Re: [DNSOP] [homenet] My assessment of .homenet as described during the WG session yesterday.

2017-03-29 Thread Mark Andrews

In message 
, Brian 
Dickson writes:
> On Wed, Mar 29, 2017 at 5:07 PM, Mark Townsley  wrote:
>
> >
> > > On Mar 29, 2017, at 10:07 AM, Michael Richardson
> 
> > wrote:
> > >
> > >
> > > Terry Manderson  wrote:
> > >> B) seek a .homenet special use domain WITHOUT the delegation request
> > >> AND ask the IETF/IESG/IAB to commence the discussion with the ICANN
> > >> community to achieve an insecure delegation
> > >
> > >> c) seek a .arpa insecure special use delegation
> > >
> > >> d) go for "B" and if that doesn't work shift to "C"
> > >
> > > Is there some reason we can not proceed with "C", concurrently with (B).
> >
> > I think that would require a new consensus call. There was a lot of work
> > done to get to the point of agreeing on a path forward at the last IETF,
> > and this path would be rather different than that.
> >
> > > This might cause stub resolvers to have to have two cases
> > > (SOMETHING.arpa, and .homenet) eventually, but at least we could deploy
> > > and attempt interop with SOMETHING.arpa NOW, and it would more clearly
> > > permit "home." to be removed from code.
> > >
> >
> > /chair-hat-off
> >
> > I don’t think we want to have two defaults in our specs. It’s bad enough
> > that we are already going to end up with .home and .homenet depending on
> > the version of code used or forked from, I really don’t want to do 
> > anything
> > that could lead to a third if we can avoid it.
> >
> > - Mark
> >
>
> Taking a STRICTLY devil's advocate position here:
>
> Isn't it the case that the thing that knows what the  label is,
> should be able to masquerade on behalf of anything that isn't aware of the
> divergence of the three possible values for ? If you end up with
> some boxes thinking it is ".home", some ".homenet", and some
> ".homenet.arpa", as long as one of them knows about all three, it should
> be possible to resolve the differences.
>
> The scope of the namespace is "the home network", and never reaches the
> real DNS (roots), so at worst it would be folding the three fake
> namespaces into a unified (three-headed) fake namespace.

Can we please stop with this "and never reaches the real DNS (roots)"
garbage.  Queries for homenet/DS *will* reach the roots.  That is
how DNSSEC validation is designed to work.  They *need* to be
answered with a signed NOERROR NODATA response.  Lots of Linux
distributions ship with DNSSEC validation enabled for on machine
clients and they are also configured to forward to the nameservers
that are returned by DHCP.

These machines behave *exactly* like a validating stub resolver from
the DNSSEC perspective.  This isn't something that will be in the
future.  It is the PRESENT.

> I.e. avoid it if you can, but if you can't, I think the issues are
> solvable, even if they get a little funky/ugly under the hood.
>
> None of that should be visible to users, I don't think.
>
> Brian
>
> P.S. Guide to implementers - never expose multiple handles for the same
> object; over-exuberant users may be tempted to try to "clean up" the
> duplicates.

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [homenet] My assessment of .homenet as described during the WG session yesterday.

2017-03-29 Thread Brian Dickson
On Wed, Mar 29, 2017 at 5:07 PM, Mark Townsley  wrote:

>
> > On Mar 29, 2017, at 10:07 AM, Michael Richardson 
> wrote:
> >
> >
> > Terry Manderson  wrote:
> >> B) seek a .homenet special use domain WITHOUT the delegation request
> >> AND ask the IETF/IESG/IAB to commence the discussion with the ICANN
> >> community to achieve an insecure delegation
> >
> >> c) seek a .arpa insecure special use delegation
> >
> >> d) go for "B" and if that doesn't work shift to "C"
> >
> > Is there some reason we can not proceed with "C", concurrently with (B).
>
> I think that would require a new consensus call. There was a lot of work
> done to get to the point of agreeing on a path forward at the last IETF,
> and this path would be rather different than that.
>
> > This might cause stub resolvers to have to have two cases
> > (SOMETHING.arpa, and .homenet) eventually, but at least we could deploy
> > and attempt interop with SOMETHING.arpa NOW, and it would more clearly
> > permit "home." to be removed from code.
> >
>
> /chair-hat-off
>
> I don’t think we want to have two defaults in our specs. It’s bad enough
> that we are already going to end up with .home and .homenet depending on
> the version of code used or forked from, I really don’t want to do anything
> that could lead to a third if we can avoid it.
>
> - Mark
>

Taking a STRICTLY devil's advocate position here:

Isn't it the case that the thing that knows what the  label is,
should be able to masquerade on behalf of anything that isn't aware of the
divergence of the three possible values for ? If you end up with
some boxes thinking it is ".home", some ".homenet", and some
".homenet.arpa", as long as one of them knows about all three, it should be
possible to resolve the differences.

The scope of the namespace is "the home network", and never reaches the
real DNS (roots), so at worst it would be folding the three fake namespaces
into a unified (three-headed) fake namespace.

I.e. avoid it if you can, but if you can't, I think the issues are
solvable, even if they get a little funky/ugly under the hood.

None of that should be visible to users, I don't think.

Brian

P.S. Guide to implementers - never expose multiple handles for the same
object; over-exuberant users may be tempted to try to "clean up" the
duplicates.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [homenet] My assessment of .homenet as described during the WG session yesterday.

2017-03-29 Thread Mark Townsley

> On Mar 29, 2017, at 10:07 AM, Michael Richardson  
> wrote:
> 
> 
> Terry Manderson  wrote:
>> B) seek a .homenet special use domain WITHOUT the delegation request
>> AND ask the IETF/IESG/IAB to commence the discussion with the ICANN
>> community to achieve an insecure delegation
> 
>> c) seek a .arpa insecure special use delegation
> 
>> d) go for "B" and if that doesn't work shift to "C"
> 
> Is there some reason we can not proceed with "C", concurrently with (B).

I think that would require a new consensus call. There was a lot of work done 
to get to the point of agreeing on a path forward at the last IETF, and this 
path would be rather different than that.

> This might cause stub resolvers to have to have two cases
> (SOMETHING.arpa, and .homenet) eventually, but at least we could deploy
> and attempt interop with SOMETHING.arpa NOW, and it would more clearly
> permit "home." to be removed from code.
> 

/chair-hat-off

I don’t think we want to have two defaults in our specs. It’s bad enough that 
we are already going to end up with .home and .homenet depending on the version 
of code used or forked from, I really don’t want to do anything that could lead 
to a third if we can avoid it.

- Mark

>> Again, this situation is fluid and as discussions evolve I will provide
>> more information when it is appropriate. In the mean-time I would very
>> much like everyone to take a calming breath and understand that I am
>> taking a very pragmatic view of this concern.
> 
> Thank you!
> 
> --
> Michael Richardson , Sandelman Software Works
> -= IPv6 IoT consulting =-
> 
> 
> 
> ___
> homenet mailing list
> home...@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New draft for ALIAS/ANAME type

2017-03-29 Thread Anthony Eden
On Wed, Mar 29, 2017 at 11:14 AM, Pieter Lexis
 wrote:
> Hello Anthony,
>
> On Wed, 29 Mar 2017 08:51:50 -0500
> Anthony Eden  wrote:
>
>> https://datatracker.ietf.org/doc/draft-dnsop-eden-alias-rr-type/
>>
>> This draft describes the ALIAS/ANAME record (aka CNAME-flattening)
>> that numerous vendors and DNS providers are now supporting in
>> proprietary fashions. I hope that this draft will eventually lead to a
>> good mechanism for interop of ALIAS/ANAME records.
>
> First off, thank you for this. I would love to hear from current implementors 
> of ALIAS/ANAME/CNAME-flattening what their ideas/critisisms are.
>
> This said, I have several comments after a first quick read of the document.
>
> There is no mention of the fact that ALIAS is mostly meant for zone apexes 
> where other records MUST be present and a CNAME cannot exist. CNAMEs would 
> cover non-apex usecases for ALIAS.

As Tony pointed out, there are use cases for non-apex nodes as well.

>
> I miss guidance what should happen when an ALIAS record is queried directly 
> (would it be returned, should it be refused, should it be an empty response?).

It's a good point. Our implementation doesn't expose the ALIAS itself
as a queryable type, but there is a legitimate argument to allow it.

>
> I miss words on the interaction between ALIAS records and other (mostly A and 
> ) records on the same node.

+1. In our case we would return both the static records as well as the
materialized records.

>
> Section 3.1
>
> "The server will respond with one or more A records", I fail to see why this 
> cannot be zero or more. Am ALIAS target without A or  records should 
> yield an empty response from the authoritative server.

Good point.

>
> "If the recursive query returns an NXDOMAIN response, then the authoritative 
> name server MUST return an NXDOMAIN response as well.". If any other records 
> exist (which is always the case for the apex), or if there are labels 
> underneath the ALIAS'es name, the authoritative server cannot send out 
> NXDOMAIN.

Also a good point. I actually need to check our implementation to see
how it behaves now in this case.

>
> Section 3.3
>
> This section has 2 similar paragraphs, one with should and the other with 
> MUST.

Yes, I am removing the extra paragraph and going with MUST.

>
> Asking directly for a CNAME for a node that only has an ALIAS record should 
> yield a response indicating that RRType does not exist at that node.

I agree.

>
> Again, thank you for starting this draft. I support adoption of this draft in 
> the dnsop WG to facilitate better interop between 
> ALIAS/ANAME/CNAME-flattening implementors.

Thank you for your feedback, I appreciate it.

-Anthony

-- 
DNSimple.com
http://dnsimple.com/
Twitter: @dnsimple

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-tale-dnsop-serve-stale

2017-03-29 Thread Shumon Huque
On Wed, Mar 29, 2017 at 2:10 PM, Paul Vixie  wrote:

>
>
> Shumon Huque wrote:
> > On Tue, Mar 28, 2017 at 12:20 PM, Paul Vixie  > ...
> >
> > speaking of resimprove, i hope you'll include in this draft the idea
> of
> > using delegation-TTL as a delegation-recheck interval, and using an
> > authoritative NXDOMAIN from the delegator as proof that you need to
> run
> > an "rm -rf" in your cache.
> >
> > i bring this up because we need to be able to kill more cached data
> > faster-- the opposite of stretchiness-- for abuse control reasons. if
> > you're going to soften the signaling for cache expiration, you really
> > ought to balance that out with this simple method of also hardening
> it.
> >
> > Perhaps you've forgotten (since you participated in the discussions), but
> > the portion of resimprove that dealt with expunging cached data below the
> > NXDOMAIN boundary was rescued, expanded on, and published as
> > RFC 8020 ("NXDOMAIN: There Really is Nothing Underneath") late last
> > year.
>
> yes, i know that RFC 8020 includes both the idea of stopping downward
> searches when a cached NXD is encountered, and the idea of pruning (like
> "rm -rf" in UNIX) existing cache entries when an NXD is received. those
> changes, in addition to QM, will do much to pacify the DNS data model.
>
> however, it's equally vital for malicious DNS content takedown, that the
> part about remembering the delegation NS TTL and using it to
> periodically revalidate the existence of that delegation, also be
> brought forward. this becomes even more vital if we're making TTL
> stretchy, and i would be happy to see tale's document cover this topic.


> in other words, the prune-and-stop on NXD must be given a new source of
> NXD, which is delegation revalidation. i'd love it if delegations all
> had a one hour or less TTL, at least for public suffixes.
>

Yes, I forgot to comment on that piece in the previous email. I agree
that delegation revalidation should be published also. Among other things,
I think it effectively solves the ghost domain problem that was discussed
during the last IETF and DNS-OARC.

-- 
Shumon Huque
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-tale-dnsop-serve-stale

2017-03-29 Thread Paul Vixie


Shumon Huque wrote:
> On Tue, Mar 28, 2017 at 12:20 PM, Paul Vixie  ...
> 
> speaking of resimprove, i hope you'll include in this draft the idea of
> using delegation-TTL as a delegation-recheck interval, and using an
> authoritative NXDOMAIN from the delegator as proof that you need to run
> an "rm -rf" in your cache.
> 
> i bring this up because we need to be able to kill more cached data
> faster-- the opposite of stretchiness-- for abuse control reasons. if
> you're going to soften the signaling for cache expiration, you really
> ought to balance that out with this simple method of also hardening it.
> 
> Perhaps you've forgotten (since you participated in the discussions), but
> the portion of resimprove that dealt with expunging cached data below the
> NXDOMAIN boundary was rescued, expanded on, and published as
> RFC 8020 ("NXDOMAIN: There Really is Nothing Underneath") late last
> year.

yes, i know that RFC 8020 includes both the idea of stopping downward
searches when a cached NXD is encountered, and the idea of pruning (like
"rm -rf" in UNIX) existing cache entries when an NXD is received. those
changes, in addition to QM, will do much to pacify the DNS data model.

however, it's equally vital for malicious DNS content takedown, that the
part about remembering the delegation NS TTL and using it to
periodically revalidate the existence of that delegation, also be
brought forward. this becomes even more vital if we're making TTL
stretchy, and i would be happy to see tale's document cover this topic.

in other words, the prune-and-stop on NXD must be given a new source of
NXD, which is delegation revalidation. i'd love it if delegations all
had a one hour or less TTL, at least for public suffixes.

-- 
P Vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] on zone enumeration and the futility of secrecy on authenticated denial

2017-03-29 Thread Paul Vixie


Shumon Huque wrote:
> 2017-03-28 12:41 GMT-05:00 Paul Vixie  
> ...
> 
> summary: all dns content is running naked through the forest covered in
> honey. if you put something into the dns, and it gets used, then it's
> going to be known. no amount of crypto on dnssec authenticated denial is
> going to change that. (nor will the DPRIVE effort, since passive dns
> relies on inside-the-RDNS-servers cooperation, such as for example
> 'dnstap').
> 
> ...
> 
> These systems see a lot, no doubt, but they are still limited to data
> contributed by the set of participating resolvers. ...

DNSDB coverage gets better every year. other passive systems report the
same. systems of this kind are vital for both operational security and
security research, and are part of a very strong and virtuous cycle.

> And as far as I know, they aren't open to inspection by the world
> (usually only participating resolvers, researchers, and customers of
> the passive DNS service).

for the purpose of this thread, that doesn't matter. anyone who wants to
enumerate dns content can do so, well enough, given access to one or
more passive dns systems, which is more available and also easier than
enumeration, especially because it does not rely on active queries, so
the zone administrator can't detect it.

under nsec5, something that's already harder to do than passive dns,
will get harder. this is an irrelevant benefit, with a very relevant cost.

the only practical benefit of nsec3 is opt-out, and this was true even
before the pre-image enumeration vulnerability was "discovered". nsec3's
anti-enumeration capability was merely a necessary "fig leaf" for some
cctld operators whose national privacy laws prohibited NSEC-walking.

> The fact that systems like this exist, does not invalidate the desire
> for the DNS protocol to prevent easy "bulk disclosure" of zone content.

yes, it does.

> I don't think protocol evolution can be blamed for lack of ubiquitous
> DNSSEC deployment. In my experience, most people who haven't 
> deployed it, don't see any immediate compelling need for it.

had we completed the work after nine years, so, ten years ago, and had
there been no new flag days since then, i think it would be generally
implemented by recursives (validation), authorities (signatures),
registries and registrars. and there might be an app or two, such as
DANE, in general use.

> Another deployment disincentive is that DNSSEC has a generally
> bad rap in the larger technical community. Much of it is based on 
> FUD and misunderstanding. But there are legitimate criticisms that we
> ought to be paying more attention to - DNSSEC deployment is littered
> with 1024-bit RSA is one. Zone enumeration obviously is another. 

i can post more exerpts from the dns-security mailing list from 1996, or
from dnsind in 2005, if i've failed to convince you. there is no
generally perceived benefit from dnssec deployment today, but that is an
effect of the nineteen (19) years we have now been "working on it".

if there's no market for dnssec itself, then for that reason and to
exactly the same extent, there is no market for nsec5. if anyone would
like a demo of passive dns, please send me some nameservers, or ip
address blocks, or domain names. because, if you put something in the
dns, and somebody looks it up (ever), then it is public information. we
have got to stop arguing that it can be simultaneously kept secret.

-- 
P Vixie

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] on zone enumeration and the futility of secrecy on authenticated denial

2017-03-29 Thread Shumon Huque
2017-03-28 12:41 GMT-05:00 Paul Vixie :

> at DNSOP yesterday i asked that anyone who thought zone enumeration was
> a risk and that any crypto change (such as NSEC5) could manage that risk
> should please accept a free demonstration of passive dns.
>
> i realized that i could offer this more broadly. here is *.vix.su, one
> of my vanity domains. passive dns works by storing cache miss traffic
> (so there is no PII here). DNSDB, whose result is shown below, is one of
> about a dozen security-community projects who aggregate these cache
> misses into searchable databases.
>
> summary: all dns content is running naked through the forest covered in
> honey. if you put something into the dns, and it gets used, then it's
> going to be known. no amount of crypto on dnssec authenticated denial is
> going to change that. (nor will the DPRIVE effort, since passive dns
> relies on inside-the-RDNS-servers cooperation, such as for example
> 'dnstap').
>

Hi Paul,

I'm quite familiar with DNSDB and similar passive DNS systems and would
guess that many in the DNSOP crowd are also. Some years ago, when I
worked in the US R&E  community, I used DNSDB to enumerate most of the
.edu TLD to do DNSSEC deployment statistics and analyses.

These systems see a lot, no doubt, but they are still limited to data
contributed by the set of participating resolvers. And as far as I know,
they aren't open to inspection by the world (usually only participating
resolvers, researchers, and customers of the passive DNS service).

The fact that systems like this exist, does not invalidate the desire
for the DNS protocol to prevent easy "bulk disclosure" of zone content.
The DNS privacy considerations RFC for example has a section that
provides such arguments - the protocol queries public data, but you have
to know what to query for, and mechanisms that permit mass leakage of
such data are undesirable. Similarly, the fact that website observatories
exist doesn't mean that the web protocol should provide a mechanism to
enumerate all website names hosted at a CDN for example.

Before DNSSEC, enumerating zone content was only possible by means
of online queries of candidate names. NSEC and NSEC3 made that problem
strictly worse (walking the NSEC chain, and offline dictionary attack
of the NSEC3 chain). NSEC5 restores the pre-DNSSEC property that only
online guessing works.

Perhaps passive dns will become so prevalent, all-encompassing, and
accessible that it isn't worth investing time in doing better than NSEC3,
but let's have that discussion as a community.


> nsec5 is a work of beauty and wonder. but changing the DNSSEC protocol
> every two years is why we're 19 years in and still lack ubiquitous
> deployment. adding more complexity would have to pay back more cost than
> any new form of authenticated denial could even theoretically do.
>

I don't think protocol evolution can be blamed for lack of ubiquitous
DNSSEC deployment. In my experience, most people who haven't
deployed it, don't see any immediate compelling need for it. If cache
poisoning and DNS MITM attacks were happening on a large scale
(they aren't), that would act as a deployment incentive. If there were
a killer app that depended on DNSSEC (perhaps DANE will be that
some day down the road), that would also be an incentive.

Another deployment disincentive is that DNSSEC has a generally
bad rap in the larger technical community. Much of it is based on
FUD and misunderstanding. But there are legitimate criticisms that we
ought to be paying more attention to - DNSSEC deployment is littered
with 1024-bit RSA is one. Zone enumeration obviously is another.

Shumon.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] [Errata Verified] RFC6781 (4844)

2017-03-29 Thread RFC Errata System
The following errata report has been verified for RFC6781,
"DNSSEC Operational Practices, Version 2". 

--
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=6781&eid=4844

--
Status: Verified
Type: Technical

Reported by: Marcos Sanz 
Date Reported: 2016-10-26
Verified by: Joel Jaeggli (IESG)

Section: 4.1.2

Original Text
-
   initial:  Initial version of the zone.  The parental DS points to
  DNSKEY_K_1.  Before the rollover starts, the child will have to
  verify what the TTL is of the DS RR that points to DNSKEY_K_1 --
  it is needed during the rollover, and we refer to the value as
  TTL_DS.

   new DNSKEY:  During the "new DNSKEY" phase, the zone administrator
  generates a second KSK, DNSKEY_K_2.  The key is provided to the
  parent, and the child will have to wait until a new DS RR has been
  generated that points to DNSKEY_K_2.  After that DS RR has been
  published on all servers authoritative for the parent's zone, the
  zone administrator has to wait at least TTL_DS to make sure that
  the old DS RR has expired from caches.

   DS change:  The parent replaces DS_K_1 with DS_K_2.

Corrected Text
--
initial:  Initial version of the zone.  The parental DS points to
DNSKEY_K_1.  Before the rollover starts, the child will have to
verify what the TTL is of the DS RR that points to DNSKEY_K_1 --
it is needed during the rollover, and we refer to the value as
TTL_DS.  Also, we refer to the TTL value of the DNSKEY_K_1 RR as
TTL_DNSKEY.

new DNSKEY:  During the "new DNSKEY" phase, the zone administrator
generates a second KSK, DNSKEY_K_2.  The new DNSKEY RRSet that
includes DNSKEY_K_2 is published at the child.  After waiting at
least TTL_DNSKEY, DNSKEY_K_2 (or the DS RR generated from it, that
is DS_K_2) is provided to the parent.

DS change:  The parent replaces DS_K_1 with DS_K_2.  After that DS RR
has been published on all servers authoritative for the parent's
zone, the zone administrator has to wait at least TTL_DS to make
sure that the old DS RR has expired from caches.

Notes
-
I just corrected what is fundamentally flawed. RFC 7583 section 3.3.1 provides 
a much detailed explanation of the process.

--
RFC6781 (draft-ietf-dnsop-rfc4641bis-13)
--
Title   : DNSSEC Operational Practices, Version 2
Publication Date: December 2012
Author(s)   : O. Kolkman, W. Mekking, R. Gieben
Category: INFORMATIONAL
Source  : Domain Name System Operations
Area: Operations and Management
Stream  : IETF
Verifying Party : IESG

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] [Errata Rejected] RFC7719 (4611)

2017-03-29 Thread RFC Errata System
The following errata report has been rejected for RFC7719,
"DNS Terminology".

--
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=7719&eid=4611

--
Status: Rejected
Type: Technical

Reported by: Nikolai Malykh 
Date Reported: 2016-02-02
Rejected by: Joel Jaeggli (IESG)

Section: 2

Original Text
-
CNAME:  "It is traditional to refer to the owner of a CNAME record as
   'a CNAME'.  This is unfortunate, as 'CNAME' is an abbreviation of
   'canonical name', and the owner of a CNAME record is most certainly
   not a canonical name."  (Quoted from [RFC2181], Section 10.1.1)


Corrected Text
--
CNAME:  "It is traditional to refer to the label of a CNAME record as
   'a CNAME'.  This is unfortunate, as 'CNAME' is an abbreviation of
   'canonical name', and the label of a CNAME record is an alias, not
   a canonical name."  (Quoted from [RFC2181], Section 10.1.1)

Notes
-
Incorrect quote from RFC 2181.
 --VERIFIER NOTES-- 
 Not a technical erratum.

is corrected already in 

https://tools.ietf.org/html/draft-ietf-dnsop-terminology-bis-05

which  should be examined for consistency


--
RFC7719 (draft-ietf-dnsop-dns-terminology-05)
--
Title   : DNS Terminology
Publication Date: December 2015
Author(s)   : P. Hoffman, A. Sullivan, K. Fujiwara
Category: INFORMATIONAL
Source  : Domain Name System Operations
Area: Operations and Management
Stream  : IETF
Verifying Party : IESG

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] [Errata Verified] RFC7816 (4644)

2017-03-29 Thread RFC Errata System
The following errata report has been verified for RFC7816,
"DNS Query Name Minimisation to Improve Privacy". 

--
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=7816&eid=4644

--
Status: Verified
Type: Technical

Reported by: Robert Edmonds 
Date Reported: 2016-03-24
Verified by: Joel Jaeggli (IESG)

Section: 6

Original Text
-
QNAME minimisation can decrease performance in some cases -- for
instance, for a deep domain name (like
www.host.group.department.example.com, where 
host.group.department.example.com is hosted on example.com's name
servers).  Let's assume a resolver that knows only the name servers of
.example.  Without QNAME minimisation, it would send these .example name
servers a query for www.host.group.department.example.com and
immediately get a specific referral or an answer, without the need for
more queries to probe for the zone cut.  For such a name, a cold
resolver with QNAME minimisation will, depending on how QNAME
minimisation is implemented, send more queries, one per label.  Once the
cache is warm, there will be no difference with a traditional resolver.
Actual testing is described in [Huque-QNAME-Min].  Such deep domains are
especially common under ip6.arpa.

Corrected Text
--
QNAME minimisation can decrease performance in some cases -- for 
instance, for a deep domain name (like
www.host.group.department.example.com, where 
host.group.department.example.com is hosted on example.com's name
servers).  Let's assume a resolver that knows only the name servers of
.example.com.  Without QNAME minimisation, it would send these 
.example.com name servers a query for 
www.host.group.department.example.com and immediately get a specific
referral or an answer, without the need for more queries to probe for
the zone cut.  For such a name, a cold resolver with QNAME minimisation
will, depending on how QNAME minimisation is implemented, send more
queries, one per label.  Once the cache is warm, there will be no
difference with a traditional resolver.  Actual testing is described in
[Huque-QNAME-Min].  Such deep domains are especially common under
ip6.arpa.

Notes
-
Changed ".example" to ".example.com".

--
RFC7816 (draft-ietf-dnsop-qname-minimisation-09)
--
Title   : DNS Query Name Minimisation to Improve Privacy
Publication Date: March 2016
Author(s)   : S. Bortzmeyer
Category: EXPERIMENTAL
Source  : Domain Name System Operations
Area: Operations and Management
Stream  : IETF
Verifying Party : IESG

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New draft for ALIAS/ANAME type

2017-03-29 Thread Tony Finch
Pieter Lexis  wrote:
>
> There is no mention of the fact that ALIAS is mostly meant for zone
> apexes where other records MUST be present and a CNAME cannot exist.
> CNAMEs would cover non-apex usecases for ALIAS.

There are lots of non-apex situations where you can't use a CNAME, e.g.
where mail domains and hostnames coincide. (lists.cam.ac.uk,
trin.cam.ac.uk, etc.)

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/  -  I xn--zr8h punycode
Viking, North Utsire, South Utsire: Cyclonic, becoming southeasterly for a
time, 4 or 5, increasing 6 or 7, perhaps gale 8 later, then becoming variable
4 later. Moderate or rough. Fair then rain. Good, becoming moderate or poor.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-ietf-dnsop-nsec-aggressiveuse-08

2017-03-29 Thread fujiwara
Thanks for the review

> From: Jouni Korhonen 
> Reviewer: Jouni Korhonen
> Review result: Has Nits
> 
> I think would be ready if it passed IDnits. I found the document good
> read and found no sinkholes in it. Pointing up two implementations was
> also great.
> 
> The Proto Write-up seems not be up to date with what IDnits says e.g.,
> when it comes to downrefs, which is what the IDnits complain about.
> 
> A couple of editorials:
> 
> Lines 118-119 says: "This takes this.." I would reword to something
> like:
>"This document takes using NXDOMAIN information for more effective
> caching further."
> 
> Lines 396 and 397 uses "is NOT" and "IS making". I would use lower
> case here. No reason to use capitalized and still non-RFC2119
> language.

I will update the parts.

> Line 407 is would be great to indicate since which version of Unbound
> support has been in place.

It is my edit mistake. Unbound does not implement "Aggressive use of
DNSSEC-validated Cache" now.

  See: https://mailarchive.ietf.org/arch/msg/dnsop/Iv1mxko-ZtUBkNWPZnnnwT9LR-A

# I implemented NSEC only version using Unbound three years ago as a patch.

--
Kazunori Fujiwara, JPRS 

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New draft for ALIAS/ANAME type

2017-03-29 Thread Pieter Lexis
Hello Anthony,

On Wed, 29 Mar 2017 08:51:50 -0500
Anthony Eden  wrote:

> https://datatracker.ietf.org/doc/draft-dnsop-eden-alias-rr-type/
> 
> This draft describes the ALIAS/ANAME record (aka CNAME-flattening)
> that numerous vendors and DNS providers are now supporting in
> proprietary fashions. I hope that this draft will eventually lead to a
> good mechanism for interop of ALIAS/ANAME records.

First off, thank you for this. I would love to hear from current implementors 
of ALIAS/ANAME/CNAME-flattening what their ideas/critisisms are.

This said, I have several comments after a first quick read of the document.

There is no mention of the fact that ALIAS is mostly meant for zone apexes 
where other records MUST be present and a CNAME cannot exist. CNAMEs would 
cover non-apex usecases for ALIAS.

I miss guidance what should happen when an ALIAS record is queried directly 
(would it be returned, should it be refused, should it be an empty response?).

I miss words on the interaction between ALIAS records and other (mostly A and 
) records on the same node.

Section 3.1

"The server will respond with one or more A records", I fail to see why this 
cannot be zero or more. Am ALIAS target without A or  records should yield 
an empty response from the authoritative server.

"If the recursive query returns an NXDOMAIN response, then the authoritative 
name server MUST return an NXDOMAIN response as well.". If any other records 
exist (which is always the case for the apex), or if there are labels 
underneath the ALIAS'es name, the authoritative server cannot send out NXDOMAIN.

Section 3.3

This section has 2 similar paragraphs, one with should and the other with MUST.

Asking directly for a CNAME for a node that only has an ALIAS record should 
yield a response indicating that RRType does not exist at that node.

Again, thank you for starting this draft. I support adoption of this draft in 
the dnsop WG to facilitate better interop between ALIAS/ANAME/CNAME-flattening 
implementors.

Best regards,

Pieter

-- 
Pieter Lexis
PowerDNS.COM BV -- https://www.powerdns.com

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-tale-dnsop-edns-clientid

2017-03-29 Thread Dave Lawrence
Ray Bellis writes:
> It's effectively the same argument about TXT records - there's plenty of
> things that use TXT format, but it's preferred that separate RRTYPEs are
> used to indicate the use case.

If that's the position the WG would like to take, I'd be fine with that.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-tale-dnsop-edns-clientid

2017-03-29 Thread Ray Bellis


On 29/03/2017 10:41, Dave Lawrence wrote:

> Well yes, but there's another simple test, the limited Expert Review
> guidance against duplicate functionality.  Both xpf and clientid
> provide the functionality of conveying an IP address in an EDNS0
> option.

Whilst you're correct that they both carry information that happens to
have the same format, they have different semantic intent, and it would
IMHO cause confusion if both were carried in a packet with the same
option code.

It's effectively the same argument about TXT records - there's plenty of
things that use TXT format, but it's preferred that separate RRTYPEs are
used to indicate the use case.

Ray

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] draft-tale-dnsop-edns-clientid

2017-03-29 Thread Dave Lawrence
Ray Bellis writes:
> I therefore think there's a simple test here: [...]

Well yes, but there's another simple test, the limited Expert Review
guidance against duplicate functionality.  Both xpf and clientid
provide the functionality of conveying an IP address in an EDNS0
option.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [homenet] My assessment of .homenet as described during the WG session yesterday.

2017-03-29 Thread Terry Manderson
Hi Michael,

There is no policy or technical barrier to proceeding with SOMETHING.arpa. 
Procedurally that, of course, would necessitate some WG discussion and 
consensus.

Cheers
Terry

On 30/03/2017, 1:07 AM, "DNSOP on behalf of Michael Richardson" 
 wrote:


Terry Manderson  wrote:
> B) seek a .homenet special use domain WITHOUT the delegation request
> AND ask the IETF/IESG/IAB to commence the discussion with the ICANN
> community to achieve an insecure delegation

> c) seek a .arpa insecure special use delegation

> d) go for "B" and if that doesn't work shift to "C"

Is there some reason we can not proceed with "C", concurrently with (B).
This might cause stub resolvers to have to have two cases
(SOMETHING.arpa, and .homenet) eventually, but at least we could deploy
and attempt interop with SOMETHING.arpa NOW, and it would more clearly
permit "home." to be removed from code.

> Again, this situation is fluid and as discussions evolve I will 
provide
> more information when it is appropriate. In the mean-time I would very
> much like everyone to take a calming breath and understand that I am
> taking a very pragmatic view of this concern.

Thank you!

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-






smime.p7s
Description: S/MIME cryptographic signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [homenet] My assessment of .homenet as described during the WG session yesterday.

2017-03-29 Thread Terry Manderson
Hi James,

Q1. Both. The root zone, as a registry, is not an IETF registry.

Q2. My guess, and I am really guessing here, that if a process were to be 
created by the ICANN community to accept such requests from the IETF, it would 
be encompassing of both.

Cheers
Terry 


On 30/03/2017, 12:48 AM, "homenet on behalf of james woodyatt" 
 wrote:



q1. What precisely about “3” is not covered in IETF policy terms? That the 
document directs IANA to request a delegation in the root zone? Or that the 
document directs IANA to request an *insecure* delegation in the root zone, 
whereas a secure delegation
 *would* be adequately covered? Or both of these?


q2. If the answer to q1 is that both aspects of “3” are not covered in IETF 
policy terms, and that each one will require a set of collaborative discussions 
with the ICANN community and new processes that handle each of these 
situations, are there any expectations
 about which of the two processes, if there are two and not just one, can 
be defined in a workable period of time for HOMENET?



--james woodyatt 








smime.p7s
Description: S/MIME cryptographic signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Errata Rejected] RFC7871 (4736)

2017-03-29 Thread Dave Lawrence
RFC Errata System writes:
> http://www.rfc-editor.org/errata_search.php?rfc=7871&eid=4736
> Status: Rejected

>  --VERIFIER NOTES--
> Internet Software Consortium occurs only in the acknowledgements and
> while incorrect now it is generally the perogative of the authors to
> include in this section what they see fit. were a future version to
> be updated it's acknowledgements would probably include the then
> current contributors not the previous ones.

For the record, I would have been fine with the change.  I wasn't the
one who added the text originally, but as someone who worked for ISC
before the renaming, I probably glossed over the name dozens of times
without noticing it needed updating.  I don't know if process-wise it
is allowable as an errata, but apologies nonetheless for the error.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] I-D Action: draft-ietf-dnsop-attrleaf-02.txt

2017-03-29 Thread internet-drafts

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Domain Name System Operations of the IETF.

Title   : DNS Scoped Data Through Global '_Underscore' Naming 
of Attribute Leaves
Author  : Dave Crocker
Filename: draft-ietf-dnsop-attrleaf-02.txt
Pages   : 13
Date: 2017-03-29

Abstract:
   Formally, any DNS "RR" may occur for any domain name.  However some
   services have defined an operational convention that applies to DNS
   leaf nodes that have a reserved node name, beginning with an
   underscore.  The underscore construct is used to define a semantic
   scope for DNS records that are associated with the parent domain.
   This specification explores the nature of this DNS usage and defines
   the "DNS Global Underscore Scoped Entry Registry" registry with IANA.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-attrleaf/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-dnsop-attrleaf-02
https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-attrleaf-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-attrleaf-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] [Errata Verified] RFC7871 (4735)

2017-03-29 Thread RFC Errata System
The following errata report has been verified for RFC7871,
"Client Subnet in DNS Queries". 

--
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=7871&eid=4735

--
Status: Verified
Type: Technical

Reported by: Robert Edmonds 
Date Reported: 2016-07-08
Verified by: Joel Jaeggli (IESG)

Section: 13

Original Text
-
   7.   Due its internal implementation, ANS finds a response that is
tailored for the whole /16 of the client that performed the
query.

   8.   ANS adds an ECS option in the response, containing:
[...]
*  SCOPE PREFIX-LENGTH set to 0x30, indicating a /48 network.

Corrected Text
--
   7.   Due its internal implementation, ANS finds a response that is
tailored for the whole /48 of the client that performed the
query.

   8.   ANS adds an ECS option in the response, containing:
[...]
*  SCOPE PREFIX-LENGTH set to 0x30, indicating a /48 network.

Notes
-
The prose description in step 7 does not match the ECS option described in step 
8. Either both should say "/16" or both should say "/48". Probably /48 was 
meant, since a /16 would be a huge amount of IPv6 address space.

--
RFC7871 (draft-ietf-dnsop-edns-client-subnet-08)
--
Title   : Client Subnet in DNS Queries
Publication Date: May 2016
Author(s)   : C. Contavalli, W. van der Gaast, D. Lawrence, W. Kumari
Category: INFORMATIONAL
Source  : Domain Name System Operations
Area: Operations and Management
Stream  : IETF
Verifying Party : IESG

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [homenet] My assessment of .homenet as described during the WG session yesterday.

2017-03-29 Thread Michael Richardson

Terry Manderson  wrote:
> B) seek a .homenet special use domain WITHOUT the delegation request
> AND ask the IETF/IESG/IAB to commence the discussion with the ICANN
> community to achieve an insecure delegation

> c) seek a .arpa insecure special use delegation

> d) go for "B" and if that doesn't work shift to "C"

Is there some reason we can not proceed with "C", concurrently with (B).
This might cause stub resolvers to have to have two cases
(SOMETHING.arpa, and .homenet) eventually, but at least we could deploy
and attempt interop with SOMETHING.arpa NOW, and it would more clearly
permit "home." to be removed from code.

> Again, this situation is fluid and as discussions evolve I will provide
> more information when it is appropriate. In the mean-time I would very
> much like everyone to take a calming breath and understand that I am
> taking a very pragmatic view of this concern.

Thank you!

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





signature.asc
Description: PGP signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] [Errata Rejected] RFC7871 (4736)

2017-03-29 Thread RFC Errata System
The following errata report has been rejected for RFC7871,
"Client Subnet in DNS Queries".

--
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=7871&eid=4736

--
Status: Rejected
Type: Editorial

Reported by: Robert Edmonds 
Date Reported: 2016-07-08
Rejected by: Joel Jaeggli (IESG)

Section: GLOBAL

Original Text
-
the Internet Software Consortium

Corrected Text
--
Internet Systems Consortium

Notes
-
ISC (no "the") was originally founded as Internet Software Consortium, Inc. in 
1994 but it has been known as Internet Systems Consortium, Inc. since 2004.
 --VERIFIER NOTES-- 
   Internet Software Consortium occurs only in the acknowledgements and while 
incorrect now it is generally the perogative of the authors to include in this 
section what they see fit. were a future version to be updated it's 
acknowledgements would probably include the then current contributors not the 
previous ones.

--
RFC7871 (draft-ietf-dnsop-edns-client-subnet-08)
--
Title   : Client Subnet in DNS Queries
Publication Date: May 2016
Author(s)   : C. Contavalli, W. van der Gaast, D. Lawrence, W. Kumari
Category: INFORMATIONAL
Source  : Domain Name System Operations
Area: Operations and Management
Stream  : IETF
Verifying Party : IESG

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [homenet] My assessment of .homenet as described during the WG session yesterday.

2017-03-29 Thread George Michaelson
sign it with a bad key or bad DS. this goes to SERVFAIL and its NXDOMAIN.

-G

On Wed, Mar 29, 2017 at 9:48 AM, james woodyatt  wrote:
> Hi Terry,
>
> Clarifying questions here...
>
> On Mar 28, 2017, at 12:32, Terry Manderson 
> wrote:
>
>
> My summary of the situation is this.
>
> 1) .homenet _COULD_ be added to the special use domain registry based on
> RFC6761
>
> 2) The expected future operation of HOMENET resolution for DNSSEC validating
> stub resolvers requires a break in the DNSSEC chain of trust.
>
> 3) To achieve "2", the document _additionally_ asks IANA to insert an
> insecure delegation into the root zone
>
>
> 4) The ask for "3" is not covered in IETF policy terms, in fact it tries to
> put an entry into someone else's registry (the root zone), and will require
> a set of collaborative discussions with the ICANN community and a new
> process that handles this situation. There are no expectations that this
> process will be defined in a reasonable time for the uses of HOMENET.
>
>
> q1. What precisely about “3” is not covered in IETF policy terms? That the
> document directs IANA to request a delegation in the root zone? Or that the
> document directs IANA to request an *insecure* delegation in the root zone,
> whereas a secure delegation *would* be adequately covered? Or both of these?
>
> q2. If the answer to q1 is that both aspects of “3” are not covered in IETF
> policy terms, and that each one will require a set of collaborative
> discussions with the ICANN community and new processes that handle each of
> these situations, are there any expectations about which of the two
> processes, if there are two and not just one, can be defined in a workable
> period of time for HOMENET?
>
> --james woodyatt 
>
>
>
>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] New draft for ALIAS/ANAME type

2017-03-29 Thread Anthony Eden
After attending the dnsop meeting on Monday I decided it was time I
submitted my first ID for review:

https://datatracker.ietf.org/doc/draft-dnsop-eden-alias-rr-type/

This draft describes the ALIAS/ANAME record (aka CNAME-flattening)
that numerous vendors and DNS providers are now supporting in
proprietary fashions. I hope that this draft will eventually lead to a
good mechanism for interop of ALIAS/ANAME records.

Sincerely,
Anthony Eden

-- 
DNSimple.com
http://dnsimple.com/
Twitter: @dnsimple

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] BULK RR as optional feature

2017-03-29 Thread John R Levine

On Wed, 29 Mar 2017, Woodworth, John R wrote:

I am curious why you feel a nameserver unaware of a new record type
would ever return it instead of the known type it queried?


No, you're right, you'd only get the BULK if you queried for it, and you'd 
get NXDOMAIN or more likely NODATA for records that might have been 
synthesized.


As Evan points out, this leads to chronically inconsistent DNSSEC.

Regards,
John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] BULK RR as optional feature

2017-03-29 Thread John R Levine

Evan Hunt  wrote:


At least, please add some operational advice that BULK is not to be
deployed in any domain unless all auth servers for that domain fully
implement it.


Yes.

This is fairly similar to the requirement for DNSSEC support on auth
servers, and there wasn't any explicit signalling in the xfer protocol
in that case.


I think there's a meaningful difference that we expected everyone to 
upgrade to DNSSEC eventually, while I expect I am far from the only person 
with no plans to implement this one.


As I keep saying, it's an enormous amount of new and different mechanism 
for a very narrow use case.


Regards,
John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] BULK RR as optional feature

2017-03-29 Thread Tony Finch
Another possibly-crazy thought ...

Should BULK be allocated from the metatype range, 128-255? The idea being
that this would cause the zone xfer to be rejected by servers that don't
understand it.

... but, from looking at BIND's code (I didn't test it) I think this idea
wouldn't actually work in practice because BIND only rejects xfers
containing explicitly-known metatypes - it treats most of 128-255 as
unknown.

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/  -  I xn--zr8h punycode
Southeast Viking, North Utsire, South Utsire: Cyclonic 4 or 5, becoming
southeasterly 5 to 7, perhaps gale 8 later. Moderate or rough. Rain later.
Good, becoming moderate or poor later.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] BULK RR as optional feature

2017-03-29 Thread Tony Finch
Evan Hunt  wrote:
>
> At least, please add some operational advice that BULK is not to be
> deployed in any domain unless all auth servers for that domain fully
> implement it.

Yes.

This is fairly similar to the requirement for DNSSEC support on auth
servers, and there wasn't any explicit signalling in the xfer protocol
in that case.

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/  -  I xn--zr8h punycode
Southeast Biscay: Easterly or southeasterly 3 or 4. Slight or moderate,
becoming moderate or rough. Fair. Good.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] on staleness of code points and code (mentions MD5 commentary from IETF98)

2017-03-29 Thread Philip Homburg
In your letter dated Tue, 28 Mar 2017 19:23:16 +0200 you wrote:
>On 28 Mar 2017, at 12:37, Philip Homburg wrote:
>
>> So if would be best if a validator that implements MD5 would still 
>> return
>> NXDOMAIN is validation fails, but would keep the AD-bit clear even if 
>> validation
>> passes for a domain signed using MD5.
>
>In the interest of nitpick correctness, please return SERVFAIL there, 
>not NXDOMAIN :)

Indeed. Though if somebody is foolish enough to sign with MD5, maybe they should
get a NXDOMAIN :-)


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop