Re: [dns-operations] Cloudflare TYPE65283

2023-03-27 Thread Paul Ebersman
viktor> Do the CPU and packet size reductions justify the additional viktor> protocol complexity? As IPv6 slowly creeps up in usage amongst folks not well versed in PMTUD and such (particularly more and more smaller middleware/firewall vendors or crap consumer routers), I think keeping response

Re: [dns-operations] Looking for zones using white lies (RFC 4470)

2023-01-27 Thread Paul Ebersman
shuque> The UltraDNS implementation doesn't use the more precise white shuque> lies epsilon function defined in the spec, but it is probably shuque> good enough for all practical purposes. shuque> And it's much closer to white lies than "black" lies, because it shuque> preserves the correct

Re: [dns-operations] Looking for zones using white lies (RFC 4470)

2023-01-27 Thread Paul Ebersman
shuque> UltraDNS (Neustar Security Services) is known to use NSEC White shuque> Lies. I have a test zone there, shuque> which you can examine: "[[ultratest.huque.com]]". My recollection is that the NSS implementation is really grey lies, i.e. not quite RFC white lies but not fully black like

Re: [dns-operations] Full-service resolver - Pending Upstream Query behaviour

2021-10-05 Thread Paul Ebersman
fneves> I would like to start a discussion or to hear implenters and fneves> operators of Full-service resolvers on what would be the best fneves> software architecture or best current configuration practice to fneves> handle a traffic pattern when a very popular name enters a fneves> scenario

Re: [dns-operations] slack.com bogus

2021-09-30 Thread Paul Ebersman
pe> If NASA borks their DNSSEC, the large recursive resolvers eat huge pe> customer support costs but NASA is mostly unscathed (and may not pe> even notice immediately). So the incentive to do better pe> operationally is light for NASA but the resolver operators have very pe> little leverage to

Re: [dns-operations] slack.com bogus

2021-09-30 Thread Paul Ebersman
pe> NTAs in production use aren't even vaguely new. They've been in wide pe> use for 8-10 years that I'm aware of. They are part of why folks pe> like google, cloudflare, comcast et al are willing to do DNSSEC pe> validation in production. paul> i know that. i just don't like it. without

Re: [dns-operations] slack.com bogus

2021-09-30 Thread Paul Ebersman
pounsett> Negative Trust Anchors, most probably. paul> i hope not. because if true, there's no backpressure on sloppy paul> operations. are we really introducing a new animal to this paul> ecosystem that has no predators trying to kill or eat it? NTAs in production use aren't even vaguely new.

Re: [dns-operations] Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS

2021-08-17 Thread Paul Ebersman
dukhovni> A client using 8.8.8.8 as its iterative resolver and dukhovni> delegating all input validation to that upstream becomes dukhovni> vulnerable not only to data forgery, but also to validation dukhovni> bypass if an MiTM pretending to be 8.8.8.8 returns unvalidated dukhovni> data. In a

Re: [dns-operations] Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS

2021-08-17 Thread Paul Ebersman
pe> DNS is a complicated, esoteric knowledge set. The reason apps, pe> middleware and various other boxes mucking with DNS in transit tend pe> to suck is exactly because the programmers on those boxes don't have pe> this expertise and make all sorts of bad assumptions about what is pe> safe/sane.

Re: [dns-operations] Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS

2021-08-17 Thread Paul Ebersman
pe> Resolver coders are vastly more likely to have knowledge of what pe> might break, what is unsafe, etc. And if they miss a check, the odds pe> of said resolver coders finding this out quickly, and fixing it and pe> getting it deployed, are much better than expecting apps or pe> middleware box

Re: [dns-operations] Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS

2021-08-17 Thread Paul Ebersman
dukhovni> I am far from convinced that it is the resolvers job to dukhovni> enforce RDATA syntax restrictions beyond what is required for dukhovni> a valid wire form. dukhovni> If applications make unwarranted assumptions about the syntax dukhovni> of DNS replies, that's surely an application

Re: [dns-operations] [Ext] DNS Flag Day 2020 will become effective on 2020-10-01

2020-09-15 Thread Paul Ebersman
bsomers> My argument goes something like this. When a DNS request is bsomers> sent, the client (whether a stub or a resolver) is the most bsomers> qualified to know specifics about the "connection" and is also bsomers> the target of fragmentation attacks. I'd go the other end of the spectrum.

Re: [dns-operations] New OARC Chat Platform

2020-08-25 Thread Paul Ebersman
warren> We've often discussed if the tools are useful / doing what we warren> want. My concern with this is that it requires yet another app warren> installed for people to communicate; I'm one of the first to bitch about this when I have to install yet another app. However, mattermost works

Re: [dns-operations] A strange DNS problem (intermittent SERVFAILs)

2020-05-30 Thread Paul Ebersman
matthew-l> I wonder whether the first one (SERVFAIL for NS) is a clue. matthew-l> bcpe.fr is delegated to the same servers which do not answer matthew-l> NS queries. Thus, NS RRSET is only available from the parent matthew-l> (.fr) and not the child. Maybe this upsets child-centric matthew-l>

Re: [dns-operations] Google DNS Admin

2020-01-08 Thread Paul Ebersman
daniel> Thank you for this. Is there any chance at all I can get you to daniel> do a traceroute to daniel> 185.203.205.10 and 2a0c:d2c4::53:5:7335 daniel> And if you have access to a bgp speaking peer, show ip bgp daniel> 185.203.204.0/22 and show bgp ipv6 unicast 2a0c:d2c4::/32 (or daniel>

Re: [dns-operations] root? we don't need no stinkin' root!

2019-12-11 Thread Paul Ebersman
jreid> In principle, they could all change at once, In reality, they jreid> don't. dot> But they do. Vanuatu did yesterday, and I mentioned some other dot> recent examples in this thread a couple of weeks ago: dot> https://lists.dns-oarc.net/pipermail/dns-operations/2019-November/019486.html

Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-28 Thread Paul Ebersman
mallman> I wonder if we're ever allowed to just decide this sort of mallman> thing is ridiculous old shit and for lots of reasons we can and mallman> should just garbage collect it away. ebersman> We aren't allowed as IETF/engineers. The world sort of is. ;) tale> I see the :) but I'm thinking

Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-26 Thread Paul Ebersman
ebersman> IPv4 reachable traditional DNS servers for some tiny group of ebersman> antique folks will be needed for years, even if we get 99+% of ebersman> the world to some new system. mallman> I wonder if we're ever allowed to just decide this sort of mallman> thing is ridiculous old shit and

Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-26 Thread Paul Ebersman
mallman> Setting aside history and how things have been done and why mallman> (which I am happy to stipulate is rational)... At this point, mallman> are there tangible benefits for getting information about the mallman> TLD nameservers to resolvers as needed via a network service? The biggest

Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-26 Thread Paul Ebersman
ebersman> Actually, it's a great argument for longer TTLs and caching ebersman> doing what they're supposed to. jim> It would be if the root only got queries from well behaved jim> recursive resolvers. But we both know Paul that simply isn't true. jim> Well over 90% of the query traffic at the

Re: [dns-operations] root? we don't need no stinkin' root!

2019-11-25 Thread Paul Ebersman
jim> What do you consider to be a lot of queries? The root server system jim> collectively handles 500K-1M queries per second. That seems rather jim> a lot to me. YMMV. fw> But globally? For the entire planet? fw> It's certainly beyond what I can run out of my basement using spare fw> parts,

Re: [dns-operations] Link-local IP addresses for a resolver?

2019-09-24 Thread Paul Ebersman
ebersman> No need to shout... And the same could be said of RFC 1918 but ebersman> ISPs have used that for thousands of homes, crossing thousands ebersman> of CPEs. Not the best choice and not your choice but it does ebersman> work for some folks. marka> Advertising RFC 1918 address as DNS

Re: [dns-operations] Link-local IP addresses for a resolver?

2019-09-24 Thread Paul Ebersman
marka> When a *ISP* advertises a DNS server to its *customers* IT SHOULD marka> WORK FOR ALL OF THE CUSTOMER'S MACHINES! That doesn't mean it can't be ULA. And it would be hideous but you can use LL if you flatten the broadcast domain. There are lots of reasons why this isn't the best idea but

Re: [dns-operations] Link-local IP addresses for a resolver?

2019-09-24 Thread Paul Ebersman
marka> DNS servers that are expected to be reached across sites need to marka> be globally unique addresses which ULA and LL are not. The IP address clients use to reach the resolver doesn't have to be the same one that the resolver uses as source address when it queries. And it's not uncommon to