[DNSOP] dnsop - Requested sessions have been scheduled for IETF 99

2017-06-23 Thread "IETF Secretariat"
Dear Tim Wicinski,

The session(s) that you have requested have been scheduled.
Below is the scheduled session information followed by
the original request. 

dnsop Session 1 (2:00:00)
Tuesday, Afternoon Session II 1550-1750
Room Name: Congress Hall II size: 350
-
dnsop Session 2 (1:00:00)
Thursday, Afternoon Session III 1810-1910
Room Name: Grand Hilton Ballroom size: 250
-



Request Information:


-
Working Group Name: Domain Name System Operations
Area Name: Operations and Management Area
Session Requester: Tim Wicinski

Number of Sessions: 2
Length of Session(s):  2 Hours, 1 Hour
Number of Attendees: 160
Conflicts to Avoid: 
 First Priority: dprive dnssd homenet appsawg apparea dhc
 Second Priority: v6ops intarea trans
 Third Priority: 6man grow opsarea opsawg pcp saag sidr


People who must be present:
  Suzanne Woolf
  Joel Jaeggli
  Warren Kumari
  Tim Wicinski

Resources Requested:

Special Requests:
  If either session is slotted for Friday, please make it the second 1 hour 
session. thanks
-

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Technical Errata Reported] RFC8078 (5049)

2017-06-23 Thread Ólafur Guðmundsson
The errata is correct.

Ólafur

sent from phone

On Jun 23, 2017 11:54, "RFC Errata System" 
wrote:

> The following errata report has been submitted for RFC8078,
> "Managing DS Records from the Parent via CDS/CDNSKEY".
>
> --
> You may review the report below and at:
> http://www.rfc-editor.org/errata/eid5049
>
> --
> Type: Technical
> Reported by: Ondřej Caletka 
>
> Section: 4
>
> Original Text
> -
>The contents of the CDS or CDNSKEY RRset MUST contain one RR and only
>contain the exact fields as shown below.
>
>   CDS 0 0 0 0
>
>   CDNSKEY 0 3 0 0
>
>The keying material payload is represented by a single 0.  This
>record is signed in the same way as regular CDS/CDNSKEY RRsets are
>signed.
>
>Strictly speaking, the CDS record could be "CDS X 0 X 0" as only the
>DNSKEY algorithm is what signals the DELETE operation, but for
>clarity, the "0 0 0 0" notation is mandated -- this is not a
>definition of DS digest algorithm 0.  The same argument applies to
>"CDNSKEY 0 3 0 0"; the value 3 in the second field is mandated by
>[RFC4034], Section 2.1.2.
>
>
> Corrected Text
> --
>The contents of the CDS or CDNSKEY RRset MUST contain one RR and only
>contain the exact fields as shown below.
>
>   CDS 0 0 0 00
>
>   CDNSKEY 0 3 0 AA==
>
>The keying material payload is represented by a single octet with
>the value 00. This record is signed in the same way as regular
>CDS/CDNSKEY RRsets are signed.
>
>Strictly speaking, the CDS record could be "CDS X 0 X 00" as only the
>DNSKEY algorithm is what signals the DELETE operation, but for
>clarity, the "0 0 0 00" notation is mandated -- this is not a
>definition of DS digest algorithm 0.  The same argument applies to
>"CDNSKEY 0 3 0 AA=="; the value 3 in the second field is mandated by
>[RFC4034], Section 2.1.2.
>
> Notes
> -
> RFC 7344 defines both CDS and CDNSKEY record wire and presentation format
> to be identical to DS and DNSKEY wire and presentation format defined in
> RFC 4034.
>
> In case of CDNSKEY record, RFC 4034 section 2.2 requires that:
> > The Public Key field MUST be represented as a Base64 encoding of the
> Public Key.
>
> As Base64 encoding encodes 6 bits into one character, one character alone
> can never be a valid Base64 sequence. The proper encoding of one-byte long
> sequence with binary value of 00 is AA==.
>
> In case of CDS record, RFC 4034 section 5.3 requires that:
> > The Digest MUST be represented as a sequence of case-insensitive
> hexadecimal digits
>
> Although the value of a single 0 fulfils this requirement per se, it's not
> properly parsable by many implementations since it is expected to be even
> number of hex digits to align with octet boundaries in the wire format. So
> proper form of CDS record should contain two zeroes in place of the digest.
>
> Instructions:
> -
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party
> can log in to change the status and edit the report, if necessary.
>
> --
> RFC8078 (draft-ietf-dnsop-maintain-ds-06)
> --
> Title   : Managing DS Records from the Parent via CDS/CDNSKEY
> Publication Date: March 2017
> Author(s)   : O. Gudmundsson, P. Wouters
> Category: PROPOSED STANDARD
> Source  : Domain Name System Operations
> Area: Operations and Management
> Stream  : IETF
> Verifying Party : IESG
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] [Technical Errata Reported] RFC8078 (5049)

2017-06-23 Thread RFC Errata System
The following errata report has been submitted for RFC8078,
"Managing DS Records from the Parent via CDS/CDNSKEY".

--
You may review the report below and at:
http://www.rfc-editor.org/errata/eid5049

--
Type: Technical
Reported by: Ondřej Caletka 

Section: 4

Original Text
-
   The contents of the CDS or CDNSKEY RRset MUST contain one RR and only
   contain the exact fields as shown below.

  CDS 0 0 0 0

  CDNSKEY 0 3 0 0

   The keying material payload is represented by a single 0.  This
   record is signed in the same way as regular CDS/CDNSKEY RRsets are
   signed.

   Strictly speaking, the CDS record could be "CDS X 0 X 0" as only the
   DNSKEY algorithm is what signals the DELETE operation, but for
   clarity, the "0 0 0 0" notation is mandated -- this is not a
   definition of DS digest algorithm 0.  The same argument applies to
   "CDNSKEY 0 3 0 0"; the value 3 in the second field is mandated by
   [RFC4034], Section 2.1.2.


Corrected Text
--
   The contents of the CDS or CDNSKEY RRset MUST contain one RR and only
   contain the exact fields as shown below.

  CDS 0 0 0 00

  CDNSKEY 0 3 0 AA==

   The keying material payload is represented by a single octet with
   the value 00. This record is signed in the same way as regular
   CDS/CDNSKEY RRsets are signed.

   Strictly speaking, the CDS record could be "CDS X 0 X 00" as only the
   DNSKEY algorithm is what signals the DELETE operation, but for
   clarity, the "0 0 0 00" notation is mandated -- this is not a
   definition of DS digest algorithm 0.  The same argument applies to
   "CDNSKEY 0 3 0 AA=="; the value 3 in the second field is mandated by
   [RFC4034], Section 2.1.2.

Notes
-
RFC 7344 defines both CDS and CDNSKEY record wire and presentation format to be 
identical to DS and DNSKEY wire and presentation format defined in RFC 4034.

In case of CDNSKEY record, RFC 4034 section 2.2 requires that:
> The Public Key field MUST be represented as a Base64 encoding of the Public 
> Key.

As Base64 encoding encodes 6 bits into one character, one character alone can 
never be a valid Base64 sequence. The proper encoding of one-byte long sequence 
with binary value of 00 is AA==.

In case of CDS record, RFC 4034 section 5.3 requires that:
> The Digest MUST be represented as a sequence of case-insensitive hexadecimal 
> digits

Although the value of a single 0 fulfils this requirement per se, it's not 
properly parsable by many implementations since it is expected to be even 
number of hex digits to align with octet boundaries in the wire format. So 
proper form of CDS record should contain two zeroes in place of the digest.

Instructions:
-
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
can log in to change the status and edit the report, if necessary. 

--
RFC8078 (draft-ietf-dnsop-maintain-ds-06)
--
Title   : Managing DS Records from the Parent via CDS/CDNSKEY
Publication Date: March 2017
Author(s)   : O. Gudmundsson, P. Wouters
Category: PROPOSED STANDARD
Source  : Domain Name System Operations
Area: Operations and Management
Stream  : IETF
Verifying Party : IESG

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Fw: New Version Notification for draft-yao-dnsop-accompanying-questions-03.txt

2017-06-23 Thread Jiankang Yao
hello,
 
 Based on Seoul IETF's discussion, I refine the introduction of this 
document to explain the motivation and compare with other mechanisms.
the key text is here:
-
1.  Introduction

   Sometimes, when DNS lookup of X, an application will lookup Y if X
   fails.  For examples, the initiator may fall back to A record if the
   lookup of MX record fails.

   Some initiators do it in sequence, X and after a few seconds, then Y.
   Although it is simple, this leads to unpleasant waiting whenever X
   times out or answers negatively.

   Some initiators use concurrent X/Y lookups and a state machine to
   decide whether to use X or Y.  If an answer to Y arrives but none to
   X, the initiator needs to wait a little or else fall back to Y
   inappropriately.  Concurrent lookup is faster if the X lookup takes
   time and falling back to Y is appropriate, but rather complex, with
   four states to test, and the initiator needs to wait for an answer to
   X or a timeout before it can use Y.

   This document enables a quicker, more easily tested failover.  There
   is no need to test different answer sequences, there's no need for a
   state machine, there's no need for timeouts beyond receiving the
   reply.  This document describes a method by which DNS initiators can
   send a main question accompanying with several related questions in a
   single DNS query, and enables DNS responders place all related
   answers into a single DNS response.  This mechanism can reduce the
   number of DNS round-trips per application work-unit, by carrying
   several related queries in a single query transaction.  It has the
   following advantages compared to other solutions.

   o  Compared to sequential lookups: It's roughly as simple, but much
  faster in case a fallback to Y is necessary.

   o  Compared to the concurrent mechanism: It is slightly faster (if
  the initiator needs to wait for an X timeout) and/or prevents
  inappropriate fallback (if the answer to X arrives too late), and
  it has a simpler state machine.

   This mechanism can also be used in the scenarios when the application
   needs more records of the same domain name or its sub-domain name.
   For examples, when asking about a QTYPE=A RRset, a QTYPE= RRset
   may also be of use [RFC 5321]; When asking for some RRset of
   www.example.com about A and , records of a sub-domain name such
   as _443._tcp.www.example.com for TLSA may be of interest[RFC 6698].









Jiankang Yao

From: internet-drafts
Date: 2017-06-23 15:41
To: XiaoDong Lee; Ning Kong; Paul Vixie; Jiankang Yao; Xiaodong Li
Subject: New Version Notification for 
draft-yao-dnsop-accompanying-questions-03.txt

A new version of I-D, draft-yao-dnsop-accompanying-questions-03.txt
has been successfully submitted by Jiankang Yao and posted to the
IETF repository.

Name: draft-yao-dnsop-accompanying-questions
Revision: 03
Title: A DNS Query including A Main Question with Accompanying Questions
Document date: 2017-06-23
Group: dnsop
Pages: 11
URL:
https://www.ietf.org/internet-drafts/draft-yao-dnsop-accompanying-questions-03.txt
Status: 
https://datatracker.ietf.org/doc/draft-yao-dnsop-accompanying-questions/
Htmlized:   
https://tools.ietf.org/html/draft-yao-dnsop-accompanying-questions-03
Htmlized:   
https://datatracker.ietf.org/doc/html/draft-yao-dnsop-accompanying-questions-03
Diff:   
https://www.ietf.org/rfcdiff?url2=draft-yao-dnsop-accompanying-questions-03

Abstract:
   This document enables DNS initiators to send a main question
   accompanying with several related questions in a single DNS query,
   and enables DNS responders to put the answers into a single DNS
   response.  This extension enables a range of initiators to look up
   "X, or failing that, Y" in a better way than both current
   alternatives.  This mechanism can reduce the number of DNS round-
   trips per application work-unit.


  


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] I-D Action: draft-yao-dnsop-accompanying-questions-03.txt

2017-06-23 Thread internet-drafts

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Domain Name System Operations of the IETF.

Title   : A DNS Query including A Main Question with 
Accompanying Questions
Authors : Jiankang Yao
  Paul Vixie
  Ning Kong
  Xiaodong Li
Filename: draft-yao-dnsop-accompanying-questions-03.txt
Pages   : 11
Date: 2017-06-23

Abstract:
   This document enables DNS initiators to send a main question
   accompanying with several related questions in a single DNS query,
   and enables DNS responders to put the answers into a single DNS
   response.  This extension enables a range of initiators to look up
   "X, or failing that, Y" in a better way than both current
   alternatives.  This mechanism can reduce the number of DNS round-
   trips per application work-unit.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-yao-dnsop-accompanying-questions/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-yao-dnsop-accompanying-questions-03
https://datatracker.ietf.org/doc/html/draft-yao-dnsop-accompanying-questions-03

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-yao-dnsop-accompanying-questions-03


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop