On Aug 5, 2015, at 9:39 PM, Mark Andrews <ma...@isc.org> wrote: > If the attacker has a good cookie then you have a high degree of > confidence that the IP address is correct even if it a UDP request > and you can take steps like contacting the operators of the network > / server.
After some pretty intense criticism of this document, I went radio silent last week for two reasons. The first is that Mark said this, and it caused me to rethink my position on the document. The second is that my mail server exploded in a rather exciting way, and I spent the weekend writing an SMTP server so that I didn’t have to install Postfix again. So the short response to this is that I can now see how the draft is useful, but I think the draft fails to communicate why it is useful, and communicates some things that it’s purportedly for that aren’t useful. However, it may also be that I simply didn’t read it carefully enough. So I want to give it another thorough read and possibly suggest some changes that I think would result in readers having a clearer understanding of what it does that it useful, and not coming away with the impression that it does other things that I think could actually be harmful, but at the very least are not useful. I think the changes I would propose would be to the explanatory text, not to the specification. I think it would be useful to consider these changes before concluding the WGLC, but I am sure that the authors would like to see forward progress, and I’m not notoriously a fast reviewer. So I mention this for the chairs’ information, but have no real expectations as to what they might do in response. Thanks to Mark and Donald for their patient responses to my questions.
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop