Re: [DNSOP] draft-hardaker-dnsop-private-namespace-options

2020-11-04 Thread Andrew McConachie
On 4 Nov 2020, at 2:11, Wes Hardaker wrote: "Andrew McConachie" writes: I’m having a hard time understanding the two proposed deployments in this document. It's not as clean as I'd like, certainly. I was pushing up against the draft submission deadlines and didn't get all the wording

Re: [DNSOP] draft-fujiwara-dnsop-delegation-information-signer

2020-11-04 Thread Bob Harold
If an attacker is spoofing responses, it seems that they could send a different NS and A record, and a new calculated DS hash. So this provides no protection against spoofing? We would need instead (or in addition) an RRSIG record to actually protect this. An example would help. -- Bob Harold

Re: [DNSOP] draft-hardaker-dnsop-private-namespace-options

2020-11-04 Thread Wes Hardaker
"Andrew McConachie" writes: > 1. Is a special-use domain per [RFC6761], and does not (and will never) > exist in the GID. > In this document, we refer to this as ".internal" for discussion purposes > only following > conventions in [draft-wkumari-dnsop-internal]. > > I read the above

Re: [DNSOP] draft-hardaker-dnsop-private-namespace-options

2020-11-04 Thread Andrew McConachie
On 4 Nov 2020, at 17:47, Wes Hardaker wrote: "Andrew McConachie" writes: 1. Is a special-use domain per [RFC6761], and does not (and will never) exist in the GID. In this document, we refer to this as ".internal" for discussion purposes only following conventions in [draft-wkuma

[DNSOP] draft-bretelle-dnsop-recursive-iprange-location

2020-11-04 Thread Manu Bretelle
Hi all, There is currently no streamlined way for recursive resolver operators to distribute the IP ranges/locations that their server farm may use. It is currently a mixture of csv files shared over email, or web pages with formats that may be unique to each provider and rarely directly parseable

Re: [DNSOP] draft-ietf-dnsop-rfc7816bis: hopefully ready for WG Last Call

2020-11-04 Thread Dave Lawrence
Thanks for the work on this, Stephane, Ralph, and Paul. Could you please clarify explicitly what should happen in the case of encountering CNAMEs? Or DNAMEs? The way I read it, at least for CNAMEs, is that you just keep prepending labels to the ANCESTOR name so encountering the CNAME is in pract

Re: [DNSOP] draft-fujiwara-dnsop-delegation-information-signer

2020-11-04 Thread Mark Andrews
One problem with DiS is that assumes that address records in the additional section *always* come from the delegating zone (see how the hash is created). This is not how DNS works. Address records can, correctly, come from other sources, even when the name is *below* the zone cut. Take a server t

Re: [DNSOP] draft-fujiwara-dnsop-delegation-information-signer

2020-11-04 Thread fujiwara
> From: Bob Harold > If an attacker is spoofing responses, it seems that they could send a > different NS and A record, and a new calculated DS hash. So this provides > no protection against spoofing? > > We would need instead (or in addition) an RRSIG record to actually protect > this. Thanks

Re: [DNSOP] draft-fujiwara-dnsop-delegation-information-signer

2020-11-04 Thread fujiwara
> From: Mark Andrews > One problem with DiS is that assumes that address records in the additional > section *always* come from the delegating zone (see how the hash is created). > This is not how DNS works. Address records can, correctly, come from other > sources, even when the name is *below*

Re: [DNSOP] draft-fujiwara-dnsop-delegation-information-signer

2020-11-04 Thread Mark Andrews
> On 5 Nov 2020, at 15:49, fujiw...@jprs.co.jp wrote: > >> From: Mark Andrews >> One problem with DiS is that assumes that address records in the additional >> section *always* come from the delegating zone (see how the hash is created). >> This is not how DNS works. Address records can, corr