this doc?

yes please.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-ietf-dnsop-dnssec-key-timing

2012-08-30 Thread Paul Vixie
On 2012-08-30 9:40 AM, Johan Ihrén wrote:
 On Aug 20, 2012, at 17:33 , Paul Hoffman wrote:

 On Aug 20, 2012, at 6:19 AM, Peter Koch p...@denic.de wrote:

 My current reading of the sense of the WG is that we move to
 WGLC with -03, declaring the July 24 suggestion out of scope
 for this document and keep momentum for 'dnssec bis'.

dnssec-bis was delegated signer. dnssec-ter was type code roll. we're on
dnssec-nextgen now.

 That's one way to do it. A better one would be to start WG LC on key-timing 
 with an explicit question to the WG about folding in the keytiming-bis 
 changes. That way, the WG would know the status of both, and we would would 
 possibly produce just one document. The operations community would be better 
 off with just one document, if this WG can do that.
 Not to question the abilities of the WG, but I still have to ask whether (in 
 your opinion) the operations community would be better off with a single 
 document that may be finished around Christmas Eve 2020 or rather live with 
 multiple docs that are published somewhat sooner than that.

while i agree with these sentiments i have a broader concern. ietf's
mantra is good engineering. if we know now that keytiming has flaws, and
we are only considering publishing it because we know our own record
shows that reaching consensus for keytiming-bis will take a long time,
then it's an implicit indictment (by us) of our own record and habits.

we should have a better reason for publishing two documents, like new
ideas occurred to us after the first one was beyond reach of our pen, or
they have different topics.

paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] new version of IPv6 rDNS for ISPs

2012-11-21 Thread Paul Vixie
On 2012-11-21 4:44 PM, Ted Lemon wrote:
 ... Aside from this quibble, I think the document is useful and should
 be published.

my quibble is different. ipv6 is bringing some tough love to the
consumer-facing edge. the fact that ISP's auto-populated the IPv4 PTR
tree made it impossible for mail server operators to distinguish between
consumer grade and business grade internet connections. since consumer
grade connectees should really not be connecting to SMTP servers on
other networks, there's been a great deal of work to find all of the
common auto-populated PTR naming patterns in use anywhere in the world,
in order to reject off-net e-mail from consumer grade connections. this
work is inefficient, ineffective, painful even when correct, and often
wrong.

there are some excellent reasons not to use PTR RR records for this
purpose, starting with good security practices and continuing through
good engineering practices. nevertheless this is a pre-existing property
of the existing server plant, and even if server operators were willing
to give it up, the tail would be very long. i'm going to treat this as
an unavoidable universal mistake that all of us will have to live with,
forever, period.

network operators should provide PTR RR's for specific addresses which
have real names. the inability due to IPv6's richness of address space
to provide auto-naming for PTR's does not to me, a problem statement make.

paul

-- 
It seems like the rules for automagic completion of incomplete names typed 
into browsers are going to start to look like those for the game of fizbin. 
--rick jones

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] finding the closest delegation

2012-11-23 Thread Paul Vixie
On 2012-11-23 2:34 PM, Mark Andrews wrote:
 ...
 There is nothing wrong with using the SOA record from the -ve
 response.  Named has been doing it for about 15 years in nslookup.
 If it is not there it falls back to stripping a label at a time
 until it gets the SOA record.

indeed not. i think mark means nsupdate here. the history of this is, i
wrote for late model bind8 a function called res_findzonecut(), which
was part of integrating a contributed implementation of RFC 2136, which
i'd been the editor and main author of. the comments at the top of
lib/res/res_findzonecut.c are shown below. there's nothing untoward, or
spec-violating, or even spec-bending going on here.

/*
 * int
 * res_findzonecut(res, dname, class, zname, zsize, addrs, naddrs)
 *  find enclosing zone for a dname,class, and some server addresses
 * parameters:
 *  res - resolver context to work within (is modified)
 *  dname - domain name whose enclosing zone is desired
 *  class - class of dname (and its enclosing zone)
 *  zname - found zone name
 *  zsize - allocated size of zname
 *  addrs - found server addresses
 *  naddrs - max number of addrs
 * return values:
 *   0 - an error occurred (check errno)
 *  = 0 - zname is now valid, but addrs[] wasn't changed
 *   0 - zname is now valid, and return value is number of addrs[]
found
 * notes:
 *  this function calls res_nsend() which means it depends on correctly
 *  functioning recursive nameservers (usually defined in
/etc/resolv.conf
 *  or its local equivilent).
 *
 *  we start by asking for an SOAdname,class.  if we get one as an
 *  answer, that just means dname,class is a zone top, which is fine.
 *  more than likely we'll be told to go pound sand, in the form of a
 *  negative answer.
 *
 *  note that we are not prepared to deal with referrals since that
would
 *  only come from authority servers and our correctly functioning local
 *  recursive server would have followed the referral and got us
something
 *  more definite.
 *
 *  if the authority section contains an SOA, this SOA should also
be the
 *  closest enclosing zone, since any intermediary zone cuts
would've been
 *  returned as referrals and dealt with by our correctly
functioning local
 *  recursive name server.  but an SOA in the authority section
should NOT
 *  match our dname (since that would have been returned in the answer
 *  section).  an authority section SOA has to be above our dname.
 *
 *  however, since authority section SOA's were once optional, it's
 *  possible that we'll have to go hunting for the enclosing SOA by
 *  ripping labels off the front of our dname -- this is known as doing
 *  it the hard way.
 *
 *  ultimately we want some server addresses, which are ideally the ones
 *  pertaining to the SOA.MNAME, but only if there is a matching NS RR.
 *  so the second phase (after we find an SOA) is to go looking for the
 *  NS RRset for that SOA's zone.
 *
 *  no answer section processed by this code is allowed to contain CNAME
 *  or DNAME RR's.  for the SOA query this means we strip a label and
 *  keep going.  for the NS and A queries this means we just give up.
 */

paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-22 Thread Paul Vixie
if we can't return nxdomain, then i'm opposed to the omniscient spec,
and we should continue as before, enumerating on the responding servers
every zone to which we wish to delegate.

noerror/nodata is the wrong answer.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-25 Thread Paul Vixie
...

Tony Finch wrote:
 ...
 Why not something like Paul's metazone idea to automate the configuration
 of which zones the server should answer for?

for reference:
http://www.ietf.org/mail-archive/web/dnsop/current/msg05192.html

paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of draft-wkumari-dnsop-omniscient-as112-01.txt as a WG work item?

2013-02-25 Thread Paul Vixie
...

Paul Vixie wrote:
 ...

 Tony Finch wrote:
 ...
 Why not something like Paul's metazone idea to automate the configuration
 of which zones the server should answer for?
 for reference:
 http://www.ietf.org/mail-archive/web/dnsop/current/msg05192.html


that message's pdf attachment appears to have been corrupted. another
copy is here: http://ss.vix.su/~vixie/mz.pdf

paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] additional special names Fwd: I-D Action: draft-chapin-additional-reserved-tlds-00.txt

2014-02-04 Thread Paul Vixie


Joe Abley wrote:
 ...

 ONION is like LOCAL. Neither are like ARPA (or any other TLD).

How like LOCAL is ONION? ICANN knows it can't sell .LOCAL, but does
ICANN know it can't sell .ONION ?

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-hzhwm-start-tls-for-dns-00: Starting TLS over DNS

2014-02-14 Thread Paul Vixie


Zi Hu wrote:
 We recently posted draft-hzhwm-start-tls-for-dns-00 (Starting TLS over
 DNS) to explore one proposal to add standard TLS over standard DNS to
 improve privacy.
 http://tools.ietf.org/html/draft-hzhwm-start-tls-for-dns-00

 This topic may be of interest to DNSOP and PERPASS.  Some of the authors
 will be at the London IETF and can discuss it at the DNS privacy BOF if
 there is interest.
 ...

this is good work. i recommend it be adopted by the working group, and i
will act as a reviewer.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] meta issue: WG to discuss DNS innovation (was Re: draft-hzhwm-start-tls-for-dns-00)

2014-02-16 Thread Paul Vixie


Joe Abley wrote:
 ...
 If we believe all these problems are intractable, then we might as well just 
 accept that overloading TXT records and reflection attacks are a fact of 
 life, and stop worrying about them.

reflection attacks aren't a fact of life. DNS RRL does not require a
forklift upgrade of the infrastructure, isn't stopped by middleboxes,
and does not change the protocol. i think you should discriminate more
finely as to what we ought and ought not give up about.

 What I would prefer, though, is a more entrepreneurial approach where the 
 likelihood of short-term operational problems (or even long-term failure of 
 the work) should not stop us from trying. ...

those were my exact words upon the publication of RFC 2671. it's been
fifteen years. i think if any change to the dns protocol was going to be
useful enough to overcome edge corruption and edge inertia, it would be
EDNS0.

however, it's heartening to see another generation of cannon fodder
lining up to enter the trenches. you go, joe. i'll cheer you on. but
i'll be working on a RESTful/JSON API to hide DNS edge traffic inside
TLS, in sessions not managed by any X.509 CA, while cheering you on.

 So, how about a starting point where we assume that if a particular extension 
 has value to anybody, the operators (the market) will adjust to allow it to 
 work, and if it doesn't, then adjustments are not necessary?

 Anybody else feel like working on the specification for SCTP transport? :-)

go, joe, go!

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Passive DNS COF

2014-03-07 Thread Paul Vixie


Lawrence Conroy wrote:
 Hi Chaps,
  stupid quick question, listening to the stream:
 How does this work with CDNs (I think you may need to capture the IP address; 
 bailiwick could act as a proxy for that, but ...)

this is well described, as follows:

https://archive.farsightsecurity.com/Passive_DNS/passive-dns-architecture.pdf

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] on the subject of dnse

2014-03-21 Thread Paul Vixie


Phillip Hallam-Baker wrote:
 This was the use case that originally drove the development of OmniBroker.

 If we do DNS Encryption right it is going to be very easy for end
 users to chose their DNS provider and very hard for the authorities to
 block them.

+1.

 Security is a balance. Going through 8.8.8.8 rather than direct means
 that you are leaking privacy sensitive information to Google. But that
 is probably less important here than the censorship attack.

noting, google's public claims about not data mining any part of the
8.8.8.8 query flow, are believable. we also now know that the greater
risk is an on-path nation-state MiTM. i think we should solve for the
latter and not worry about the former.

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] port 0 requests leading to errors

2014-03-22 Thread Paul Vixie


bert hubert wrote:
 ...

 43.504115 IP x.y.117.10.0  192.175.48.6.53: 6365+ SOA? 168.192.in-addr.arpa. 
 (38)
 45.504152 IP x.y.117.10.0  192.175.48.6.53: 6365+ SOA? 168.192.in-addr.arpa. 
 (38)
 49.505124 IP x.y.117.10.0  192.175.48.6.53: 6365+ SOA? 168.192.in-addr.arpa. 
 (38)

 PowerDNS now refuses to attempt to answer such packets, which silences the
 error messages.

mark andrews sent me a similar patch to bind 4.9 back in 1992, which
made no sense to me but i put it in anyway. thanks for explaining.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] port 0 requests leading to errors

2014-03-23 Thread Paul Vixie


Christopher Morrow wrote:

 If I have a patch which makes no sense, will you also add it?


nope. not for you anyway. only mark andrews.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] DNS over DTLS (DNSoD)

2014-04-23 Thread Paul Vixie
for reasons well-spoken up-thread, if we're going to add a dns
transport, i'd like it to be RFC 6013 style TCP (in which session
context can be compressed and retained after FIN for full-window-size
restart, and which permits the query to be bundled into the SYN packet),
or at a minimum, SCTP.

DTLS does not solve any of the problems described at
https://queue.acm.org/detail.cfm?id=2578510.

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] call to work on edns-client-subnet

2014-05-07 Thread Paul Vixie


Andrew Sullivan wrote:
 Dear Uncle Ben,

keep it civil, please.

 On Wed, May 07, 2014 at 07:26:51PM +0200, P Vixie wrote:
 The architectural context of a feature should not be divorced from its 
 specification. RFC is an imprimatur. With great power comes great 
 responsibility.


 I disagree with this point of view.  I see nothing at all wrong with
 one thing that states clearly and precisely how a feature works, and
 another one that says, Here is the wider environment in which
 such-and-thus thing works.

let me show you something wrong with that, then.

http://www.cisco.com/c/en/us/products/collateral/wireless/5700-series-wireless-lan-controllers/data_sheet_c78-722607.html

an rfc is seen by sellers and buyers as an unalloyed good. we can (and i
do) criticize uneducated people making appeals to authority, but that's
a far cry from pretending it won't happen or that any undesirable result
from its happening is not the responsibility of those who write and edit
and approve RFC documents.

the current thrust is to move from ietf should do good engineering to
ietf should document anything that has to be interoperable, and in
that move we have to plan on being quite detailed in our applicability
statement sections. my draft for that section of a client subnet option
goes more or less like this:

 APPLICABILITY STATEMENT

The method described in this document is controversial, as is the use of
wide area anycasting for Full Service Resolvers (recursive DNS servers).
The Domain Name System as originally contemplated and implemented made
the assumption that a Full Service Resolver would either share a host
with, or a LAN with, or a campus with its end-user stub resolvers. In
that scenario, the need for something like the client subnet option does
not arise. Since at the time of this writing, personal electronics are
far more complex and resource intense than a Full Service Resolver, even
when including DNSSEC validation and DNS firewall policy. The purpose
of this document is to describe the client subnet option so that
cooperating systems can interoperate. No recommendation is expressed or
should be implied as to whether this method should be used, or that its
antecedent, wide area anycasted Full Service Resolvers (recursive DNS
servers) should be used. 

if i thought i could get consensus on an addition, i'd add:

 The client subnet option is only useful when other earlier
assumptions about Internet architecture are violated. Specifically, it's
when a market driven CDN (content delivery system) desires to tune DNS
authority responses to control end-user web performance, is reached by
an end user who uses a market driven anycast recursive DNS service.
Neither the described authority DNS tuning nor the described anycasted
recursive DNS service are Internet architecture requirements, or even
recommendations. A web site without a CDN front end will still work, as
will a CDN who has no insight into each requestor's actual address at
the time it receives an authority DNS request. End users who use local
recursive name servers will receive faster service per query due to the
reduced round trip time (one millisecond instead of a dozen or more
milliseconds) and will be less affected by cloud outages. Design by
market force can lead to unnecessary features and not always to good
engineering. 

obviously i'm miffed that Stupid DNS Tricks ultimately demands more
complexity for the DNS, and so on.

   Even the DNS protocol itself has this
 separation of duties, between 1034 and 1035 (though heaven knows the
 actual protocol specification could use some attention).

that's a terrible example since neither one of them talks about the
limited applicability of the other.

 If this were not the case, then in fact we'd have had to discuss the
 entire architectural context of any DNS feature.  It only seems like
 the DNS RFCs are infinitely long.

that's a terrible example since any internet draft describing a
controversial technique either failed or got an applicability statement.
if you think there are cases where RFC 2136 should not be used, over and
above the IAB-demanded statement about authentication, speak on.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] call to work on edns-client-subnet

2014-05-08 Thread Paul Vixie


Tony Finch wrote:
 Barry Margolin pointed out an amusing interaction between two stupid DNS
 tricks on the bind-users list:
 https://lists.isc.org/pipermail/bind-users/2014-May/093171.html

 If you have an authoritative server with ANAME or CNAME flattening
 support, and the target of the ANAME is a CDN that does source-based
 answer selection, then the synthetic A /  records will be based on the
 auth server address rather than the client address, unless you have
 some special arrangement between the auth server and the CDN like
 edns-client-subnet support.

madness. this way lies madness. the dns design had moving parts and
nonmoving parts. the dns implementation is becoming something else entirely.

see also What DNS Is Not https://queue.acm.org/detail.cfm?id=1647302.

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] call to work on edns-client-subnet

2014-05-08 Thread Paul Vixie


Ralf Weber wrote:
 ...
 There is madness, but the madness is in mixing authoritative and recursive 
 functions in one server and not in using DNS to direct traffic.

while i'm on record has holding that view, it turns out that RFC 1035
does describe recursion and authority as co-residing in a server. so
while this is in my view a dangerous practice and a bad idea, it's well
supported by the scriptures.

 After all that's what all lookups do, give you an IP address you connect to.

i don't think so. dns lookups have many purposes unrelated to returning
IP addresses. i'd like to see 100 more things like SSHFP this decade.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] call to work on edns-client-subnet

2014-05-16 Thread Paul Vixie
one of the icann ssac (then secsac) consensus processes i am most
proud to have been part of was this, in 2004:

http://www.icann.org/en/groups/ssac/report-redirection-com-net-09jul04-en.pdf

indeed, this document and the process followed in creating it may still
stand today, as ssac's finest hour.

see especially section 2.3, design principles and good practice in the
internet technical community, starting on page 8.

unless i can think of anything new to say on this topic, this will be my
final comment on this thread.

consensus tally people: i'm yes we must document it, but we must also
explicitly withhold recommendation of it, both in the introduction
section and in some kind of applicability section down near the iana
considerations.

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Extended CNAME (ENAME)

2014-05-16 Thread Paul Vixie


Mark Delany wrote:
 On 17May14, Mark Andrews allegedly wrote:
  domain ENAME domain {0|1} [type list of included / excluded types]
  (0 == include, 1 == exclude)

 As I recall, the HTTP/2.0 folks have been intermittently talking about
 supporting SRV. Would encouraging that group on that front be easier
 than inventing CNAME support at the apex?

yes. by far.


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Extended CNAME (ENAME)

2014-05-19 Thread Paul Vixie


Mark Andrews wrote:
 ... Everytime I have mentioned SRV records to HTTP folks they say it
 won't work as the extra lookup takes too long.

this sounds strange to me. TTL=0 SRV RR's strike me as precisely what
the CDN industry needs, since they can include an  (or for
back-compatibility, an A) RR in the same response as additional data.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Extended CNAME (ENAME)

2014-05-19 Thread Paul Vixie


Ted Lemon wrote:
 On May 19, 2014, at 6:12 PM, David C Lawrence t...@akamai.com wrote:
 Not so much pushing required, at least of Akamai.  You have a
 ready-made [SRV] ally in me, if only clients actually made good use of it.
 The clients are the real obstacle.

 Yup.   It would be great if we could get the HTTP 1.1 clients to do it [SRV], 
 but getting HTTP 2.0 clients to do it [SRV] seems at least as do-able as any 
 of the alternatives that have been proposed.

i was there when SRV was conceived. we intended it to be used
opportunistically, like MX before it, falling back to  or even A
queries if there was no SRV. it can be added to any protocol at any
time, including HTTP/0.9 clients to the extent there are still any of
those around. SRV's rules are defined for a service not by the client.
if we decide that web servers can be reached by SRV records, then any
web client can start looking for the SRV that describes that service,
falling back to whatever tin-cups-and-string it did before if it can't
find the SRV it wants.

in that sense mark andrews' HTTP SRV I-D from all those years ago should
not have been controversial. if you want to do this, here's how
everybody else agreed to do it.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Extended CNAME (ENAME)

2014-05-20 Thread Paul Vixie


Mark Delany wrote:
 one can lookup A,  and SRV in parallel and positive answer
 to SRV, as Paul mentioned, can have additional A and  RRs.

 A downside is that clients has to wait for the SRV query to complete
 so they can be sure of the presence or not of an SRV. ...

in a blast protocol where all N queries are sent to the same
destination, one can reset the blast timeout upon first response, to
1.2x that response time. or even 1.1x. the total time cost delta of a
blast protocol is thus ~10%. since this is only happening on a cache
miss, i don't see it as decisive.

 ...

 You're also ensuring that the global query rate will substantially
 increase on the assumption that HTTP/2.0 becomes as popular as
 HTTP/1.0.

not so. 97% of the queries reaching the root name servers (as an example
of an important subset of global DNS traffic) are unanswerable due to an
initator-side screwup of some kind (rfc1918 source; firewall doesn't
permit response; etc). if we doubled the traffic that is not that 97%,
it would still be mouse nuts compared to that 97%.

 ...

 Generally speaking, the challenge is that SRV is likely acceptable to
 commercial CDN providers that have thus far relied on CNAME - with
 it's intrinsic level of indirection - but will be less welcome by
 those who are using every trick to squeeze latency out of HTTP.

disagreeing for a third time, SRV is an opportunity to squeeze even more
latency out of HTTP.

 ...

 If you want to make everyone happy, you need to invent a single
 round-trip resolution that supports indirection...

content-centric networking would do this. lixia and van have been
talking about it for a few years. alas it's a totally non-IP model and
not likely to replace the internet during the time it will take us to
decide what to do about SRV (and also do whatever it is we decided.)

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Extended CNAME (ENAME)

2014-05-20 Thread Paul Vixie


Masataka Ohta wrote:
 Mark Andrews wrote:

 The reason why CNAME is prohibited at a zone apex is described in RFC 1034:

 If we must change something, isn't it easier to allow CNAME at
 a zone apex than introducing ENAME?

the reasons for prohibiting it, as given in RFC 1034, still apply.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] rssac caucus

2014-05-31 Thread Paul Vixie
Greetings,

If you are interested in participating at ICANN's Root Server System Advisory 
Committee (https://www.icann.org/resources/pages/charter-2013-07-14-en) as a 
Caucus member, please kindly read the relevant information and Caucus document 
published at https://www.icann.org/resources/pages/rssac-caucus-2014-05-06-en 
and submit your statement of interest to rssac-members...@icann.org 

The RSSAC executive is working on publishing the final version Procedures 
documents and at the moment is establishing  the Caucus and with a few work 
items ready to be discussed by the Caucus.

If you would like to volunteer please kindly indicate those intentions known by 
sending an email to rssac-members...@icann.org.

Kind Regards,

Kaveh Ranjbar, RSSAC Membership Committee Chair
Tripti Sinha, RSSAC Membership Committee Member
Paul Vixie, RSSAC Membership Committee Member

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] rssac caucus

2014-06-24 Thread Paul Vixie
Dear colleagues,

This is a friendly reminder to apply for RSSAC Caucus membership. The
cut-off date for first round of membership is end of June, so please
kindly submit your statement of interest before 1st of July to
rssac-members...@icann.org.
On Monday 23rd of June RSSAC had its public session at ICANN 50 and it
was announced that first face to face caucus meeting will be held during
IETF 90 in Toronto.

Kind regards,

Paul Vixie
on behalf of RSSAC Caucus membership committee

re:

Paul Vixie wrote:
 Greetings,

 If you are interested in participating at ICANN's Root Server System Advisory 
 Committee (https://www.icann.org/resources/pages/charter-2013-07-14-en) as a 
 Caucus member, please kindly read the relevant information and Caucus 
 document published at 
 https://www.icann.org/resources/pages/rssac-caucus-2014-05-06-en and submit 
 your statement of interest to rssac-members...@icann.org 

 The RSSAC executive is working on publishing the final version Procedures 
 documents and at the moment is establishing  the Caucus and with a few work 
 items ready to be discussed by the Caucus.

 If you would like to volunteer please kindly indicate those intentions known 
 by sending an email to rssac-members...@icann.org.

 Kind Regards,

 Kaveh Ranjbar, RSSAC Membership Committee Chair
 Tripti Sinha, RSSAC Membership Committee Member
 Paul Vixie, RSSAC Membership Committee Member

 ___
 DNSOP mailing list
 DNSOP@ietf.org
 https://www.ietf.org/mailman/listinfo/dnsop

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] feedback on draft-wkumari-dnsop-dist-root-00

2014-06-24 Thread Paul Vixie


Tim Wicinski wrote:
 ...

 On 6/24/14 3:57 AM, Paul Hoffman wrote:


 My hope is that DNSOP doesn't become too DNSEXT-like where if the -00
 for a proposal isn't universally loved, it is destroyed instead of
 worked on.

 We as chairs do not have that mind set.  My personal feeling is to
 figure out what parts do seem to be useful and have some interest, and
 guide discussions along those lines.   We may be also completely
 delusional, but I'd like to keep believing otherwise for a little
 while longer.

i don't think universal love should be the standard for surviving one's
-00 or not -- so that would be a straw man argument if anyone is
actually making it. however, the standard for consensus should remain
good engineering in view of the overall system. i've authored any number
of silly -00's over the years, which were killed before there could be a
-01, because discussion in the forum pointed in that direction. e.g.,
dns-0x20 remains a bad idea, and will remain a bad idea, no matter how
much work the group does on it.

let's not learn the wrong lesson from dnsext's disgrace -- some -00
ideas do deserve to die. warren introduced dist-root to me in warsaw
during dns-oarc as possibly one such stupid idea, and i agreed with him
and told him why. per drc, i owe this forum a copy of those reasons. the
chairs, and the co-authors, should be open to the possibility that no
amount of work will yield consensus that the idea is sound and that the
resulting overall system would be stronger than either the system we
have now or other more easily reached alternatives.

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] please review CGA-TSIG

2014-06-26 Thread Paul Vixie


Hosnieh Rafiee wrote:
 Hello,

 We actually put all our efforts to change the document thoroughly and not
 only consider the IPv4 scenario that was comment of some people in
 mailinglist but also we expand the DNS privacy section and explained it in
 more detail (no need to change the protocol.)
   http://tools.ietf.org/html/draft-rafiee-intarea-cga-tsig-08

thank you. i am not a member of the int-area@ mailing list, so please
forward this reply to that forum.


 So, any more comments? Any more feedback?  do you think it is now a good
 acceptable version?   :-) 

see below.

 The TSIG keys, which are manually
exchanged between a group of hosts, need to be maintained in a secure
manner.

tsig keys have no needs. i suggest must be maintained here.

 or to assure a Slave Server that the zone transfer is from
the original Master Server and that it has not been corrupted.

or as an access control method to permit AXFR/IXFR only when a shared
TSIG key is present.

 Handling this shared secret in a secure manner and exchanging it does
not appear to be easy. This is especially true if the IP addresses
are dynamic or the shared secret is exposed to the attacker.

this is nonsequitur. either give a reference for what does not appear
to be observed, or simply note that out of band key exchange by
sneaker-net does not scale and was never expected to. also, _what_ ip
addresses? you've not introduced that concept before referencing it.

 this document proposes two
algorithms which support both IPv4 and IPv6 scenarios.

does each of the two support both protocols? if not, the above wording
is wrong. perhaps you mean two algorithms, one for IPv4, and one for IPv6.

 This document updates the
following sections in TSIG document: ...

those details should not be in the Introduction section.

 There are several different methods where DNS records can become
compromised. Some examples of methods are DNS Spoofing; DNS
Amplification Attacks; Resolver Source IP Spoofing; Unauthorized DNS
Update; User Privacy Attack; and Human Intervention.

this Problem Statement is grossly inadequate to motivate the proposal
you've submitted.

consider the User Privacy Attack scenario. the thing that you'd like to
hide is the q-tuple, since the response is public information. only the
requester's interest in a particular q-tuple at a particular time is
worth protecting. we end up having to encrypt the response not because
the response itself is sensitive but because a response will implicate a
q-tuple which is sensitive.

in the stub-to-recursive data path, existing data mining is not occuring
in-channel, but at the endpoints. A/V products instrument end-system
resolvers to learn and sometimes intercept or redirect DNS transactions.
that isn't a problem -- users who don't want it to happen can't stop it
with encryption, but they can stop it by uninstalling the A/V. at the
other end, an RDNS often participates in some kind of passive DNS
collection effort for security analytics purposes, and that is again not
the problem being stated here -- because that's happening outside the
channel where encryption would do any good. asking for dns path
protection end-to-end from stub to authority, such that the RDNS did not
know the q-tuple, raises the questions of how could it cache or reuse
anything, how could DNS function without caching and reuse, and how
could the RDNS route a query to an ADNS without knowing the q-name.

yet you're proposing hop-by-hop channel encryption. there is no stated
justification for who that helps or how. only if a user wants to use a
distant RDNS like opendns or googledns would a form of channel
encryption that prevented the user's ISP and other intervening ISP's (or
national security agencies in the wide-area data path) be useful. if
that's the value you intend to add then you should say so -- after
contextualizing it and defining your taxonomy.

Disadvantages:

- Offline generation of the signature

DNSSEC [RFC6840 http://tools.ietf.org/html/rfc6840] needs manual step 
 for the configuration. For
instance, when a DNSSEC needs to sign the zone offline.

offline generation is not a disadvantage. dnssec makes it optional, and
offers it because it is a desirable feature.

moreover you appear not to know about SIG(0) which worries me since that
ought to have been part of any reasonable background check on this topic
before writing a proposal as fundamental as this one.

- IP spoofing

The public key verification in DNSSEC creates a chicken-and- egg
situation. In other words, the key for verifying messages should be
obtained from the DNSSEC server itself. This is why a query requester
needs to verify the key.

If this does not happen, DNSSEC is vulnerable to an IP spoofing
attack.

this is completely wrong, as in, 100% counter-factual.

i stopped reading this draft at the end of section 1. it appears not to
be worth my time to read the 

[DNSOP] various approaches to dns channel secrecy

2014-07-04 Thread Paul Vixie
i've now seen a number of proposals reaction to the snowden
disclosures, seeking channel encryption for dns transactions. i have
some thoughts on the matter which are not in response to any specific
proposal, but rather, to the problem statement and the context of any
solution.

first, dns data itself is public -- the data is there for anybody to
query for it, if you know what to query for. only the question,
questioner, and time can be kept secret. answers are only worth keeping
secret because they identify the question, questioner, and time.

second, dns transactions are not secret to protocol agents. whether stub
resolver, full resolver, forwarder, proxy, or authority server -- the
full identity of the question must be knowable to the agent in order to
properly process that question. if the agent does logging, then the
question, questioner, and time will be stored and potentially shared or
analyzed.

by implication, then, the remainder of possible problem statement
material is hide question from on-wire surveillance, there being no
way to hide the questioner or the time. to further narrow this, the
prospective on-wire surveillance has to be from third parties who are
not also operators of on-path dns protocol agents, because any second
party could be using on-wire surveillance as part of their logging
solution, and by (2) above there is no way to hide from them. so we're
left with hide question from on-wire surveillance by third parties.

this is extremely narrow but i can envision activists and dissidents who
rightly fear for their safety based on this narrowly defined threat, so
i'm ready to agree that there should be some method in DNS of providing
this secrecy. and as we know from the history of secrecy, if you only
encrypt the things you care about, then they stand out. therefore,
secrecy of this kind must become ubiquitous.

datagram level channel secrecy (for example, DTLS or IPSEC) offers a
solution which matches the existing datagram level UDP transport used
primarily by DNS. however, the all-pervasive middleboxes (small plastic
CPE devices installed by the hundreds of millions by DSL and Cable and
other providers) have been shown to be more powerful than IPv6, DNSSEC,
and EDNS -- we could expect them to prevent any new datagram level
channel secrecy protocol we might otherwise wish to employ.

TCP/53 is less prone to middlebox data inspection, and may seem to be an
attractive solution here. i think not for two reasons. first, TCP/53
is often blocked outright, and second, because TCP/53 as defined in RFC
1035 has a connection management scheme that prohibits persistent TCP/53
connections at Internet scale, and we cannot afford the setup/teardown
costs of a non-persistent TCP-based channel secrecy protocol for DNS. to
those who suggest redefining TCP/53 and upgrading the entire physical
plant and all software and operating systems, i challenge you to first
show how this is less global effort than other proposals now on the
table, and then show how you would handle the long-tail problem, since
many agents will never be upgraded, or will only be upgraded on a scale
of half-decades. DNS works today because TCP/53 is a fallback for
UDP/53. its definition and deployment makes it unsuitable either
currently or as-would-be upgraded to become the primary transport.

i suggest that any channel secrecy protocol we wish to add to the DNS
system must be suitable as the primary transport, to which the existing
UDP/53 and TCP/53 protocols are fallbacks. i further suggest that any
new transport be operable at internet scale, which demands connection
persistence. finally i suggest that this be done using a protocol that
the internet's middle boxes (cheap CPE devices who think they know
what all valid traffic must look like) will allow to pass without comment.

one candidate for this would be RESTful JSON carried over HTTPS. because
of its extensive use in e-commerce and web API applications, HTTPS
works everywhere. because HTTPS currently depends on X.509 keys, other
groups in the IETF world are already working to make HTTPS proof against
on-path surveillance. (google for perfect forward secrecy to learn
more), and others are working to defend the internet user population
against wildcard or targeted SSL certificates issued by governments and
other anti-secrecy agents with on-path capabilities.

stephane bortzmeyer has already shown us that JSON representation of DNS
transactions is possible. i have heard from another protocol engineer
who is also working in this area (and who credits bortzmeyer for
informing his work).

the special advantage of TCP/443 as a primary transport for persistent
DNS with channel secrecy is that HTTPS's connection management permits
massive scale, as in, a single protocol agent with tens or hundreds of
thousands of open connections, even with local and global load balancing
and connection pinning.

in summary, i agree that we have a narrowly defined problem of on-path
surveillance 

Re: [DNSOP] draft-wkumari-dnsop-dist-root-01.txt

2014-07-05 Thread Paul Vixie


Joe Abley wrote:
 Hi Paul, Warren,

 On 4 July 2014 at 16:50:08, Paul Hoffman (paul.hoff...@vpnc.org) wrote:

 Greetings. Warren and I have done a major revision on this draft, narrowing 
 the design  
 goals, and presenting more concrete proposals for how the mechanism would 
 work. We welcome  
 more feedback, and hope to discuss it in the WG in Toronto.

 I think there is much in the language of this draft that could be tightened 
 up, but this is an idea for discussion so I'll avoid a pedantic line-by-line 
 dissection. But I can give you the full pedantry if you like :-)

 On the pros and cons, however (crudely pasted below), see below.

 TL;DR: there are way more cons than pros to this proposal. The pros listed 
 are weak; the cons listed are serious. I don't see a net advantage to the DNS 
 (or to perceived performance of the DNS for any client) here. This proposal, 
 if implemented, would represent non-trivial additional complexity with 
 minimal or no benefit. I am not in favour of it, if that's not obvious.

 ...


i am +1 to joe's comments above and analysis elided. i consider joe's
response to be at least as good as the because i owe DRC after my
first short answer to the -00 version of this draft. however, i want to
add two other countervailing points.

first, this approach was tried in freebsd, when doug barton (then
freebsd's BIND9 maintainer) made it the default. all hell broke loose
due to changes in firewall config. debugging cost was maximized, and the
debugging skills were minimized. this config was removed with prejudice.
this experience, where freebsd users are actually among the smartest of
all dns users, should serve as a warning sign to others: abandon hope
all ye who enter here. so, joe's recommendation that this draft be
retitled and rekerned to be
draft-ietf-dnsop-slaving-root-on-resolvers-harmful resonates very
strongly with me.

second, this approach asks millions or tens of millions of rdns servers
to change their config in order to actually scale the capacity of the
root. (so, high cost and low benefit, as joe said.) the reason i
proposed a radically different solution in my ICANN ITI contribution
(now described at
http://tools.ietf.org/html/draft-lee-dnsop-scalingroot-00) is to allow a
few dozen to a few hundred self selected highly skilled and motivated
network-level admins to scale the capacity of the root for everyone.
it's a plain hierarchical solution allowing the operators of any
loopback network on any host, or any LAN segment, or any campus,
corporate, or ISP network to add root name service as a local
capability; it also allows unlimited scale at the global BGP layer. it
is patterned after the success of AS112. it is apolitical since existing
rootops are also expected to participate.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] various approaches to dns channel secrecy

2014-07-05 Thread Paul Vixie


Matthäus Wander wrote:
 * Paul Vixie [7/5/2014 5:04 AM]:
 datagram level channel secrecy (for example, DTLS or IPSEC) offers a
 solution which matches the existing datagram level UDP transport used
 primarily by DNS. however, the all-pervasive middleboxes (small plastic
 CPE devices installed by the hundreds of millions by DSL and Cable and
 other providers) have been shown to be more powerful than IPv6, DNSSEC,
 and EDNS -- we could expect them to prevent any new datagram level
 channel secrecy protocol we might otherwise wish to employ.

 DTLS works on top of UDP (among others) and thus can pass CPE devices.

no, it cannot. DTLS does not look something that the CPE was programmed
to accept; thus in many cases it is silently dropped.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] various approaches to dns channel secrecy

2014-07-06 Thread Paul Vixie


Matthäus Wander wrote:
 * Paul Vixie [7/5/2014 7:47 PM]:
 Matthäus Wander wrote:
 DTLS works on top of UDP (among others) and thus can pass CPE devices.
 no, it cannot. DTLS does not look something that the CPE was programmed
 to accept; thus in many cases it is silently dropped.


 DTLS can be used on top of UDP. CPE devices allow outgoing UDP sessions
 to arbitrary ports. If they didn't, many online games and VoIP
 applications would not work.

it's possible to find single counter examples to almost any assertion.
however, consider RFC 2671 (EDNS), published fifteen years ago. because
it changes the format of a UDP/53 datagram, there is silent loss across
most CPE boundaries. implementers of EDNS have had to investigate and
deploy about a dozen different fallback strategies since then, not to
make EDNS work, but to make it fail reliably enough so that normal
non-EDNS can be tried. since DNSSEC relies on EDNS0, this is a real
problem. to the extent that it's gotten any better it's because someone
changed this CPE logic:

if (normal dns packet)
intercept it and answer inappropriately, 30% of the time;
let it get where it's going, 70% of the time;
else
drop;

to this:

if (normal dns packet)
intercept it and answer inappropriately, 30% of the time;
let it get where it's going, 70% of the time;
else if (normal edns packet)
intercept it and answer inappropriately, 30% of the time;
let it get where it's going, 70% of the time;
else
drop;

in other words what fixes have been made have been EDNS specific, where
the real fix is:

if (packet addressed to you)
handle it or send ICMP;
else
let it get where it's going;

that fix is not going into the O(10^9) CPE devices now in place, ever.

if we can't get this right for EDNS in 15 years, my bet is that another
15 (or 150) years of trying won't produce better results. in fact, by
jim gettys and dave taht i've been made to understand that the world's
CPE problem is much worse than i knew. we might be able to fix it for
the next billion devices some day, but the devices shipping today are
still crippled.

incentives are such that a CPE provider hopes to sell web access, not
internet access.

your counter-example of DNS gaming does not change the treatment now
accorded UDP/53 at the internet edge. if you seriously think that a DTLS
solution can be universally deployed, including in hotel rooms, home CPE
environments, coffee shops, and mobile, then you and i are having a
same planet, different worlds experience, and i wish you well on your
walk.

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Int-area] various approaches to dns channel secrecy

2014-07-07 Thread Paul Vixie


Hannes Tschofenig wrote:
 Just a minor note on this paragraph:

 because HTTPS currently depends on X.509 keys, other
 groups in the IETF world are already working to make HTTPS proof against
 on-path surveillance. (google for perfect forward secrecy to learn
 more), and others are working to defend the internet user population
 against wildcard or targeted SSL certificates issued by governments and
 other anti-secrecy agents with on-path capabilities.

 TLS has this ciphersuite concept and allows you to more than just X.509
 certificates. As such, you have more freedom than you think (if you know
 what you want).

you are right of course. we would use TLS PSK for this, avoiding the
X.509 system entirely.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Int-area] various approaches to dns channel secrecy

2014-07-07 Thread Paul Vixie


Bernard Aboba wrote:
 this is extremely narrow but i can envision activists and dissidents who
 rightly fear for their safety based on this narrowly defined threat

 [BA] Presumably protection would only be from an attacker that can snoop on 
 the wire, but not have access to the logs?

yes. which i said explicitly:

 by implication, then, the remainder of possible problem statement
 material is hide question from on-wire surveillance, there being no
 way to hide the questioner or the time. to further narrow this, the
 prospective on-wire surveillance has to be from third parties who are
 not also operators of on-path dns protocol agents, because any second
 party could be using on-wire surveillance as part of their logging
 solution, and by (2) above there is no way to hide from them. so we're
 left with hide question from on-wire surveillance by third parties.

so, to your question:

 Is the assumption that the DNS server is hosted out of country, and that 
 measures are used to avoid identification of DNS traffic?  I am trying to 
 understand the scenario in which this actually would have a plausible chance 
 of making a difference.

there are two kinds of channel in dns queries. (i'm not going to account
for updates or zone transfers here.)

one channel is from the stub to the recursive. it's pointless to add
secrecy to that unless a stub wants to use a very distant name server,
like opendns or googledns, or as in your example, one in another
country. however, these long stub/recursive paths do exist and are
becoming more common, either to avoid poisoning by the local recursive
operator (typosquatting and so on) or to avoid surveillance by the local
recursive operator or to access poisoning by a distant local recursive
operator (opendns for example is actually a security company, and they
deliberately filter out dns results to known-dangerous locations, as a
service.)

the other channel is from the recursive to the authoritative. these
transactions contain very little PII, since the IP address of the
end-user is not present, and since cache re-use events are not present,
only cache-miss events. however, this channel is frequently intercepted
(see china's GFW) and frequently observed/logged. (my $DAYJOB does this
kind of observation/logging, but only with the explicit permission of
the recursive operator who must deliberately install our sensor
software, and only with the implicit permission of their stub
population, which we can't ourselves verify, but we require be attested.)

secrecy on either of these channels is only rarely important, but in
order to avoid exceptional appearance (standing out like a sore thumb)
it's going to be necessary to make secrecy on both of these channels
ubiquitous.

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Int-area] various approaches to dns channel secrecy

2014-07-07 Thread Paul Vixie
 
 
Paul Ferguson wrote:
 ...
  
 That is *not* to say that DANE is not a desirable thing to
 deploy/accomplish.

DANE relies on DNSSEC which relies on EDNS. the placement of a
DNS-over-HTTPS channel would have to be below EDNS in the stack, and
non-reliant. therefore my correction up-thread -- this HTTPS session
would rely on PSK for keying information, not X.509.

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] various approaches to dns channel secrecy

2014-07-07 Thread Paul Vixie


Nicholas Weaver wrote:
 ...

 One important observation:  ONLY the path between the client and the 
 recursive resolver in the classic model substantially benefits from channel 
 security.

if i were proposing a secrecy scheme that was easy to do on
stub-to-recursive but hard to do on recursive-to-authority, then i'd be
looking very much harder at the benefits of recursive-to-authority.
however, what i'm proposing is no easier to do in one case than the
other, and so any purported difference in benefit is outweighed by the
lack of difference in the cost. pay once, benefit twice, is good
engineering economics as far as i'm concerned.

 ...

 Even if you wave a magic wand and all resolver-authority communication 
 becomes protected with 0-cost, 100% perfect data encryption, basic traffic 
 analysis will largely be able to determine which domains are being looked up. 
  Individual names within the domain are protected, but that is relatively 
 minor.

 The other problem is DNS is used to guide endpoint communication.  Between 
 the resolver-authority information leak, and the actual IP selected by the 
 endpoint itself for communication, this allows a nation-state observer 
 adversary to pretty much recover what the hostname was in question in many 
 cases, and at least the domain in almost all cases.

i wish it noted that i am responding to the general post-snowden call
for channel secrecy, and that i don't myself see much need for it in the
case of DNS, but that the proposals i've seen come out of the security
community for how to add channel secrecy to DNS are alarming in their
lack of understanding of what DNS is, how large DNS is, and how DNS
works. therefore, i'm attempting to isolate the cases which might be
relevant to somebody, i am drumming up a definition of dissident, and
crafting a proposal that would protect that mythical person's interests.

the fact that the QNAME can be recovered in many cases by a well
resourced nation-state actor is meaningless here, since that
surveillance would have to be targeted, and would be both inaccurate and
expensive; whereas the surveillance i'm solving for is the ubquitous
kind, which is presently very accurate and very cheap.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] various approaches to dns channel secrecy

2014-07-07 Thread Paul Vixie


Matthäus Wander wrote:
 ...

 I didn't mean to imply that a DTLS solution can be universally deployed.

because the dns is a map to the territory known as the internet, and
because most internet packet flows begin with a dns transaction, i'm
dismissing out of hand anything that will almost universally not work
for some class of user, such as those in hotel room wireless networks,
or behind CPE that either can't pass new protocols or would require
above-average skill to configure for such.

in my own configuration i'd set EDNS to be the primary protocol, and add
HTTPS as the first fallback to be tried, so that the fallback to plain
DNS on UDP/53 can be as rare as possible. this may even be a reasonable
default.

but we can't spend any of our time pretending that the internet
architecture isn't a hostage to a billion poorly built CPE devices, no
matter how hopeful we are as to the future, and no matter how many
personal counter-examples we can cite.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-wkumari-dnsop-dist-root-01.txt

2014-07-07 Thread Paul Vixie


David Conrad wrote:
 Paul,


 ...
 that's why query minimization is the preferred solution to this problem.

 This isn't either/or.

are you proposing to solve problem A (junk queries at the root) and
problem B (junk queries at tld's and pseudo-tld's) using different
mechanisms? why is the cost of a second mechanism worth paying, if a
single mechanism would solve both problems?

granted, we can solve any given problem in any number of ways including
one, or more than one. but what's our incentive to pay more than we have to?

 ... one key point of slaving the root is that folks who do slave the root are 
 accepting the responsibility to keep it up to date.  Failure to do so only 
 impacts their own customer base. This is a self-correcting problem -- get too 
 stale and your (presumably paying) customer scream at you ...

my experience has been that when dns doesn't work the call reporting
this can go just about anywhere. if i could be sure that the first call
from most users would go to the actual person who had the power to fix
whatever caused the call, i'd certainly make that a primary design
assumption.

put it the other way. as a domain holder, i'd like the system
recommended by IETF whereby my delegation data is distributed to be as
error-unlikely as possible. if you give me a vote, wearing my domain
holder hat, i will pick please tell the small number of people who want
to run root anycast nodes to do so rather than please tell the large
number of RDNS operators to slave the root. this is me wanting,
selfishly, uptime and a low number of dependencies and
state-permutations. but i consider myself to be representative of other
domain holders in this regard, so it could be worth paying attention to
my selfish desires this time.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-wkumari-dnsop-dist-root-01.txt

2014-07-09 Thread Paul Vixie


Declan Ma wrote:
 Zhiwei,

   Your proposal seems reasonable. But we can not separate the 
 recursive-level and authorative-level, as you call it by the way, since the 
 DNS is an integrated one. If both of the two solutions are feasible, we need 
 to figure out how and to what extent, both solutions could collaborate on 
 root zone file distribution, not in the “respective scenarios” .


 Declan Ma
 ZDNS

in my opinion, the applicability statement of a recursive solution would
be: if you want these benefits and can manage these risks, then you can
configure your rdns as follows. whereas the applicability statement for
an authoritative solution would be: if you want to serve root dns
content to a loopback, lan, campus, or global network, then configure
your adns and your routing as follows.

separate from applicability, there is vision. the vision statement for
an rdns solution would be: to allow self selected recursive dns
operators to become less dependent on the root name server system, the
following proposal is offered. whereas the vision statement for the
adns solution would be: to better server root dns content to the
internet, the following proposal is offered.

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Recursive solutions and authoritative solutions

2014-07-09 Thread Paul Vixie


Paul Hoffman wrote:
 On Jul 9, 2014, at 12:43 AM, Paul Vixie p...@redbarn.org wrote:

 in my opinion, the applicability statement of a recursive solution would
 be: if you want these benefits and can manage these risks, then you can
 configure your rdns as follows. whereas the applicability statement for
 an authoritative solution would be: if you want to serve root dns
 content to a loopback, lan, campus, or global network, then configure
 your adns and your routing as follows.

 separate from applicability, there is vision. the vision statement for
 an rdns solution would be: to allow self selected recursive dns
 operators to become less dependent on the root name server system, the
 following proposal is offered. whereas the vision statement for the
 adns solution would be: to better server root dns content to the
 internet, the following proposal is offered.

 These statements assume that there is a need for an authoritative solution, 
 ...

no. these statements offer specific motives to specific self-identified
parties.

 ...

 Given that you are one of the co-authors of draft-lee-dnsop-scalingroot, can 
 you say why your authoritative proposal is significantly better than the 
 current operational base?

yes. in
https://www.icann.org/en/system/files/files/report-21feb14-en.pdf
(section 9.4) i wrote as follows:

 Criticisms of the current and historical Root Name Server System
include lack of resistance to DDoS
attack, noting that even with the current wide scale anycasting by every
Root Name Server Operator,
there are still only a few hundred name servers in the world who can
answer authoritatively for the DNS
root zone. We are also concerned that reachability of the Root Name
Server System is required even for
purely local communication, since otherwise local clients have no way to
discover local services. In a
world sized distributed system like the Internet, critical services
ought to be extremely well distributed. 

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Recursive solutions and authoritative solutions

2014-07-09 Thread Paul Vixie


Paul Hoffman wrote:
 On Jul 9, 2014, at 10:45 AM, Paul Vixie p...@redbarn.org wrote:

  Criticisms of the current and historical Root Name Server System include 
 lack of resistance to DDoS attack, noting that even with the current wide 
 scale anycasting by every Root Name Server Operator, there are still only a 
 few hundred name servers in the world who can answer authoritatively for the 
 DNS root zone. We are also concerned that reachability of the Root Name 
 Server System is required even for purely local communication, since 
 otherwise local clients have no way to discover local services. In a world 
 sized distributed system like the Internet, critical services ought to be 
 extremely well distributed. 

 Apologies, but that doesn't answer the question. In the face of lack of 
 resistance to DDoS attacks, why is it better to have more *authoritative* 
 root servers, as compared to validating recursive resolvers that have an 
 up-to-date signed copy of the root? Similarly, for purely local 
 communication, why is it better to have more *authoritative* root servers? 
 The last sentence above makes good sense, but it too is not related to the 
 number authoritative servers.

my comparison of the recursive vs authoritative approach to scaling root
name service was given in the attached e-mail. --vix


---BeginMessage---


Joe Abley wrote:
 Hi Paul, Warren,

 On 4 July 2014 at 16:50:08, Paul Hoffman (paul.hoff...@vpnc.org) wrote:

 Greetings. Warren and I have done a major revision on this draft, narrowing 
 the design  
 goals, and presenting more concrete proposals for how the mechanism would 
 work. We welcome  
 more feedback, and hope to discuss it in the WG in Toronto.

 I think there is much in the language of this draft that could be tightened 
 up, but this is an idea for discussion so I'll avoid a pedantic line-by-line 
 dissection. But I can give you the full pedantry if you like :-)

 On the pros and cons, however (crudely pasted below), see below.

 TL;DR: there are way more cons than pros to this proposal. The pros listed 
 are weak; the cons listed are serious. I don't see a net advantage to the DNS 
 (or to perceived performance of the DNS for any client) here. This proposal, 
 if implemented, would represent non-trivial additional complexity with 
 minimal or no benefit. I am not in favour of it, if that's not obvious.

 ...


i am +1 to joe's comments above and analysis elided. i consider joe's
response to be at least as good as the because i owe DRC after my
first short answer to the -00 version of this draft. however, i want to
add two other countervailing points.

first, this approach was tried in freebsd, when doug barton (then
freebsd's BIND9 maintainer) made it the default. all hell broke loose
due to changes in firewall config. debugging cost was maximized, and the
debugging skills were minimized. this config was removed with prejudice.
this experience, where freebsd users are actually among the smartest of
all dns users, should serve as a warning sign to others: abandon hope
all ye who enter here. so, joe's recommendation that this draft be
retitled and rekerned to be
draft-ietf-dnsop-slaving-root-on-resolvers-harmful resonates very
strongly with me.

second, this approach asks millions or tens of millions of rdns servers
to change their config in order to actually scale the capacity of the
root. (so, high cost and low benefit, as joe said.) the reason i
proposed a radically different solution in my ICANN ITI contribution
(now described at
http://tools.ietf.org/html/draft-lee-dnsop-scalingroot-00) is to allow a
few dozen to a few hundred self selected highly skilled and motivated
network-level admins to scale the capacity of the root for everyone.
it's a plain hierarchical solution allowing the operators of any
loopback network on any host, or any LAN segment, or any campus,
corporate, or ISP network to add root name service as a local
capability; it also allows unlimited scale at the global BGP layer. it
is patterned after the success of AS112. it is apolitical since existing
rootops are also expected to participate.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
---End Message---
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Recursive solutions and authoritative solutions

2014-07-09 Thread Paul Vixie


Paul Hoffman wrote:
 On Jul 9, 2014, at 11:15 AM, Paul Vixie p...@redbarn.org wrote:

 Paul Hoffman wrote:
 ...
 Apologies, but that doesn't answer the question. In the face of lack of 
 resistance to DDoS attacks, why is it better to have more *authoritative* 
 root servers, as compared to validating recursive resolvers that have an 
 up-to-date signed copy of the root? Similarly, for purely local 
 communication, why is it better to have more *authoritative* root servers? 
 The last sentence above makes good sense, but it too is not related to the 
 number authoritative servers.

 my comparison of the recursive vs authoritative approach to scaling root 
 name service was given in the attached e-mail. --vix

 I'll take that as a no to you having answers to the questions about why it 
 is better to have the additional servers be authoritative.

i don't know how to state the case more clearly. my answer is not no
as you surmise. the cost of the recursive solution is high and the
benefit low. the cost of the authoritative solution is low and the
benefit high. if you consider the number of operators involved, their
skill and motivation levels, and the number of affected end users -- in
each case -- you should be able to reason your way to the same conclusion.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Recursive solutions and authoritative solutions

2014-07-09 Thread Paul Vixie


Paul Hoffman wrote:
 On Jul 9, 2014, at 1:47 PM, Paul Vixie p...@redbarn.org wrote:

 i don't know how to state the case more clearly. my answer is not no as 
 you surmise. the cost of the recursive solution is high and the benefit low. 
 the cost of the authoritative solution is low and the benefit high. 

 a) You didn't actually calculate the cost of the recursive solution, you 
 simply pulled a large number of servers needed out of thin air.

about 20M IP addresses answer as open recursive. most of these are low
quality CPE and other servers without skilled operators. i don't believe
that the rdns-root proposal is aimed at this set of users, but if it is,
we've got a NOTIFY problem as well as a debugging problem.

to the best of my knowledge opendns and google dns already operate as
stealth secondaries for the root, not that they can answer AA for root
data, but that they don't need to ask a real root name server for any
TLD information, and they can generate NXDOMAIN without having to swim
upstream to get a purpose built NXDOMAIN for the root. if not, both
should. if the rdns-root proposal is aimed at this set of users, then
that's great, it just needs an applicability statement similar in
concept to the one i suggested up-thread.

the middle of the market is where we lose cognitive traction. from my
point of view this set of operators is not skilled enough, and is not
ever going to be skilled enough, to both configure and operate and audit
and debug a stealth root slave. the freebsd experiment proved this to my
satisfaction, though i was previously informed on this topic by selling
BIND support for a decade or two. but if we imagine that the skills gap
could be closed with good documentation and good software, the portion
of the internet that can be isolated from root name server reachability
errors using this approach is still very small -- and the roll out time
for vendors like nominum, microsoft, infoblox, ISC and others to inform
their customers of this option is measured in years. and the total mass
of held state in terms of software revisions, version numbers, stored
content has a multiplier in the tens of thousands if not hundreds of
thousands.

there's no thin air here.

based on the freebsd experiment with stealth root zone service, it can't
scale. (the freebsd community is Very Smart in the grand scheme of
things.) whereas based on the AS112 experience with unowned anycast,
that approach can scale -- all we needed was DNSSEC so as to erase the
temptation of local root operators to amend the zone content in any way.


 b) You didn't say why would need any fewer authoritative servers to get the 
 same benefit.

i said why fewer authoritative servers would have a greater benefit.

 ...

 If the goal is to get the correct answers for root queries closer to more 
 users, both proposals do that.

i'd like a small number of operators to be able to effect internet-wide
improvement, and specifically, i'd like a moderate number of edge
network operators to be able to offer root name service to their
rdns-running populations without them having to pirate the address space
of an existing root name server operator.

i want to avoid having this burden shift to every single rdns operator
who wants the benefit of better access to root zone content, because (a)
the world's supply of rdns operators motivated and skilled enough to do
that is insignificant; (b) the complexity of configuration and
monitoring and debugging will scale with the affected population; and
(c) the affected population will be extremely small compared to the size
of (for example) the affected population of the AS112 system.

so my goal is different -- both more broad and more narrow -- than the
goal you're describing.

i'll stop here. feel free to have the last word.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Recursive solutions and authoritative solutions

2014-07-09 Thread Paul Vixie


David Conrad wrote:
 On Jul 9, 2014, at 2:17 PM, Paul Vixie p...@redbarn.org wrote:
 the freebsd experiment proved this to my satisfaction,

 My understanding of the freebsd experiment you keep referencing was that 
 one individual on the FreeBSD core team decided to change the default on an 
 OS distribution in a very unexpected and infrastructure impacting way without 
 significant (any?) public notice, resulting in an 'interesting' set of 
 surprises for folks who merely upgraded their OS.

that happened, except that the backout of this config feature was driven
not just by the experiences of those surprised by it, but also by those
who knew it was coming and knew it was happening. two wizard level
freebsd power users went so far as to describe a failure caused by the
root zone timing out due to an upstream firewall change. rather than
teach the system how to monitor and report this sort of thing, and back
out the local root zone if it went stale, there was a brief and overdue
cost:benefit analysis after which this config was backed out of freebsd
itself.

   Can you please point to your evidence that the failure of the freebsd 
 experiment was driven by a lack of skill to both configure and operate and 
 audit and debug a stealth root slave? 

i did not keep notes as to who did or said what and on which dates.
perhaps doug barton could be persuaded to say more.

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Last Call: draft-ietf-appsawg-nullmx-05.txt (A NULL MX Resource Record for Domains that Accept No Mail) to Proposed Standard

2014-07-18 Thread Paul Vixie


Tony Finch wrote:
 John C Klensin john-i...@jck.com wrote:
 IN MX 0 .

 At least in the near term, some SMTP Server (MTA)
 implementations will conform to that rule (many already use it)
 and some won't.   For the latter, they will presumably do what
 the SMTP specs say to do.  In summary, that is to look up the
 address(es) associated with the root and try to open a mail
 connection to one of them.

 There are no addresses associated with the root, so the mail server will
 immediately report a delivery error. RFC 5321 section 5.1 paragraph 2
 final sentence.

 The SMTP server will not try to connect to the root name servers, as your
 message suggested.

true as stated.

what's unstated here is that every SMTP sender who encounters such an MX
without understanding its new meaning will do two or three lookups: .
MX, [. ,] and . A. if they are behind an RDNS that doesn't do
negative caching (and there are many, though none of them are open
source; the open source RDNS servers do negative caching right) then
these two or three queries will flow through to the authority servers
for . which is to say the root name servers.

the long tail on old interpretation is between one and three decades.
(which is also why repurposing/redefining things like TCP/53 is
unworkable, as discussed separately.)

if IETF had rules, one of them should be, don't redefine things that are
in an existing datapath -- make a new datapath.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Masataka Ohta's 2004 draft...

2014-07-23 Thread Paul Vixie


David Conrad wrote:
 Masataka,

 On Jul 23, 2014, at 7:57 AM, Masataka Ohta mo...@necom830.hpcl.titech.ac.jp 
 wrote:
 http://tools.ietf.org/html/draft-ietf-dnsop-ohta-shared-root-server-03
 In what context, did you mention it?

 I asked if the authors had compared their draft 
 (http://tools.ietf.org/html/draft-lee-dnsop-scalingroot-00) to yours.

this author isn't in toronto so i'll answer here-- i had not and have
not compared -lee-dnsop-scalingroot- to -ohta-shared-root-.

vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] DNS, fragmentation, and IPv6 extension headers

2014-07-30 Thread Paul Vixie
i think there's a necessary and healthy tension between the installed
base and new technology. i would not like to see every new application
designed to run inside TCP/80, even though that's the only universal
wide area protocol. and we won't see any new application that requires a
forklift upgrade of the whole internet before it can be used -- no market.

in this case i think mark's approach is right, because it works better
for people who fix their firewalls, but it finds a way to work, no
matter what. this puts a little bit of pressure on middlebox makers who
mindlessly constrain future protocols.

sardonically, the reason i chose fragmentation for EDNS rather than a
new MD (More Data) bit in the flags and a new fragment number N of M
option in the OPT RR, is that i imagined getting EDNS deployed in less
than five years. now that it's been almost fifteen years and we're still
fiddling with it, i can see that i made the wrong choice in RFC 2671.

vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] fyi [Pdns-users] Please test: ALIAS/ANAME apex record in PowerDNS

2014-09-21 Thread Paul Vixie


 bert hubert mailto:bert.hub...@netherlabs.nl
 Sunday, September 21, 2014 4:52 AM
 ...

 PS: the above is currently not yet supported for DNSSEC domains!

i'd be very interested in a standards-track (interoperable; including
DNSSEC support and AXFR/IXFR) version of this feature. my hope is that
you will remove out-of-zone capability here, that is, the target of
ALIAS should have to be authority data in the same zone. this would
simplify the DNSSEC case, but more importantly, it would avoid having
authority servers make upstream queries.

if you decide to work on this, i'll contribute as at least a reviewer
and perhaps (if invited) as an editor.

-- 
Paul Vixie
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


  1   2   3   4   5   6   7   8   9   10   >