Hello,

I will keep my feedback short and to the point.  We have implemented RPZ across 
our resolvers and it has been a fantastic tool to stop botnet C&Cs and outbound 
DDoS attacks.  I just wanted to say it has been an extremely valuable tool to 
us here at Rackspace and provide some positive feedback since this thread seems 
fairly negative.

Nolan Berry

Linux Systems Engineer

DNS Engineering

Rackspace Hosting


________________________________
From: DNSOP <dnsop-boun...@ietf.org> on behalf of Viktor Dukhovni 
<ietf-d...@dukhovni.org>
Sent: Wednesday, December 21, 2016 2:01 PM
To: dnsop
Subject: Re: [DNSOP] DNSOP Call for Adoption draft-vixie-dns-rpz

On Wed, Dec 21, 2016 at 12:39:55PM -0500, Matthew Pounsett wrote:

> RPZ is not the ideal, but it works, and goes beyond being deployable-it is
> deployed.

I am curious to understand how RPZ zone transfers are (intended to
be) secured.  It sounds like the reason for standardizing RPZ is
to allow interoperable sharing of policies via replication of zone
data, and so an appropriate security mechanism would seem to be
desirable here to authenticate the transfer of data from the RPZ
master zone.  Is there a related specification for that?

As a (long-ago) emigre from the then Soviet Union, I am loathe to
see the IETF standardizing scalable censorship mechanisms, however
well intentioned.  Let's hope that skepticism of such "progress"
can evolve without the personal experience of having lived under
a totalitarian regime.

Once the infrastructure that RPZ makes possible is deployed at
scale, it will surely become increasingly difficult to bypass.
This proposal is a major step towards building the Great Firewall
of <your CountryName>, and should I believe be resisted.

--
        Viktor.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to