Re: [DNSOP] Do we need new draft that recommends number limits ?

2024-03-12 Thread Mark Andrews
gt; R's, > John > > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET:

Re: [DNSOP] [Ext] About key tags

2024-03-01 Thread Mark Andrews
You don’t perform a verify if the time window is invalid. The same as you don’t perform a verify if the tag doesn’t match. Mind you it’s completely pointless to have multiple time ranges. The RRset and it’s signatures travel as pairs. All the key rollover rules depend on that. -- Mark

Re: [DNSOP] [Ext] About key tags and collision numbers

2024-02-28 Thread Mark Andrews
ou partition the ID space among multiple signers. > That would be (other than the grease kludge) an elegant way out. > > R's, > John > > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listi

Re: [DNSOP] [Ext] About key tags

2024-02-28 Thread Mark Andrews
> On 29 Feb 2024, at 08:44, John R Levine wrote: > > On Thu, 29 Feb 2024, Mark Andrews wrote: >>> If it is forbidden in the protocol, it might still happen. >> >> Ed, your reasoning is off. The point of forbidding is to allow the >> validator to

Re: [DNSOP] [Ext] About key tags

2024-02-28 Thread Mark Andrews
ied -> specified). The hardest part is getting vendors to fix their products. That was the most important work in 2019. After that there was a very rapid reduction in broken servers out there. It is not impossible to do. Mark > ___ > DNSOP mailing list > DNSOP@ietf.org > htt

Re: [DNSOP] [Ext] About key tags

2024-02-28 Thread Mark Andrews
happen. Ed, your reasoning is off. The point of forbidding is to allow the validator to safely stop as soon as possible when it is under attack. > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark

Re: [DNSOP] [Ext] About key tags

2024-02-27 Thread Mark Andrews
the DNS in the past. > Regards, > John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY > Please consider the environment before reading this e-mail. https://jl.ly -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 I

Re: [DNSOP] [Ext] About key tags

2024-02-27 Thread Mark Andrews
> On 28 Feb 2024, at 09:09, John Levine wrote: > > It appears that Mark Andrews said: >> The current “fixes” still leave validators more vulnerable to cpu exhaustion >> attacks than eliminating colliding key tags in the signer does. This is a >> protocol bug that

Re: [DNSOP] [Ext] About key tags

2024-02-27 Thread Mark Andrews
3 records due to CPU exhaustion. What is the difference with fixing this with DNSKEYs? Is it "I don’t want to touch my code”? > Best, > Peter > > ___ > DNSOP mailing list > DNSOP@ietf.org > http

Re: [DNSOP] [Ext] About key tags

2024-02-27 Thread Mark Andrews
> On 28 Feb 2024, at 05:50, Peter Thomassen wrote: > > > > On 2/15/24 22:53, Mark Andrews wrote: >> But we can state that they should be avoided when generating new DNSKEYs. >> BIND has been avoiding key tag collisions for 2 decades now when generating >>

Re: [DNSOP] DNS Grease?

2024-02-26 Thread Mark Andrews
hich show my ignorance, not yours. I > thank you for the gentle clue-stick hit, it was educational. > > -G > > On Tue, Feb 27, 2024 at 12:24 PM Shumon Huque wrote: >> >> On Tue, Feb 27, 2024 at 12:01 AM Mark Andrews wrote: >>> >>> >>>> On 2

Re: [DNSOP] DNS Grease?

2024-02-26 Thread Mark Andrews
as is mentioned in the draft, has been testing this for years now. You don’t need to speculate. You can go view the behaviour patterns. > Nice, small draft. > > -G > On Tue, Feb 27, 2024 at 10:29 AM Shumon Huque wrote: >> >> Hi folks, >> >> M

Re: [DNSOP] Detecting, regeneration and avoidance was Re: [Ext] About key tags

2024-02-20 Thread Mark Andrews
llision > set. That’s why I keep raising the key management angle. > From: Ted Lemon > Date: Tuesday, February 20, 2024 at 09:48 > To: Edward Lewis > Cc: Mark Andrews , Paul Wouters , > "dnsop@ietf.org" > Subject: Re: [DNSOP] Detecting, regeneration and avoidance

Re: [DNSOP] [Ext] About key tags

2024-02-16 Thread Mark Andrews
to reserve the new key tag. Repeat if necessary. We could even use the DNS and UPDATE to do that. Records with tuples of algorithm, tag and operator. Grab the current RRset. Add it as a prerequisite with a update for the new tag. -- Mark Andrews > On 17 Feb 2024, at 05:47, Paul Wout

Re: [DNSOP] [Ext] About key tags

2024-02-15 Thread Mark Andrews
__ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas V

Re: [DNSOP] [Last-Call] Tsvart telechat review of draft-ietf-dnsop-dns-error-reporting-07

2024-02-14 Thread Mark Andrews
The RRL code also sends BADCOOKIE if there isn’t a server cookie instead of setting TC=1. > On 15 Feb 2024, at 10:27, Mark Andrews wrote: > > > >> On 15 Feb 2024, at 03:03, Paul Wouters wrote: >> >> On Wed, 14 Feb 2024, Roy Arends wrote: >> >

Re: [DNSOP] [Last-Call] Tsvart telechat review of draft-ietf-dnsop-dns-error-reporting-07

2024-02-14 Thread Mark Andrews
NAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 1232 ; COOKIE: 287badf367f9a396010065cd4b21b108c8b316f0d5cc (good) ;; QUESTION SECTION: ;. IN SOA ;; ANSWER SECTION: . 426 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024021302 1800 900 604800 86400 ;; Query time: 0 msec ;; SERVER: ::1#53(::1) (UDP) ;; WHEN: Thu Feb 15 10:22

Re: [DNSOP] [Ext] About key tags

2024-02-13 Thread Mark Andrews
> On 13 Feb 2024, at 00:56, Edward Lewis wrote: > > On 2/9/24, 22:05, "Mark Andrews" wrote: > >> The primary use of the key tag is to select the correct key to validate the >> signature from multiple keys. > > Yes - which is great if 1) you nee

Re: [DNSOP] About key tags

2024-02-09 Thread Mark Andrews
The primary use of the key tag is to select the correct key to validate the signature from multiple keys. -- Mark Andrews > On 10 Feb 2024, at 12:38, Wellington, Brian > wrote: > >  > >> On Feb 8, 2024, at 6:41 AM, Edward Lewis wrote: >> >> ..

Re: [DNSOP] [Ext] AD Review of draft-ietf-dnsop-rfc8109bis

2024-02-06 Thread Mark Andrews
> On 7 Feb 2024, at 09:57, Brian Dickson wrote: > > > > On Thu, Feb 1, 2024 at 12:03 PM Mark Andrews wrote: > There is nothing to prevent us saying that responses to priming queries > SHOULD/MUST set TC if all of the addresses of the root servers won’t f

Re: [DNSOP] [Ext] AD Review of draft-ietf-dnsop-rfc8109bis

2024-02-01 Thread Mark Andrews
if not otherwise there. -- Mark Andrews > On 2 Feb 2024, at 06:15, Wessels, Duane > wrote: > >  > >>> On Jan 31, 2024, at 5:57 PM, Paul Hoffman wrote: >>> >>> As Mark just clarified. This isn't glue, so perhaps the text just needs >>> updating. >

Re: [DNSOP] AD Review of draft-ietf-dnsop-rfc8109bis

2024-01-31 Thread Mark Andrews
were written. > > RFC8109 was published 7 years ago, and I'm hoping that rfc8109bis will > survive at least that long. > > I don't know how we address my concern, but it feels like, in e.g 6 years, > this text will have aged poorly... > Can you see about some more massaging

Re: [DNSOP] Dnsdir early review of draft-ietf-dnsop-qdcount-is-one-01

2024-01-18 Thread Mark Andrews
at least partly because I'm always wary > about predicting the future. > > > Joe > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742

Re: [DNSOP] Errata 7689 against RFC 8906, "A Common Operational Problem in DNS Servers: Failure to Communicate"

2024-01-15 Thread Mark Andrews
th, otherwise I'll >> do what's above. > > That seems fine with me. Maybe mention that "@$server" refers to an > authoritative server, and not a recursive server, as well ? See section 8 > > Paul > > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] RFC7477 typo?

2023-12-01 Thread Mark Andrews
It an educated guess that should prevent a undetected rollover occurring. -- Mark Andrews > On 2 Dec 2023, at 08:29, Warren Kumari wrote: > >  > > > > >> On Fri, Dec 01, 2023 at 4:03 PM, Mark Andrews wrote: >> It’s stopping the serial changing

Re: [DNSOP] RFC7477 typo?

2023-12-01 Thread Mark Andrews
It’s stopping the serial changing too fast. -- Mark Andrews > On 2 Dec 2023, at 06:43, Warren Kumari wrote: > >  > > Dear DNSOP (and Wes), > > I was wading through my mailbox and realized that I hadn't seen any > discussion of this. > > > I'm q

Re: [DNSOP] [Maprg] MAPRG Agenda for IETF-118

2023-11-06 Thread Mark Andrews
cfaf3-313273af-454445554331-59fe69e8caa22cd0=1=1354aa29-d843-42fc-b4ff-49c1392f75f5=https%3A%2F%2Fmailman.irtf.org%2Fmailman%2Flistinfo%2Fmaprg > > <https://protect2.fireeye.com/v1/url?k=31323334-501cfaf3-313273af-454445554331-59fe69e8caa22cd0q=1e=1354aa29-d843-42fc

Re: [DNSOP] [Editorial Errata Reported] RFC8906 (7689)

2023-10-26 Thread Mark Andrews
party >> will log in to change the status and edit the report, if necessary. >> >> -- >> RFC8906 (draft-ietf-dnsop-no-response-issue-23) >> -- >> Ti

Re: [DNSOP] Automated delegation management via DDNS

2023-10-25 Thread Mark Andrews
it approximately 2 decades ago. The original policy set had “self”. We added sub domains of the key a little later. We added record count restrictions by type later still. commit 6e373c502584f9292e964378411d296c8259026b Author: Mark Andrews Date: Thu Feb 16 01:34:24 2006 + 1983

Re: [DNSOP] Question regarding RFC 7793

2023-09-15 Thread Mark Andrews
Please make a understandable request. -- Mark Andrews > On 16 Sep 2023, at 05:24, Von Johnson wrote: > >  > Please help me return this to normal > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.or

Re: [DNSOP] Paul Wouters' Yes on draft-ietf-dnsop-caching-resolution-failures-07: (with COMMENT)

2023-09-07 Thread Mark Andrews
er being favoured for use. Why not just remove this part? > >To prevent such unnecessary DNS traffic, security-aware resolvers >MUST cache DNSSEC validation failures, with some restrictions. > > What are these "some restrictions" ? > > >

Re: [DNSOP] [Ext] Compact DoE sentinel choice

2023-08-07 Thread Mark Andrews
> On 8 Aug 2023, at 11:27, Shumon Huque wrote: > > On Mon, Aug 7, 2023 at 9:20 PM Mark Andrews wrote: > > You can’t query for NSEC3 records. NSEC3 names do not prevent wildcard > matches nor are NSEC3 records or their RRSIGs returned for * queries at the > hashed

Re: [DNSOP] [Ext] Compact DoE sentinel choice

2023-08-07 Thread Mark Andrews
SEC3 (5155), where an > empty non-terminal name (or rather the hash of it) does solely own an NSEC3 > record. You can’t query for NSEC3 records. NSEC3 names do not prevent wildcard matches nor are NSEC3 records or their RRSIGs returned for * queries at the hashed name. They are pure metadata

Re: [DNSOP] what could we do with 15 unused bits of QDCOUNT?

2023-07-27 Thread Mark Andrews
it is or is not the value > proposition) > > clue-stick hits welcome. Avoid the stomach. > > -G > > _______ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop &g

Re: [DNSOP] what could we do with 15 unused bits of QDCOUNT?

2023-07-26 Thread Mark Andrews
em not to deploy DNS COOKIE today other than vendors not implementing it. Time for vendors to pull their fingers out. DNS COOKIE is standards track. It is a security fix. Deploy it. > > Brian > ___ > DNSOP mailing list > DNSOP@ietf

Re: [DNSOP] I-D Action: draft-ietf-dnsop-domain-verification-techniques-02.txt

2023-07-17 Thread Mark Andrews
servers the other day that where answering UDP in ms but TCP was taking 10s of seconds to answer. They appear to have fixed whatever the issue was but it still happened. > Regards, > -drc > > ___ > DNSOP mailing list > DNSOP@ietf.o

Re: [DNSOP] draft-dnsop-dnssec-extension-pkix on IETF117 dnsop agenda?

2023-07-16 Thread Mark Andrews
r substantial issues, but the above is sufficient to stop > looking for more reasons why this is a dead-end. > > -- >Viktor. > > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop I concur. This is a horribl

Re: [DNSOP] [v6ops] DNS64/Thread RE: WG call for adoption: draft-momoka-v6ops-ipv6-only-resolver-01

2023-07-10 Thread Mark Andrews
sages > electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, deforme ou > falsifie. Merci. > > This message and its attachments may contain confidential or privileged > information that may be protected by law; > they shoul

Re: [DNSOP] [v6ops] WG call for adoption: draft-momoka-v6ops-ipv6-only-resolver-01

2023-07-07 Thread Mark Andrews
Well don’t put an IPv4 stack on the device. Use mapped addresses over IPV6 sockets and map those addresses to the PREF64 prefix in use in the stack. -- Mark Andrews > On 8 Jul 2023, at 05:20, Ted Lemon wrote: > >  > John, that's simply not an option on networks that only suppor

Re: [DNSOP] [v6ops] WG call for adoption: draft-momoka-v6ops-ipv6-only-resolver-01

2023-07-06 Thread Mark Andrews
modern desktop boxes. If the box you want to run the DNS64 nameserver on doesn’t support 464XLAT install one that does. Mark > Please, adopt Momoka's draft at least somewhere (I am not sure v6ops or > dnsop). > Eduard > -Original Message- > From: v6ops [mailto:v6ops-bo

Re: [DNSOP] [v6ops] WG call for adoption: draft-momoka-v6ops-ipv6-only-resolver-01

2023-07-05 Thread Mark Andrews
tocol should not be published. Mark > Op wo 5 jul 2023 om 21:10 schreef Mark Andrews > I’ll repeat that it is a bad idea to make this an RFC. I’m saying this > despite adding > this to named. > > It is perpetuating DNS64 which does not work with DNSSEC. It sends th

Re: [DNSOP] [v6ops] WG call for adoption: draft-momoka-v6ops-ipv6-only-resolver-01

2023-07-05 Thread Mark Andrews
ic. I look forward to fruitful and > enlightening discussions. > > Best regards, > > Momoka Yamamoto > momoka@gmail.com > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > _

Re: [DNSOP] With multi-algo DS, what to do if an RRSIG is missing?

2023-07-03 Thread Mark Andrews
ttings.html#dnssec-disabled-algorithms > [4]: > https://nlnetlabs.nl/documentation/unbound/unbound.conf/#harden-algo-downgrade > [5]: https://www.google.com/search?q=%22harden-algo-downgrade:+yes%22 > [6]: https://forums.gentoo.org/viewtopic-p-8563219.html > [7]: > https://www.redd

Re: [DNSOP] With multi-algo DS, what to do if an RRSIG is missing?

2023-07-03 Thread Mark Andrews
. There are timing constraints between DS and DNSKEY that allow determination of what the zone is signed with that are impossible to achieve with DNSKEY alone unless you pre publish signatures. -- Mark Andrews > On 4 Jul 2023, at 04:25, Peter Thomassen wrote: > > Dear DNSOP, > >

Re: [DNSOP] Roman Danyliw's No Objection on draft-ietf-dnsop-glue-is-not-optional-08: (with COMMENT)

2023-06-12 Thread Mark Andrews
m. > ** Section 2.4. Machine produced tool output is provided in this section > (from > dig). Please formally cite what generated it. > > Good suggestion. I'm not sure what the formal citation for the dig tool is. > So let's ask our co-author from ISC. > > Mark (Andre

Re: [DNSOP] Incompatibility with indicating client support for EDE (draft-ietf-dnsop-structured-dns-error)

2023-05-23 Thread Mark Andrews
Read it in “perverse” mode (client will be stupid). > -- > Petr Špaček > Internet Systems Consortium > > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC

Re: [DNSOP] Incompatibility with indicating client support for EDE (draft-ietf-dnsop-structured-dns-error)

2023-05-22 Thread Mark Andrews
EDNS option code point. It really is not backwards compatible with EDE the way it is currently specified. > Best, > Tommy > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC

Re: [DNSOP] Delegation acceptance checks [was: Re: [Ext] WGLC rfc8499bis one week extension for lame delegation definition]

2023-05-11 Thread Mark Andrews
> Regards, > John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY > Please consider the environment before reading this e-mail. https://jl.ly -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org __

Re: [DNSOP] Delegation acceptance checks [was: Re: [Ext] WGLC rfc8499bis one week extension for lame delegation definition]

2023-05-11 Thread Mark Andrews
> On 12 May 2023, at 11:35, John Levine wrote: > > It appears that Mark Andrews said: >>> Oh, I completely agree. My point was just that even in the root which is >>> small and you >>> would hope would change slowly, it's still a challenge to track what

Re: [DNSOP] Delegation acceptance checks [was: Re: [Ext] WGLC rfc8499bis one week extension for lame delegation definition]

2023-05-11 Thread Mark Andrews
rs have stood out like sore thumbs the entire time. It only takes a couple of minutes to generate that report and that isn’t trying to go as fast as possible. > R's, > John > > ___ > DNSOP mailing list > DNSOP@ietf.org > https:/

Re: [DNSOP] Delegation acceptance checks [was: Re: [Ext] WGLC rfc8499bis one week extension for lame delegation definition]

2023-05-07 Thread Mark Andrews
already difficult. Perhaps we can just become comfortable > with the idea that at any time the DNS contains bits that work and bits that > don't work, and that is just the way of things. > > Joe > > > ___ > DNSOP mailing list &

Re: [DNSOP] [Ext] WGLC rfc8499bis one week extension for lame delegation definition

2023-05-04 Thread Mark Andrews
... alternates > is going to cover what people patently have been saying "is lame" for > some time, not aligning to a single meaning. > > I liked the proposed paragraph because it had the ".. or not at all" > -And yet some people seem determined to say thats the "wrong

Re: [DNSOP] [Ext] WGLC rfc8499bis one week extension for lame delegation definition

2023-05-04 Thread Mark Andrews
rm that warrants considered > clarification, surely it has a very specific value that we can all act on, > right? So what is that very specific value? > Mark. > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > > ___

Re: [DNSOP] draft-ietf-dnsop-glue-is-not-optional-07 vs. sibling glue

2023-04-14 Thread Mark Andrews
recursive server”. > On 15 Apr 2023, at 11:01, Mark Andrews wrote: > > Somehow saying MUST include a SOA record in the negative response > isn’t enough. > > 3 - Negative Answers from Authoritative Servers > > Name servers authoritative for a zone MUST include the

Re: [DNSOP] draft-ietf-dnsop-glue-is-not-optional-07 vs. sibling glue

2023-04-14 Thread Mark Andrews
- Special Handling of No Data) > suggests sending type 2 instead of type 1 responses but is silent > about type 3 responses. > > On Fri, Apr 14, 2023 at 8:46 PM Puneet Sood wrote: >> >> On Fri, Apr 14, 2023 at 8:26 PM Mark Andrews wrote: >>> >>> RFC 20

Re: [DNSOP] draft-ietf-dnsop-glue-is-not-optional-07 vs. sibling glue

2023-04-14 Thread Mark Andrews
sation >>> in some cases, given how poorly maintained it is it seems to cause more >>> problems than it solves. >>> >> >> I'd like to remind folks that the scope of this draft when it was adopted by >> the working group was very narrow. Mainly to s

Re: [DNSOP] Meaning of lame delegation

2023-04-06 Thread Mark Andrews
he NIC in the file NETINFO:DOMAIN-CONTACTS.TXT 4. Complain to the parent domain authorities. 5. Ask the parent authorities to excommunicate the domain.” As an industry we have ignored the need for there to be checks and balances. RFC 1033 says that they should be there. >

Re: [DNSOP] Meet the Root Zone Algorithm Rollover Design Team @ IETF 116

2023-03-27 Thread Mark Andrews
ng list for updates and > announcements. > Thanks, > James Mitchell > IANA > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW

Re: [DNSOP] Updated: Compact Denial of Existence

2023-03-14 Thread Mark Andrews
John it won’t work with chained validators. -- Mark Andrews > On 15 Mar 2023, at 07:59, John Levine wrote: > > It appears that Peter Thomassen said: >> So I take it that when the EDNS signal is there, compact DoE responses get >> an NXDOMAIN code. >> >>

Re: [DNSOP] Updated: Compact Denial of Existence

2023-03-07 Thread Mark Andrews
cated type code, though, because I'm > 100% sure that wouldn't cause any conflict with existing implementations, > and I'm only 99.7% sure that NULL wouldn't. > > -- > Evan Hunt -- e...@isc.org > Internet Systems Consortium, Inc. -- Mark Andrews, ISC 1 Seymour St

Re: [DNSOP] Updated: Compact Denial of Existence

2023-03-06 Thread Mark Andrews
rs to be no collision with > usage in the NSEC type bitmap, and IMHO it appears to be a very natural meta > type fit. ("This is NULL, There Really Is Nothing Underneath.") NULL is type 10. This was assigned in RFC 1035. -- Mark Andrews, ISC 1 Seymour St., Dundas

Re: [DNSOP] I-D Action: draft-ietf-dnsop-domain-verification-techniques-01.txt

2023-02-16 Thread Mark Andrews
s are also available by rsync at rsync.ietf.org::internet-drafts > > > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > ___ > DNSOP mailing lis

Re: [DNSOP] QDCOUNT > 1 (a modest proposal)

2023-02-15 Thread Mark Andrews
> On 16 Feb 2023, at 15:40, Masataka Ohta > wrote: > > Mark Andrews wrote: > >> The only part of RFC 1035 that actually mentions a value is 4.1.2 and no >> it doesn’t prohibit other values. > > No, of course.

Re: [DNSOP] QDCOUNT > 1 (a modest proposal)

2023-02-15 Thread Mark Andrews
t explicitly. > > Wrong. > > Masataka Ohta > > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Austral

Re: [DNSOP] QDCOUNT > 1 (a modest proposal)

2023-02-15 Thread Mark Andrews
il of the thread. > > Masataka Ohta > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St.,

Re: [DNSOP] I-D Action: draft-homburg-dnsop-codcp-00.txt

2023-01-11 Thread Mark Andrews
esn't boot. > > In that case, if the NTP client would request DNS resolution over Do53 for > its initinal lookup of pool.ntp.org, then the proxy can return a DNS reply > and the system can boot normally. > > > ___ > DNSOP mai

Re: [DNSOP] Generalized DNS Notifications (draft-thomassen-dnsop-generalized-dns-notify-00)

2022-11-29 Thread Mark Andrews
p-generalized- > dns-notify (https://github.com/peterthomassen/draft-thomassen-dnsop- > generalized-dns-notify). The most recent working version of the > document, open issues, etc. should all be available there. The > authors (gratefully) accept pull requests. > >

Re: [DNSOP] Generalized DNS Notifications (draft-thomassen-dnsop-generalized-dns-notify-00)

2022-11-29 Thread Mark Andrews
be > used/abused by others. Have you thought about whether there are any similar > considerations for these new uses of NOTIFY? I guess one answer is that (just > like conventional NOTIFY) local policy could override the SRV-published > (NS-published) targets. > > > Joe >

Re: [DNSOP] .alt filtering in recursive servers

2022-11-11 Thread Mark Andrews
ve leaked queries and respond with > NXDOMAIN. Techniques such as qname minimization, aggressive NSEC caching, > and root-on-loopback can reduce the amount of leaked queries received by > root name servers. > > ========== > > DW > > >

Re: [DNSOP] .alt filtering in recursive servers

2022-11-08 Thread Mark Andrews
> On 8 Nov 2022, at 10:56, Peter Thomassen wrote: > > > > On 11/8/22 10:33, Mark Andrews wrote: >> Filtering .alt in recursive servers should be a MUST NOT. > > Whenever SHOULD or MUST (NOT) is used, or we're making a promise for the > indefinite future, or

[DNSOP] .alt filtering in recursive servers

2022-11-08 Thread Mark Andrews
Filtering .alt in recursive servers should be a MUST NOT. Mirror zones (copies of the root zone) and aggressive negative caching will reduce the traffic to the root and not break downstream validating clients. AS112 is not needed. -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117

Re: [DNSOP] [BEHAVE] [v6ops] New Version Notification for draft-momoka-v6ops-ipv6-only-resolver-00.txt

2022-10-16 Thread Mark Andrews
ot do the equivalent of happy eyeballs behaviour. BIND doesn’t race queries but it does bias the selection of IPv6 servers over IPv4 servers. This went into BIND 9.11.0. The CHANGES note was dated 2015-09-28. 4222. [func] Bias IPv6 servers when selecting the next server to

Re: [DNSOP] [v6ops] New Version Notification for draft-momoka-v6ops-ipv6-only-resolver-00.txt

2022-10-09 Thread Mark Andrews
> On 9 Oct 2022, at 04:58, Momoka Yamamoto wrote: > > > re: Mark Andrews 's comments > > this is yet another example of why DNS64 should be made historic. > > This is requesting even more support to work around problems introduced by > > DN64, a poorly thought o

Re: [DNSOP] New Version Notification for draft-momoka-v6ops-ipv6-only-resolver-00.txt

2022-10-06 Thread Mark Andrews
y >authoritative servers. > > > > > The IETF Secretariat > > > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] [Editorial Errata Reported] RFC8749 (7131)

2022-09-13 Thread Mark Andrews
The word ‘deleted’ does not appear in RFC8749. The errata makes no sense. I suggest that this errata is REJECTED. -- Mark Andrews > On 14 Sep 2022, at 06:30, RFC Errata System wrote: > > The following errata report has been submitted for RFC8749, > "Moving DNSSEC Lookasid

Re: [DNSOP] Use of CNAMEs for NS Records

2022-08-23 Thread Mark Andrews
> > With best regards, > Tobias > > > _______ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742

Re: [DNSOP] [Ext] [internet-dra...@ietf.org] New Version Notification for draft-hardaker-dnsop-must-not-sha1-00.txt

2022-08-17 Thread Mark Andrews
Well anyone using RedHat Enterprise Linux 9 / Oracle Linux 9 already has RSASHA1 / NSEC3RSASHA1 disabled. BIND will automatically disable these algorithms as of the September releases if they are not supported by the crypto provider. So it will no longer require named.conf changes. -- Mark

Re: [DNSOP] On ALT-TLD, GNS, and namespaces...

2022-08-14 Thread Mark Andrews
ings. But it will be unpopular strings because the popular > ones are taken or reserved. > > Paul > > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dund

Re: [DNSOP] draft-hardaker-dnsop-must-not-sha1

2022-08-13 Thread Mark Andrews
So you are ready to replace SHA1 in NSEC3 and do a second algorithm renumber which is what is required to actually get rid of SHA1 or do you mean retire RSA-SHA1. People are much too imprecise in the terminology. -- Mark Andrews > On 13 Aug 2022, at 18:50, Jim Reid wrote: > >

Re: [DNSOP] signing parent-side NS (was: Re: Updating RFC 7344 for cross-NS consistency)

2022-07-26 Thread Mark Andrews
; > ___ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org ___

Re: [DNSOP] More private algorithms for DNSSEC

2022-04-21 Thread Mark Andrews
> On 16 Apr 2022, at 05:24, Blacka, David > wrote: > > RFC 4955 -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org ___ DNSOP mailing list DNSOP@ie

Re: [DNSOP] introducing a couple of RRTypes (CRC/CRS) for B2B applications

2022-04-11 Thread Mark Andrews
> On 11 Apr 2022, at 17:57, Mark Andrews wrote: > > I don’t see why APL (RFC 3123) can’t be used for CRC give you need to > construct an > owner name anyway and have well known label to seperate the components of the > name. > I see no reason to re-

Re: [DNSOP] introducing a couple of RRTypes (CRC/CRS) for B2B applications

2022-04-11 Thread Mark Andrews
to partner applications > E. Description of the proposed RR type. > CRC contains a limited list of authorized networks for a particular > application > F. What existing RRTYPE or RRTYPEs come closest to filling that need > and why are they unsatisfactory? > TXT RRTYPE allow

Re: [DNSOP] Wildcard junk vs NXDOMAIN junk

2022-04-07 Thread Mark Andrews
synthesise using an OPTOUT NSEC3 record. Zone operators can turn off OPTOUT today. -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] [Ext] More private algorithms for DNSSEC

2022-03-29 Thread Mark Andrews
> On 30 Mar 2022, at 14:29, Brian Dickson wrote: > > > > On Tue, Mar 29, 2022 at 1:31 PM Mark Andrews wrote: > > > > On 30 Mar 2022, at 00:28, Peter Thomassen wrote: > > > > > > > > On 3/28/22 20:34, Mark Andrews wrote: > >&

Re: [DNSOP] [Ext] More private algorithms for DNSSEC

2022-03-29 Thread Mark Andrews
-94 which are replacements for SHA256, SHA-384 and GOST R 34.11-94 respectively that support pre-publishing DS for PRIVATEDNS and PRIVATEOID. > On 29 Mar 2022, at 08:08, Mark Andrews wrote: > > Note you can’t prepublish a DS to roll keys you need to publish the DNSKEY > first. >

Re: [DNSOP] [Ext] More private algorithms for DNSSEC

2022-03-29 Thread Mark Andrews
> On 30 Mar 2022, at 00:28, Peter Thomassen wrote: > > > > On 3/28/22 20:34, Mark Andrews wrote: >> About the only part not already specified is matching DS to DNSKEY using >> PRIVATEDNS but as you can see it is obvious to anyone with a little bit of >

Re: [DNSOP] [Ext] More private algorithms for DNSSEC

2022-03-28 Thread Mark Andrews
Note you can’t prepublish a DS to roll keys you need to publish the DNSKEY first. -- Mark Andrews > On 29 Mar 2022, at 05:33, Mark Andrews wrote: > >  > >> On 29 Mar 2022, at 01:34, Paul Hoffman wrote: >> >>> On Mar 27, 2022, at 6:23 PM, Mark Andrews

Re: [DNSOP] [Ext] More private algorithms for DNSSEC

2022-03-28 Thread Mark Andrews
> On 29 Mar 2022, at 01:34, Paul Hoffman wrote: > > On Mar 27, 2022, at 6:23 PM, Mark Andrews wrote: >> There is zero reason to reserve any ADDITIONAL space for experimentation. > > Assume that you want to experiment with creating responses that have multiple > as-

Re: [DNSOP] More private algorithms for DNSSEC

2022-03-28 Thread Mark Andrews
applies to OIDs. -- Mark Andrews > On 28 Mar 2022, at 19:49, Nils Wisiol wrote: > > On Mon, 2022-03-28 at 12:23 +1100, Mark Andrews wrote: >> Please quote where it is stated that “private is not for >> experimentation”. >> >> >> >> Private is priv

Re: [DNSOP] More private algorithms for DNSSEC

2022-03-27 Thread Mark Andrews
sk vendors to do and is unlikely to cause real problems. If you want you can actually keep the name DNSKEY and DS records as a constant if you are too scared that vendors will muck up the minor change of removing an identifying name. There is zero reason to reserve any ADDITIONAL space for experiment

Re: [DNSOP] On removing a pargraph in RFC4035

2022-03-24 Thread Mark Andrews
considered bogus. We are looking > for a way to make this work. > > I admit, the problem is not trivial, but I have faith in DNSOP! ( Please > don’t prove me wrong. Pretty please!) > > /Ulrich > > > > >> On 22 Mar 2022, at 00:59, Mark Andrews wrote: &

Re: [DNSOP] I-D Action: draft-ietf-dnsop-glue-is-not-optional-04.txt

2022-03-22 Thread Mark Andrews
put requirements on data or data generators > (registries) than we have to spell out that even a server that follows this > draft/RFC might not be able to serve answers according to the draft/RFC when > the data is not correct. > > So long > -Ralf > ——- > Ralf Weber > &

Re: [DNSOP] [Ext] More private algorithms for DNSSEC

2022-03-22 Thread Mark Andrews
gt;> that basically the entire range will be empty for centuries. >> >> --Paul Hoffman >> ___ >> DNSOP mailing list >> DNSOP@ietf.org >> https://www.ietf.org/mailman/listinfo/dnsop > -- > deSEC e.V. · Kyffhäusers

Re: [DNSOP] On removing a pargraph in RFC4035

2022-03-21 Thread Mark Andrews
>> It would also cause the paradox and indeed creepy security quirk, that >> if you sign your zone with one more algorithm, which is >> cryptographically strong but poorly adopted (perhaps experimental), it >> will result in _less_ security. Hardly anyone does this, but if they do, >> they will

Re: [DNSOP] I-D An Extension to DNS64 for Sender Policy Framework SPF Awareness

2022-02-14 Thread Mark Andrews
> On 15 Feb 2022, at 10:47, Mark Andrews wrote: > >> >> On 15 Feb 2022, at 06:50, Klaus Frank wrote: >> >> Hi, >> >> yes there was discussion on the mailing list already. It wasn't however that >> clear on what side should implemen

Re: [DNSOP] I-D An Extension to DNS64 for Sender Policy Framework SPF Awareness

2022-02-14 Thread Mark Andrews
bility issues and resolutions >>>between DNS64 and SPF records for mail transfer agents. This >>>document also aims to simplify the IPv6 migration for mail transfer >>>agent operators. >>> >>>This documen

[DNSOP] TKEY and MD5

2021-12-20 Thread Mark Andrews
Isn’t it about time we updated DH support in DNS to not use MD5? Currently there is no FIPS compatible DH key exchange in DNS. I suspect it would be relatively straight forward by defining a new TKEY mode which does DH w/o using MD5. Mark -- Mark Andrews, ISC 1 Seymour St., Dundas Valley

Re: [DNSOP] Neither authenticated nor SERVFAIL

2021-12-09 Thread Mark Andrews
ts a side effect of using OPTOUT. You can’t prove or disprove the lack of a delegation at “x.lindforslaw.se”. OPTOUT was designed for delegation heavy zones like COM, ORG, NET. It was not intended to be used in enterprise, home and similar zones. It is also not the default. > vixie >

Re: [DNSOP] How Slack didn't turn on DNSSEC

2021-12-08 Thread Mark Andrews
misation is on by default. Actually they still can. Just wait until the A response expires while there are still cached NSEC present. This will happen naturally with a big enough client pool. Incorrect negative proofs lead to intermittent “incorrect” responses with aggressive synthesis. Mark

  1   2   3   4   5   6   7   8   9   10   >