[ Top post ]
Integrating these -- 'parently I'm processing emails out of order...

Thank you for your comments, I've integrated them and will post a new
version soon (planning on incorporating some of Jinmei's comments
before posting).


On Tue, May 5, 2015 at 5:53 PM, Paul Hoffman <paul.hoff...@vpnc.org> wrote:
> This document has progressed very well and is nearly ready for publication.
>
> Related to an earlier thread about intended status: "Informational" is most 
> appropriate here because the document is all about proposed operations but no 
> "best current practice". There is no problem with WGs producing Informational 
> RFCs, and Informational RFCs can have RFC 2119 language.
>

Thanks.

> In Section 2, there should be a new paragraph after the first paragraph that 
> describes why the "reasonable attempt" in the first paragraph is needed to 
> determine whether the attacker has partial control of the zone, or is just 
> mounting an on-path attack between all the nameservers and the recursive.


DONE?
"It is important to confirm that the comains is still under the
ownership / control of the legitimate owner of the domain - this is to
ensure that disabling validation for a specific domain does not direct
users to an address under an attackers control. Contacting the domain
owner allows the resolver operator to determine if the issue is a
DNSSEC misconfiguration or an attack."

I'm not really sure if this addresses your concerns? If not, do you
happen to have any suggested text?


>
> In Section 2, it talks about "a popular domain name" but don't say how to 
> determine that. Giving examples of sources of that data would be valuable.

DONE.
I added: "An example of a list of "top N" websites is the <xref
target="Alexa">"Alexa Top 500 Sites on the Web" </xref>"

Is this OK?

>
> Section 5 is one paragraph too short. It says what other misconfigurations 
> should not be fixed by recursive resolver operators, but it does not say why 
> likely DNSSEC validation errors should be. The (missing) second paragraph 
> should say something to the effect of "with DNSSEC breakage, it is often 
> possible to tell that there is a misconfiguration by looking at the data and 
> not needing to guess what it should have been".
>

DONE.
I was going to add some hand-wavy bit about the fact that DNSSEC is an
"added feature" and that the behavior differs based upon if you have
turned validation on or not, but this didn't feel helpful, so I just
used your text. Thanks.

> In Section 6, add a second sentence to the second paragraph: "Such additions 
> are prevented by the requirement that the operator attempt to contact the 
> administrators for the zone that has broken DNSSEC."

DONE.
Thank you.


>
> In Section 7.1, the second paragraph is *not* a security consideration, it is 
> a proposal for how NTAs should be implemented. Please make this its own 
> section earlier in the document, possibly called "Altering Users of NTA Use".

DONE.
I'm fairly jetlagged, and it took me a silly amount of time to parse
the suggested name :-) Yay autocorrect.


>
> There is no stated reason for Appendix B to be an appendix. It is just as 
> important as other sections in the main body of the text, and should be moved 
> there.

DONE.
It had felt more "Appendixy" to me, but I don't know why. Moved it
into the body of the doc.


>
> References to other documents are done inconsistently. For example, there is 
> both "from RFC4033 [RFC4033]" and "in [RFC5914]".

DONE.
Thank you, and apologies for the delay.


W


>
> --Paul Hoffman
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to