On 5/10/16 9:49 PM, "DNSOP on behalf of Mark Andrews" <dnsop-boun...@ietf.org on behalf of ma...@isc.org> wrote:
> >In message <20160510160757.13221.qm...@ary.lan>, "John Levine" writes: >> > Administrators should consider whether the lack of user-specified >> > hostnames is a drawback. >> > >> >This is not true - it would be trivial to allow the enduser to specify >>a >> >few specific hostnames and deterministically auto generate the rest. >> >> Putting names into the zone is the easy part. Deciding who's allowed to >> add names and what names they're allowed to add is not. > >For reverse zones, UPDATE over TCP from the matching IP works and >there are nameservers that support this and can be configured to >only accept PTR records as well. I've never figured out how a printer knows what server will accept UPDATEs from it. So, you wouldn't allow another host (say, a PC or a gateway) to populate? You get no hostname if you don't speak TCP UPDATE. I can live with that, just asking. > >It wouldn't be hard to add a EDNS option that says "remove if not >refreshed after XXXX seconds" to the update request and the master >server could maintain a time based list to clean up. I look forward to your draft. > >One can do UPDATE over TCP self for PTR + KEY (or just KEY) and >self using SIG(0) of PTR + KEY once the KEY is installed. This >allows the client to clean up after itself independent of the address >the UPDATE request comes from. Server implementations already >support this. Client implementations? > >One can do update TCP self /48 (already implemented in some servers) >(or any other configured prefix length) to install NS records or >DNAME records to do "delegations" of either style. Allow KEY to >allow client cleanups. The DHCP server can remove the delegation >when the PD expires so you have cleanup. The update self size needs >to be tuned to the PD size. If you want to add more moving parts >the DHCP server can add the KEY which is supplied w/ the DHCP PD >request. Oh, you're assuming the delegation is to something in the home, then? I still think that's a bad idea, because it's a DDoS vector. And removing delegation doesn't work if the ISP is delegating to itself. You could delete the zone and re-create it, but it'll still point (probably) to the same server. > >This is not hard to do. We just need to pick what is reasonable >to do and recommend it. The customer side will appear once we >recommend a approach. > >Border routers do the delgation while individual nodes to the self >updates. I've been taking the approach all along of "What is currently possible." If you think this is a problem space that needs to be solved, I look forward to your draft proposing this solution. Lee ________________________________ This E-mail and any of its attachments may contain Time Warner Cable proprietary information, which is privileged, confidential, or subject to copyright belonging to Time Warner Cable. This E-mail is intended solely for the use of the individual or entity to which it is addressed. If you are not the intended recipient of this E-mail, you are hereby notified that any dissemination, distribution, copying, or action taken in relation to the contents of and attachments to this E-mail is strictly prohibited and may be unlawful. If you have received this E-mail in error, please notify the sender immediately and permanently delete the original and any copy of this E-mail and any printout. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop