I think the draft is just about ready for publication as well. On May 5, 2015, at 5:53 PM, Paul Hoffman <paul.hoff...@vpnc.org> wrote:
> This document has progressed very well and is nearly ready for publication. > > Related to an earlier thread about intended status: "Informational" is most > appropriate here because the document is all about proposed operations but no > "best current practice". There is no problem with WGs producing Informational > RFCs, and Informational RFCs can have RFC 2119 language. > > In Section 2, there should be a new paragraph after the first paragraph that > describes why the "reasonable attempt" in the first paragraph is needed to > determine whether the attacker has partial control of the zone, or is just > mounting an on-path attack between all the nameservers and the recursive. > > In Section 2, it talks about "a popular domain name" but don't say how to > determine that. Giving examples of sources of that data would be valuable. > I would recommend local query logs, naturally. > > In Section 7.1, the second paragraph is *not* a security consideration, it is > a proposal for how NTAs should be implemented. Please make this its own > section earlier in the document, possibly called "Altering Users of NTA Use". > There is a security consideration there, reading between the lines - in that this is broadcasting a spoofable name to the world. However, a "Altering User's" section would be a good addition to include text about apps that may break if it is known they demand to see the AD bit set in responses. Scott =================================== Scott Rose NIST scott.r...@nist.gov +1 301-975-8439 Google Voice: +1 571-249-3671 http://www.dnsops.gov/ https://www.had-pilot.com/ =================================== _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop