[DNSOP] Re: [Ext] Revised the application for the WALLET RRTYPE

2024-07-05 Thread Erik Kline
On Fri, Jul 5, 2024 at 2:42 PM Paul Hoffman  wrote:

> On Jul 5, 2024, at 14:33, Erik Kline  wrote:
> >
> > "expect to find two strings"
> >
> > I didn't see this specified so thought I'd ask: what is the separator of
> the two strings?  ASCII whitespace, or ...?
>
> Welcome to RFC 1035 and  and TXT records. There is no
> separator: the TXT record (and thus now the WALLET record) takes "One or
> more s". A  is "a single length octet
> followed by that number of characters".
>
> --Paul Hoffman


Ah, TIL; thanks!
___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP] Re: [Ext] Revised the application for the WALLET RRTYPE

2024-07-05 Thread Erik Kline
"expect to find two strings"

I didn't see this specified so thought I'd ask: what is the separator of
the two strings?  ASCII whitespace, or ...?

On Mon, Jul 1, 2024 at 12:22 PM Paul Hoffman  wrote:

> Thanks again for the input on the new RRTYPE. I submitted it to the RRTYPE
> expert reviewers, and the new definition is posted at <
> https://www.iana.org/assignments/dns-parameters/WALLET/wallet-completed-template>.
> It has "2024-06-24" as its submission date.
>
> --Paul Hoffman
>
> ___
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-le...@ietf.org
>
___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP] Re: IPN and CLA RRTYPEs to support Bundle Protocol RFC9171

2024-06-25 Thread Erik Kline
Speaking as the responsible AD for DTN, I think the DTN working group
should probably have a discussion about what it wants to do (if anything)
vis. DNS RRs.

On Tue, Jun 25, 2024 at 08:27 Scott Johnson 
wrote:

> Hi Mark,
>
> On Tue, 25 Jun 2024, Mark Andrews wrote:
>
> >
> >
> >> On 25 Jun 2024, at 16:36, Scott Johnson 
> wrote:
> >>
> >> Hi Mark,
> >>
> >> Noted and changed.  Good stuff, thanks.  Updated draft (04) at
> datatracker using that verbiage:
> >> https://datatracker.ietf.org/doc/draft-johnson-dns-ipn-cla/
> >>
> >> Is it appropriate to add an acknowledgments section or co-authors at
> this point?
> >
> > I’m not fussed either way.
>
> (05) of the draft adds a "Contributors" section.
>
> >
> >> As well, should I be asking for WG adoption (DNSOP or DTN WG), or as an
> Informational document, is Individual submission sufficient?
> >
> > I’ll leave that for the chairs to answer.
>
> Ack.  Thank you so much for your time and attention to this document.
>
> ScottJ
>
> >
> >> Thanks,
> >> ScottJ
> >>
> >>
> >> On Tue, 25 Jun 2024, Mark Andrews wrote:
> >>
> >>> Made the IPN description more specific.
> >>>
> >>>
> >>>   Wire format encoding shall
> >>> be an unsigned 64-bit integer in network order. Presentation format,
> for these
> >>> resource records are either a 64 bit unsigned decimal integer, or two
> 32 bit
> >>> unsigned decimal integers delimited by a period with the most
> significant 32 bits
> >>> first and least significant 32 bits last.  Values are not to be zero
> padded.
> >>>
>  On 25 Jun 2024, at 15:22, Scott Johnson 
> wrote:
> 
>  Hi Scott,
> 
>  Wire format of 64 bit unsigned integer it is for IPN.
>  Updated draft (03) incorporating all changes posted at:
>  https://datatracker.ietf.org/doc/draft-johnson-dns-ipn-cla/
> 
>  Let me know if you see anything else, Mark, and thanks!
> 
> 
>  ScottJ
> 
> 
>  On Mon, 24 Jun 2024, sburleig...@gmail.com wrote:
> 
> > I've lost lock on the ipn-scheme RFC, but my own assessment is that
> always sending a single 64-bit unsigned integer would be fine.  The
> application receiving the resource can figure out whether or not it wants
> to condense the value by representing it as two 32-bit integers in ASCII
> with leading zeroes suppressed and a period between the two. Internally
> it's always going to be a 64-bitunsigned integer, from which a 32-bit
> "allocator" number can be obtained by simply shifting 32 bits to the right;
> if the result is zero then we're looking at an old-style IPN node number.
> >
> > Scott
> >
> > -Original Message-
> > From: Scott Johnson 
> > Sent: Monday, June 24, 2024 8:26 PM
> > To: Mark Andrews ; sburleig...@gmail.com
> > Cc: dnsop 
> > Subject: Re: [DNSOP] IPN and CLA RRTYPEs to support Bundle Protocol
> RFC9171
> >
> > Hi Mark,
> >
> >
> > On Tue, 25 Jun 2024, Mark Andrews wrote:
> >
> >>
> >>
> >>> On 25 Jun 2024, at 10:32, Scott Johnson 
> wrote:
> >>>
> >>> Hi Mark,
> >>>
> >>> On Tue, 25 Jun 2024, Mark Andrews wrote:
> >>>
>  An obvious correction “LTP--v6” -> “LTP-v6”
> >>>
> >>> Aha!  Good eye.
> >>>
> 
>  For IPN why isn’t the wire format two network 64 bit integers?
> That is 16 bytes.  Also 2^64-1 is 20 characters so 2 64-bit numbers
> separated by “." is 41 characters.  It’s not clear where then 21 comes from.
> >>>
> >>> EID is the basic unit of IPN naming, which is indeed two 64 bit
> integers separated by a ".". We are seeking to represent only the node-nbr
> component of an EID, as the service-nbr component is loosely analagous to a
> UDP or TCP port, for which there is one publicly defined service in the
> registry, and a collection of space agencies who lay claim to another chunk
> of them:
> >>>
> https://www.iana.org/assignments/bundle/bundle.xhtml#cbhe-service-num
> >>> bers As such, there is no gain in including the second 64-bit
> >>> integer, representing service-nbr in the DNS records, and indeed,
> a loss of utility on the application level.
> >>>
> >>> The node-nbr component is presently, under RFC7116, a 64 bit
> unsigned integer.  There is a draft from the DTN WG currently making it's
> way through the IESG which will amend the IPN naming scheme. Perhaps I
> should add it to normative references?
> >>> https://datatracker.ietf.org/doc/draft-ietf-dtn-ipn-update/
> >>>
> >>> In effect it splits the node-nbr component into two-32 bit
> integers; Allocator Identifier and Node Number in the "Three-Element
> Scheme-Specific Encoding" of Section 6.1.2 over the above.  Section 6.1.1
> describes the "Two-Element Scheme-Specific Encoding" method which retains
> the use of a single 64-bit integer.  Thus, a single 64 bit integer (20
> characters) or two 32-bit integers (10 characters each) delimited by a "."
> >>

[DNSOP]Re: Erik Kline's No Objection on draft-ietf-dnsop-dnssec-bootstrapping-08: (with COMMENT)

2024-05-10 Thread Erik Kline
On Fri, May 10, 2024 at 10:12 PM Erik Kline  wrote:

> On Tue, May 7, 2024 at 12:59 AM Peter Thomassen  wrote:
>
>> Hi Erik,
>>
>> Thanks for your review!
>>
>> On 5/5/24 00:18, Erik Kline via Datatracker wrote:
>> > ## Comments
>> >
>> > ### S7
>> >
>> > * Should there be some kind of registration or reservation for the
>> "_dsboot"
>> >meaning and usage described in this document?
>> The authors were wondering as well.
>>
>> We figured that unlike in case of the existing underscore registry, the
>> issue seems less pressing:
>>
>> The _dsboot etc. labels are under the "main" underscore label right in
>> front of the nameserver name. As a result, the signaling type label (like
>> _dsboot) is somewhat "shielded", in the sense that they are only used under
>> the signaling mechanism, i.e., by DNS operators announcing stuff about
>> their managed zones. Given the limited target group for the signaling
>> mechanism overall, collisions seem less likely than with underscore labels
>> in general.
>>
>> The authors are also not sure under which conditions such registries
>> should or should not be erected. In short, we don't really have an answer
>> to your question, except that less may be more, but it's not clear.
>>
>> That said, the authors think "why not", and if you wish, we can add a
>> section to address this. I imagine this would be something like RFC 8552
>> Section 4.1 [1]. This would add ~2 pages to the draft, unless there's a
>> shorter way to do it.
>>
>> [1]: https://www.rfc-editor.org/rfc/rfc8552#section-4.1
>>
>> Thanks,
>> Peter and Nils
>>
>
> Thanks for your reply.  I have no particular intuition telling me what's
> best here.  I'm happy to wait and see what other reviews think.
>

I should add that if no registration of any sort is made then it may be
worth a sentence or two saying why nothing is established at this time.

But again: I'm happy to wait and see what consensus emerges.
___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP]Re: Erik Kline's No Objection on draft-ietf-dnsop-dnssec-bootstrapping-08: (with COMMENT)

2024-05-10 Thread Erik Kline
On Tue, May 7, 2024 at 12:59 AM Peter Thomassen  wrote:

> Hi Erik,
>
> Thanks for your review!
>
> On 5/5/24 00:18, Erik Kline via Datatracker wrote:
> > ## Comments
> >
> > ### S7
> >
> > * Should there be some kind of registration or reservation for the
> "_dsboot"
> >meaning and usage described in this document?
> The authors were wondering as well.
>
> We figured that unlike in case of the existing underscore registry, the
> issue seems less pressing:
>
> The _dsboot etc. labels are under the "main" underscore label right in
> front of the nameserver name. As a result, the signaling type label (like
> _dsboot) is somewhat "shielded", in the sense that they are only used under
> the signaling mechanism, i.e., by DNS operators announcing stuff about
> their managed zones. Given the limited target group for the signaling
> mechanism overall, collisions seem less likely than with underscore labels
> in general.
>
> The authors are also not sure under which conditions such registries
> should or should not be erected. In short, we don't really have an answer
> to your question, except that less may be more, but it's not clear.
>
> That said, the authors think "why not", and if you wish, we can add a
> section to address this. I imagine this would be something like RFC 8552
> Section 4.1 [1]. This would add ~2 pages to the draft, unless there's a
> shorter way to do it.
>
> [1]: https://www.rfc-editor.org/rfc/rfc8552#section-4.1
>
> Thanks,
> Peter and Nils
>

Thanks for your reply.  I have no particular intuition telling me what's
best here.  I'm happy to wait and see what other reviews think.
___
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


[DNSOP] Erik Kline's No Objection on draft-ietf-dnsop-dnssec-bootstrapping-08: (with COMMENT)

2024-05-04 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-dnssec-bootstrapping-08: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-bootstrapping/



--
COMMENT:
--

# Internet AD comments for draft-ietf-dnsop-dnssec-bootstrapping-08
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Comments

### S7

* Should there be some kind of registration or reservation for the "_dsboot"
  meaning and usage described in this document?



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Erik Kline's No Objection on draft-ietf-dnsop-avoid-fragmentation-16: (with COMMENT)

2024-01-02 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-avoid-fragmentation-16: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-avoid-fragmentation/



--
COMMENT:
--

# Internet AD comments for draft-ietf-dnsop-avoid-fragmentation-16
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Comments

### S1

* "TCP avoids fragmentation by ..."

  TCP also benefits hugely from widespread support for MSS rewriting.  If
  something like an "EDNS0 Payload Size rewriting" function was available
  and as widely deployed there might be a very different conversation to
  be had.

  No text changes necessary; just a random thought.



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Erik Kline's No Objection on draft-ietf-dnsop-caching-resolution-failures-07: (with COMMENT)

2023-08-27 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-caching-resolution-failures-07: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-caching-resolution-failures/



--
COMMENT:
--

# Internet AD comments for draft-ietf-dnsop-caching-resolution-failures-07
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Nits

### S1.2

* "only exacerbated" -> "further exacerbated"?

  Use of "only" here might be misread.

### S2.2

* s/2001:DB8:1::/2001:db8:1::/g

  in accordance with RFC 5952 section 4.3



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Erik Kline's No Objection on draft-ietf-dnsop-dns-catalog-zones-08: (with COMMENT)

2022-12-22 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-dns-catalog-zones-08: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-catalog-zones/



--
COMMENT:
--

# Internet AD comments for draft-ietf-dnsop-dns-catalog-zones-08
CC @ekline

## Nits

### S4.3

* "Member-specific properties are described in Section 4.3" ->
  "Member-specific properties are described in Section 4.4"

### S4.4.2.1

* S4.3.1 has quotation marks around the contents of the TXT record, whereas
  this section does not.  Recommend standardizing on one format, and probably
  the one with surrounding quotation marks, i.e.:

  group..zones.$CATZ  0 IN TXT"nodnssec"
  group..zones.$CATZ  0 IN TXT"operator-x-sign-with-nsec3"
  group..zones.$CATZ  0 IN TXT"operator-y-nsec3"

  Although, perhaps I've misunderstood something and this is not relevant.



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Erik Kline's Yes on draft-ietf-dnsop-svcb-https-09: (with COMMENT)

2022-05-09 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-svcb-https-09: Yes

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-svcb-https/



--
COMMENT:
--

Thanks for the changes!

(Referring to 4001 seems odd to me, and maybe unnecessary.)



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Erik Kline's Discuss on draft-ietf-dnsop-svcb-https-08: (with DISCUSS and COMMENT)

2022-03-03 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-svcb-https-08: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-svcb-https/



--
DISCUSS:
--

[Appendix D.2]

* Sorry to be super nitpicky/petty about this.

  With respect to Figure 7: IPv4-mapped IPv6 addresses have a complicated
  history (see RFC 4942 S2.2 for an amuse-bouche, as well as itojun's
  draft-itojun-v6ops-v4mapped-harmful).

  Unless there is something very useful to be gained by the inclusion of this
  example (what?) I would strongly suggest removing it.  I fear it will only
  cause confusion.


--
COMMENT:
--

[S2.3; comment]

* "When a prior CNAME or SVCB record has aliased to a SVCB record, each
   RR shall be returned under its own owner name."

  I think this could use some explanation and a reference to Section 11.
  Perhaps something along the lines of

  This is in account of the client resolution process [Section 3].
  See also discussion in [Section 11.1].



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Erik Kline's Yes on draft-ietf-dnsop-dns-tcp-requirements-13: (with COMMENT)

2021-11-05 Thread Erik Kline
On Fri, Nov 5, 2021 at 10:02 AM Wessels, Duane 
wrote:

>
>
> > On Nov 1, 2021, at 3:29 PM, Erik Kline  wrote:
> >
> > Caution: This email originated from outside the organization. Do not
> click links or open attachments unless you recognize the sender and know
> the content is safe.
> >
> >>> [S4.1, comment]
> >>>
> >>> * "Resolvers and other DNS clients should be aware that some servers
> >>>  might not be reachable over TCP.  For this reason, clients MAY want
> >>>  to track and limit the number of TCP connections and connection
> >>>  attempts to a single server."
> >>>
> >>> I think the same comment could be made about paths to a server from
> >>> a given network, e.g., in the case of one network filtering TCP/53 for
> >>> some reason.
> >>>
> >>> I'm not sure how to best reword this to add a per-network notion to
> >>> TCP connection success tracking, but I did want to note that a mobile
> >>> client's measure of TCP connection success to a single server might
> >>> vary from network to network.  (for your consideration)
> >>
> >> Is this because mobile devices are more likely to have multiple network
> choices (say wifi and cellular data) and so the device should include the
> local network when remembering which works and which doesn’t?
> >
> > Yes, they have multiple networks simultaneously and also through time.
> > What's reachable/unreachable on one network might not be
> > reachable/unreachable on another.  Just moving from one Wi-Fi SSID to
> > another can make a difference, e.g.:
> >
> >* imagine two SSIDs that each hand out 8.8.8.8 but have different
> > TCP 53 filtering policies, and
> >
> >* (more concretely) I have DNS-over-TLS active on my phone and on
> > one nearby coffee shop SSID TCP 853 is blocked while on another
> > everything works just fine
> >
> > (Hopefully I'm making some kind of sense.)
>
> Thanks Erik, how does this look to you?
>
>Resolvers and other DNS clients should be aware that some
>servers might not be reachable over TCP.  For this reason, clients
>MAY track and limit the number of TCP connections and
>connection attempts to a single server.  Reachability problems
>can be caused by network elements close to the server, close
>to the client, or anywhere along the path between them.  Mobile
>clients that cache connection failures MAY do so on a per-network
>basis, or MAY clear such a cache upon change of network.
>
> DW
>
>
LGTM.

s/MAY/SHOULD/g also LGTM (since I know some mobile OSes already do stuff
like this)

Thanks!
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Erik Kline's Yes on draft-ietf-dnsop-dns-tcp-requirements-13: (with COMMENT)

2021-11-01 Thread Erik Kline
> > [S4.1, comment]
> >
> > * "Resolvers and other DNS clients should be aware that some servers
> >   might not be reachable over TCP.  For this reason, clients MAY want
> >   to track and limit the number of TCP connections and connection
> >   attempts to a single server."
> >
> >  I think the same comment could be made about paths to a server from
> >  a given network, e.g., in the case of one network filtering TCP/53 for
> >  some reason.
> >
> >  I'm not sure how to best reword this to add a per-network notion to
> >  TCP connection success tracking, but I did want to note that a mobile
> >  client's measure of TCP connection success to a single server might
> >  vary from network to network.  (for your consideration)
>
> Is this because mobile devices are more likely to have multiple network 
> choices (say wifi and cellular data) and so the device should include the 
> local network when remembering which works and which doesn’t?

Yes, they have multiple networks simultaneously and also through time.
What's reachable/unreachable on one network might not be
reachable/unreachable on another.  Just moving from one Wi-Fi SSID to
another can make a difference, e.g.:

* imagine two SSIDs that each hand out 8.8.8.8 but have different
TCP 53 filtering policies, and

* (more concretely) I have DNS-over-TLS active on my phone and on
one nearby coffee shop SSID TCP 853 is blocked while on another
everything works just fine

(Hopefully I'm making some kind of sense.)

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Erik Kline's Yes on draft-ietf-dnsop-dns-tcp-requirements-13: (with COMMENT)

2021-10-27 Thread Erik Kline
On Tue, Oct 26, 2021 at 1:13 PM Benjamin Kaduk  wrote:

> On Tue, Oct 26, 2021 at 01:09:00PM -0700, Erik Kline via Datatracker wrote:
> > Erik Kline has entered the following ballot position for
> > draft-ietf-dnsop-dns-tcp-requirements-13: Yes
> >
> > When responding, please keep the subject line intact and reply to all
> > email addresses included in the To and CC lines. (Feel free to cut this
> > introductory paragraph, however.)
> >
> >
> > Please refer to
> https://www.ietf.org/blog/handling-iesg-ballot-positions/
> > for more information about how to handle DISCUSS and COMMENT positions.
> >
> >
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-tcp-requirements/
> >
> >
> >
> > --
> > COMMENT:
> > --
> >
> > [abstract vs. S1/S3, question]
> >
> > * The abstract says:
> >
> >"...strongly
> >encourages the operational practice of permitting DNS messages to be
> >carried over TCP"
> >
> >   while section 1 says:
> >
> >"...all DNS resolvers and recursive
> >servers MUST support and service both TCP and UDP queries"
> >
> >   and section 3 also some MUST text.
> >
> >   Should the abstract be updated to say MUST rather than just
> >   "strongly encourages", or is there a subtly in here I'm missing?
>
> "require" might be better than "MUST", on the principle that if a given
> requirement is stated in more than one place, there is risk of inadvertent
> skew between what is actually stated; such skew can cause interoperability
> failure or security vulnerabilities if different implementations use the
> differing behaviors.
>
> -Ben
>

+1 sgtm
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Erik Kline's Yes on draft-ietf-dnsop-dns-tcp-requirements-13: (with COMMENT)

2021-10-26 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-dns-tcp-requirements-13: Yes

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-tcp-requirements/



--
COMMENT:
--

[abstract vs. S1/S3, question]

* The abstract says:

   "...strongly
   encourages the operational practice of permitting DNS messages to be
   carried over TCP"

  while section 1 says:

   "...all DNS resolvers and recursive
   servers MUST support and service both TCP and UDP queries"

  and section 3 also some MUST text.

  Should the abstract be updated to say MUST rather than just
  "strongly encourages", or is there a subtly in here I'm missing?

[S4.1, comment]

* "Resolvers and other DNS clients should be aware that some servers
   might not be reachable over TCP.  For this reason, clients MAY want
   to track and limit the number of TCP connections and connection
   attempts to a single server."

  I think the same comment could be made about paths to a server from
  a given network, e.g., in the case of one network filtering TCP/53 for
  some reason.

  I'm not sure how to best reword this to add a per-network notion to
  TCP connection success tracking, but I did want to note that a mobile
  client's measure of TCP connection success to a single server might
  vary from network to network.  (for your consideration)



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [Ext] Éric Vyncke's Discuss on draft-ietf-dnsop-rfc7816bis-10: (with DISCUSS)

2021-08-25 Thread Erik Kline
Works for me too.

My main observation was to consider acknowledging there might be some
nuance in this QTYPE area, and this sounds sufficiently nuance-y for me.

Thanks Paul!

On Tue, Aug 24, 2021 at 10:36 PM Eric Vyncke (evyncke)  wrote:

> Paul,
>
> First , thank you for your reply.
>
> Second, your proposed change actually addresses my DISCUSS and will be
> happy to change my ballot in a NO OBJECTION once a revised I-D is published
> ;-)
>
> Regards
>
> -éric
>
> -Original Message-
> From: iesg  on behalf of Paul Hoffman <
> paul.hoff...@icann.org>
> Date: Wednesday, 25 August 2021 at 00:44
> To: Eric Vyncke 
> Cc: dnsop , The IESG , "
> draft-ietf-dnsop-rfc7816...@ietf.org" <
> draft-ietf-dnsop-rfc7816...@ietf.org>
> Subject: Re: [Ext] Éric Vyncke's Discuss on
> draft-ietf-dnsop-rfc7816bis-10: (with DISCUSS)
>
> On Aug 24, 2021, at 5:23 AM, Éric Vyncke via Datatracker <
> nore...@ietf.org> wrote:
> > == DISCUSS ==
> >
> > -- Section 2.1 --
> > I support Erik Kline's COMMENT on this and am raising it to a
> blocking DISCUSS.
> >
> > A/ in all the discussion in the last §, a  would have the same
> benefit when
> > compared to a NS QTYPE. Or what did I miss ?
> >
> > B/ the last two sentences "Another potential benefit...happy
> eyeballs query for
> > the A QTYPE." are puzzling as using A QTYPE will actually only cache
> the A
> > answer for the minimized request and more and more Internet users
> are using
> > IPv6 nowadays (and possibly even more recursive DNS servers).
> >
> > Hence, I would welcome some discussion in the last § about the
> benefit of using
> > A QTYPE rather than  QTYPE and, as suggested by Erik Kline,
> please remove
> > the last 2 sentences.
>
> If we change from:
>
>A good candidate is to always use the "A"
>QTYPE because this is the least likely to raise issues in DNS
>software and middleboxes that do not properly support all QTYPEs.
>The QTYPE=A queries will also blend into traffic from non-minimising
>resolvers, making it in some cases harder to observe that the
>resolver is using QNAME minimisation.  Using the QTYPE that occurs
>most in incoming queries will slightly reduce the number of queries,
>as there is no extra check needed for delegations on non-apex
>records.  Another potential benefit of using QTYPE=A is that
>[RFC8305] clients that need answers for both the A and  types
>will send the  query first.  When minimising using QTYPE=A the
>minimised query might be useful, and now already in the cache, for
>the happy eyeballs query for the A QTYPE.
>
> to:
>
>Good candidatesare to always use the "A" or ""
>QTYPE because these is the least likely to raise issues in DNS
>software and middleboxes that do not properly support all QTYPEs.
>QTYPE=A or QTYPE= queries will also blend into traffic from
> non-minimising
>resolvers, making it in some cases harder to observe that the
>resolver is using QNAME minimisation.  Using a QTYPE that occurs
>most in incoming queries will slightly reduce the number of queries,
>as there is no extra check needed for delegations on non-apex
>records.
>
> does that alleviate your concers?
>
> --Paul Hoffman
>
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Erik Kline's Yes on draft-ietf-dnsop-rfc7816bis-10: (with COMMENT)

2021-08-09 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-rfc7816bis-10: Yes

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc7816bis/



--
COMMENT:
--

[S2.1 comment]

* It seems to me that using A QTYPEs for Happy Eyeballs clients is
  only a "potential benefit" for an IPv4 connection setup, and does
  nothing to aid any possible IPv6 connection setup.

  There are networks with IPv6-only clients accessing mostly
  IPv6-reachable services for which this might actually slow down
  services (by delaying  resolution resulting in an IPv4
  connection setup that uses something like NAT64 rather than
  native IPv6).

  Suggestion 1: Just trim these HE-related sentences.

  Suggestion 2: Make it clear that this might not always be a "benefit"
in certain network deployments.



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Erik Kline's Yes on draft-ietf-dnsop-server-cookies-04: (with COMMENT)

2020-12-15 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-server-cookies-04: Yes

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-server-cookies/



--
COMMENT:
--

[ questions ]]

[ section 3 ]

* I assume it's not a big deal that sometimes the client cannot easily
  tell when its upstream IP address has changed (vis. RFC 7873 S6
  considerations)?

  NAT makes it difficult to comply with the MUST for clients stated
  in section 8, but...what should a client do if only has, say, an
  RFC 1918 address and is quite likely to be behind a NAT?  If its
  server is also a likely-NAT'd IP then it might presume no NAT between
  the two, but if the server has a global IP address...I suppose it
  can just rotate the per-server cookies once per year?


[[ nits ]]

[ section 1 ]

* Final sentence of the final paragraph:
  "in a Client protecting fashion" ->
  "in a privacy protecting fashion"? (to match the abstract)

[ section 8 ]

* "five minute" -> "five minutes"



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Erik Kline's Yes on draft-ietf-dnsop-dns-zone-digest-12: (with COMMENT)

2020-10-06 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-dns-zone-digest-12: Yes

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-zone-digest/



--
COMMENT:
--

[[ nits ]]

[ section 1.2 ]

* "Whereas DNSSEC is primarily protects" ->
  "Whereas DNSSEC primarily protects"

[ section 6.2 ]

* "DNSSESC" -> "DNSSEC"



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Erik Kline's Yes on draft-ietf-dnsop-extended-error-14: (with COMMENT)

2020-04-21 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-extended-error-14: Yes

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-extended-error/



--
COMMENT:
--

Some non-mushroom-infection-related thoughts:

[ section 2 ]
* I'm insufficiently fluent in Unicode but is some reference here appropriate?
  Perhaps RFC 5198 (if not 3629)?

* Is some text of the form "EDE text may be null terminated but MUST NOT be
  assumed to be; the length MUST be derived from the OPTION-LENGTH field"
  worth including?

[ section 4.1 ]
? s/a EXTRA-TEXT/an EXTRA-TEXT/ perhaps

[ section 4.5 ]
* should DNS64 servers send "Forged Answer" EDEs with a NOERROR synthesized
   response?

[ section 4.22 ]
* "Not Supported" because something has been deprecated seems sufficiently
  specific that perhaps "Deprecated" or "No longer supported" would be more
  appropriate?



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Erik Kline's Yes on draft-ietf-dnsop-no-response-issue-18: (with COMMENT)

2020-04-05 Thread Erik Kline
LGTM, thanks

On Sun, Apr 5, 2020 at 6:43 PM Mark Andrews  wrote:

>
>
> > On 5 Apr 2020, at 15:45, Erik Kline via Datatracker 
> wrote:
> >
> > Erik Kline has entered the following ballot position for
> > draft-ietf-dnsop-no-response-issue-18: Yes
> >
> > When responding, please keep the subject line intact and reply to all
> > email addresses included in the To and CC lines. (Feel free to cut this
> > introductory paragraph, however.)
> >
> >
> > Please refer to
> https://www.ietf.org/iesg/statement/discuss-criteria.html
> > for more information about IESG DISCUSS and COMMENT positions.
> >
> >
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/draft-ietf-dnsop-no-response-issue/
> >
> >
> >
> > --
> > COMMENT:
> > --
> >
> > {Yes}
> >
> > [nits]
> >
> > S3.2.2
> >
> > * s/answers responses/responses/  (or answers)
>
> Addressed.
> >
> > S5
> >
> > * Is there a reference for a definition of "scrubbing service”?
>
> I’ve attempted to add one to the section.  See -19.
>
> >
> > S10
> >
> > * s/None the tests/None of the tests/
>
> Addressed.
> >
> >
> >
>
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org
>
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Erik Kline's Yes on draft-ietf-dnsop-no-response-issue-18: (with COMMENT)

2020-04-04 Thread Erik Kline via Datatracker
Erik Kline has entered the following ballot position for
draft-ietf-dnsop-no-response-issue-18: Yes

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-no-response-issue/



--
COMMENT:
--

{Yes}

[nits]

S3.2.2

* s/answers responses/responses/  (or answers)

S5

* Is there a reference for a definition of "scrubbing service"?

S10

* s/None the tests/None of the tests/



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] status of the aname and svcb/httpsvc drafts

2020-02-19 Thread Erik Kline
On Wed, Feb 19, 2020 at 1:13 PM Warren Kumari  wrote:

> On Thu, Feb 20, 2020 at 6:13 AM Tommy Pauly
>  wrote:
> >
> >
> >
> > On Feb 18, 2020, at 6:15 PM, Rob Sayre  wrote:
> >
> > On Tue, Feb 18, 2020 at 8:17 AM Olli Vanhoja 
> wrote:
> >>
> >>
> >> SVCB is active almost every day of the week in GitHub.
> >
> >
> > If someone wanted to follow this work, which GitHub repo is relevant?
> >
> > I found this one: https://github.com/MikeBishop/dns-alt-svc
> >
> > But I'm not sure that's the right one.
> >
> >
> > Yes, that is the correct GitHub.
>
> Could I suggest adding something like:
> [ RFC Editor - please remove before publication. This document is being
> collaborated on in Github at:
> https://github.com/MikeBishop/dns-alt-svc.  The most
> recent version of the document, open issues, etc should all be
> available here.  The authors (gratefully) accept pull requests.]
>
> to the abstract - that way, people reading the draft know where submit
> PRs, etc.
> W
>
>
Seems like something worth noting in draft-ietf-git-using-github too (I
scanned the two wg docs and no existing text jumped out at me).


> >
> > Thanks,
> > Tommy
> >
> >
> > thanks,
> > Rob
> >
> > ___
> > DNSOP mailing list
> > DNSOP@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsop
> >
> >
> > ___
> > DNSOP mailing list
> > DNSOP@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsop
>
>
>
> --
> I don't think the execution is relevant when it was obviously a bad
> idea in the first place.
> This is like putting rabid weasels in your pants, and later expressing
> regret at having chosen those particular rabid weasels and that pair
> of pants.
>---maf
>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] port number in HTTPSSVC

2020-01-03 Thread Erik Kline
I think removing port number flexibility might unduly constrain some data
center use cases where service reachability might not have the more common
443-only limitations.

On Fri, Jan 3, 2020 at 11:33 AM Ben Schwartz  wrote:

> HTTPSSVC co-editor here.
>
> The effect of this change seems similar to deprecating support for
> non-default ports in HTTP/3.  While I have some misgivings about the
> handling of non-default ports in HTTPS, I would want to see consensus in
> the HTTP and QUIC working groups before making this change.
>
> I would suggest sending your proposal to those lists, and we can adjust
> the HTTPSSVC draft based on their conclusions.
>
> On Fri, Jan 3, 2020 at 1:24 PM Paul Vixie  wrote:
>
>> in SRV we added a port number to the rdata because the /etc/services file
>> was
>> painful to keep globally updated. SRV was protocol independent.
>>
>> HTTPSSVC is protocol specific, and when it copied SRV, it included the
>> port
>> number in the rdata, which i think is both unnecessary and error-prone.
>>
>> managed private networks who want to permit outbound HTTP/3 are going to
>> add a
>> rule like "if the far end port number is 443, add a stateful rule".
>> anyone who
>> uses the port number field (if it exists) in HTTPSSVC to specify a
>> different
>> port number is going to suffer, as will many of the clients trying to
>> access
>> that service.
>>
>> i suggest that the port 443 assumption for HTTP/3 be baked in, and that
>> this
>> field be removed from the HTTPSSVC rdata.
>>
>> --
>> Paul
>>
>>
>> ___
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
>>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] I-D Action: draft-ietf-dnsop-resolver-information-00.txt

2019-10-29 Thread Erik Kline
On Tue, Oct 29, 2019 at 6:10 PM Ben Schwartz  wrote:

>
>
> On Tue, Oct 29, 2019 at 7:04 PM Paul Wouters  wrote:
>
>> On Tue, 29 Oct 2019, Neil Cook wrote:
>>
>> >   FWIW, I've previously stated a preference for dropping the use
>> of ".well-known" entirely, and using draft-00's "resolver-info.arpa" name
>> instead of reverse-IP, in order to improve support for
>> >   passive forwarders.  I understand this was changed in the hope of
>> offering some kind of security here with DNSSEC, but I think it's unlikely
>> to work in practice, and we're better off keeping
>> >   things simple.
>> >
>> >
>> > I completely agree. I’d much rather see something like
>> "resolver-info.arpa" instead of reverse-IP.
>>
>> Throwing DNSSEC under the bus for a "simpler" name seems rather
>> excessive. I for one would like to see DNSSEC in the reverse
>> support when possible. For a future where not everything is
>> chained to a single all-powerful LetsEncrypt root CA.
>>
>
> The concern here is not "simplicity" as such.  The main concern is the
> large fraction of devices whose configured DNS server is actually a
> forwarder (usually with an RFC 1918 address).  Even if the actual recursive
> implements RESINFO support, these devices will not be able to retrieve the
> information, because they won't be querying the reverse address that the
> recursive resolver thinks it owns.
>
> This can be solved if the forwarder implements some sort of RESINFO query
> rewriting, but it certainly won't work for the existing install base.  I
> think this is the crux: should the upstream RESINFO be available through a
> naive forwarder, or only through a forwarder that actively works to support
> RESINFO?  I prefer the former, because I think serving the existing install
> base is worthwhile.
>
> I don't see significant value in DNSSEC for this application, because an
> adversary who can forge DNS responses (the DNSSEC adversary) can also forge
> DNS configuration messages (DHCP or RA).  What good does it do me to prove
> that 1.2.0.192.in-addr.arpa is authentically publishing this RESINFO, if
> the attacker forged the DNS configuration message that said 192.0.2.1?
>

But this sounds more like you want to lookup RESINFO for resinfo.arpa with
some DNS hop count decrementing and get back a CNAME to the rev-addr
RESINFO record.

I don't know how we do DNS hop count decrementing, but it could be done by
convention (i.e. "0.resinfo.arpa", "1.resinfo.arpa", "2.resinfo.arpa",
).  (But still, it just sounds like want you want is somewhat orthogonal
to/separable from what's discussed in this draft.)
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] I-D Action: draft-ietf-dnsop-resolver-information-00.txt

2019-10-28 Thread Erik Kline
IIRC Ben Schwartz at the mic (Prague? Montreal?) mentioned he was
interested in seeing something like "traceroute but for DNS", which (a) is
what your described scenario sounds like to me and (b) is a
separate objective from this draft.  I think it's just...unrelated.  I
don't think we have DNS hop-by-hop -type semantics, which would make the
discovery of intermediate resolvers/forwarders easier.

On Mon, Oct 28, 2019 at 9:03 AM Neil Cook  wrote:

> I was quite surprised that there was no reaction to my comments. Are they
> not worth replying to, or is there just not enough interest in this draft?
>
> Resolver discovery seems like such an important topic given what is
> happening with DoH and DoT, I can’t believe that folks aren’t interested in
> progressing this, and I think ensuring that it works for the extremely
> widely deployed use-case of a DNS proxy/forwarder is very important.
>
> Neil
>
> > On 11 Oct 2019, at 14:41, Neil Cook  wrote:
> >
> > I have some comments on this draft.
> >
> > I’m particularly concerned about the extremely common use-case where a
> DNS proxy is used in front of the actual resolver; this is the case for
> many home routers/CPEs, particularly those provided by ISPs. They tend to
> give out DNS via DHCP on a private IP address e.g. 192.168.0.x, and then
> use dnsmasq (or homegrown software) to proxy to the actual resolver of the
> ISP located in the network on a public IP address.
> >
> > TL;DR - there are two mechanisms defined in this draft. The first
> mechanism "Retrieving Resolver Information by DNS” seems like it would work
> ok with the above scenario. The second mechanism "Retrieving Resolver
> Information by Well-Known URI” would require changes to every CPE of the
> type described above, which IMO makes it unworkable for that scenario. (BTW
> for CPE insert any kind of DNS proxy/forwarder, which would have the same
> issue).
> >
> > My main concern is that given that there are two mechanisms specified,
> clients may choose only to implement one of them. The draft doesn’t appear
> to specify that client authors must implement one or the other, or both. So
> I’d like to see the draft mandate that if only one of the mechanisms is
> implemented, it must be the "Retrieving Resolver Information by DNS” method.
> >
> > I’d like to see the draft give due consideration to this very common
> use-case, (both CPEs and the more general case of DNS proxies/forwarders)..
> >
> > A few additional comments which I think need to be considered:
> >
> > - For the Well-Known URI mechanism by resolver IP, clearly private IP
> addresses can never get valid certificates, so even if CPEs were to
> implement this mechanism, they can never be authenticated.
> >
> > - For the DNS method, given that a resolver never knows if DNS proxies
> are being used (in CPEs or elsewhere) or indeed what IP addresses are being
> used behind those proxies, I would imagine that at a minimum it would need
> to answer RESINFO queries for *all* RFC1918 addresses. This does then lead
> to the question, why include the IP address in the query at all? I assume
> the answer is “DNSSEC”, but see below for some more questions/comments on
> that.
> >
> > - There is an acknowledgement "Erik Kline suggested using
> ".{in-addr,ip6}.arpa" as the
> >   domain name to allow for the possibility of DNSSEC-signed responses.”
> >
> > I think it’s worth noting that RESINFO queries for private IP addresses
> will never be able to generate DNSSEC-signed responses. Also given the
> restriction "Authoritative servers MUST NOT answer queries that are defined
> in this protocol.” it seems unlikely that many resolvers would be capable
> of generating DNSSEC-signed responses, especially given that resolvers and
> authoritative servers tend to be completely separate entities these days.
> >
> > This also begs the question, why create that restriction at all? Why
> must Authoritative Servers not answer those queries? The draft also states
> that "if the resolver can be configured to also be authoritative for some
> zones, it can use that configuration to actually be authoritative for the
> addresses on which it responds.” Which seems to contradict the previous
> MUST NOT - surely this is an implementation detail that should not be
> mentioned in an IETF draft?
> >
> > Neil Cook
> >
> >> On 19 Aug 2019, at 20:28, internet-dra...@ietf.org wrote:
> >>
> >>
> >> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> >> This draft is a work item of the Domain Name System Operations WG of
> the IETF.
> >

Re: [DNSOP] Special-use TLDs in resolvers

2019-08-16 Thread Erik Kline
https://www.iana.org/assignments/special-use-domain-names/special-use-domain-names.xhtml#special-use-domain


I have wondered whether or not it would be useful for IANA to have a git
repo where these canonical data could live alongside scripts that transform
them into things like C #include header files and zone file formats and so
on.


On Fri, 16 Aug 2019 at 08:00, Steve Crocker  wrote:

> At the risk of revealing that I haven't been following this thread
> carefully, I don't understand how a resolver is supposed to know all of the
> special names.  Resolvers that are configured to know that invalid,
> local, onion, and test are special will not know about the next name
> that's put on the special list.
>
> I guess the larger picture is that onion is a protocol switch, so it's not
> sufficient for a resolver to know that it shouldn't look up strings ending
> in onion in the global DNS; it must also know what it should do.
>
> Steve
>
>
> On Fri, Aug 16, 2019 at 10:47 AM Andrew Sullivan 
> wrote:
>
>> As I often note, I work for ISOC but I'm not speaking for it.
>>
>> On Fri, Aug 16, 2019 at 11:30:06AM +0200, Vladimír Čunát wrote:
>>
>> > I've been wondering what's best to do around these TLDs: invalid, local,
>> > onion, test.  The RFCs say that resolvers SHOULD recognize them as
>> > special and answer NXDOMAIN without any interaction with nameservers (by
>> > default).  What do you think about NOT following this "advice", subject
>> > to some conditions that I explain below?
>>
>> I think it's less than ideal, because the point of resolvers immediately
>> answering NXDOMAIN is that these are not and never will be names in
>> the global DNS.  That is, they really are special-use, and part of
>> that specialness is that they're part of the domain name space but not
>> part of the global DNS name space.
>>
>> This is particularly true of onion, which is a protocol switch.  It's
>> intended to signal that you should _never_ look up that name in the
>> DNS.  That's its whole function.
>>
>> Best regards,
>>
>> A
>>
>> --
>> Andrew Sullivan
>> a...@anvilwalrusden.com
>>
>> ___
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
>>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] New draft, seeking comments: draft-sah-resolver-information

2019-04-30 Thread Erik Kline
Can I ask why you went with resolver-info.arpa instead of
.{in-addr,ip6}.arpa of the resolver IP to which the query is being
issued?  I think the temp-field2. trick still works, and maybe we
could get DNSSEC validation (IDK about dnssec validation in the rev-ip
..arpa space).

On Tue, 30 Apr 2019 at 14:10, Paul Hoffman  wrote:

> [[ GH. The abstract of the draft says it should be discussed on the
> ADD list. That's wrong, it belongs here. ]]
>
> [[ GH2. I didn't include the draft info.
> Title   : DNS Resolver Information Self-publication
> Authors : Puneet Sood
>   Roy Arends
>   Paul Hoffman
> Filename: draft-sah-resolver-information-00.txt
> Pages   : 9
> Date: 2019-04-30  ]]
>
> Greetings again. Puneet, Roy and I have just published a -00 with an idea
> for how to get information about a recursive resolver from the resolver, if
> it wants to give that information. This is an outgrowth of my earlier work
> in the DOH WG on draft-ietf-doh-resolver-associated-doh. The discussion on
> that latter draft in Prague had a couple of people saying "this should be
> more general than just DoH" and "what about DoT", which sparked the idea
> for draft-sah-resolver-information.
>
> Note as you read this document that we have *not* started filling in the
> kind of information that a resolver might return; we haven't even specified
> the DoH stuff. We wanted to be sure that DNSOP folks thought that the
> direction here might be viable; if so, I'll write an associated draft for a
> resolver's associated DoH and DoT servers, and some of you might start
> writing drafts for other ideas.
>
> Also note that this is explicitly only for resolvers; we might later do a
> second protocol for authoritative servers who want to give information
> about themselves (such as if they do DoT, if that moves forward in DPRIVE).
> The reason for the split is that a resolver that doesn't know the protocol
> here might pass the query on to the authoritative servers for the root or
> .arpa, and the response to the stub would then be ambiguous.
>
> We look forward to your bashing and/or support.
>
> --Paul Hoffman
>
>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Concerns around deployment of DNS over HTTPS (DoH)

2019-03-13 Thread Erik Kline
On Wed, 13 Mar 2019 at 16:10, Paul Vixie  wrote:

> On Wednesday, 13 March 2019 19:23:55 UTC Erik Kline wrote:
> > > If there is a malicious user or app on a network that someone is
> trying to
> > > protect, isn't the very existence of these players the actual issue
> that
> > > needs to be addressed?
> >
> > I tend to think this is the real issue.  Any app can craft its own
> > non-cleartext-DNS name resolution service; DoH makes it a bit easier
> > perhaps, but not much (vis. JSON DNS, etc...).
>
> if you guys would appreciate a half day seminar on network security
> economics,
> in which the value of anomalousness will figure prominently, let's meet up.
>

I'd be a fool to turn down such an offer.  Thank you.

> My suspicion is that controlling a network's DNS is less and less likely
> to
> > be a decent control point for network security w.r.t. to the craftier
> > apps.
>
> your suspicion directly contradicts both my long-term and recent
> experience.
>
> > I'm sure the monitoring and interference with things looking up
> > "really-evil.evil" still has some value.  But much more sophistication is
> > probably required nowadays to deal with even moderately competent
> > adversaries...I suspect.
>
> alas, meeting only the most competent adversaries is not a choice we can
> make.
>
> vixie
>
>
>
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Concerns around deployment of DNS over HTTPS (DoH)

2019-03-13 Thread Erik Kline
>
>
> If there is a malicious user or app on a network that someone is trying to
> protect, isn't the very existence of these players the actual issue that
> needs to be addressed?
>

I tend to think this is the real issue.  Any app can craft its own
non-cleartext-DNS name resolution service; DoH makes it a bit easier
perhaps, but not much (vis. JSON DNS, etc...).

My suspicion is that controlling a network's DNS is less and less likely to
be a decent control point for network security w.r.t. to the craftier
apps.  I'm sure the monitoring and interference with things looking up
"really-evil.evil" still has some value.  But much more sophistication is
probably required nowadays to deal with even moderately competent
adversaries...I suspect.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Delegation into the interior of a zone?

2018-12-27 Thread Erik Kline
On Thu, 27 Dec 2018 at 11:27, John Levine  wrote:

> Over in bind-users somone suggested a CIDR rDNS kludge in which you
> delegate a bunch of names out of a rDNS zone to a second server,
> and the second server answers them all from one zone, like this
>
> $ORIGIN 1.1.1.in-addr.arpa.
> @ SOA blah
>
> 10 NS otherserver
> 11 NS otherserver
> 12 NS otherserver
>
>
> and on the other server
>
> $ORIGIN 1.1.1.in-addr.arpa.
> @ SOA blah
>
> 10 PTR foo
> 11 PTR bar
> 12 PTR baz
>
> That is, the two zones have the same apex, and NS records point into
> the interior of the second zone, not at the apex.  That works in BIND,
> of course, but it seems wrong.  I am having trouble tracking down the
> specification of why it is wrong.
>
> Any sugestions?  It would fail with DNSSEC since there's no DNSKEY
> to match the delegation DS, but how wrong was it before that?
>
> Signed,
> Confused
>

So, the NS listed in some zone above would be "wrong", i.e. the glue
records point to namservers hosting a zone with these different
nameservers?  Seems like a resolver being pedantic about glue records might
be nonplussed.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] I-D Action: draft-ietf-dnsop-attrleaf-15.txt

2018-11-04 Thread Erik Kline
On Mon, 5 Nov 2018 at 09:56, Dave Crocker  wrote:
>
> On 11/4/2018 6:28 PM, Erik Kline wrote:
> > One thing I missed earlier (and please forgive me if this was already
> > discussed), was whether or not _example* should be reserved in the
> > table in draft-ietf-dnsop-attrleaf-15#section-4.3.
> >
> > Basically, is there any value in reserving _example* for future RFCs
> > to use (ones that don't care about the specific _foo label but apply
> > to all such labels in some way).
>
>
> Clever suggestion.  Seems like obvious benefit with no obvious detriment.
>
> So I immediately went to add it and then realized that doing this
> cleanly will take an entry for each RR...
>
> Not so sure we want to do that?

Perhaps doable via a {see section #X.Y} e.g.:

  | *   | _example* {see #X.Y} | [this doc]  |

X.Y Reserved _example* label
For use in RFC documentation describing behaviour applicable to
any label associate with any RR type. More awesome text also goes
here.

I'm not sure about the strictness requirements for this kind of table for IANA.

Also, this doesn't address whether it's an actually useful suggestion. :-)

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] I-D Action: draft-ietf-dnsop-attrleaf-15.txt

2018-11-04 Thread Erik Kline
Dave (others),

One thing I missed earlier (and please forgive me if this was already
discussed), was whether or not _example* should be reserved in the
table in draft-ietf-dnsop-attrleaf-15#section-4.3.

Basically, is there any value in reserving _example* for future RFCs
to use (ones that don't care about the specific _foo label but apply
to all such labels in some way).

Sorry for the last-minute distraction,
-Erik
On Sun, 4 Nov 2018 at 03:23,  wrote:
>
>
> A New Internet-Draft is available from the on-line Internet-Drafts 
> directories.
> This draft is a work item of the Domain Name System Operations WG of the IETF.
>
> Title   : DNS Scoped Data Through "Underscore" Naming of 
> Attribute Leaves
> Author  : Dave Crocker
> Filename: draft-ietf-dnsop-attrleaf-15.txt
> Pages   : 14
> Date: 2018-11-03
>
> Abstract:
>Formally, any DNS resource record may occur under any domain name.
>However some services use an operational convention for defining
>specific interpretations of an RRset, by locating the records in a
>DNS branch, under the parent domain to which the RRset actually
>applies.  The top of this subordinate branch is defined by a naming
>convention that uses a reserved node name, which begins with an
>_underscore.  The underscored naming construct defines a semantic
>scope for DNS record types that are associated with the parent
>domain, above the underscored branch.  This specification explores
>the nature of this DNS usage and defines the "DNS Global Underscore
>Scoped Entry Registry" with IANA.  The purpose of the Underscore
>registry is to avoid collisions resulting from the use of the same
>underscore-based name, for different services.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-attrleaf/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-dnsop-attrleaf-15
> https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-attrleaf-15
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-attrleaf-15
>
>
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Genart last call review of draft-ietf-dnsop-attrleaf-13

2018-09-26 Thread Erik Kline
Reviewer: Erik Kline
Review result: Ready with Nits

I am the assigned Gen-ART reviewer for this draft. The General Area
Review Team (Gen-ART) reviews all IETF documents being processed
by the IESG for the IETF Chair.  Please treat these comments just
like any other last call comments.

For more information, please see the FAQ at

<https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.

Document: draft-ietf-dnsop-attrleaf-13
Reviewer: Erik Kline
Review Date: 2018-09-26
IETF LC End Date: 2018-09-25
IESG Telechat date: Not scheduled for a telechat

Major issues: none

Minor issues: none

Nits/editorial comments: just a few things that look like they may be typos

Section 2:  "DNS nodes names" doesn't quite scan for me.  "DNS node names" 
perhaps?

Section 4.2: s/simply/simplify/?

Section 5: s/in the of/in the/?

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] BIG RRSETS EDNS0 and ipv6 framentation.

2013-06-17 Thread Erik Kline
On 16 June 2013 23:15, Mark Andrews  wrote:
>
> In message <51bc6c18.3020...@bogus.com>, joel jaeggli writes:
>> I'm interested in the intersection between the requested payload size
>> and the use of the v6 fragmentation header, 6891 I think is missing some
>> advice to implementers that might reasonably prevent fragmented replies
>> from being dropped and limit the degree of amplification that can be
>> achieved with large RRsets.
>
> Fragments get dropped because of badly configured/designed firewalls
> and PMTUD.  Setting IPV6_USE_MIN_MTU to 1 helps with the latter
> though it may result in a addition fragment being sent.

Unfortunately the former are far too prevalent.  It's undoubtedly too
late, but unfortunately it might have been better to do the
fragmentation within the UDP payload (i.e. inside DNS) somehow (c.f.
http://tools.ietf.org/html/rfc5405#section-3.2).
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] fyi: draft-jabley-dnsext-eui48-eui64-rrtypes as AD sponsored individual sumission...

2013-04-17 Thread Erik Kline
I too am not a long-standing dnsop participant, but this draft raised a
question for me.  Does the class have any relevance anymore, really?

To be clear, I have no substantive comment on this document.  But when I
read "The EUI{48,64} RR is class-independent" I thought, that's a
bit...weird.  It seemed to me that if there were, for example, an IEEE
class then this would be perfectly suitable.  But I guess that the RR
number-space is effectively flat?  Do people even contemplate new classes
anymore?

Apologies for my naivete.

PS: If there are clarifying statements being added it might be worth
stating (the obvious) that EUI64 != Modified EUI64 as used by IPv6 SLAAC
(so don't go flipping bits unnecessarily).
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Adoption of as a WG work item?

2013-02-19 Thread Erik Kline
I know I'm late, but for what it's worth I'd support this.

I'm happy to help, if possible.  Perhaps I can sync with Warren et
alia in person in Orlando.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop