Re: [DNSOP] New Version Notification for draft-muks-dnsop-dnssec-sha3-00.txt

2017-04-06 Thread Jelte Jansen
On 2017-04-05 16:50, Mukund Sivaraman wrote: >> Also, it is weird that a draft that is about having a fallback if a hash >> algorithm becomes weakened uses the RSASSA-PKCS1-v1_5 signature scheme, >> given that PKCS1 1.5 is already known to be weakened. > > It was to allow simple addition of the

Re: [DNSOP] Asking TLD's to perform checks.

2015-11-12 Thread Jelte Jansen
On 11/12/2015 01:30 AM, Tim Wicinski wrote: > > (as chair) > > I was the one who told Mark I liked the document but we needed to do > less badgering of TLDs (my words, not his) and more on giving them > advice on the best practices. > +1 I'd like to add that they may be badgered just as hard

Re: [DNSOP] Optimization in draft-ietf-dnsop-qname-minimisation

2015-01-06 Thread Jelte Jansen
On 01/05/2015 05:55 PM, Bob Harold wrote: Does anyone have actual data on how common it is, so we can make an informed decision? I would expect www.something... to be in the same zone as something... in most cases, so I think it is actually very common to have more than one level on the

Re: [DNSOP] Extended CNAME (ENAME)

2014-05-20 Thread Jelte Jansen
On 05/20/2014 12:12 AM, David C Lawrence wrote: Looking at a random high-traffic DNS server on our network, I see practically no use at all of _http._tcp SRV requests. Over 6 days of logs on this machine, they are just over 0.7% of all requests. (Yes, that decimal point is right.)

Re: [DNSOP] Extended CNAME (ENAME)

2014-05-19 Thread Jelte Jansen
On 05/18/2014 07:58 AM, Patrik Fältström wrote: It might be worth actively pushing the CDN folks to go the SRV direction. Even if ENAME were a good idea, which is not clear to me, it's an idea that would require significant infrastructure changes, whereas SRV records appear to be

Re: [DNSOP] call to work on edns-client-subnet

2014-05-16 Thread Jelte Jansen
On 05/16/2014 02:18 PM, Andrew Sullivan wrote: First, if resolvers have expectations about consistency of zones and so on, then they're broken. The DNS has only ever been loosely coherent. You're simply _not allowed_ to make that assumption from any point in the network except inside the

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-04-01 Thread Jelte Jansen
On 04/01/2014 03:39 PM, Phillip Hallam-Baker wrote: Yes, I agree, but you are proposing a different DNSSEC model to the one they believe in. The DNS world has put all their eggs into the DNSSEC from Authoritative to Stub client model. They only view the Authoritative to Resolver as a

Re: [DNSOP] my dnse vision

2014-03-05 Thread Jelte Jansen
On 03/05/2014 01:27 PM, Francis Dupont wrote: Personally I don't like the idea of DNS encryption but because I don't want to give a reason to ISPs to filter port 53. This is something I worry about too. If we consider the resolver itself out of scope, and only protect the wire, all the more

Re: [DNSOP] some random dnse-triggered thoughts

2014-03-05 Thread Jelte Jansen
On 03/05/2014 02:40 PM, João Damas wrote: perhaps there is a need to separate the problem into tractable chunks. For the part of the problem about authenticating the recursive resolver (the fake 8.8.8.8 problem) we probably a different solution than for the metadata snooping problem (who is

Re: [DNSOP] additional special names Fwd: I-D Action: draft-chapin-additional-reserved-tlds-00.txt

2014-03-03 Thread Jelte Jansen
On 03/03/2014 09:25 AM, Norbert Bollow wrote: Warren makes a strong argument in favor of .alt I think. Another related aspect is that if something like onion.notreallydns.org is used, with notreallydns.org registered for the specific purpose of providing a home for one or more non-resolving

Re: [DNSOP] additional special names Fwd: I-D Action: draft-chapin-additional-reserved-tlds-00.txt

2014-03-03 Thread Jelte Jansen
On 03/03/2014 01:43 PM, Ted Lemon wrote: On Mar 3, 2014, at 1:32 PM, Tony Finch d...@dotat.at wrote: As well as Joe's AS112 argument there is also the question of DNSSEC validation - but perhaps we don't want non-DNS names to make any kind of sense in this respect... cf. .local Indeed, it

Re: [DNSOP] additional special names Fwd: I-D Action: draft-chapin-additional-reserved-tlds-00.txt

2014-03-03 Thread Jelte Jansen
On 03/03/2014 02:03 PM, Andrew Sullivan wrote: On Mon, Mar 03, 2014 at 01:56:20PM +, Jelte Jansen wrote: I'd think that a domain name is only a domain name when whatever protocol it is defined in defines it as a domain name (or whatever undefined protocol uses it in actual dns resolution

Re: [DNSOP] Rough Draft of minutes from IETF88

2013-11-12 Thread Jelte Jansen
On 11/12/2013 09:20 AM, Tim Wicinski wrote: I've uploaded the minutes, with an initial editing pass. There are located here: http://www.ietf.org/proceedings/88/minutes/minutes-88-dnsop I wasn't there, and wasn't able to follow remotely this time, but I assume that Evan Hunt: csync is

Re: [DNSOP] NSCP Pros and Cons: draft-dickinson-dnsop-nameserver-control

2011-02-03 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 01/26/2011 06:58 PM, Stephen Morris wrote: To restart the dormant discussion on NSCP... keeping it on life-support :) On 13 Dec 2010, at 08:51, Jelte Jansen wrote: It has been said (perhaps by you) that perhaps we ought to think about

Re: [DNSOP] NSCP Pros and Cons: draft-dickinson-dnsop-nameserver-control

2010-12-13 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/07/2010 12:36 PM, Stephen Morris wrote: At the WG meeting in Beijing, the somewhat inconclusive discussion on a nameserver control protocol was ended by the suggestion that the authors of the two drafts discussed should write a short piece

Re: [DNSOP] Comments on RFC4641bis

2010-11-08 Thread Jelte Jansen
On 11/09/2010 02:33 AM, Roy Arends wrote: 4.2.1 KSK Compromise (2nd paragraph) A compromised KSK used by an attacker can also sign data in the zone other than the key set. An attacker does not need to follow the definitions of KSK vs ZSK. I wonder how different implementations handle this

[DNSOP] FYI: New Non-WG Mailing List: nscp -- DNS Nameserver control/configuration protocol discussion list

2010-09-17 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, forwarding this announcement here, since this list contains a lot of people likely to be interested in the effort; if you also follow ietf-announce, my apologies for the double message. There is now a mailinglist for nameserver control protocol

[DNSOP] grave erroneous statement in draft 4641bis-03

2010-07-27 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 the introduction suggests that the root has not been signed yet. Jelte -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

[DNSOP] my jabber question

2010-03-24 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ok, so audio lag + jabber lag + trying to get a question into one line for relaying does not a easygoing discussion make :) My question was this; in the presentation I saw a list of issues that are considered resolved and a list of issues that are

Re: [DNSOP] what i said at the mic (re: dnssec-key-timing)

2009-11-17 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Johan Ihren wrote: I don't remember exactly what I said, but what I meant was not that double signature is sufficient to accomplish an algorithm rollover, only that it was needed as part of one. So I think you and I agree hee. I think so too,

[DNSOP] nameserver control protocol

2009-11-10 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, i had asked for a small AOB slot at the dnsop meeting, but only just before, so either it was forgotten or simply skipped because we were already late, so i'll just misuse the mailing list instead. My apologies :) A while back, a requirements

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Jelte Jansen
Ralf Weber wrote: No redirection on SERVFAIL seems to be a strange recommendation. Wouldn't this be a very good reason to provide a diagnostics page, especially if there's been a DNSSEC validation failure? This sounds like an excellent idea to help DNSSEC adoption and is something that should

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Jelte Jansen
Florian Weimer wrote: * Jelte Jansen: Ralf Weber wrote: No redirection on SERVFAIL seems to be a strange recommendation. Wouldn't this be a very good reason to provide a diagnostics page, especially if there's been a DNSSEC validation failure? This sounds like an excellent idea to help

Re: [DNSOP] Key sizes was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-24 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Paul Hoffman wrote: At 11:32 AM -0400 4/24/09, Paul Wouters wrote: So it seems to me that using 1024 bit RSA keys for ZSK, and 2048 bit keys for KSK, assuming RFC 4641 rollover periods, are still many orders of magnitude safe for our use within

Re: [DNSOP] suggestion for 4641bis: key algorithm rollover section

2008-09-06 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mark Andrews wrote: What I'm getting from this is that the keyset at the apex must (at least) be signed by each algorithm in the DS referral, and every rrset in the zone must be signed by each algorithm in the apex keyset. which is

Re: [DNSOP] suggestion for 4641bis: key algorithm rollover section

2008-09-05 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Resending my message because of the ietf mailing list problems - Original Message Subject: Re: [DNSOP] suggestion for 4641bis: key algorithm rollover section Date: Fri, 05 Sep 2008 10:32:35 +0200 From: Jelte Jansen [EMAIL PROTECTED

Re: [DNSOP] suggestion for 4641bis: key algorithm rollover section

2008-09-05 Thread Jelte Jansen
And Mark's reply to my previous message: Original Message Subject: Re: [DNSOP] suggestion for 4641bis: key algorithm rollover section Date: Fri, 05 Sep 2008 18:39:49 +1000 From: Mark Andrews [EMAIL PROTECTED] To: Jelte Jansen [EMAIL PROTECTED] CC: dnsop@ietf.org Mark Andrews

[DNSOP] suggestion for 4641bis: key algorithm rollover section

2008-09-04 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, during some work on DNSKEY maintenance, I think i found a potential operational issue. If we are going to do new work on DNSSEC Operational Practices, I would like to suggest to add a text similar to that attached to this message. The issue

Re: [DNSOP] A different question (was Re: Kaminsky on djbdns bugs (fwd))

2008-08-20 Thread Jelte Jansen
Jaap Akkerhuis wrote: On Tue, Aug 19, 2008 at 10:35:54AM -0700, David Conrad wrote: it in their products or services. Peter Koch did provide an interesting data point that warrants further investigation (20-35% of queries having DO bit on seems a bit high to me)

Re: [DNSOP] Public Suffix List

2008-06-11 Thread Jelte Jansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Gervase Markham wrote: Florian Weimer wrote: * Jamie Lokier: Yes. I think Ebay suffers from these issues. Indeed. This is one of the reasons that livejournal switched from www.livejournal.com/name to name.livejournal.com. It prevented rogue