On Mon, Apr 14, 2014 at 7:09 AM, Antoin Verschuren
<antoin.verschu...@sidn.nl> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> op 10-04-14 21:54, Patrik Fältström schreef:
>
>> We already have too many parents that have I do not know how many
>> stupid rules for what various values must be in the child hosting
>> situation, and in many cases that make it plain impossible to do
>> what you want as a child. Really silly rules.
>
> While I agree with you some (TLD) parents are sometimes too pedantic,
> it may serve a need for parents to refuse certain use cases under
> their parenthood. If the rules are stupid, complain to the parent if
> you want to be his child.
>
>> Parent should not control the child.
>
> I don't agree you can put it that generic. Some parents only want
> specific use under their tree, and you cannot force a parent to grant
> you a use case you want. While I agree with you some parents want to
> control their children too much, and hence have silly rules that don't
> match the use case they want to accommodate, it's not always the case.
> Don't throw away the child with the bathwater.
>
> Let me give you a use case where this may be clear.
> Suppose I want to set up a network of probes under a parent
> "probenetwork.example.com". Every probe gets a registration, but for
> the probenetwork to work, every delegation MUST do DNSSEC with an
> algoritm the probe architecture can handle and know the whereabouts of
> every other probe. Every probe handles it's own delegation so queries
> over the network requires the zones to contain specific records the
> probes use. So my local policy is to only allow delegations for
> certain DNSSEC algorithms, and every delegated zone MUST contain a LOC
> record.
> In order not to disturb the running probe network, I only accept new
> delegations after I verify the child zone for that.
>
> Another example may be that as a parent, we do not want too short
> TTL's on the child's NS RRset because our infrastructure is hit with
> more queries that are useless with our zone's publication frequency.
> And we don't want too long TTL's as a countermeasure against ghost
> domains misused by botnets. Now the botnet herders may be against that
> policy, but it's our choice as a parent not to accommodate that use
> case in our tree unless someone convinces us there's a legitimate
> other use case that cannot live with those rules.

Just checking -- do you want any action *on this doc*? I *think* that
we are generic/non-prescriptive enough that you can implement whatever
policy you want...
If you'd like something additional (probably in Section 6.2) saying
something like "Acting on CDS/CDNSKEY records may be subject to local
policy" or something, please help by providing text...

I *think* that we are generic enough that this is covered, but...

W

>
> - --
> Antoin Verschuren
>
> Technical Policy Advisor SIDN
> Meander 501, PO Box 5022, 6802 EA Arnhem, The Netherlands
>
> P: +31 26 3525500  M: +31 6 23368970
> Mailto: antoin.verschu...@sidn.nl
> XMPP: antoin.verschu...@jabber.sidn.nl
> HTTP://www.sidn.nl/
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.11 (GNU/Linux)
>
> iQEcBAEBAgAGBQJTS8HQAAoJEDqHrM883Agn8XYIANEHTXRmoAgK0nFN+UXLcjY3
> SU8c9x0C2ZIgVFpPm1jIyyetFhzVgtHh6IzJb0BRINziRYYaXkR0sNxC0feCpboP
> sv4nPBw3JkY24rZ6xFJ9O+vSA3TLujp9JlgudZLAPVx/g2LuGeO7jwGXssF95I5F
> Uv9eFOLH6Nul3KVynN6osRaE6fgHyaFppOb/SvkCVRwpccyrGTH+jQzlHhdhL9rv
> ra+VG5G3pDrRND4LcRAHpev14QYhZejmyXsf4scIy/fh4SSCvUZ5wuwhTbMWPMtG
> ocVAZFqibdVZWJ1E/xDxSXSqqXU3lGCuDHGvFe8P+fZcUO5lHuPjBRK3NnSimag=
> =khPI
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to