>"Not wanting to be recruited into a botnet" is another such consideration.
>Paul and Vernon invented a useful tool to help address it, and I'm
>in favor of documenting it.

I would really prefer that the IETF not embarrass itself with a rerun
of the NAT fiasco, in which TCP/IP purists yelled and screamed and
insisted that NAT was evil, while in the real world it solved (still
solves) real problems, and everyone implemented it in various not very
transparent or compatible ways.

RPZ is ugly but it solves serious real world problems, and it's going
to be used all over the world regardless of what we do.  Just this
week I heard from a friend at a largish company that one of their
suppliers got hacked with the trendy new malware that hides in web
page images.  Without RPZ, approximately all of their Windows users
would have been infected, with RPZ none of them were.

If we want to offer advice and perhaps technical twiddles on how to
deploy RPZ to minimize surprises and make it easy to find and fix
mistakes, that would be swell.  Insisting that it's stupid and wrong
confirms the not ill-founded impression that dnsop is out of touch
with the real world.

So, yes, we should adopt this draft.

R's,
John

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to