To go along with this proposal, maybe we can adapt the approach from RFC3514 
for DNS?
We could send a new RRTYPE with a bitfield value, giving a more granular level 
of detail than that in RFC3514.  RFC3514 was constrained to only use one bit 
because IP headers are small; with DNS, we don't have the same level of 
constraint.

I would suggest that responses for all new GTLDs have the bit for "evil" set to 
1, unless responses are sent via RFC1149, in which case they'd merit a default 
of 0.

On Jul 9, 2019, at 05:09, Vittorio Bertola 
<vittorio.bertola=40open-xchange....@dmarc.ietf.org 
<mailto:vittorio.bertola=40open-xchange....@dmarc.ietf.org>> wrote:
> 
>> Il 9 luglio 2019 00:01 John Bambenek 
>> <jcb=40bambenekconsulting....@dmarc.ietf.org 
>> <mailto:jcb=40bambenekconsulting....@dmarc.ietf.org>> ha scritto:
>> 
>> 
>> Like I said, I’m ok with someone lying to me. Its easy to detect
>> and easy to deal with. For instance, in DNS a mailserver could 
>> query these records, see phone number is set to 0000000000 and 
>> then just reject email from said domain. With existing whois that 
>> was never possible, due to rate limiting.
> 
> At first sight, your proposal looked ok - if someone wants to publish their 
> information voluntarily, why not? But then I read this and now I am seriously 
> concerned: it looks like this is explicitly being designed to penalize 
> registrants that care about their privacy and choose not to publish 
> information about themselves (or publish fake information, which used to be 
> the only practical way in the old mandatory Whois times).


-david waitzman
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to