Re: [DNSOP] Heads-up - draft about "letting localhost be localhost" in SUNSET4 that really should be in DNSOP

2016-11-16 Thread George Michaelson
This may seem a little strange, contrarian even, given how implacably opposed to new things in this space pending some sanity, but I am actually, broadly speaking, in favour of defining the world as it is, regarding localhost. If somebody seeks to invent something new, that is a discussion of its

Re: [DNSOP] Heads-up - draft about "letting localhost be localhost" in SUNSET4 that really should be in DNSOP

2016-11-16 Thread Suzanne Woolf
Hi, I wasn’t aware of this draft and will have to take a look at it, but note that the DNSOP charter includes: 6. Publish documents that attempt to better define the overlapping area among the public DNS root, DNS-like names as used in local or restricted naming scopes, and the 'special names' r

[DNSOP] [OT][rant-ish] Electronics & business models (was DNSSEC operational issues long term)

2016-11-16 Thread Shane Kerr
Ondřej, At 2016-11-17 01:02:10 +0100 Ondřej Surý wrote: > > Given the low margin, my suspicion is that most CPE manufacturers would NOT > > want > > to add in any additional components to solve what for them would be an edge > > case in terms of volume. > > This is the main problem. Most CP

Re: [DNSOP] Heads-up - draft about "letting localhost be localhost" in SUNSET4 that really should be in DNSOP

2016-11-16 Thread Ted Lemon
Sure. We could also ask the IAB--there's a ton of expertise on the IAB. :) However, in fact it's an accident of slow deployment of DNSSEC validators that this has worked for thirty years, which would suggest that that experience isn't going to help that much. That said, I really was just bein

Re: [DNSOP] Heads-up - draft about "letting localhost be localhost" in SUNSET4 that really should be in DNSOP

2016-11-16 Thread Andrew Sullivan
On Thu, Nov 17, 2016 at 01:19:28PM +0900, Ted Lemon wrote: > The reason I ask is that the document proposes /not/ to use DNS to resolve > it, which I think is correct. So it really doesn't sound like a dnsop > issue. It's sounds like an intarea issue, or else keep it in sunset4. Perhaps changing a

Re: [DNSOP] Heads-up - draft about "letting localhost be localhost" in SUNSET4 that really should be in DNSOP

2016-11-16 Thread Ted Lemon
RFC 6303 doesn't help, because locally-served zones are all under .arpa, and hence can have secure delegations. It is analogous to .ONION, yes. On Thu, Nov 17, 2016 at 2:06 PM, Shane Kerr wrote: > Ted, > > Isn't this more-or-less the same as .ONION then? We're searching for a > label-based swit

Re: [DNSOP] Heads-up - draft about "letting localhost be localhost" in SUNSET4 that really should be in DNSOP

2016-11-16 Thread Shane Kerr
Ted, Isn't this more-or-less the same as .ONION then? We're searching for a label-based switch to disable DNS? An alternate interpretation would be that this is something that could be added to RFC 6303, "Locally Served DNS Zones". While that RFC is only about reverse DNS now, one could step back

Re: [DNSOP] Heads-up - draft about "letting localhost be localhost" in SUNSET4 that really should be in DNSOP

2016-11-16 Thread Ted Lemon
The reason I ask is that the document proposes /not/ to use DNS to resolve it, which I think is correct. So it really doesn't sound like a dnsop issue. It's sounds like an intarea issue, or else keep it in sunset4. Additionally, the root zone will respond to queries for localhost with a secure den

Re: [DNSOP] Heads-up - draft about "letting localhost be localhost" in SUNSET4 that really should be in DNSOP

2016-11-16 Thread Dan York
Ted, > On Nov 17, 2016, at 12:46 PM, Ted Lemon wrote: > > Just to play the devil's advocate here, what does this have to do with DNS? >From the abstract: This document updates RFC6761 by requiring that the domain "localhost." and any names falling within ".localhost." resolve to loopb

Re: [DNSOP] Heads-up - draft about "letting localhost be localhost" in SUNSET4 that really should be in DNSOP

2016-11-16 Thread Ted Lemon
Just to play the devil's advocate here, what does this have to do with DNS? On Thu, Nov 17, 2016 at 12:07 PM, Matthew Pounsett wrote: > > > On 17 November 2016 at 12:00, Dan York wrote: >> >> DNSOP, >> >> In SUNSET4 right now, Emily Stark from Google presented a draft from Mike >> West (also Goo

Re: [DNSOP] Call for Adoption: draft-dickinson-dnsop-dns-capture-format

2016-11-16 Thread Ondřej Surý
+1 for adoption, and I will try to actively review more drafts from now again. Not only this one. O. -- Ondřej Surý -- Technical Fellow CZ.NIC, z.s.p.o.-- Laboratoře CZ.NIC Milesovska 5, 130 00 Praha 3, Czech Republic mailto:ondrej.s...@n

Re: [DNSOP] I-D Action: draft-ietf-dnsop-refuse-any-03.txt

2016-11-16 Thread Ólafur Guðmundsson
On Thu, Nov 17, 2016 at 11:48 AM, Ondřej Surý wrote: > Section 7 (nit): s/implimentations/implementations/ > > Applied > Otherwise I have reviewed the document and I believe it's ready to be put > in the oven. > > ~~~ > > There's a small procedural thing - the last name of the draft > appears o

Re: [DNSOP] The DNSOP WG has placed draft-wallstrom-dnsop-dns-delegation-requirements in state "Candidate for WG Adoption"

2016-11-16 Thread Ondřej Surý
Dear all, I reviewed draft-wallstrom-dnsop-dns-delegation and I think it useful as an overview of the current RFC on the subject are. At the same time I think that in some parts it doesn't match the current (or possibly) future operational best practice. One such example is the "@ MX 0 ." that's

Re: [DNSOP] Heads-up - draft about "letting localhost be localhost" in SUNSET4 that really should be in DNSOP

2016-11-16 Thread Matthew Pounsett
On 17 November 2016 at 12:00, Dan York wrote: > DNSOP, > > In SUNSET4 right now, Emily Stark from Google presented a draft from Mike > West (also Google) asking to update the language in RFC 6761 around the > resolution of localhost: > > Draft: https://tools.ietf.org/html/draft-west-let-localhost

[DNSOP] Heads-up - draft about "letting localhost be localhost" in SUNSET4 that really should be in DNSOP

2016-11-16 Thread Dan York
DNSOP, In SUNSET4 right now, Emily Stark from Google presented a draft from Mike West (also Google) asking to update the language in RFC 6761 around the resolution of localhost: Draft: https://tools.ietf.org/html/draft-west-let-localhost-be-localhost-02 Slides: https://www.ietf.org/archive/id

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Mikael Abrahamsson
On Thu, 17 Nov 2016, Ondřej Surý wrote: Mikael, the operation of the root zone and signing of the root zone is in the ICANN/IANA bailiwick. Therefore most of the relevant document to the RZ DNSSEC operations can be found at https://www.iana.org/dnssec/ and the document you are most interested

Re: [DNSOP] The DNSOP WG has placed draft-wallstrom-dnsop-dns-delegation-requirements in state "Candidate for WG Adoption"

2016-11-16 Thread Ondřej Surý
Dear all, I reviewed draft-wallstrom-dnsop-dns-delegation and I think -- Ondřej Surý -- Technical Fellow CZ.NIC, z.s.p.o.-- Laboratoře CZ.NIC Milesovska 5, 130 00 Praha 3, Czech Republic mailto:ondrej.s...@nic.czhttps://nic.cz/ --

Re: [DNSOP] I-D Action: draft-ietf-dnsop-refuse-any-03.txt

2016-11-16 Thread Ondřej Surý
Section 7 (nit): s/implimentations/implementations/ Otherwise I have reviewed the document and I believe it's ready to be put in the oven. ~~~ There's a small procedural thing - the last name of the draft appears on both datatracker.i.o and tools.i.o. I believe it would be better to reupload t

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Ondřej Surý
Mikael, the operation of the root zone and signing of the root zone is in the ICANN/IANA bailiwick. Therefore most of the relevant document to the RZ DNSSEC operations can be found at https://www.iana.org/dnssec/ and the document you are most interested in is here: http://data.iana.org/root-ancho

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Mikael Abrahamsson
On Thu, 17 Nov 2016, Ondřej Surý wrote: Again, you are using unfair arguments. The devices have to cope with that and it doesn't have to be a protocol design. Agreed. It can also be method design. There have been some suggestions in this thread for ways to handle the problem. I have not seen

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Ondřej Surý
- Original Message - > From: "Mikael Abrahamsson" > To: "Ted Lemon" > Cc: "dnsop" > Sent: Thursday, 17 November, 2016 01:44:59 > Subject: Re: [DNSOP] DNSSEC operational issues long term > On Thu, 17 Nov 2016, Ted Lemon wrote: > >> Embedded systems of this sort need to have a managemen

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread George Michaelson
btw this is not in any sense a novel problem. Anyone who owns a Dell, and uses iDrac will be familiar with the "your certificate chain to this console java app is expired" problem. It can be fixed, but it requires effort. And alongside the crypto age-out problem, the dependency on java is increasi

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Paul Wouters
Sent from my iPhone > On Nov 16, 2016, at 22:41, Bob Harold wrote: > >> This is not well thought out, but what jumps to mind is to keep a chain of >> signatures in the root DNS that links from the original KSK up through the >> current KSK (or at least the last 10 years). Perhaps a differen

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Paul Wouters
On Nov 16, 2016, at 22:38, Philip Homburg wrote: >> Did you see my original response? Proposals for automatic DNSSEC trust >> anchor updating *do* exist. > > Is there any document that deals with the situation where a device has > been in a box for 10 years and then has to bootstrap automatical

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Mikael Abrahamsson
On Thu, 17 Nov 2016, Ted Lemon wrote: Embedded systems of this sort need to have a management process so that that can be updated. This is needed for more reasons than DNSSEC. Putting a ten year old device on a network without upgrading the firmware is irresponsible. We have been discussing ze

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Edward Lewis
On 11/17/16, 08:49, "Matthew Pounsett" wrote: >On 17 November 2016 at 06:57, "joel jaeggli" wrote: > >>A decade is well within the service range of all sorts embedded systems. > >Service range, sure.  But back-room storage range? The day before I flew here I took time to unbox a printer my wife bo

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Mark Andrews
In message , Dan York writes: > Mark, > > I agree that a physical solution could be a workable option (and a nice > one), BUT > > On Nov 17, 2016, at 6:46 AM, Mark Andrews > mailto:ma...@isc.org>> wrote: > > Is it that hard to add a sim or sd card reader? This is the solution > the cable indu

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Ondřej Surý
- Original Message - > From: "Dan York" > To: "Mark Andrews" > Cc: "Evan Hunt" , "Bob Harold" , "dnsop" > , "Mikael Abrahamsson" > > Sent: Wednesday, 16 November, 2016 23:28:18 > Subject: Re: [DNSOP] DNSSEC operational issues long term > > On Nov 17, 2016, at 6:46 AM, Mark Andrews < [

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Matthew Pounsett
On 17 November 2016 at 06:57, joel jaeggli wrote: > > A decade is well within the service range of all sorts embedded systems. > Service range, sure. But back-room storage range? I agree it's an unreasonably long time to have something to sit on a shelf, never-used, and then expect it to work

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Matt Larson
> On Nov 16, 2016, at 1:56 AM, Mikael Abrahamsson wrote: > > So if it's manufactured the day before a new key is publically released, when > is the key material it has built in no longer viable to have successful > DNSSEC validation? Since we haven't done a root KSK roll yet, a general answer

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Ondřej Surý
- Original Message - > From: "Emily Shepherd" > To: "Mikael Abrahamsson" > Cc: "dnsop" > Sent: Wednesday, 16 November, 2016 14:26:53 > Subject: Re: [DNSOP] DNSSEC operational issues long term > On Wed, Nov 16, 2016 at 02:18:17PM +0100, Mikael Abrahamsson wrote: >>Ok, so what I see right

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Dan York
Mark, I agree that a physical solution could be a workable option (and a nice one), BUT On Nov 17, 2016, at 6:46 AM, Mark Andrews mailto:ma...@isc.org>> wrote: Is it that hard to add a sim or sd card reader? This is the solution the cable industry uses for its crypto issues but with bigge

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Ted Lemon
Embedded systems of this sort need to have a management process so that that can be updated. This is needed for more reasons than DNSSEC. Putting a ten year old device on a network without upgrading the firmware is irresponsible. On Nov 17, 2016 06:57, "joel jaeggli" wrote: > On 11/16/16 10:44 P

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread joel jaeggli
On 11/16/16 10:44 PM, Wessels, Duane wrote: > >> On Nov 16, 2016, at 10:18 PM, Mikael Abrahamsson wrote: >> >> As a whole, nobody seems to be interested in actually coming up with a >> viable solution that actually fixes peoples problems. Everybody's just >> punting the problem elsewhere or wav

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Mark Andrews
There is also the physical solution. Have removable storage for the key and update the key using this externally when reqired. Nano sims or micro sd card would be a good form factor for this. Pick a standard file name and you just have them sitting on the shelves in stores with the key date pri

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Evan Hunt
On Wed, Nov 16, 2016 at 08:41:03AM -0500, Bob Harold wrote: > > Do you have a suggestion for a solution? > > > This is not well thought out, but what jumps to mind is to keep a chain of > signatures in the root DNS that links from the original KSK up through the > current KSK (or at least the last

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Tony Finch
Steve Crocker wrote: > I recall a discussion several years about having a site that > would have > all of the keys accumulated over time. A query to it would return the > current key. It's roughly analogous to using a root hints file > to find a > current root server and from that the full set

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Steve Crocker
I recall a discussion several years about having a site that would have all of the keys accumulated over time. A query to it would return the current key. It's roughly analogous to using a root hints file to find a current root server and from that the full set of current servers. This wouldn

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread william manning
Johan Ihren and I and Olaf had a competing ID that delt with shelf life and embedded devices w/o an easy way to update key info. RFC 5011 won out since shelf life and embedded devices were considered edge cases. /Wm On Wednesday, 16 November 2016, Tony Finch wrote: > Wessels, Duane > wrote: >

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Tony Finch
Wessels, Duane wrote: > > I don't think its possible to have a solution that works for devices on > the shelf for an arbitrarily long time. You posed the problem as 10 > years, which I think is an unrealistically long time. > > You could probably have a useful discussion about what is an appropri

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Bob Harold
Looks like someone else thought of it already: https://tools.ietf.org/html/draft-wijngaards-dnsext-trust-history-03 Thanks to Jaap for that info. Someone will probably point out that using keys for a long time increases the chances that someone can break them, But in this case I think it is

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Mikael Abrahamsson
On Wed, 16 Nov 2016, Bob Harold wrote: This is not well thought out, but what jumps to mind is to keep a chain of signatures in the root DNS that links from the original KSK up through the current KSK (or at least the last 10 years). Perhaps a different record type, so it is only sent if aske

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Jaap Akkerhuis
Philip Homburg writes: > >Did you see my original response? Proposals for automatic DNSSEC trust > >anchor updating *do* exist. > > Is there any document that deals with the situation where a device has > been in a box for 10 years and then has to bootstrap automatically? > > I'm not awa

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Wessels, Duane
> On Nov 16, 2016, at 10:18 PM, Mikael Abrahamsson wrote: > > As a whole, nobody seems to be interested in actually coming up with a viable > solution that actually fixes peoples problems. Everybody's just punting the > problem elsewhere or waving their hands and says "not our problem". I don

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Bob Harold
On Wed, Nov 16, 2016 at 8:30 AM, Dan York wrote: > > On Nov 16, 2016, at 10:18 PM, Mikael Abrahamsson wrote: > > As a whole, nobody seems to be interested in actually coming up with a > viable solution that actually fixes peoples problems. Everybody's just > punting the problem elsewhere or wavi

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Philip Homburg
>Did you see my original response? Proposals for automatic DNSSEC trust >anchor updating *do* exist. Is there any document that deals with the situation where a device has been in a box for 10 years and then has to bootstrap automatically? I'm not aware of any. But maybe there is. Note that by a

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Dan York
On Nov 16, 2016, at 10:18 PM, Mikael Abrahamsson mailto:swm...@swm.pp.se>> wrote: As a whole, nobody seems to be interested in actually coming up with a viable solution that actually fixes peoples problems. Everybody's just punting the problem elsewhere or waving their hands and says "not our

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Emily Shepherd
On Wed, Nov 16, 2016 at 02:18:17PM +0100, Mikael Abrahamsson wrote: Ok, so what I see right now is DNSSEC punting the problem somewhere else. NTP is punting it somewhere else. TLS is punting it somehere else. I don't think this is what people are saying. The issue of trust anchor updates is o

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Mikael Abrahamsson
On Wed, 16 Nov 2016, Philip Homburg wrote: Recently, there was some discussion in homenet related to this topic, in particular how does a device without battery backed RTC obtain the current time. I think that ideally this should be discussed in a security related working group. Because a lo

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Philip Homburg
>Now after 10 years after plugging the first one in, I take the second one >off the shelf and plug it in. It will now not work because there has been >a root zone key rollover. I am told this is by design. This makes me a sad >panda. > >We have a bootstrapping problem. My device has no way to kn

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Tony Finch
Ted Lemon wrote: > Why would you put a device on the shelf for ten years? The failure occurs if a device is on the shelf for the wrong 6 months (second half of 2017) and this is a completely reasonable length of time to hold stock. > This is certainly a known issue that has been talked about at

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Emily Shepherd
On Wed, Nov 16, 2016 at 10:56:35AM +0100, Mikael Abrahamsson wrote: So if it's manufactured the day before a new key is publically released, when is the key material it has built in no longer viable to have successful DNSSEC validation? The new KSK was generated at the end of October this year

Re: [DNSOP] IPR Disclosure Ray Bellis' Statement about IPR related to draft-dickinson-dnsop-dns-capture-format belonging to Nominet UK

2016-11-16 Thread Jim Reid
> On 16 Nov 2016, at 10:24, Jerry Lundström wrote: > > How does this affect if I want to build an implementation? What are the chances that the patent holder will be litigous? Do you (or your employer) feel lucky? :-) Personally, I wouldn't risk implementing something that has a patent or IPR

Re: [DNSOP] IPR Disclosure Ray Bellis' Statement about IPR related to draft-dickinson-dnsop-dns-capture-format belonging to Nominet UK

2016-11-16 Thread Jerry Lundström
Hi all, How does this affect if I want to build an implementation? Cheers, Jerry On 11/15/16 01:48, IETF Secretariat wrote: > Dear Jim Hague, John Dickinson, Sara Dickinson, Terry Manderson, John Bond: > > > An IPR disclosure that pertains to your Internet-Draft entitled "C-DNS: A > DNS Packet

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Jim Reid
> On 16 Nov 2016, at 10:12, Jaap Akkerhuis wrote: > > Mikael Abrahamsson writes: > >> So if it's manufactured the day before a new key is publically released, >> when is the key material it has built in no longer viable to have >> successful DNSSEC validation? > > A properly designed device

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Jaap Akkerhuis
Mikael Abrahamsson writes: > So if it's manufactured the day before a new key is publically released, > when is the key material it has built in no longer viable to have > successful DNSSEC validation? A properly designed device will discover that its preconfgured trust anchor differs from

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Ask Bjørn Hansen
> On Nov 16, 2016, at 18:56, Mikael Abrahamsson wrote: > > So if it's manufactured the day before a new key is publically released, when > is the key material it has built in no longer viable to have successful > DNSSEC validation? Do the first (only) bootstrap without validation if validatio

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread George Michaelson
On the current timeline, October 11 -> January 11 so three months. Vendors of sealed units who ship equipment from before October 11 with delivery held up for three months at the docks by a strike, or people who put the sealed unit into a long-delay orbit to Mars to be turned on by Matt Damon on

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Mikael Abrahamsson
On Wed, 16 Nov 2016, George Michaelson wrote: I feel this is a corner case. My experience with 'mom' whitegoods is that they age out much faster than the 10+ year case. Shops do not hold electronic goods for sale that long, if its old but unboxed, you have taken yourself into a dark alley deli

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread George Michaelson
I feel this is a corner case. My experience with 'mom' whitegoods is that they age out much faster than the 10+ year case. Shops do not hold electronic goods for sale that long, if its old but unboxed, you have taken yourself into a dark alley deliberately. If you genuinely were supporting your mum

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Ted Lemon
Or your device needs an RTC... On Wed, Nov 16, 2016 at 6:30 PM, Mikael Abrahamsson wrote: > On Wed, 16 Nov 2016, Ted Lemon wrote: > >> Why would you put a device on the shelf for ten years? Is this a real >> scenario? This is certainly a known issue that has been talked about at >> length--the

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Mikael Abrahamsson
On Wed, 16 Nov 2016, Ted Lemon wrote: Why would you put a device on the shelf for ten years? Is this a real scenario? This is certainly a known issue that has been talked about at length--the conclusion when it was discussed is that there is nothing we can do about it, and it's relatively un

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread George Michaelson
I echo what Ted said. If its 'not well known' its a property of the RFC ecology in general, that things we did know, and did document, wind up buried in the RFC free text search. >From memory, the specific issue was discussed across at least two rounds of IETF, as a thing. I seem to recall Mike St

Re: [DNSOP] I-D Action: draft-ietf-dnsop-nsec-aggressiveuse-06.txt

2016-11-16 Thread Paul Wouters
> On Nov 16, 2016, at 15:09, Ondřej Surý wrote: > > Hi, > > I read the document and I believe that the document goes to far > to recommend the vendors how to implement the knobs in their > software here: > > It is recommended that resolvers that implement Aggressive Negative > Caching prov

Re: [DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Ted Lemon
Why would you put a device on the shelf for ten years? Is this a real scenario? This is certainly a known issue that has been talked about at length--the conclusion when it was discussed is that there is nothing we can do about it, and it's relatively unlikely, and manually fixable. On Wed, No

Re: [DNSOP] I-D Action: draft-ietf-dnsop-nsec-aggressiveuse-06.txt

2016-11-16 Thread Matthijs Mekking
Hi Ondřej, On 16-11-16 07:09, Ondřej Surý wrote: Hi, I read the document and I believe that the document goes to far to recommend the vendors how to implement the knobs in their software here: It is recommended that resolvers that implement Aggressive Negative Caching provide a configura

[DNSOP] DNSSEC operational issues long term

2016-11-16 Thread Mikael Abrahamsson
Hi, today I have discovered something after talking to some people that know more than I do. Example: I go to the store and buy two DNSSEC enabled devices that rely on DNSSEC working for them to work. I put one device on the network immediately and the other one on the shelf. The one I p