Re: [DNSOP] I-D Action: draft-ietf-dnsop-caching-resolution-failures-01.txt

2022-09-12 Thread Wessels, Duane
This draft has been updated based on recent feedback.  The primary change is 
that the new version is less prescriptive about how the resolution failure 
negative cache should work.  e.g., rather than saying "Resolution failures MUST 
be cached against the specific query tuple…” it now says "Resolvers MUST 
implement a cache for resolution failures” but leaves the details to the 
implementation.

We welcome further discussion and input.

DW


> On Sep 12, 2022, at 3:18 PM, internet-dra...@ietf.org wrote:
> 
> Caution: This email originated from outside the organization. Do not click 
> links or open attachments unless you recognize the sender and know the 
> content is safe. 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts 
> directories.
> This draft is a work item of the Domain Name System Operations WG of the IETF.
> 
>Title   : Negative Caching of DNS Resolution Failures
>Authors : Duane Wessels
>  William Carroll
>  Matthew Thomas
>  Filename: draft-ietf-dnsop-caching-resolution-failures-01.txt
>  Pages   : 14
>  Date: 2022-09-12
> 
> Abstract:
>   In the DNS, resolvers employ caching to reduce both latency for end
>   users and load on authoritative name servers.  The process of
>   resolution may result in one of three types of responses: (1) a
>   response containing the requested data; (2) a response indicating the
>   requested data does not exist; or (3) a non-response due to a
>   resolution failure in which the resolver does not receive any useful
>   information regarding the data's existence.  This document concerns
>   itself only with the third type.
> 
>   RFC 2308 specifies requirements for DNS negative caching.  There,
>   caching of type (1) and (2) responses is mandatory and caching of
>   type (3) responses is optional.  This document updates RFC 2308 to
>   require negative caching for DNS resolution failures.
> 
> 
> The IETF datatracker status page for this draft is:
> https://secure-web.cisco.com/1Tj_cyWFGUKz4YiwF0fnptDrtAqXWa3M5rS8wHsuQCrQptkzDaKaH6AWjPBY_s16axtl7VLXOVEb9P7rzXsDwHI0XVUgdeHs4Ct1cy0BTwTxeEzdzZrg4b5QYSwl-PEJnI06bCFbF7ZW3h_f6SU5_8sabBLoC6dCbfXTMYy3fDB1Wf1XvMuNGSNCCW0OUt01APnljOZTthD1IKenynQ_JrDrP9WsvUZEu9iHS86Zd8xlRfuji57W7aD2ZZtO8lEUdCl9vWYoeCDNO_nCExB2YeQ/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-dnsop-caching-resolution-failures%2F
> 
> There is also an htmlized version available at:
> https://secure-web.cisco.com/1WFFL6urpB2je9kE3AoDDEzwQHDjXZY3xOlZQ8KwFKQW2kmo0hq_-YOLhTYSmT8I5fBPbxkc_dtNIB4K9WSJ3DZ38qALxhUO_c_xgylCWK1yQ7LAo9Ew1SiV6GQQMPuAeVTOg3Llp6mR47e8pUh7QAL9WPWrkof5j46o03CsB0ZDUb4I33Y8Syn2e8Qx0KEKtm9_jTiWexL8PwOXWHV00DIYMSVpGMNqHpBpOHnNStnNNY4pEG5AZSX_PFn2gFMF4ngFZcy3KNiKWZwmmoa94EQ/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-dnsop-caching-resolution-failures-01
> 
> A diff from the previous version is available at:
> https://secure-web.cisco.com/1dQmPkTAo638e9_FNBF4C67-9DmW45qKHp2-6yGP_nhj3X_dnrrbWNiovzA_BDmV64gDGpXGQddgbXrsaexx1NdzUiaeIlPNeap-nPa9cRss-1v4BQfvz9lHVqq07zwiWRV80tChWR0Zxwx50m9zjDFAzkOD02jbl7c9qcn0vIPZu9x0ydX9BTsgpEMfHEwG-TLSSFju-0Dn6laYvp02UdR96bEuQnTkfnUWKsQds3JwMigVgi8LwKXkIXdXszT8Mq7Bz42OcQHvsL0uCxfdHRg/https%3A%2F%2Fwww.ietf.org%2Frfcdiff%3Furl2%3Ddraft-ietf-dnsop-caching-resolution-failures-01
> 
> 
> Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts
> 
> 
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://secure-web.cisco.com/1X4Rarmsiq-SsH39XV8rmlSY-wlnMHFd1fOwVU5jcXa6xvDmH2MmdE98OFVMnL2joeah-AhvVvD_wpcjnY5tqBkoJar30JHIpdxfNHJHBT03ZELDpSnG8n6PCkacoLgsweCFBCswxLVE_AH-B0WlhKnf8_kpryc75wefklVPqYx-wXLq8qR4P9Zs1xMqhm5T03sAQzHHytcaDWQmwjxHocjR0Mqb1zrSURbXAsCEw34oEjiz_gowwgo4JpWZePQcnfMjCkuDnhyFTxdh8guTWXg/https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fdnsop
> 

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] I-D Action: draft-ietf-dnsop-caching-resolution-failures-01.txt

2022-09-12 Thread internet-drafts


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Domain Name System Operations WG of the IETF.

Title   : Negative Caching of DNS Resolution Failures
Authors : Duane Wessels
  William Carroll
  Matthew Thomas
  Filename: draft-ietf-dnsop-caching-resolution-failures-01.txt
  Pages   : 14
  Date: 2022-09-12

Abstract:
   In the DNS, resolvers employ caching to reduce both latency for end
   users and load on authoritative name servers.  The process of
   resolution may result in one of three types of responses: (1) a
   response containing the requested data; (2) a response indicating the
   requested data does not exist; or (3) a non-response due to a
   resolution failure in which the resolver does not receive any useful
   information regarding the data's existence.  This document concerns
   itself only with the third type.

   RFC 2308 specifies requirements for DNS negative caching.  There,
   caching of type (1) and (2) responses is mandatory and caching of
   type (3) responses is optional.  This document updates RFC 2308 to
   require negative caching for DNS resolution failures.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-caching-resolution-failures/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-caching-resolution-failures-01

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-caching-resolution-failures-01


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] DNS Directorate...

2022-09-12 Thread Warren Kumari
Hi there all,

At IETF 114 I mentioned that Eric Vynke and I were planning on creating a
DNS Directorate. Unfortunately  we got a little busy, and so it took a bit
longer than expected, but we've finally had a chance to write up a
"charter" (below).

A number of people have already kindly offered to participate, but we'd
like some more, so, if you are willing, please fill in this form -
https://forms.gle/GDffKp2XuT9acK9T6  - this will add your info to a
(private) spreadsheet so that Eric and I don't accidentally miss an email.
If you have already volunteered, please fill it in anyway, just to make
sure we didn't miss your mail…

As usual, we are not looking only for "the" experts on DNS (even if those
are welcome), but also for volunteers with good understanding of DNS
security, privacy, operations, implementing, scalability, ... even if 'new'
at the IETF. If you are willing to dedicate some time to review early
drafts for the benefit of the IETF community: please step forward !

Thank you,
W

-
# DNS Directorate Charter (draft)

DNS directorate reviewers assist Area Directors, Working Group chairs, and
document authors with documents containing DNS-related content.

More detailed guidance on DNS directorate process can be found at:
http://wiki.ietf.org/group/dnsdir

WG chairs or responsible ADs may request a DNS directorate review via the
draft's Datatracker page. They are encouraged to do so as early in the
process as possible to ensure that structural concerns are caught early in
the document development.

The DNS directorate secretaries will assign reviews to reviewers, but they
are not required to check the list of IETF drafts for DNS-related ones.

The DNS directorate reviews will be sent to the DNS Directorate mailing
list (dns...@ietf.org), draft authors, WG chairs, and the respective AD.

The DNS directorate reviewers and secretary are volunteers, and serve at
the pleasure of the INT and OPS area ADs.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] DNSOP WG interim-2022-dnsop-02 meeting agenda (September 26, 2022)

2022-09-12 Thread Benno Overeinder

Hi all,

As mentioned on the mailing list, we have settled on a date for the 
DNSOP WG virtual interim meeting on Monday, September 26, from 15:00 to 
16:00 UTC.


The agenda for the interim is:

* Administrivia
  - Agenda Bashing, Blue Sheets, etc, 5 min

* Current Working Group Business
  - DNS Terminology
https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc8499bis/
Paul Hoffman and Kazunori Fujiwara, 55 min
Chairs Action:

Information about agenda, remote participation and more:
- https://datatracker.ietf.org/doc/agenda-interim-2022-dnsop-02-dnsop-01/
- https://datatracker.ietf.org/meeting/interim-2022-dnsop-02/session/dnsop


Best regards,

Suzanne, Tim and Benno

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] Questions / concerns with draft-ietf-dnsop-svcb-https (in RFC Editor queue)

2022-09-12 Thread Warren Kumari
Hi all,

Firstly, and most importantly, thank y'all for keeping this civil, friendly
and productive; I really appreciate it.

I've (informally) checked with the IESG on the proposed change in the
PR and also including Erik's proposed operational note ("Some
implementations may not allow A or  records on names starting with an
underscore due to various interpretations of RFCs. This could be an
operational issue when the TargetName contains an attrleaf label, as well
as using an TargetName of "." when the owner name contains an attrleaf
label.") and everyone seems fine with it.

So, I'm ask the authors to cut a new version with these changes in
(basically, accept the PR and add the proposed text) and I will then email
the IESG with a diff to get "official" consensus on the change.

Dealing with process exception handling is always stressful, so thanks all
again for keeping this moving along nicely.
Also, a reminder that while we *can* make changes after approval (and
before RFC publication) we really really avoid doing so, and so this should
only happen under exceptional circumstances[0].

W

[0]: I'm not convinced that this situation rose to the "exceptional
circumstances" bar, but seeing as I'd already paused it (not knowing what
all the issues were) and because the changes are clarifications, I'm
willing to accepting it.

On Thu, Sep 08, 2022 at 12:34 PM, Erik Nygren  wrote:

> There seem to be two topics:
>
> 1) Victor's clarification makes sense, although the wording is a little
> awkward and perhaps we can improve that sentence.
> The section was already implying that meaning (ie, that the fallback
> addition of the QNAME was for the AliasMode case)
> but clarifying this in a more normative way seems worthwhile and not a
> technical change.
> I'd propose we refine this PR and incorporate it as the "clarifying
> sentence" that Warren was willing to accept.
>
> 2) There is the issue of whether attrleaf labels are valid owner names for
> A/ records.
> This document does not seem like the place to land that, and it seems
> like it may be open for interpretation
> as different implementations may have interpreted it differently.  If
> anything, we might add a non-normative sentence like:
>
>"Some implementations may not allow A or  records on names
> starting with an underscore
> due to various interpretations of RFCs. This could be an
> operational issue when the TargetName contains an attrleaf label,
> as well as using an TargetName of "." when the owner name contains
> an attrleaf label."
>
>This wouldn't be a normative change but just an operational warning ---
> would this be acceptable to include at this stage?
>Further clarification of this seems worth a draft in its own right
> since the existing RFCs are inconsistent
>on this topic and there is room for multiple interpretations, as shown
> in some implementations.
>
>
>
> On Thu, Sep 8, 2022 at 12:05 PM Paul Hoffman 
> wrote:
>
>> On Sep 8, 2022, at 8:35 AM, Viktor Dukhovni 
>> wrote:
>> > This is a bug fix, the proposed behaviour makes no sense when $QNAME
>> > is the unaltered (attrleaf prefixed) starting point.  The current
>> > meaning was not intended.  If the edit can be made without any
>> > major process, just a note to the RFC editor, it'll save errata,
>> > and possible confusion later.
>>
>> A technical change made after the IESG review requires, at a minimum,
>> another IESG review. The IESG could ask for another IETF review, if they
>> want. It's up to Warren, the responsible AD, to decide if that's "major
>> process".
>>
>> --Paul Hoffman
>>
>> ___
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
>>
>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [dns-privacy] [core] WGA call for draft-lenders-dns-over-coap

2022-09-12 Thread Alexander Mayrhofer
Hello everyone,

Speking as the author of RFC 7830 – there was some discussion whether the 
document should say “SHOULD NOT” or “MUST NOT” when padding DNS packets over 
unencrypted packets. We couldn’t come up with any other use case (maybe except 
testing of the feature over unencrypted transport), so the consensus of the 
group was that we should be strict, especially as padding might be an easy way 
to bloat packets. I do agree that this connects DNS answer behaviour with 
transport choice – hence creates a dependency that’s probably not very wise in 
a protocol that has already pretty complex dependencies.

If the community believes that this requirement should be relaxed (and it’s 
worth the effort), I’m up for creating a revision of RFC 7830. This might also 
be a chance to step up EDNS Padding to Internet Standard – I think it’s widely 
deployed on billions of devices (Android..).

Thoughts?

Best,
Alex


Von: dns-privacy  Im Auftrag von Vladimír Cunát
Gesendet: Freitag, 9. September 2022 18:11
An: Ben Schwartz 
Cc: c...@ietf.org; DNS Privacy Working Group ; dnsop 
; Jaime Jiménez 
Betreff: Re: [dns-privacy] [DNSOP] [core] WGA call for 
draft-lenders-dns-over-coap

On 06/09/2022 17.06, Ben Schwartz wrote:
The choice of transport is independent of the DNS server's answering behavior, 
which must not be modified by the transport.

Nit: there's a very specific counter-example of EDNS padding which is meant to 
be added depending on transport encryption.  
https://www.rfc-editor.org/rfc/rfc7830#section-6

There might be some others (in future, too), as encryption does change some 
considerations, but yes - not basic stuff like following CNAMEs.

--Vladimir | knot-resolver.cz
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop