Some additional requested changes:

Section 2:

OLD:

   Validated Split Horizon:  Indicates that a split-horizon
      configuration for some name is considered "validated" if the
      client has confirmed that a parent of that name has authorized
      this resolver to serve its own responses for that name.

NEW:

   Validated Split Horizon:  A split-horizon
      configuration for some name is considered "validated" if the
      client has confirmed that a parent of that name has authorized
      this resolver to serve its own responses for that name.

OLD:

   Lone lines in examples are wrapped using a single backslash ("\") per
   [RFC8792].

NEW:

   Long lines in examples are wrapped using a single backslash ("\") per
   [RFC8792].

Section 6:

OLD:
   If the client cannot obtain a response from the external resolver within a 
reasonable timeout period,

NEW:
   If the client cannot obtain a response from the external resolver within a 
reasonable timeframe,

Section 6.1:

OLD:
   Alternatively, a client might perform DNSSEC validation for the verification 
query even if it has disabled DNSSEC validation for other DNS queries.

NEW:
   A compliant client could perform DNSSEC validation for the verification 
query even if it has disabled DNSSEC validation for other DNS queries.
Section 7:

I believe the last sentence of the fourth paragraph is confusing and should be 
deleted.  The fifth paragraph can be made more explicit.

OLD:
If the "ds" key is not present in a valid Verification Record, the client MUST 
disable DNSSEC validation when resolving the claimed subdomains via this local 
encrypted resolver.

Note that in this configuration, any claimed subdomains MUST be marked as 
unsigned in the public DNS. Otherwise, resolution results would be rejected by 
validating stubs that do not implement this specification.

NEW:

Note that when the local resolver does not have a globally trusted DNSKEY, any 
claimed subdomains MUST be marked as unsigned in the public DNS. Otherwise, 
local resolution results would be rejected by validating stubs that do not 
implement this specification.

Section 8:

I thought we agreed that domains would be code-formatted when not in quotation 
marks, but "dns.example.net" is not code-formatted in Steps 1-2 or Steps 3-5.

Section 9:

OLD:
...unnecessary to prevent leakage...

NEW:
...not necessary to prevent leakage...

Section 11:

OLD:
The sequence number in the RA PvD Option will be incremented,

NEW:
The sequence number in the RA PvD Option can be incremented,

--Ben Schwartz
________________________________
From: Lynne Bartholomew <lbartholo...@staff.rfc-editor.org>
Sent: Wednesday, January 8, 2025 11:29 AM
To: Ben Schwartz <bem...@meta.com>
Cc: Eric Vyncke (evyncke) <evyn...@cisco.com>; Ben Schwartz 
<bemasc=40meta....@dmarc.ietf.org>; kevin.sm...@vodafone.com 
<kevin.sm...@vodafone.com>; rfc-edi...@rfc-editor.org 
<rfc-edi...@rfc-editor.org>; kond...@gmail.com <kond...@gmail.com>; 
danw...@gmail.com <danw...@gmail.com>; i...@bemasc.net <i...@bemasc.net>; 
add-...@ietf.org <add-...@ietf.org>; add-cha...@ietf.org <add-cha...@ietf.org>; 
mohamed.boucad...@orange.com <mohamed.boucad...@orange.com>; 
auth48archive@rfc-editor.org <auth48archive@rfc-editor.org>
Subject: Re: AUTH48: RFC-to-be 9704 <draft-ietf-add-split-horizon-authority-14> 
for your review

Hi, Ben.

We have updated this document per your note below.

The latest files are posted here.  Please refresh your browser:

   
https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9704.txt__;!!Bt8RZUm9aw!52D3C6VH_fDIPn3D39TUK_Xs7SipY1fWrJ1T-D07jmRFubmK2hGS4S8ivbIGWmINmyu1J47fC2XgWpWIe1DZutlaSoo$
   
https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9704.pdf__;!!Bt8RZUm9aw!52D3C6VH_fDIPn3D39TUK_Xs7SipY1fWrJ1T-D07jmRFubmK2hGS4S8ivbIGWmINmyu1J47fC2XgWpWIe1DZWPC2QPA$
   
https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9704.html__;!!Bt8RZUm9aw!52D3C6VH_fDIPn3D39TUK_Xs7SipY1fWrJ1T-D07jmRFubmK2hGS4S8ivbIGWmINmyu1J47fC2XgWpWIe1DZY3878GE$
   
https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9704.xml__;!!Bt8RZUm9aw!52D3C6VH_fDIPn3D39TUK_Xs7SipY1fWrJ1T-D07jmRFubmK2hGS4S8ivbIGWmINmyu1J47fC2XgWpWIe1DZVW-WnS8$
   
https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9704-diff.html__;!!Bt8RZUm9aw!52D3C6VH_fDIPn3D39TUK_Xs7SipY1fWrJ1T-D07jmRFubmK2hGS4S8ivbIGWmINmyu1J47fC2XgWpWIe1DZuH96_i4$
   
https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9704-rfcdiff.html__;!!Bt8RZUm9aw!52D3C6VH_fDIPn3D39TUK_Xs7SipY1fWrJ1T-D07jmRFubmK2hGS4S8ivbIGWmINmyu1J47fC2XgWpWIe1DZVFJlCPc$
   
https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9704-auth48diff.html__;!!Bt8RZUm9aw!52D3C6VH_fDIPn3D39TUK_Xs7SipY1fWrJ1T-D07jmRFubmK2hGS4S8ivbIGWmINmyu1J47fC2XgWpWIe1DZBuJZcpU$
   
https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9704-lastdiff.html__;!!Bt8RZUm9aw!52D3C6VH_fDIPn3D39TUK_Xs7SipY1fWrJ1T-D07jmRFubmK2hGS4S8ivbIGWmINmyu1J47fC2XgWpWIe1DZlg6olwo$
   
https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9704-lastrfcdiff.html__;!!Bt8RZUm9aw!52D3C6VH_fDIPn3D39TUK_Xs7SipY1fWrJ1T-D07jmRFubmK2hGS4S8ivbIGWmINmyu1J47fC2XgWpWIe1DZ9Y0gVfw$

   
https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9704-xmldiff1.html__;!!Bt8RZUm9aw!52D3C6VH_fDIPn3D39TUK_Xs7SipY1fWrJ1T-D07jmRFubmK2hGS4S8ivbIGWmINmyu1J47fC2XgWpWIe1DZfbXlOaw$
   
https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9704-xmldiff2.html__;!!Bt8RZUm9aw!52D3C6VH_fDIPn3D39TUK_Xs7SipY1fWrJ1T-D07jmRFubmK2hGS4S8ivbIGWmINmyu1J47fC2XgWpWIe1DZHryc7UE$

Please note that my email address has changed from <lbartholo...@amsl.com> to 
<lbartholo...@staff.rfc-editor.org>.

Thank you!

RFC Editor/lb

> On Jan 6, 2025, at 12:39 PM, Ben Schwartz <bem...@meta.com> wrote:
>
> > Ben, we have updated this document per your notes below, except for this 
> > item; please advise:
>
> >> Section 1:
> >> "This specification expects that local DNS servers will be securely 
> >> identified ..."
> >> -> This statement strikes me as more personifying than is necessary.  It's 
> >> also strange because, leaving aside the specification's opinion, I don't 
> >> expect that most local DNS servers will be securely identified.  The prior 
> >> text said "this specification relies on ...", in an attempt to convey the 
> >> idea that secure identification is a precondition, not a prediction (as 
> >> implied by the future tense "will be").  Other possible verbs for this 
> >> sentence would be "require" or "assume" (or "applies only to networks 
> >> where the local DNS server is securely identified", etc.).
>
> > It's not clear to us how, and where, we should make updates.  Please 
> > specify, using "OLD" and "NEW" text.
>
> draft-14:
>    This specification relies on securely identified local DNS servers,
>    and checks each local domain hint against a globally valid parent
>    zone.
>
> OLD:
>    This specification expects that local DNS servers will be securely
>    identified and that each local domain hint will be checked against a
>    globally valid parent zone.
>
> NEW:
>   In this specification, network operators securely identify the local DNS
>   servers, and clients check each local domain hint against a globally
>   valid parent zone.


-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to