-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In message <m1aw7ii-0000...@stereo.hq.phicoh.net>, Philip Homburg <pch-
dn...@u-1.phicoh.com> writes

>In your letter dated Fri, 29 Apr 2016 13:54:44 +0200 you wrote:
>
>>Having said all of that, I don't see any strong requirement that this
>>document provide motivation for reverse DNS solutions for IPv6. People
>>ask about the problem, and want solutions, and it would be good to have
>>a document to point them to with some help.
>
>The problem I have with the current line of thinking (Section 2.4 in this
>draft) is that there is a big disconnect between where reverse DNS is
>needed and what ISPs are trying to do.

"needed" is rather a strong word.... historically reverse DNS was a de
facto requirement for access to some anonymous FTP servers (a use case
that is now rather long in the tooth) and it was seized on by mail
systems that were trying to deal with spam because

a) checking for consistency between forward and reverse DNS and any
associated HELO command gave them a (totally unjustified) warm feeling
about the identity (and bona fides) of the machine sending them email

b) some reckoned to parse the name (in an entirely ad hoc and error
prone manner) and thereby identify mass-market ADSL/cable connected
machines that they did not think should be sending email directly.

I am not aware of ANY other protocols that have ever relied on the
presence of reverse DNS -- but experts here may recall some ??


Latterly, the existence of reverse DNS has been used as a "clue test"
for IPv6 email delivery (server to server, not email submission by end
user machines) and this is documented in the M3AAWG document on IPv6
email:

<https://www.m3aawg.org/sites/default/files/document/M3AAWG_Inbound_IPv6
_Policy_Issues-2014-09.pdf>

which says

     In the absence of a more appropriate mechanism for identifying
     hosts intended to act as outbound MTAs by their owners, M3AAWG
     recommends rejecting email from host IPv6 addresses without reverse
     DNS records. This technique should be deprecated once a more
     suitable standard mechanism is developed.

So in fact "reverse IPv6 DNS everywhere" risks being counterproductive
for email (or at best we'll be back in the ad hoc parsing world).

>Whether we like it or not, mail admins are adding reverse DNS checks.
>In fact, some really big mail providers require reverse DNS.

Yes, that's what M3AAWG is documenting... but if you roll out reverse
DNS everywhere I confidently predict they will rapidly cease to bother !

>So, ISPs not doing reverse DNS for IPv6, like my current ISP, are making it
>impossible to use your own mail server to deliver mail over IPv6. I think
>they are doing a serious disservice to the open internet.

Mayhap -- but reputation services for IPv6 are still in their infancy
and so there needs to be some way to distinguish "legitimate" mail
servers from malware infected end-user devices.

In my view the effort should all be devoted to addressing reputation
services for IPv6. In particular there is no standard for documenting
the "cut point" (what the allocation unit was to a particular customer)
and that is essential information for linking delivery events to an
entity and thereby forming a view as to their legitimacy (or otherwise)

If lots of work is to be done on reverse lookups in IPv6 (which I would
argue is entirely self-defeating) then being able to do a reverse lookup
which returns "/48" or "/56" or whatever is, in my view, significantly
more useful.

- -- 
richard                                                   Richard Clayton

Those who would give up essential Liberty, to purchase a little temporary 
Safety, deserve neither Liberty nor Safety. Benjamin Franklin 11 Nov 1755

-----BEGIN PGP SIGNATURE-----
Version: PGPsdk version 1.7.1

iQA/AwUBVyNUmTu8z1Kouez7EQL3QgCg+bONYXsKXzFP+8BGsyF1B7sezBgAnRgu
zardRJpsJ6yicNFSijnV2EbB
=25R6
-----END PGP SIGNATURE-----

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to