On Nov 7, 2008, at 3:17 AM, Stephane Bortzmeyer wrote:

On Tue, Nov 04, 2008 at 10:59:46AM -0800,
The IESG <[EMAIL PROTECTED]> wrote a message of 26 lines which said:

- 'DNS Blacklists and Whitelists '
  <draft-irtf-asrg-dnsbl-07.txt> as a Proposed Standard

Well, it is certainly very important that the DNSxL are documented, given their widespread use. And the I-D is a good document.

On the other hand, I have a few questions: the first one, why "Proposed standard"? Is it really a good idea to standardize these lists (most being badly managed)? Why not just "Informational" if we just want to document what people are doing?

Agreed.

Second question, the document indeed standardizes many things which are not in common use but does not point towards a rationale, so some choices are puzzling. Why TXT records to point to an URL and not NAPTR? Is this because of current usage in DNSxL? If so, this should be noted. But why IPv6 lists use a A record and not a AAAA? I am not aware of existing IPv6 lists so this cannot be the current usage?

In putting together planning for IPv6 block-lists, one soon confronts the enormity of its potential data-set and the incredible complexity related to carrier grade NATs, tunneling protocols, and third-party translation services. :^(

On the other hand, the DKIM signature "domain" and an accurate "on- behalf-of" value as a tuple offers a safer and simpler basis for acceptance with perhaps only a two order increase in the data-set. In today's budget cutting and tight schedules, even establishing a DKIM list is not easy where ADSP needs to be modified before this can happen. :^(

Perhaps years from now, part of the overhead for sourcing from IPv6 will be to include DKIM signatures with accurate "on-behalf-of" values. The "on-behalf-of" values should be opaque in most cases. Today it would seem email wants to pretend to authenticate, rather than indicate what is actually authenticated, even when using opaque values. :^(

It is seldom that a person's email-address represents the source of abuse. Instead, it is often the result of compromised systems somewhere in the message stream.

-Doug
_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

Reply via email to