Benoit Claise has entered the following ballot position for
draft-ietf-dnsop-root-loopback-04: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-root-loopback/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

   Malicious third
   parties might be able to observe that traffic on the network between
   the recursive resolver and one or more of the DNS roots
   ....
   The primary goals of this design is to provide faster negative
   responses to stub resolver queries that contain junk queries, and to
   prevent queries and responses from being visible on the network. 

I've been wondering. So this mechanism is basically to speed up junk
queries.
What can a malicious third party do by observing junk queries. Nothing, I
guess.

I guess you want something like.
OLD:
   The primary goals of this design is to provide faster negative
   responses to stub resolver queries that contain junk queries, and to
   prevent queries and responses from being visible on the network.

NEW: 
   The primary goals of this design is to provide faster negative
   responses to stub resolver queries that contain junk queries, and to
   prevent valid queries and responses from being visible on the network.


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to