Re: [DNSOP] Cache utilization review and suggestion for EDNS client-subnet

2016-02-04 Thread Yuri Schaeffer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > Is this example for considering that a 128.0.0.0/4/8 answer is > different from a 128.0.0.0/4/4 answer when both are available > answers to be returned by an auth for a 128.0.0.0/4/0 query? Both 128.0.0.0/4/8 and 128.0.0.0/4/4 could satisfy a 128.0.

Re: [DNSOP] Cache utilization review and suggestion for EDNS client-subnet

2016-02-04 Thread Yuri Schaeffer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > I don't follow. Are you saying you are saving the SOURCE > PREFIX-LENGTH from the original query (responsible for the cache > entry) alongside the cache entry? Yes. > If so, I don't follow why this is required. Can you explain? Certainly! Suppose

Re: [DNSOP] Cache utilization review and suggestion for EDNS client-subnet

2016-02-04 Thread Yuri Schaeffer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Mukund, > The draft doesn't state that the answer is for the SOURCE > PREFIX-LENGTH when SCOPE > SOURCE. At all other times, the answer > is meant to be cached at the SCOPE PREFIX-LENGTH. I indeed use SCOPE to determine where the answer would fit

Re: [DNSOP] Cache utilization review and suggestion for EDNS client-subnet

2016-02-04 Thread Yuri Schaeffer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I have a hard time understanding your need for DIRECTION and DEPTH, and would argue you'd have enough information as is. > > IPv4 root [A2(/0)**] / \ 0b0.. /\ 0b1.. / \ A2(/1)X / > \ / \ 0b10.. / \ 0b11.. / \ A2(/2) X

[DNSOP] draft-ietf-dnsop-edns-client-subnet-00 Birthday Attack

2015-04-22 Thread Yuri Schaeffer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Please correct me if I'm wrong. I think there is a problem in this draft. Although the draft explicitly addresses Birthday Attacks it is still vulnerable. Section 10.2 (Birthday Attacks) states: > To counter this, every edns-client-subnet option in a

Re: [DNSOP] Comments on draft-ietf-dnsop-edns-client-subnet-00

2015-02-18 Thread Yuri Schaeffer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, On 18-02-15 18:19, Marcus Grando wrote: >>> If the SCOPE NETMASK in the reply is longer than the SOURCE >>> NETMASK, > it means that the reply might be suboptimal. A Recursive Resolver > MUST return this entry from cache only to queries that do no

Re: [DNSOP] comments on draft-ietf-dnsop-edns-client-subnet-00

2015-01-08 Thread Yuri Schaeffer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/31/2014 08:31 PM, 神明達哉 wrote: > - Section 6.3 > > If the address of the client is within any of the networks in the > cache, then the cached response MUST be returned as usual. If the > address of the client matches multiple networks in the c

Re: [DNSOP] WGLC draft-ietf-dnsop-dnssec-key-timing-03.txt until 2012-09-14

2012-09-06 Thread Yuri Schaeffer
On 09/06/2012 01:44 PM, Tony Finch wrote: >> - Bullet point 1 says that the ZSK Double Signature rollover is also >> known as Double-DNSKEY. I have not heard of this term before reading >> this document. Is it really known as? > Double-KSK would be a better term, since Double-DNSKEY sounds like th

Re: [DNSOP] I-D Action: draft-ietf-dnsop-dnssec-key-timing-03.txt

2012-08-20 Thread Yuri Schaeffer
On 08/20/2012 01:50 PM, John Dickinson wrote: > We could rearrange the table to tidy up the description of the > Double-Signature method but keep the existing names. Would that > help? Yes, making a clearer distinction between ZSK Double-Signature and KSK Double-Signature would help a bit. //yu

Re: [DNSOP] I-D Action: draft-ietf-dnsop-dnssec-key-timing-03.txt

2012-08-14 Thread Yuri Schaeffer
| -| Double-KSK | Publish DNSKEY and DS in| | | | parallel. | +--+--+-+ Regards, Yuri Schaeffer ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

[DNSOP] NSEC3 Hash Performance

2010-03-18 Thread Yuri Schaeffer
that in order to find a satisfying amount of iterations it is sufficient to look at the performance impact of the authoritative name server. Regards, Yuri Schaeffer - -- Yuri Schaeffer NLnet Labs http://www.nlnetlabs.nl -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) Comment