Re: [DNSOP] Proposal for a new record type: SNI

2017-02-14 Thread Adrien de Croy
presuming that the client will have to look up the hostname of the destination at some stage, and presuming that a passive network attacker may see DNS requests as well as TCP connections, how does this help? Or does this require the use of DNS over TLS. And also there will be leakage of ce

Re: [DNSOP] I-D Action: draft-vixie-dns-rpz-04.txt

2016-12-18 Thread Adrien de Croy
> If the admin's goal is to block access to malicious sites, then they > want to block the traffic, not falsify DNS. If the goal is to warn > users away from bad places, they can publish the list as a filter for > end-system firewalls. That may be your view about how blocking should work, but

Re: [DNSOP] Call for Adoption: draft-song-dns-wireformat-http

2016-07-11 Thread Adrien de Croy
for a web to DNS proxy to decide to send a reply back, it would need to consider it complete? Or are you proposing that the http server would start streaming back the payload as it received the (possibly out of order) replies? Maybe instead should use WebSockets -- Original Message --

Re: [DNSOP] Call for Adoption: draft-song-dns-wireformat-http

2016-07-11 Thread Adrien de Croy
I guess presuming that the back end will use TCP for DNS you could do this, but I would imagine that's not always the case? As an on-the-wire format goes there are worse ones, so if DNS over TCP is used, which supports this, then I guess some mention in this proposal could be useful to get p

Re: [DNSOP] Call for Adoption: draft-song-dns-wireformat-http

2016-07-11 Thread Adrien de Croy
One thing I think has always been bugging me about DNS over HTTP is the appalling performance we will likely see in a lot of cases. Even small latencies in normal DNS lookups cause major impact on page load times on complex pages with resources from many servers, and adding HTTP overhead to

Re: [DNSOP] Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt

2016-05-07 Thread Adrien de Croy
, I really don't feel like making them again here. I'm sure members of this list are already sick of me posting about this. -- Original Message -- From: "Adrien de Croy" To: "Stephane Bortzmeyer" Cc: "Shane Kerr" ; "dnsop@ietf.org"

Re: [DNSOP] Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt

2016-05-07 Thread Adrien de Croy
-- Original Message -- From: "Stephane Bortzmeyer" To: "Adrien de Croy" Cc: "Shane Kerr" ; "dnsop@ietf.org" Sent: 7/05/2016 10:13:37 p.m. Subject: Re: [DNSOP] Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt

Re: [DNSOP] New Version Notification for draft-song-dns-wireformat-http-03.txt

2016-05-07 Thread Adrien de Croy
-- Original Message -- From: "Stephane Bortzmeyer" To: "Adrien de Croy" Cc: "dnsop@ietf.org" ; "Paul Hoffman" Sent: 7/05/2016 10:10:35 p.m. Subject: Re: [DNSOP] New Version Notification for draft-song-dns-wireformat-http-03.txt On Fri, M

Re: [DNSOP] Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt

2016-05-06 Thread Adrien de Croy
age -- From: "Stephane Bortzmeyer" To: "Adrien de Croy" Cc: "Shane Kerr" ; "dnsop@ietf.org" Sent: 7/05/2016 7:40:17 a.m. Subject: Re: [DNSOP] Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt On Fri, May 06, 2016 at 07:14:29

Re: [DNSOP] Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt

2016-05-06 Thread Adrien de Croy
I think you and many others will continue to disagree on that point. try using https for OCSP or CRL checking and see how you go. -- Original Message -- From: "Stephane Bortzmeyer" To: "Adrien de Croy" Cc: "Shane Kerr" ; "dnsop@ietf.org"

Re: [DNSOP] New Version Notification for draft-song-dns-wireformat-http-03.txt

2016-05-06 Thread Adrien de Croy
-- Original Message -- From: "Paul Hoffman" To: "Adrien de Croy" Cc: "dnsop@ietf.org" Sent: 7/05/2016 7:24:46 a.m. Subject: Re: [DNSOP] New Version Notification for draft-song-dns-wireformat-http-03.txt On 6 May 2016, at 12:14, Adrien de Croy wro

Re: [DNSOP] Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt

2016-05-06 Thread Adrien de Croy
From: "Stephane Bortzmeyer" To: "Adrien de Croy" Cc: "Shane Kerr" ; "dnsop@ietf.org" Sent: 6/05/2016 8:59:45 p.m. Subject: Re: Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt On Wed, May 04, 2016 at 10:13:09PM +, Adrien d

Re: [DNSOP] Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt

2016-05-04 Thread Adrien de Croy
yeah, my email client wasn't quoting properly due to something about the original message I was replying to... so I had to cut n paste. sorry bout that! -- Original Message -- From: "Mark Andrews" To: "Adrien de Croy" Cc: "Shane Kerr" ; "dn

Re: [DNSOP] Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt

2016-05-04 Thread Adrien de Croy
r. Sure, DNS servers should be hardened, but they may not realise they can't trust requests from the gateway. Adrien -- Original Message -- From: "Shane Kerr" To: "Adrien de Croy" Cc: "dnsop@ietf.org" Sent: 5/05/2016 2:18:24 a.m. Subject: Re:

Re: [DNSOP] Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt

2016-05-02 Thread Adrien de Croy
n/dns-wireformat definition, or some other new meta format, or just base64 encode the message, and include both parts as form data (application/x-www-form-encoded). The same applies to unknown response headers (may be stripped or blocked) Regards Adrien -- Original Message -- From: "

Re: [DNSOP] Fwd: New Version Notification for draft-song-dns-wireformat-http-03.txt

2016-05-02 Thread Adrien de Croy
Hi Davey Some general comments: I don't think you can claim that https provides data integrity or privacy any more, since MitM proxies are abundant. I think some thought should be given to how a DNS stub might deal with a captive portal or http proxy authentication. I think also that any

Re: [DNSOP] [rfc-edi...@rfc-editor.org: RFC 7788 on Home Networking Control Protocol]

2016-04-23 Thread Adrien de Croy
sounds like there could be trouble with that https://icannwiki.com/.home based on the applicants currently investing in acquiring that TLD. on another note, TOR is proving its worth as a troll aggregator. Since blocking TOR exit nodes from posting to our forums, our forum spam problem has d

Re: [DNSOP] AAAA4Free

2016-04-11 Thread Adrien de Croy
sure the whole point of doing anything is to try and avoid mutliple lookup hacks, like the existing concurrent A and lookups. What about allowing the responses in an A query? Even if only in additional. Adrien -- Original Message -- From: "Rob Austein" To: "dnsop@ietf

Re: [DNSOP] AAAA4Free

2016-04-11 Thread Adrien de Croy
I think this approach would really hamper adoption. If we simply added a new QTYPE which permitted a server to respond with all matching A and records then that would solve a lot of problems. "fixing" multiple queries per message by an extension option may fail on every DNS inspection f

Re: [DNSOP] hostnames vs domain names vs RFC1034/1035 vs RFC2818 vs Wikipedia etc

2016-04-07 Thread Adrien de Croy
library one that is used purely to resolve addresses (e.g. A and records)? Adrien -- Original Message ------ From: "Ted Lemon" To: "Adrien de Croy" Cc: "dnsop@ietf.org" Sent: 8/04/2016 2:35:40 p.m. Subject: Re: [DNSOP] hostnames vs domain names vs RFC1034/10

Re: [DNSOP] hostnames vs domain names vs RFC1034/1035 vs RFC2818 vs Wikipedia etc

2016-04-07 Thread Adrien de Croy
ience! -- Original Message -- From: "Ted Lemon" To: "Adrien de Croy" Cc: "dnsop@ietf.org" Sent: 8/04/2016 2:31:13 p.m. Subject: Re: [DNSOP] hostnames vs domain names vs RFC1034/1035 vs RFC2818 vs Wikipedia etc The document I mentioned updates RFC 1034. T

Re: [DNSOP] hostnames vs domain names vs RFC1034/1035 vs RFC2818 vs Wikipedia etc

2016-04-07 Thread Adrien de Croy
Lemon" To: "Adrien de Croy" Cc: "dnsop@ietf.org" Sent: 8/04/2016 2:24:33 p.m. Subject: Re: [DNSOP] hostnames vs domain names vs RFC1034/1035 vs RFC2818 vs Wikipedia etc Have you read the rest of the documents? E.g.,: https://tools.ietf.org/html/rfc2181#section-11 On T

Re: [DNSOP] hostnames vs domain names vs RFC1034/1035 vs RFC2818 vs Wikipedia etc

2016-04-07 Thread Adrien de Croy
-- Original Message -- From: "Ted Lemon" ::= | " " ::= | "." ::= [ [ ] ] ::= |::= | "-" ::= | ::= any one of the 52 alphabetic characters A through Z in upper case and a through z in lower case ::= any one of the ten digits 0 through 9 if this was a BNF prod

Re: [DNSOP] hostnames vs domain names vs RFC1034/1035 vs RFC2818 vs Wikipedia etc

2016-04-07 Thread Adrien de Croy
-- Original Message -- From: "Ted Lemon" To: "Adrien de Croy" Cc: "dnsop@ietf.org" Sent: 8/04/2016 2:03:17 p.m. Subject: Re: [DNSOP] hostnames vs domain names vs RFC1034/1035 vs RFC2818 vs Wikipedia etc No, you're confusing hostnames and do

[DNSOP] hostnames vs domain names vs RFC1034/1035 vs RFC2818 vs Wikipedia etc

2016-04-07 Thread Adrien de Croy
Hi all I guess you're all aware of the issue of what constitutes a valid domain name, what characters are valid in labels etc. So forgive me for what must be me re-raising an ancient maybe long-thought-put-to-rest issue... but there's a serious problem out there. RFC1034 secion 3.5 which is

Re: [DNSOP] Alternative Special-Use TLD problem statement draft

2016-04-07 Thread Adrien de Croy
-- Original Message -- From: "Stephane Bortzmeyer" To: "Adrien de Croy" Cc: "Philip Homburg" ; "dnsop@ietf.org" ; "Ted Lemon" Sent: 8/04/2016 3:06:43 a.m. Subject: Re: [DNSOP] Alternative Special-Use TLD problem statement draft

Re: [DNSOP] Alternative Special-Use TLD problem statement draft

2016-04-07 Thread Adrien de Croy
.local is another excellent example of where we ignore the specs. If we stopped sending lookups for .local names via DNS (not multicast DNS), a lot of things would break. Regards Adrien -- Original Message -- From: "Patrik Fältström" To: "Adrien de Croy"

Re: [DNSOP] Alternative Special-Use TLD problem statement draft

2016-04-07 Thread Adrien de Croy
-- Original Message -- From: "John Levine" To: "dnsop@ietf.org" Cc: "adr...@qbik.com" Sent: 8/04/2016 9:26:51 a.m. Subject: Re: [DNSOP] Alternative Special-Use TLD problem statement draft Just because TOR asks for .onion doesn't mean it should be given it. The TOR project has been

Re: [DNSOP] Alternative Special-Use TLD problem statement draft

2016-04-07 Thread Adrien de Croy
-- Original Message -- From: "Stephane Bortzmeyer" To: "Adrien de Croy" Cc: "Philip Homburg" ; "dnsop@ietf.org" Sent: 8/04/2016 12:35:32 a.m. Subject: Re: [DNSOP] Alternative Special-Use TLD problem statement draft On Wed, Apr 06, 2016 at

Re: [DNSOP] Alternative Special-Use TLD problem statement draft

2016-04-07 Thread Adrien de Croy
-- Original Message -- From: "David Conrad" To: "Philip Homburg" Cc: "dnsop@ietf.org" Sent: 8/04/2016 12:38:26 a.m. Subject: Re: [DNSOP] Alternative Special-Use TLD problem statement draft Philip, On Apr 7, 2016, at 7:57 AM, Philip Homburg wrote: However, having lived through a p

Re: [DNSOP] Alternative Special-Use TLD problem statement draft

2016-04-07 Thread Adrien de Croy
Hi Stephane don't worry, I didn't take it that way. For me, the concept of perversion and LGBT are entirely independent, and I think people who associate the 2 concepts need to look at their own prejudices. Regards Adrien de Croy -- Original Message -- From: "Step

Re: [DNSOP] Alternative Special-Use TLD problem statement draft

2016-04-06 Thread Adrien de Croy
nly being the part of the tree that is left after you add these other TLDs. Seems a bit circular to me. So, we're left with the 1 single TLD that is the problem and that's .onion, and regardless of the problems that is demonstrating, we wish to roll out more of these. Adrien

Re: [DNSOP] Alternative Special-Use TLD problem statement draft

2016-04-06 Thread Adrien de Croy
-- Original Message -- From: "Stephane Bortzmeyer" To: "Ted Lemon" Cc: "dnsop@ietf.org" Sent: 7/04/2016 4:53:31 a.m. Subject: Re: [DNSOP] Alternative Special-Use TLD problem statement draft 4.1.2. Does Every Domain Name Have The Same Meaning Everywhere? Your claim is that toda

Re: [DNSOP] Alternative Special-Use TLD problem statement draft

2016-04-06 Thread Adrien de Croy
-- Original Message -- From: "Philip Homburg" To: "dnsop@ietf.org" Sent: 7/04/2016 3:05:26 a.m. Subject: Re: [DNSOP] Alternative Special-Use TLD problem statement draft In your letter dated Wed, 6 Apr 2016 09:21:31 -0300 you wrote: Strong dissensus here. The problem is there is no s

Re: [DNSOP] Alternative Special-Use TLD problem statement draft

2016-04-06 Thread Adrien de Croy
Why do DNS programmers need to care about these "special" names in the normal domain name space? The question is what protocol to use. I think we still need to answer the question about whether DNS namespace should be polluted for non-DNS resolution. -- Original Message -- From: "

Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01

2016-04-03 Thread Adrien de Croy
-- Original Message -- From: "Mark Andrews" To: "Adrien de Croy" Cc: "Robert Edmonds" ; "dnsop@ietf.org" ; "Paul Hoffman" Sent: 3/04/2016 4:47:20 p.m. Subject: Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01 In message

Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01

2016-04-02 Thread Adrien de Croy
s any time soon? Adrien -- Original Message -- From: "Robert Edmonds" To: "Adrien de Croy" Cc: "Paul Hoffman" ; "dnsop@ietf.org" Sent: 3/04/2016 8:11:37 a.m. Subject: Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01 You are complaining about t

Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01

2016-03-31 Thread Adrien de Croy
sorry, that second reference should have also been RFC 2826 neither the word "Maintaining" nor "architectural" are present in 2826 according to the search function in Chrome. Adrien -- Original Message ------ From: "Adrien de Croy" To: "Paul Hoffma

Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01

2016-03-31 Thread Adrien de Croy
-- Original Message -- From: "Paul Hoffman" To: "dnsop@ietf.org" Cc: "adr...@qbik.com" Sent: 1/04/2016 12:31:53 a.m. Subject: Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01 On 30 Mar 2016, at 18:49, John Levine wrote: Isn't it a little late to be refighting this argument?

Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01

2016-03-30 Thread Adrien de Croy
I don't know the answer to that. If the leakage is still a significant problem, maybe they should be looking at alternatives anyway. Adrien -- Original Message -- From: "John Levine" To: "dnsop@ietf.org" Cc: "adr...@qbik.com" Sent: 31/03/2016 10:49:52 a.m. Subject: Re: [DNSOP] dr

Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01

2016-03-30 Thread Adrien de Croy
g a clear need and lack of alternative solution to the problem. Regards Adrien -- Original Message -- From: "Andrew Sullivan" To: "dnsop@ietf.org" Sent: 31/03/2016 6:38:55 a.m. Subject: Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01 On Wed, Mar 30, 2016

Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01

2016-03-29 Thread Adrien de Croy
7;d still expect it to be in google somewhere. Is this the justification for having an extensible registry of special names? Cheers Adrien -- Original Message -- From: "John R Levine" To: "Adrien de Croy" Cc: "dnsop@ietf.org" Sent: 30/03/2016 3

Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01

2016-03-29 Thread Adrien de Croy
don't leak into the DNS. The only thing that anyone's asking DNS developers to do is to fail .onion requests rather than forwarding them along. That's the problem. Creating new requirements for DNS developers to do anything at all is a huge problem. It's not a requirement. It's a request.

Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01

2016-03-29 Thread Adrien de Croy
and secondly to encourage developers to stub it out in DNS resolvers so that .onion requests don't leak into the DNS. The only thing that anyone's asking DNS developers to do is to fail .onion requests rather than forwarding them along. That's the problem. Creating new requirements for DNS d

Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01

2016-03-29 Thread Adrien de Croy
-- Original Message -- From: "John Levine" To: "dnsop@ietf.org" Cc: "adr...@qbik.com" Sent: 30/03/2016 2:55:22 p.m. Subject: Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01 Surely .onion could have been handled in the application, without pushing it down to the resolution la

Re: [DNSOP] draft-adpkja-dnsop-special-names-problem-01

2016-03-29 Thread Adrien de Croy
lvers who ignore any new special use names. I'm sure you all know that, but it seems foolhardy to negotiate sensitive information over .onion resolution when that is highly likely to leak. Surely .onion could have been handled in the application, without pushing it down to the res

Re: [DNSOP] Public Suffix List

2008-06-10 Thread Adrien de Croy
not need to contact their >> customers for this: it's a .co.uk policy. >> > > OK. Then we are basically back to Yngve's suggestion. But this does > require universal take-up for universal support - and that, as someone > else has pointed out, makes it (in my opini