Re: [DNSOP] [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-04-20 Thread Paul Wouters
On Sat, 20 Apr 2024, Peter Thomassen wrote: The authors certainly don't insist, but we'd need to pick a suitable replacement for the "_signal" label. John proposed "_dnssec-signal" elsewhere in this thread. The authors would like to note that adding "_dnssec-" eats up 8 more bytes,

Re: [DNSOP] [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-04-19 Thread Paul Wouters
> Just a ping on this; thank you. > > Best regards, > > David Dong > IANA Services Sr. Specialist > >> On Sat Apr 13 01:24:13 2024, pe...@desec.io wrote: >> Hi Paul, >> >>> On 4/12/24 22:36, Paul Wouters wrote: >>> However, I would urge the au

Re: [DNSOP] [IANA #1362913] expert review for draft-ietf-dnsop-dnssec-bootstrapping (dns-parameters)

2024-04-12 Thread Paul Wouters
On Fri, 12 Apr 2024, David Dong via RT wrote: Dear Frederico A C Neves and Paul Wouters (cc: dnsop WG), As the designated experts for the Underscored and Globally Scoped DNS Node Names registry, can you review the proposed registration in draft-ietf-dnsop-dnssec-bootstrapping-08 for us

[DNSOP] Paul Wouters' Yes on draft-ietf-dnsop-dns-error-reporting-08: (with COMMENT)

2024-03-04 Thread Paul Wouters via Datatracker
Paul Wouters has entered the following ballot position for draft-ietf-dnsop-dns-error-reporting-08: Yes When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer

[DNSOP] Paul Wouters' Yes on draft-ietf-dnsop-dns-error-reporting-08: (with COMMENT)

2024-03-04 Thread Paul Wouters via Datatracker
Paul Wouters has entered the following ballot position for draft-ietf-dnsop-dns-error-reporting-08: Yes When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer

Re: [DNSOP] unrelated name server name recommendation

2024-03-04 Thread Paul Wouters
On Mar 4, 2024, at 14:04, Paul Vixie wrote: > >  > > this means a zone will always be reachable through at least one in-zone data > path (name server name and associated address records.) the result would be > that a full resolver would never have to pause its current lookup while >

Re: [DNSOP] [Ext] About key tags

2024-03-01 Thread Paul Wouters
On Feb 29, 2024, at 20:33, Arnold DECHAMPS wrote: > > > Is it still a concern enough that they justify continuing using those tags > instead of the full key? The full key is not there. There is only a key tag. Are you proposing a wire format change to DNSSEC that puts the full key there?

Re: [DNSOP] [Ext] About key tags

2024-02-29 Thread Paul Wouters
> On Feb 29, 2024, at 07:52, Edward Lewis wrote: > (If no action is taken, malicious activity might follow now that it is > described, but I have not heard of a historical case of it.) This attack was more or less described five year ago: https://essay.utwente.nl/78777/ They didn’t get to

Re: [DNSOP] [Ext] About key tags

2024-02-27 Thread Paul Wouters
On Feb 27, 2024, at 17:48, Mark Andrews wrote: > > If you forbid in the protocol But part of this is not “in” the protocol. Eg if two dns hosters happen to arrive at the same key tag for a single zone in concurrent offline ways. Or if that happens when KSK and ZSK are managed differently.

Re: [DNSOP] I-D Action: draft-ietf-dnsop-domain-verification-techniques-03.txt

2024-02-19 Thread Paul Wouters
em to be a consensus for that at the moment. I'm sure other folks will chime in with their views. But I want to ping Paul Wouters specifically - since you are one of the expert reviewers for this registry and an author of domain-verification, could you express your opinion on the specific request related to ACME (

Re: [DNSOP] [Ext] About key tags

2024-02-16 Thread Paul Wouters
On Feb 16, 2024, at 12:17, Petr Špaček wrote: > >  > It does not handle collisions in any special way. It simply does not validate > and the resolver has no way to tell if the crypto thingy is wrong or if it > just tried a wrong key. Any such failure is counted towards fail-budget (1 >

Re: [DNSOP] [Ext] About key tags

2024-02-15 Thread Paul Wouters
On Thu, 15 Feb 2024, Ralf Weber wrote: There is a difference between what a lot of people on this thread did to keep the Internet alive Resolvers would have disabled dnssec to remain alive. Also not at all something nice to happen, but the Internet in fact would not have died. I am super

Re: [DNSOP] [Ext] About key tags

2024-02-15 Thread Paul Wouters
On Thu, 15 Feb 2024, Ralf Weber wrote: So to put some real numbers out there. I recently for testing did download all the zone data I could get from ICANN CZDS and tried to get DNSKEYs for every domain. So that data set had 256479639 domains (256 million) and out of those 18726163 (18

Re: [DNSOP] [Ext] About key tags

2024-02-15 Thread Paul Wouters
On Feb 15, 2024, at 04:37, Petr Špaček wrote: > > If you think colliding keys should be allowed, please propose your own limits > for sensible behavior. I do think they need to be allowed because they have always been allowed so far. Reasons for not allowing them seems to be implementation

Re: [DNSOP] [Last-Call] Tsvart telechat review of draft-ietf-dnsop-dns-error-reporting-07

2024-02-14 Thread Paul Wouters
On Wed, 14 Feb 2024, Roy Arends wrote: It is recommended that the client (the resolver) sets the DNS COOKIE. The benefit of using cookies is for the client. It is to make sure that the response is genuine. Does it? Not for an on-path attacker that sees the COOKIE in the clear. So what

Re: [DNSOP] [Ext] Paul Wouters' Discuss on draft-ietf-dnsop-dns-error-reporting-07: (with DISCUSS)

2024-02-14 Thread Paul Wouters
On Tue, 13 Feb 2024, Roy Arends wrote: Based on this, I assume the error report query is of qtype TXT, but this is not specified anywhere in the document. Someone could use a qtype of CNAME or ANY or just A or . Can this be stated explicitly ? It is explicitly specified in section 3:

Re: [DNSOP] [Last-Call] Tsvart telechat review of draft-ietf-dnsop-dns-error-reporting-07

2024-02-13 Thread Paul Wouters
On Wed, 14 Feb 2024, Roy Arends wrote: 1. There is a recommendation to use DNS COOKIEs [RFC7873] over UDP (PS), but no statement about how to mitigate the effects when these are not used. What ought someone to do when this is not done? It is recommended that the client (the resolver) sets the

Re: [DNSOP] Martin Duke's Discuss on draft-ietf-dnsop-avoid-fragmentation-16: (with DISCUSS and COMMENT)

2024-02-05 Thread Paul Wouters
I don't think I saw any response to this from the authors or dnsop, so let me reply to your DISCUSS points (as individual DNS enthousaist only): On Tue, Jan 2, 2024 at 2:44 PM Martin Duke via Datatracker wrote: > Martin Duke has entered the following ballot position for >

[DNSOP] nudging draft-ietf-dnsop-avoid-fragmentation

2024-02-02 Thread Paul Wouters
I tried to nudge this document on by filing a PR: https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-avoid-fragmentation/pull/40 While I can confirm it addresses my concerns raised, all proposed changes should be vetted by the authors, dnsop and the related IESG / Directorate members before

Re: [DNSOP] [Ext] AD Review of draft-ietf-dnsop-rfc8109bis

2024-01-31 Thread Paul Wouters
On Thu, 1 Feb 2024, Paul Hoffman wrote: Maybe we should add to the second paragraph: Note, however, the root server addresses are not glue records, so setting the TC bit in truncated responses from the root servers is not required by RFC 9471. Does this solve your and Warren's issues?

Re: [DNSOP] [Ext] AD Review of draft-ietf-dnsop-rfc8109bis

2024-01-31 Thread Paul Wouters
On Wed, 31 Jan 2024, Paul Hoffman wrote: On Jan 31, 2024, at 15:15, Paul Wouters wrote: Can they write a draft with why they are going against the RFC? Yes, that is possible. However, I think it would be unfair to the DNS community to hold up draft-ietf-dnsop-rfc8109bis waiting

Re: [DNSOP] [Ext] AD Review of draft-ietf-dnsop-rfc8109bis

2024-01-31 Thread Paul Wouters
On Wed, 31 Jan 2024, Paul Hoffman wrote: Nope. The tone is because some root server operators want the ability to continue to not set the TC bit due to root server operational independence. We have to be honest about what is happening, and what the rules are. The rules are defined in the

Re: [DNSOP] Documenting DELEG design trade-offs

2024-01-31 Thread Paul Wouters
On Jan 31, 2024, at 09:56, Ralf Weber wrote: > > Moin! > > While this is true, there are a lot of players from different part > of the ecosystem that want to work on DELEG (see contributors) I am not saying don’t do it. I am saying we need to understand the cost and benefits. For example, do

Re: [DNSOP] Documenting DELEG design trade-offs

2024-01-31 Thread Paul Wouters
On Wed, 31 Jan 2024, Philip Homburg wrote: Something I wonder about, certainly after the interim, is how do we discuess with the wider DNS community the trade-offs that are available in de design of DELEG such that we get good feedback about priorities. For example, the current design used two

Re: [DNSOP] draft-dnsop-deleg-00

2024-01-30 Thread Paul Wouters
On Tue, 30 Jan 2024, Roy Arends wrote: One motivation behind DELEG is the ability to use “Aliasmode” to point to an SVCB record elsewhere, which contains a DS record. This way, DS records in various top level domains can be federated under a single operator. This works solely if both the

Re: [DNSOP] draft-dnsop-deleg-00

2024-01-30 Thread Paul Wouters
On Tue, 30 Jan 2024, Roy Arends wrote: DNSSEC is not mandatory, it is recommended. One motivation behind DELEG is the ability to use “Aliasmode” to point to an SVCB record elsewhere, which contains a DS record. This way, DS records in various top level domains can be federated under a single

Re: [DNSOP] DNSOPComments on draft-dnsop-deleg-00.txt - section 1

2024-01-30 Thread Paul Wouters
On Jan 30, 2024, at 01:14, Ralf Weber wrote: > > > I agree that future extensions will require code changes, but having a > record type that is extensible from the start might make it easier to > deploy new parameters then it is to do a full RRTYPE, at least that is > the hope. I took a step

Re: [DNSOP] on private use TLDS: .interNAL -> .LAN

2024-01-27 Thread Paul Wouters
> On Jan 27, 2024, at 16:42, Paul Marks wrote: > >  pick .lan > instead? It seems that a lot of people are already using this abbreviation > on their internal networks, which happen to be local in > area. LAN implies local area network. So an organization with multiple locations would have

Re: [DNSOP] Resolver behaviour in the presence of unrequested answer records

2024-01-17 Thread Paul Wouters
On Jan 17, 2024, at 05:15, Bellebaum, Thomas wrote: > > 1. Caching of unrequested RRs would actually be fine, if they are > properly signed. At worst, a resolver would cache irrelevant records. This is not entirely true. By tailoring someone’s cache you might be able to track them. There is

Re: [DNSOP] Errata 7689 against RFC 8906, "A Common Operational Problem in DNS Servers: Failure to Communicate"

2024-01-15 Thread Paul Wouters
On Mon, 15 Jan 2024, Warren Kumari wrote: dig +nocookie +edns=0 +noad +norec +dnssec soa $zone @$server expect: status: NOERROR expect: the SOA record to be present in the answer section expect: an OPT record to be present in the additional section expect: DO=1 to be present if an RRSIG is in

Re: [DNSOP] Dealing with some open Errata:

2024-01-15 Thread Paul Wouters
On Mon, 15 Jan 2024, Warren Kumari wrote: Subject: [DNSOP] Dealing with some open Errata: [ + Dave Crocker (author), Paul Wouters, Frederico Neves (registry experts)]  Hi there all, As part of the Great Errata Cleanup of 2024, I'm going through reported Errata and trying to close them.  I'm

Re: [DNSOP] Fwd: New Version Notification for draft-pan-dnsop-explicit-forged-answer-signal-00.txt

2024-01-10 Thread Paul Wouters
On Jan 10, 2024, at 20:55, Paul Vixie wrote: > > i think you mean RPZ here. Yes I did. Thank you. Paul > > Paul Wouters wrote on 2024-01-10 07:01: >>> On Wed, 10 Jan 2024, Lanlan Pan wrote: >>> I have submitted a new draft to discuss the faked answer re

Re: [DNSOP] Fwd: New Version Notification for draft-pan-dnsop-explicit-forged-answer-signal-00.txt

2024-01-10 Thread Paul Wouters
On Wed, 10 Jan 2024, Lanlan Pan wrote: I have submitted a new draft to discuss the faked answer returned from the recursive resolver. Your comments are appreciated. As I've said during the discussions on RBL and an updated version for RBL, if these things are done "for the user", the best

Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-rfc8109bis

2024-01-09 Thread Paul Wouters
On Mon, 8 Jan 2024, Tim Wicinski wrote: Subject: [DNSOP] Working Group Last Call for draft-ietf-dnsop-rfc8109bis From my previous comments (still unaddressed, were my comments rejected?) there are 13 root servers. I would really like to see this changed. We keep trying to tell

Re: [DNSOP] Fw: New Version Notification for draft-zuo-dnsop-delegation-confirmation-00.txt

2024-01-07 Thread Paul Wouters
On Jan 7, 2024, at 05:02, Paul Vixie wrote: > > > i think as long as we keep adding features that are only necessary because > dnssec lacks certain features or is not universally deployed or both, then > dnssec will lack certain features or not be universally deployed or both. > please be

Re: [DNSOP] [Ext] WGLC draft-ietf-dnsop-rfc8109bis (2nd round)

2023-12-29 Thread Paul Wouters
On Fri, 29 Dec 2023, Paul Wouters wrote: I've missed these calls, my apologies. I think the document is almost ready to proceed, but contains some markers of [[unresolved discussion]] that obviously needs resolving (and should have been resolved before doing a WGLC? :) Obviously I made

Re: [DNSOP] [Ext] WGLC draft-ietf-dnsop-rfc8109bis (2nd round)

2023-12-29 Thread Paul Wouters
On Thu, 28 Dec 2023, Paul Hoffman wrote: On Dec 28, 2023, at 13:34, Tim Wicinski wrote: All, We wrapped up the second working group last call for draft-ietf-dnsop-rfc8109bis with no comments pro or con. The chairs can only assume the working group is not interested in moving this work

Re: [DNSOP] Notification Call for Adoption: draft-bash-rfc7958bis

2023-12-18 Thread Paul Wouters
On Mon, 18 Dec 2023, Geoff Huston wrote: I am in support of adoption by the Working Group. The process of peer review has proved to be highly valuable over the years and the result is generally a more robust framework for critical elements of the DNS infrastructure. I agree, but also

Re: [DNSOP] Zaheduzzaman Sarker's No Objection on draft-ietf-dnsop-dns-error-reporting-07: (with COMMENT)

2023-12-13 Thread Paul Wouters
On Wed, 13 Dec 2023, Joe Abley wrote: On 13 Dec 2023, at 16:37, Paul Wouters wrote: It should probably change TCP to “source IP validated transports (dns over stuff, tcp and udp cookies) Since it is possible to imagine networks in which source address spoofing is not possible, and hence

Re: [DNSOP] Zaheduzzaman Sarker's No Objection on draft-ietf-dnsop-dns-error-reporting-07: (with COMMENT)

2023-12-13 Thread Paul Wouters
It should probably change TCP to “source IP validated transports (dns over stuff, tcp and udp cookies) Sent using a virtual keyboard on a phone > On Dec 13, 2023, at 10:14, Zaheduzzaman Sarker via Datatracker > wrote: > > Zaheduzzaman Sarker has entered the following ballot position for >

[DNSOP] Paul Wouters' Discuss on draft-ietf-dnsop-dns-error-reporting-07: (with DISCUSS)

2023-12-12 Thread Paul Wouters via Datatracker
Paul Wouters has entered the following ballot position for draft-ietf-dnsop-dns-error-reporting-07: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please

Re: [DNSOP] Last Call: Change the status of GOST Signature Algorithms in DNSSEC in the IETF stream to Historic

2023-11-29 Thread Paul Wouters
On Wed, 29 Nov 2023, Warren Kumari wrote: So, the IANA has a question: IANA Question --> What about the registrations that currently reference RFC5933? Should the registrations currently referencing RFC5933 be marked "OBSOLETE," "DEPRECATED," changed in some other way, or left alone? If

Re: [DNSOP] I-D Action: draft-bellis-dnsext-multi-qtypes-08.txt

2023-11-17 Thread Paul Wouters
On Nov 17, 2023, at 12:04, Ray Bellis wrote: > >  > >> On 17/11/2023 10:41, Paul Wouters wrote: >> >> I think it would be unwise to make assumptions on how people will use >> this feature. They might want to ask for many more records along with >>

Re: [DNSOP] I-D Action: draft-bellis-dnsext-multi-qtypes-08.txt

2023-11-17 Thread Paul Wouters
On Fri, 17 Nov 2023, Ray Bellis wrote: Last time this came around I also suggested instead of n times QT entries, to use the same method as NSEC does for conveying which RRtypes are covered using a single bitmap: https://datatracker.ietf.org/doc/html/rfc3845#section-2.1.2 Speaking

Re: [DNSOP] I-D Action: draft-bellis-dnsext-multi-qtypes-08.txt

2023-11-16 Thread Paul Wouters
On Tue, 14 Nov 2023, internet-dra...@ietf.org wrote: Internet-Draft draft-bellis-dnsext-multi-qtypes-08.txt is now available. Last time this came around I also suggested instead of n times QT entries, to use the same method as NSEC does for conveying which RRtypes are covered using a single

Re: [DNSOP] QNAME minimization, we screwed up and it's your problem

2023-11-11 Thread Paul Wouters
On Sat, 11 Nov 2023, John R Levine wrote: work(ed) fine without minimization and I don't think it is reasonable to expect every mail system in the world to change their configuration to work around our performance bug. It is totally reasonable for protocols and software and configurations

Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-bootstrapping

2023-11-11 Thread Paul Wouters
Subject: Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-bootstrapping On 9/19/23 21:48, Tim Wicinski wrote: > > This starts a Working Group Last Call for draft-ietf-dnsop-dnssec-bootstrapping > > Current versions of the draft is available

Re: [DNSOP] QNAME minimization is bad

2023-11-11 Thread Paul Wouters
On Nov 10, 2023, at 21:02, John Levine wrote: > >> >> A bit misleading subject :P > > It seems to have done the trick. You need to trick people with exaggerations to read your emails? The industry term for that is “clickbait”. I urge everyone not to engage in that in the IETF. > > DNSBLs

Re: [DNSOP] QNAME minimization is bad

2023-11-10 Thread Paul Wouters
On Fri, 10 Nov 2023, John R Levine wrote: Subject: [DNSOP] QNAME minimization is bad Well, not always bad but sometimes. A bit misleading subject :P I'd like to write a draft that updates RFC 9156 by describing situations like this that caches could recognize and avoid useless churn, added

Re: [DNSOP] [ietf-wg-dnsop/draft-ietf-dnsop-domain-verification-techniques] Encourage people to add to the underscore label registry (Issue #104)

2023-11-07 Thread Paul Wouters
On Nov 7, 2023, at 17:34, Erik Nygren wrote: > > As discussed at the mic, we should encourage people add labels to the dns > node names registry: > > https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#underscored-globally-scoped-dns-node-names > So I am one of the Delegated

Re: [DNSOP] [IANA #1285116] expert review for draft-ietf-dnsop-dns-error-reporting (Underscored and Globally Scoped DNS Node Names)

2023-10-31 Thread Paul Wouters
On Oct 31, 2023, at 19:17, Frederico A C Neves wrote: > > Dear David, > > Section 7 of the draft is sufficiently clear, precise, and complete. > > This registration at the time it is approved by the IESG, taking in > account the fact that currently there is no other request for TXT _er > on

Re: [DNSOP] Automated delegation management via DDNS

2023-10-28 Thread Paul Wouters
On Oct 25, 2023, at 13:14, Johan Stenstam wrote: > >  > To begin with it works equally well with or without DNSSEC. That statements seems a little odd? > Furthermore it is a cleaner solution than what we currently have (i.e. child > zone published CDS and/or CSYNC and parent at some future

Re: [DNSOP] Automated delegation management via DDNS

2023-10-27 Thread Paul Wouters
On Fri, 27 Oct 2023, Johan Stenstam wrote: Scanners are, of course, inefficient, and notifications are a way to improve that. I just think that as we are making comparisons, with arguments whose strength is (in part) based on the number of queries needed, we should get the order of magnitude

Re: [DNSOP] [Editorial Errata Reported] RFC8906 (7689)

2023-10-26 Thread Paul Wouters
> On Oct 26, 2023, at 21:51, Mark Andrews wrote: > > 'flag: do’ is just the way ‘dig’ displays ‘DO=1’ in the EDNS flags. I had even sent a patch in a decade ago for dig to take +do as alias for +dnssec but it got rejected  > I would leave this as editorial. I would accept this but I

Re: [DNSOP] Automated delegation management via DDNS

2023-10-25 Thread Paul Wouters
On Oct 25, 2023, at 10:11, Paul Vixie wrote: > [speaking as individual] > i am uncomfortable using the UPDATE RCODE for a purpose unrelated to zone > modification. perhaps propose a new RCODE having the same message form as > UPDATE? I agree. >> 2. No requirement for DNSSEC. Great as

Re: [DNSOP] [Ext] Warren did a bad (was Re: Datatracker State Update Notice: )

2023-10-22 Thread Paul Wouters
> On Oct 22, 2023, at 15:56, Paul Hoffman wrote: > > On Oct 22, 2023, at 10:28, Paul Wouters wrote: >> >> I thought we all agreed the IESG would mark the old GOST RFCs Historic and >> then the new RFCs don’t have to obsolete anything ? > > > Define &

Re: [DNSOP] Warren did a bad (was Re: Datatracker State Update Notice: )

2023-10-22 Thread Paul Wouters
I thought we all agreed the IESG would mark the old GOST RFCs Historic and then the new RFCs don’t have to obsolete anything ?PaulSent using a virtual keyboard on a phoneOn Oct 22, 2023, at 13:24, Boris Makarenko wrote: Eliot and Warren, As I remember, the idea was

Re: [DNSOP] Call for Adoption: draft-bash-rfc7958bis

2023-10-13 Thread Paul Wouters
On Thu, 12 Oct 2023, Tim Wicinski wrote: The draft is available here: https://datatracker.ietf.org/doc/draft-bash-rfc7958bis/ Here is the diff from RFC7958 itself: https://author-tools.ietf.org/iddiff?url1=rfc7958=draft-bash-rfc7958bis-01=--html Please review this draft to see if you think

Re: [DNSOP] Fwd: New Version Notification for draft-many-dnsop-dns-isolated-networks-00.txt

2023-10-09 Thread Paul Wouters
On Oct 9, 2023, at 10:02, Ben Schwartz wrote: > >  > This is fun to think about, but it seems to me that these networks should > avoid any reliance on the ICANN DNS tree. I doubt that any network of space > probes on Io can accept the risk of a technical or governance issue on .io. > >

Re: [DNSOP] Paul Wouters' Yes on draft-ietf-dnsop-caching-resolution-failures-07: (with COMMENT)

2023-09-20 Thread Paul Wouters
works for me, thanks! Paul On Wed, Sep 20, 2023 at 7:47 PM Wessels, Duane wrote: > > > > On Sep 20, 2023, at 2:23 PM, Paul Wouters wrote: > > > > > >>> To prevent such unnecessary DNS traffic, security-aware resolvers > >>>

Re: [DNSOP] Paul Wouters' Yes on draft-ietf-dnsop-caching-resolution-failures-07: (with COMMENT)

2023-09-20 Thread Paul Wouters
On Tue, 19 Sep 2023, Wessels, Duane wrote: Section 4.7 of RFC 4035 talks about the “BAD cache” where an implementation can cache data with invalid signatures. It says: o Since RRsets that fail to validate do not have trustworthy TTLs, the implementation MUST assign a TTL. This TTL

Re: [DNSOP] Question regarding RFC 7793

2023-09-18 Thread Paul Wouters
On Mon, 18 Sep 2023, Von Johnson wrote: Hello. Any updates? There will be no updates from this list. This mailing list is about designing protocols. Other people and vendors implement these. So if you have a device problem with any application, please contact the device vendor or

[DNSOP] Paul Wouters' Yes on draft-ietf-dnsop-rfc8499bis-09: (with COMMENT)

2023-09-18 Thread Paul Wouters via Datatracker
Paul Wouters has entered the following ballot position for draft-ietf-dnsop-rfc8499bis-09: Yes When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https

Re: [DNSOP] [Last-Call] [Ext] Genart last call review of draft-ietf-dnsop-rfc8499bis-09

2023-09-18 Thread Paul Wouters
On Sun, 17 Sep 2023, Salz, Rich wrote: [ speaking as individual only ] On the other hand, spending a week or two repeating a cycle to get an important term in the current document seems like a better solution. If the WG agrees that this is an important term, sure. Well, if the IETF has

Re: [DNSOP] Paul Wouters' Yes on draft-ietf-dnsop-caching-resolution-failures-07: (with COMMENT)

2023-09-07 Thread Paul Wouters
On Sep 7, 2023, at 19:28, Mark Andrews wrote: > >  > > The server shouldn’t be caching the RRset and it’s RRSIGs unless they validate > successfully. This is a requirement of DNSSEC. This is also why recursive > servers need to validate responses so that garbage is not cached. Ah, so just

[DNSOP] Paul Wouters' Yes on draft-ietf-dnsop-caching-resolution-failures-07: (with COMMENT)

2023-09-06 Thread Paul Wouters via Datatracker
Paul Wouters has entered the following ballot position for draft-ietf-dnsop-caching-resolution-failures-07: Yes When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please

Re: [DNSOP] Clarifying motivation for Compact DoE

2023-08-08 Thread Paul Wouters
On Tue, 8 Aug 2023, Ben Schwartz wrote: If this is correct, then I'm not sure the complexity of solving the ENT problem is worthwhile. At $dayjob, I had to add bogus TXT records to our zones because of ENT issues with Amazon Route53, which Amazon knows about and has refused to fix for years.

Re: [DNSOP] should all ccTLD be on the Public Suffix list?

2023-07-19 Thread Paul Wouters
On Jul 19, 2023, at 01:54, Paul Vixie wrote: > >  > > George Michaelson wrote on 2023-07-18 22:41: >> ... >> my concerns with the PSL governance aren't relevant either. I am sure >> it was purposeful. I don't have to like things for them to provide >> upsides. > > when we've tried to talk

Re: [DNSOP] should all ccTLD be on the Public Suffix list?

2023-07-18 Thread Paul Wouters
On Jul 18, 2023, at 20:42, George Michaelson wrote: > > I know, I could submit these to the PSL website directly. I am asking > a meta question: do we think that operationally, if a PSL exists, that > all ccTLD and TLD should be on it? ccTLDs are mostly general registration so probably yes.

Re: [DNSOP] I-D Action: draft-ietf-dnsop-domain-verification-techniques-02.txt

2023-07-18 Thread Paul Wouters
On Jul 17, 2023, at 22:50, Paul Vixie wrote: > >  > >> Agreed, but that horse had already left the barn when we published the first >> SPF RFC 4408. > RFC 4408 was folly. TXT in a subdomain (RFC 5507 s3.2) would suit domain > verification well (wildcards aren't a factor) and would in no way

Re: [DNSOP] I-D Action: draft-ietf-dnsop-domain-verification-techniques-02.txt

2023-07-17 Thread Paul Wouters
On Jul 17, 2023, at 20:10, John Levine wrote: > >> I’m sure there are still plenty of tools crafting dns packets or using >> simplistic tools that are not able to do TCP or DNSSEC. > > I'm sure there used to be, but in 2023? Really? An example or two would be > intersting. As most of the

Re: [DNSOP] I-D Action: draft-ietf-dnsop-domain-verification-techniques-02.txt

2023-07-17 Thread Paul Wouters
On Jul 17, 2023, at 15:50, Joe Abley wrote: > >  > I see UDP as a legacy transport, required for backwards comparability but > that's about it. I think you will be proven wrong QUICly  Paul ___ DNSOP mailing list DNSOP@ietf.org

Re: [DNSOP] I-D Action: draft-ietf-dnsop-domain-verification-techniques-02.txt

2023-07-17 Thread Paul Wouters
On Jul 17, 2023, at 14:12, John R Levine wrote: > >  > In view of the wide use of DNSSEC and DoT and DoH, I think the argument that > triggering TCP is bad stopped being persuasive a while ago. (Don't we hope > people sign the DNS responses with the tokens?) I’m sure there are still plenty

Re: [DNSOP] I-D Action: draft-ietf-dnsop-domain-verification-techniques-02.txt

2023-07-17 Thread Paul Wouters
On Mon, 17 Jul 2023, Florian Obser wrote: The entire discussion of response size seems like a throwback to the 1990s and I would remove it. These days if your DNS doesn't handle yeah, that might be best. TCP, you already have worse problems, like DNSSEC doesn't work. Triggering TCP is

Re: [DNSOP] draft-dnsop-dnssec-extension-pkix on IETF117 dnsop agenda?

2023-07-17 Thread Paul Wouters
On Jul 16, 2023, at 15:53, Viktor Dukhovni wrote: > >  > I should perhaps have stated the technical criteria on which I consider > the proposal non-viable. To whit: > >- The proposed protocol lacks all downgrade resistance. >- Without a signed delegation from the parent, the existence

[DNSOP] Review of draft-ietf-dnsop-dnssec-validator-requirements-06

2023-07-03 Thread Paul Wouters
Abstract (and Section 2): Please remove the acronym DRO and just use "operator". Section 3 (Introduction): The first two paragraphs of the Introduction can be removed. Section 4 (Time Recommendations) This section repeats a lot and could be cut. But a real issue I have is with

Re: [DNSOP] Working Group Last call for draft-ietf-dnsop-dns-error-reporting

2023-06-21 Thread Paul Wouters
On Jun 20, 2023, at 16:40, Dick Franks wrote: > >  > WGLC is supposed to be a review, nit-picking and clarification process. A “review” can have results requiring major changes. But your use here seems to imply “only small changes”. This is incorrect. Documents in WGLC could be found to

Re: [DNSOP] Multiple drafts discussing the use of DNS NOTIFY

2023-06-20 Thread Paul Wouters
On Tue, 20 Jun 2023, Peter Thomassen wrote: My thoughts on this as in how to decide who does what, is... in EPP, there is a section that I've coded to look like... The usual drop downs are Yes/No and may require a reason Create a new action, "DS Managed by", give it three options

Re: [DNSOP] Generalized DNS Notifications (draft-thomassen-dnsop-generalized-dns-notify-01)

2023-06-20 Thread Paul Wouters
On Tue, 20 Jun 2023, Matthijs Mekking wrote: If there are different targets for different children of the same parent, then a generic NOTIFY record like below won't work anyway. parent. IN NOTIFY CDS scheme port scanner.parent. Why a new RRtype ? Why more stuff in the APEX? Why not:

Re: [DNSOP] Generalized DNS Notifications (draft-thomassen-dnsop-generalized-dns-notify-01)

2023-06-20 Thread Paul Wouters
On Tue, 20 Jun 2023, John Levine wrote: It appears that Matthijs Mekking said: Hi, I like this draft because of it tackles the issues of wasteful CDS polling and it uses NOTIFY, a mechanism that is well known, already exists in implementations, and actually feels like a good fit (as opposed

Re: [DNSOP] Multiple drafts discussing the use of DNS NOTIFY

2023-06-11 Thread Paul Wouters
On Jun 10, 2023, at 15:42, Tim Wicinski wrote: > >  > All > > The chairs have been looking at two different drafts discussing the use of > using DNS NOTIFY to update DNSSEC information. Interesting, as the reason for using CDS et. all was because TLD operators didn’t want to receive and

Re: [DNSOP] rfc8499bis: lame

2023-06-08 Thread Paul Wouters
On Thu, 8 Jun 2023, Kazunori Fujiwara wrote: It may be too late, but the word "lame" may have a discriminatory meaning. Then, how about we stop using "lame delegation" That was one of my suggestions, don't define it or declare it obsolete. It will ofcourse take time for people to stop

Re: [DNSOP] Call for Adoption: draft-klh-dnsop-rfc8109bis

2023-05-31 Thread Paul Wouters
On Wed, 31 May 2023, Tim Wicinski wrote: Subject: Re: [DNSOP] Call for Adoption: draft-klh-dnsop-rfc8109bis This call for adoption ends: 7 June 2023 In favour of adoption. Paul ___ DNSOP mailing list DNSOP@ietf.org

Re: [DNSOP] Domain Verification Techniques using DNS

2023-05-23 Thread Paul Wouters
On Mon, May 22, 2023 at 5:49 PM wrote: > Dear DNSOP WG, > > My company has developed a domain verification technique using DNS, it > fits the abstract of draft-ietf-dnsop-domain-verification-techniques. > > I am writing to ask the WG's opinion on whether our technique is within > the scope of

Re: [DNSOP] [Ext] WGLC rfc8499bis one week extension for lame delegation definition

2023-05-02 Thread Paul Wouters
On Tue, 2 May 2023, Frederico A C Neves wrote: On Mon, May 01, 2023 at 04:43:11PM +, Wessels, Duane wrote: My preferred definition is the one originally given by Paul Vixie, amended by myself, and further amended by Peter Thomassen: A lame delegation is said to exist when one or more

Re: [DNSOP] [Ext] WGLC rfc8499bis one week extension for lame delegation definition

2023-05-02 Thread Paul Wouters
On Tue, 2 May 2023, Peter Thomassen wrote: This, so far, was my understanding of the definition that was given in the other thread, and which Benno labeled (2) in the original post of this thread: "A lame delegation is said to exist when one or more authoritative servers designated by

[DNSOP] Paul Wouters' Yes on draft-ietf-dnsop-alt-tld-23: (with COMMENT)

2023-04-23 Thread Paul Wouters via Datatracker
Paul Wouters has entered the following ballot position for draft-ietf-dnsop-alt-tld-23: Yes When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https

Re: [DNSOP] Secdir early review of draft-ietf-dnsop-domain-verification-techniques-01

2023-04-20 Thread Paul Wouters
On Wed, 19 Apr 2023, Benjamin Kaduk via Datatracker wrote: [co-author hat on] Reviewer: Benjamin Kaduk Review result: Has Issues # SecDir review of draft-ietf-dnsop-domain-verification-techniques-01 Thanks for the review! On the whole the content is reasonable, but read on for some

Re: [DNSOP] draft-ietf-dnsop-structured-dns-error: suberr registration policy

2023-04-18 Thread Paul Wouters
On Tue, 18 Apr 2023, Ralf Weber wrote: [speaking as individual] On 18 Apr 2023, at 13:11, Benjamin Schwartz wrote: The draft's opening words are "DNS filtering is widely deployed for network security". This is true, but by far the "widest" deployment of DNS filtering is for authoritarian

Re: [DNSOP] Call for Adoption: Compact Denial of Existence in DNSSEC

2023-04-17 Thread Paul Wouters
On Sun, 16 Apr 2023, Tim Wicinski wrote: (as individual) Please review this draft to see if you think it is suitable for adoption by DNSOP, and send any comments to the list, clearly stating your view. In favour of adoption. Please also indicate if you are willing to contribute text,

Re: [DNSOP] [Ext] Meaning of lame delegation

2023-04-11 Thread Paul Wouters
No one proposed to retire the term? If unclear and additionally inappropriate from an inclusive language point of view, why not document the term as is, with a note explaining it is incomplete (without trying to fix it) and calling the term historic? Paul Sent using a virtual keyboard on a

Re: [DNSOP] I-D Action: draft-ietf-dnsop-domain-verification-techniques-01.txt

2023-03-28 Thread Paul Wouters
On Tue, 28 Mar 2023, Alex Stuart wrote: I am employed by a SAML metadata registrar and we require verification that a registrant has effective control over a fully-qualified domain name. We have developed our own DNS TXT based method for verification and are in the process for reviewing it.

Re: [DNSOP] Working Group Last Call for "Domain Verification Techniques using DNS"

2023-02-17 Thread Paul Wouters
On Fri, 17 Feb 2023, John R Levine wrote: Surely we know people who run services that use DNS validation. How about talking to some of them and finding out what kind of user errors they run into? The insinuation here is that we didn't talk to them. One of the authors is at salesforce, who

Re: [DNSOP] Working Group Last Call for "Domain Verification Techniques using DNS"

2023-02-17 Thread Paul Wouters
On Fri, 17 Feb 2023, John Levine wrote: That makes no sense. Why is it harder to copy a string to the name field in a cruddy web GUI than to the data field? It's copy and paste either way. For one, if the zone data presented to you is like a sorted zone file. Second, because LHS entries

Re: [DNSOP] Working Group Last Call for "Domain Verification Techniques using DNS"

2023-02-17 Thread Paul Wouters
John Levine wrote: While I think it would be good to publish some best practices in this area, this draft still seems scattered and makes some assertions that seem to me to be somewhere between unsupported and mistaken. I think we agree that the goal is there are two parties, call them owner

Re: [DNSOP] FW: [regext] WGLC: draft-ietf-regext-datadictionary-03

2023-02-09 Thread Paul Wouters
On Feb 9, 2023, at 16:27, Tim Wicinski wrote:On Thu, Feb 9, 2023 at 12:19 PM Paul Wouters <p...@nohats.ca> wrote:On Thu, 9 Feb 2023, Tim Wicinski wrote: >> I have a deeper question on using "ext" for extension - it feels like an  > abbreviation which doesn't feel u

Re: [DNSOP] FW: [regext] WGLC: draft-ietf-regext-datadictionary-03

2023-02-09 Thread Paul Wouters
On Thu, 9 Feb 2023, Tim Wicinski wrote: Big fan of this document and feel it is good. I have only one small nit: See also "domain name" in [RFC8499]. Should this not be "Domain name"  (per 8499) ? I have a deeper question on using "ext" for extension - it feels like an  abbreviation 

Re: [DNSOP] New Version Notification - draft-ietf-dnsop-dns-catalog-zones-09.txt

2023-02-09 Thread Paul Wouters
On Thu, 9 Feb 2023, Willem Toorop wrote: Or it could use “_catalog.example.com” ? Yes, if we add a sentence that the fictional organization producing this catalog is "example.com", then we could use that too yes. That would imho be the best solution. Paul

Re: [DNSOP] New Version Notification - draft-ietf-dnsop-dns-catalog-zones-09.txt

2023-02-09 Thread Paul Wouters
On Feb 9, 2023, at 06:33, Willem Toorop wrote: > > Op 07-02-2023 om 16:45 schreef Paul Wouters:> I find the valid use of the > name "invalid" to be pretty horrible. An >> engineer looking at a catalog might quickly believe >> the invalid is a bug where it sh

Re: [DNSOP] New Version Notification - draft-ietf-dnsop-dns-catalog-zones-09.txt

2023-02-08 Thread Paul Wouters
On Wed, Feb 8, 2023 at 3:33 AM Kees Monshouwer wrote: > Hi Paul, > > On 2/7/23 16:45, Paul Wouters wrote: > > On Tue, Feb 7, 2023 at 8:53 AM wrote: > > Why must a catalog server / zone only support one version at most? Eg if > version "3" come

  1   2   3   4   5   6   7   8   >