Mark Delany writes:
> On 26Mar15, David C Lawrence allegedly wrote:
> > At IETF this week it was decided to refocus the effort on the
> > edns-client-subnet draft on only documenting the existing behaviour of
> > deployed implementations.
> 
> That's disappointing and somewhat at odds with the theme of the
> on-list discussions since the last draft was posted. Oh well.

I had meant to comment on this aspect in my message to dnsop;
apologies for not doing so.  The second half of this piece of news is
that we will be advancing a new draft to work on improving the
protocol based on operational experience, and will certainly be
incorporating previous feedback.

> > To clarify some areas that were un/under-specified I am looking for
> > implementers of both recursive and authoritative servers at the
> 
> Given that the major public caches have all adopted a whitelist
> approach to participating auths, one presumes that their whitelists
> represent all deployed implementations.

Yes, in a sense.  Not in a way that makes it easy for me to identify
which implementations are which and who to talk to about them,
unfortunately.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to