Re: [dmarc-ietf] DBOUND

2023-10-22 Thread Murray S. Kucherawy
On Mon, Oct 16, 2023 at 8:35 PM Neil Anuskiewicz  wrote:

> The reference to DBOUND was sparked by looking around at what w3aawg was
> saying as I generally think they have some good papers and a great video
> series on email authentication. But what I found on DBOUND isn’t
> endorsement. They framed DBOUND in a positive light and encouraged people
> to look into the project but that doesn’t mean the organization endorses
> it.
>

DBOUND was an attempt to create, in the DNS, a mechanism that could do what
the PSL does.  There were essentially two proposals: Making assertions from
the top down, and making assertions from the bottom up.  You could liken
these to the cookies case and the DMARC case.  Sadly, there was no
convergence and thus no consensus, so the WG disbanded (over six years ago)
without producing anything.  I'm not sure why a M3AAWG statement dated
April of this year would make reference to it as if it were current.

There was an attempt to restart the working group within the last year or
so, but that push was not sufficiently organized to sustain a rechartering
effort.  The working group remains closed, though the mailing list remains
open.

-MSK, ART AD
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DBOUND

2023-10-16 Thread Neil Anuskiewicz
On Oct 16, 2023, at 6:48 PM, Neil Anuskiewicz  wrote:
> 
> 
>> On Oct 16, 2023, at 6:43 PM, Seth Blank  
>> wrote:
>> 
>> I'm sorry, to what are you referring? I co-chair the M3AAWG technical 
>> committee, and am unaware of any advocacy for relitigating DBOUND...

Seth, I based my statement on wording in a couple documents and I heard it from 
other sources but I think I’m just flat out wrong w3aawg is supporting DBOUND. 
I did not mean it as a pejorative, it was more interest in why they might be 
supporting it. I don’t anything about DBOUND. It looked like the project was a 
an active project, so I was curious about it and why M3AAWG might have taken an 
interest. But jumping from that to support was too big a leap.

My goal for being on this list is to learn and that’s been great. So the next 
thing would be how to use what I learn to be helpful. It’s challenging to 
figure out how to be helpful to the WG so I’ve been thinking of other ways such 
as other content to help others understand. 

The reference to DBOUND was sparked by looking around at what w3aawg was saying 
as I generally think they have some good papers and a great video series on 
email authentication. But what I found on DBOUND isn’t endorsement. They framed 
DBOUND in a positive light and encouraged people to look into the project but 
that doesn’t mean the organization endorses it. 

The last thing I wanted to do is offend anyone here. I’d like to continue to 
learn and possibly contribute to the larger DMARCbis effort. So again, I 
apologize.

Neil

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DBOUND

2023-10-16 Thread John Levine
It appears that Neil Anuskiewicz   said:
>-=-=-=-=-=-
>See section V


Enaging with DBOUND is not the same thing as advocating that DBOUND do anything 
specific.

Everyone agrees the PSL is awful, including the people who maintain
it. But there's no agreement at all about what would be better.

DMARC managed to get away from the PSL because unlike every other PSL
application, it can put its own markers in the DNS.

Quite a while ago I came up with a tricky way to put the whole PSL in
the DNS and do look ups efficiently (one lookup per boundary, which
typically means one lookup total.) But people who write web browsers
that use it to manage cookies said no, that's too slow, and we haven't
made any perceptible progress since then.

R's,
John

>> On Oct 16, 2023, at 6:43 PM, Seth Blank  
>> wrote:
>> 
>
>
>> I'm sorry, to what are you referring? I co-chair the M3AAWG technical 
>> committee, and am unaware of any advocacy for relitigating DBOUND...
>> On Mon, Oct 16, 2023 at 6:36� �PM Neil Anuskiewicz 
>>  wrote:
>> 
>> M3AAWG is advocating for DBOUND as most of you likely know. Does it seem 
>> a viable alternative? We could sure use the support of M3AAWG. How could
>> we earn their support or are they committed to DBOUND?
>> 
>> Perhaps once we prove that DMARCbis works they� ll reconsider.
>> 
>> Neil

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DBOUND

2023-10-16 Thread Neil Anuskiewicz
See section VOn Oct 16, 2023, at 6:43 PM, Seth Blank  wrote:I'm sorry, to what are you referring? I co-chair the M3AAWG technical committee, and am unaware of any advocacy for relitigating DBOUND...On Mon, Oct 16, 2023 at 6:36 PM Neil Anuskiewicz 40marmot-tech@dmarc.ietf.org> wrote:M3AAWG is advocating for DBOUND as most of you likely know. Does it seem a viable alternative? We could sure use the support of M3AAWG. How could we earn their support or are they committed to DBOUND?

Perhaps once we prove that DMARCbis works they’ll reconsider.

Neil
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc
-- Seth Blank  | Chief Technology Officere: s...@valimail.comp:  This email and all data transmitted with it contains confidential and/or proprietary information intended solely for the use of individual(s) authorized to receive it. If you are not an intended and authorized recipient you are hereby notified of any use, disclosure, copying or distribution of the information included in this transmission is prohibited and may be unlawful. Please immediately notify the sender by replying to this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DBOUND

2023-10-16 Thread Neil Anuskiewicz
On Oct 16, 2023, at 6:43 PM, Seth Blank  wrote:I'm sorry, to what are you referring? I co-chair the M3AAWG technical committee, and am unaware of any advocacy for relitigating DBOUND...On Mon, Oct 16, 2023 at 6:36 PM Neil Anuskiewicz 40marmot-tech@dmarc.ietf.org> wrote:M3AAWG is advocating for DBOUND as most of you likely know. Does it seem a viable alternative? We could sure use the support of M3AAWG. How could we earn their support or are they committed to DBOUND?

Perhaps once we prove that DMARCbis works they’ll reconsider.

Neil
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

In this document on the site, toward the bottom they encourage support for it. I found the same thing in another similar document. https://www.m3aawg.org/sites/default/files/m3aawg_present_and_future_of_the_public_suffix_list.docx_.pdfNo offense intended, sir. I apologize if I’m wrong. It does appear they are supporting it by the wording.Neil___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] DBOUND

2023-10-16 Thread Seth Blank
I'm sorry, to what are you referring? I co-chair the M3AAWG technical
committee, and am unaware of any advocacy for relitigating DBOUND...

On Mon, Oct 16, 2023 at 6:36 PM Neil Anuskiewicz  wrote:

> M3AAWG is advocating for DBOUND as most of you likely know. Does it seem a
> viable alternative? We could sure use the support of M3AAWG. How could we
> earn their support or are they committed to DBOUND?
>
> Perhaps once we prove that DMARCbis works they’ll reconsider.
>
> Neil
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>


-- 

*Seth Blank * | Chief Technology Officer
*e:* s...@valimail.com
*p:*

This email and all data transmitted with it contains confidential and/or
proprietary information intended solely for the use of individual(s)
authorized to receive it. If you are not an intended and authorized
recipient you are hereby notified of any use, disclosure, copying or
distribution of the information included in this transmission is prohibited
and may be unlawful. Please immediately notify the sender by replying to
this email and then delete it from your system.
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] DBOUND

2023-10-16 Thread Neil Anuskiewicz
M3AAWG is advocating for DBOUND as most of you likely know. Does it seem a 
viable alternative? We could sure use the support of M3AAWG. How could we earn 
their support or are they committed to DBOUND?

Perhaps once we prove that DMARCbis works they’ll reconsider.

Neil
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


[dmarc-ietf] DBOUND

2022-06-18 Thread Murray S. Kucherawy
Some time back there was an attempt to solve the PSL problem in DNS via a
Domain Boundaries (DBOUND) working group.  It was not successful, unable to
develop consensus among several options, and the working group closed
having not produced anything.

The WG page: https://www.ietf.org/mailman/listinfo/dbound

There is now some interest in seeing if a new run at that work would
succeed.  This might be of significant interest to DMARC if it were to work
out this time.  There may be a side meeting to discuss it at IETF 114.  If
you might be interested in participating or supporting that work, feel free
to subscribe to their list.

-MSK, ART AD
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread Dave Crocker

On 4/3/2019 12:19 PM, tjw ietf wrote:

I was going to say CAA but that’s 6 years old.



5 was a random number.  I was merely meaning 'recent'.

But suggesting CAA in response to my query means that you think RFC 6844 
has received widespread -- ie, at scale -- end to end adoption and use.


Yes?

Please forgive my skepticism.

d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread Stephen Farrell


On 03/04/2019 21:19, Jothan Frakes wrote:
>> ... registrar
>> GUIs are perhaps the main barrier for new RRTYPEs ...
> 
> s/registrar/DNS Management/
> 
> these are often not one in the same - and the only reason I make that
> pedantic distinction is that the frequent situation where
> DNS Management != registrar
> heavily impedes DNSSEC end-to-end configuration, because it needs
> config harmony within the registration path (registrar) and the
> resolution path (DNS)
> 
> Hope that made sense.  Just want to ensure these are not conflated to
> avoid drag on efforts

Fair point.

Ta,
S.

> 
> ___
> dbound mailing list
> dbo...@ietf.org
> https://www.ietf.org/mailman/listinfo/dbound
> 


0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread Jothan Frakes
> ... registrar
> GUIs are perhaps the main barrier for new RRTYPEs ...

s/registrar/DNS Management/

these are often not one in the same - and the only reason I make that
pedantic distinction is that the frequent situation where
DNS Management != registrar
heavily impedes DNSSEC end-to-end configuration, because it needs
config harmony within the registration path (registrar) and the
resolution path (DNS)

Hope that made sense.  Just want to ensure these are not conflated to
avoid drag on efforts

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread Stephen Farrell

Far from widely deployed, but the latest ESNI draft introduced a
new RRTYPE from an experimental range, and it "just worked," which
was a pleasant surprise for me. (And is partly why I am happy to
try that route for RDBD.)

"just worked" here meaning: no registrar web-GUI involved, but
whacking the ascii hex encoding of binary RR values into a zonefile
on a hidden master, having that transferred to the visible NS's and
accessing it from elsewhere using dig with and without DNS/TLS (DoT-
flavoured via stubby) all did really just work. Only hard thing was
finding the docs to say how to refer to the new RRTYPE in zonefile
and dig command line. (I added some notes on that in a readme for my
ESNI code - go to [1] and search down for RRTYPE if you're curious.)

I think that tends to back up John's argument that today, registrar
GUIs are perhaps the main barrier for new RRTYPEs that don't change
the DNS semantically. But there may also be development environment
issues, e.g. I don't know if you can easily query for new RRTYPEs
from e.g. PHP or python code.

Lastly, on Dave's draft itself, I'd be happy if something like that
were deployed, and don't think it overlaps much with or competes
with RDBD. (At least I hope these aren't seen as competing ideas.)

In early chats about RDBD Alex and I did think about the PSL, but we
ended up deliberately not trying to aim for a DNS equivalent. Without
trying to speak for Alex, personally I think emulating the PSL in DNS
is too big a leap to attempt in one step and isn't likely to succeed,
despite it being an outcome that'd be good to (eventually) see.

That's partly how we ended up with (what I'd claim) is the more modest
initial goal of RDBD.

Cheers,
S

[1] https://github.com/sftcd/openssl/tree/master/esnistuff


On 03/04/2019 20:19, tjw ietf wrote:
> I was going to say CAA but that’s 6 years old. 
> 
> 
> 
> From my high tech gadget
> 
>> On Apr 3, 2019, at 20:06, John R Levine  wrote:
>>
>>> On Wed, 3 Apr 2019, Dave Crocker wrote:
>>> Now, about /end to end/ support, not just publishing...
>>>
>>> Please provide some examples comparable to your proposed use case.  That 
>>> is, what are new RRs that are getting well-scaled, on-going use, defined in 
>>> say the last 5 years?
>>
>> There aren't many other than maybe CDS and CDSKEY.  TLSA was defined in 2012 
>> and Viktor says it's getting pretty wide use now, particularly considering 
>> that it needs DNSSEC.
>>
>> On the other hand, there hasn't been anything with new server semantics 
>> since NSEC3 in 2008.
>>
>> This is really an argument for dnsop, not dmarc or dbound.
>>
>> Regards,
>> John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
>> Please consider the environment before reading this e-mail. https://jl.ly
>>
>> ___
>> dmarc mailing list
>> dmarc@ietf.org
>> https://www.ietf.org/mailman/listinfo/dmarc
> 
> ___
> dbound mailing list
> dbo...@ietf.org
> https://www.ietf.org/mailman/listinfo/dbound
> 


0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread tjw ietf
I was going to say CAA but that’s 6 years old. 



From my high tech gadget

> On Apr 3, 2019, at 20:06, John R Levine  wrote:
> 
>> On Wed, 3 Apr 2019, Dave Crocker wrote:
>> Now, about /end to end/ support, not just publishing...
>> 
>> Please provide some examples comparable to your proposed use case.  That is, 
>> what are new RRs that are getting well-scaled, on-going use, defined in say 
>> the last 5 years?
> 
> There aren't many other than maybe CDS and CDSKEY.  TLSA was defined in 2012 
> and Viktor says it's getting pretty wide use now, particularly considering 
> that it needs DNSSEC.
> 
> On the other hand, there hasn't been anything with new server semantics since 
> NSEC3 in 2008.
> 
> This is really an argument for dnsop, not dmarc or dbound.
> 
> Regards,
> John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
> Please consider the environment before reading this e-mail. https://jl.ly
> 
> ___
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread John R Levine

On Wed, 3 Apr 2019, Dave Crocker wrote:

Now, about /end to end/ support, not just publishing...

Please provide some examples comparable to your proposed use case.  That is, 
what are new RRs that are getting well-scaled, on-going use, defined in say 
the last 5 years?


There aren't many other than maybe CDS and CDSKEY.  TLSA was defined in 
2012 and Viktor says it's getting pretty wide use now, particularly 
considering that it needs DNSSEC.


On the other hand, there hasn't been anything with new server semantics 
since NSEC3 in 2008.


This is really an argument for dnsop, not dmarc or dbound.

Regards,
John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread Dave Crocker

On 4/3/2019 11:52 AM, Jothan Frakes wrote:

I fear that unless we can ensure
that some of the dependencies are met by those proposals, the
proposals will not endure, and we'll remain using the PSL in a status
quo manner.



Jothan,

Thanks for adding comments so quickly after the draft was released.

As the draft notes, it attempts to cover PSL use cases but needs far 
more experienced eyes and minds to find where the PSL emulation needs 
more work.


To that end, anything that documents the dependencies you cite is sure 
to help.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread Jothan Frakes
I appreciate the time you invested in this Dave.   I definitely like
that we're thinking in terms of how to leverage DNS and its
distributed model vs emulating the hosts.txt situation, and PSL is
essentially a hosts.txt situation.

Some assert there is a benefit to being able to contain some form of
static list locally for speed.  This happens at the trade-off of
potentially stale data, which we experience as maintainers receiving
energy from expressive TLD admins describing their grief over their
domains being directed at search instead of resolving in DNS because
their pc, tablet or mobile device runs a browser software that did not
contain their TLD.

So in those cases (and potentially others) getting things into DNS
_might_ be better.  I think that a TLD administrator being able to
make direct updates in their own zones is vastly better because it
would both alleviate the arduous process of validating authority of
requests, and streamline the requesting process to near zero on their
updates, and enable more direct and exacting control by the registry
operators.

That said, we fail the community unless the potential replacements
take into consideration the many constituent / subjective uses of PSL
that have evolved across the years before we tick the box next to any
particular solution meeting the diverse needs.

We have to tread carefully here.  I have great respect for the IETF
and the many wise and noble experts that have donated their
experience, time and wisdom towards solutions and standards.  It is a
process that requires patience and I have been told by many in the
developer community that it is not always one that is inclusive or
able to meet the pace of some development cycles and product or
service evolution.

The PSL basically came into existence outside of the IETF process,
borne of real practical needs, and those needs have forked and
matured.

There is a 'lenticular' / perspective issue in how different
stakeholders are using the PSL.   PSL is included in software
libraries, which incorporate it without prescribing how a developer
might use it.  Some care only about the private section of the list,
some only about the "ICANN" section.  Some integrators of the PSL omit
certain elements, or even maintain their own supplementary sections
for their project or service needs.

Think it is safe to assert variety is present - each have an entirely
different need and application of some or all of the PSL's contents
than a browser program, search engine, security professional,
anti-spam, reporting, SSL Cert, or other use.

We (maintainers) don't prescribe specifically how it gets used as
volunteer community maintainers, we just try to guide community
entries and validate them (and focus on ICP-3 or other I* integrity).

PSL is expanding - which grows the file size each time.  As potential
solutions are presented from web developers or even the IETF (or both)
that might help to organize or better architect solutions that could
help PSL from heading towards something that emulates the transition
from the SRI hosts.txt challenges, I fear that unless we can ensure
that some of the dependencies are met by those proposals, the
proposals will not endure, and we'll remain using the PSL in a status
quo manner.

-Jothan
Jothan Frakes


On Wed, Apr 3, 2019 at 10:58 AM John Levine  wrote:
>
> In article <3bebe973-0536-96cd-983e-240ba4346...@dcrocker.net> you write:
> >Comments eagerly sought, of course.
>
> This seems sorta kinda like my dbound draft, only with _tagged TXT
> records rather than a new rrtype, and (unless I missed something) a
> hope that somehow you can use a yet to be invented cache to avoid
> walking up the tree, where mine used wildcards to do one lookup per
> boundary regardless of the tree depth.
>
> I can see that the tradeoffs are different but I don't see why they're better.
>
> R's,
> John
>
> >A new version of I-D, draft-dcrocker-dns-perimeter-00.txt
> >has been successfully submitted by D. Crocker and posted to the
> >IETF repository.
> >
> >Name:  draft-dcrocker-dns-perimeter
> >Revision:  00
> >Title: DNS Perimeter Overlay
> >Document date: 2019-04-02
> >Group: Individual Submission
> >Pages: 20
> >URL:
> >https://www.ietf.org/internet-drafts/draft-dcrocker-dns-perimeter-00.txt
>
> ___
> dbound mailing list
> dbo...@ietf.org
> https://www.ietf.org/mailman/listinfo/dbound

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread Dave Crocker

On 4/3/2019 11:45 AM, John R Levine wrote:

On Wed, 3 Apr 2019, Dave Crocker wrote:
In my experience, these days getting a new rrtype that doesn't have 
extra semantics into DNS servers happens pretty quickly. 


Now, about /end to end/ support, not just publishing...

Please provide some examples comparable to your proposed use case.  That 
is, what are new RRs that are getting well-scaled, on-going use, defined 
in say the last 5 years?



  My dbound draft has no new DNS 
semantics, just ordinary wildcards and an ordinary rrtype.


I noted that.


To put anything into the additional section, you're asking the DNS 
servers to treat a _perim name specially if there are TXT records under 


I noted that.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread John R Levine

On Wed, 3 Apr 2019, Dave Crocker wrote:
Section 7's suggestion for using Additional information does not rely on 
caching.


Reliance on existing wildcard depends on propagation of a new RR, which 
continues to be problematic.  There's a reason the Attrleaf table has so many entries...


Now we're having a discussion about which is the frying pan and which is 
the fire.


In my experience, these days getting a new rrtype that doesn't have extra 
semantics into DNS servers happens pretty quickly.  It's an entry in a 
table or a new short stylized parse/unparse routine.  DNS caches don't 
have to change at all. The problem is the web provisioning crudware, which 
is what I have tried with limited success to address with my DNS extension 
language work.  My dbound draft has no new DNS semantics, just ordinary 
wildcards and an ordinary rrtype.


To put anything into the additional section, you're asking the DNS servers 
to treat a _perim name specially if there are TXT records under the name 
and to go search through the zone to find the extra stuff and put it in 
the additional section.  DNS caches have to change too, to treat the 
additional stuff as non-hostile and pass it through, since caches throw 
away unrecongnized additional sections to prevent cache poisoning (the 
Kashpureff bug.)


You should run this by dnsop where I expect you'll get a great deal of 
pushback and references to the DNS Camel for anything with new semantics.


Regards,
John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


Re: [dmarc-ietf] [dbound] Fwd: New Version Notification for draft-dcrocker-dns-perimeter-00.txt

2019-04-03 Thread Dave Crocker

On 4/3/2019 10:58 AM, John Levine wrote:

In article <3bebe973-0536-96cd-983e-240ba4346...@dcrocker.net> you write:

Comments eagerly sought, of course.


This seems sorta kinda like my dbound draft, only with _tagged TXT
records rather than a new rrtype, and (unless I missed something) a
hope that somehow you can use a yet to be invented cache to avoid
walking up the tree, where mine used wildcards to do one lookup per
boundary regardless of the tree depth.



Section 7's suggestion for using Additional information does not rely on 
caching.


Reliance on existing wildcard depends on propagation of a new RR, which 
continues to be problematic.  There's a reason the Attrleaf table has so 
many entries...


And while there is certainly conceptual overlap with your earlier 
proposal, the current one has differences I'd class as significant.


d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

___
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc