Paul - changes to existing practice is a _new_ document. You take the existing, 
coded, and deployed specification in as an informational RFC. Then you start a 
new working group document for the full “IETF version.” 

We’ve done this for many other protocols over the last several decades. Why the 
push back?


> On Mar 13, 2017, at 4:11 AM, Paul Wouters <p...@nohats.ca> wrote:
> 
> On Sun, 12 Mar 2017, Dave Crocker wrote:
> 
>> On 3/12/2017 4:23 PM, Paul Wouters wrote:
>>> I do not want to adopt it unmodified
>>> as informational RFC for running existing code.
>> 
>> You do not want the IETF to document existing practice?
>> 
>> Really?
> 
> There is a fine line between "bringing existing things to IETF to
> standardize" and "bringing existing things to IETF to document".
> 
> The draft breaks DNSSEC. In its current form it would not have moved
> forward if this work had been done from the start at the IETF. We would
> have asked the authors to come up with a modified solution that does
> not break DNSSEC. So documenting it now after the fact as RFC basically
> bypasses the IETF purposefully.
> 
> I have proposed a method that would not change the RPZ response for a
> non-DNSSEC client, but would add data for DNSSEC capable clients to be
> notified the DNSSEC data was modified (and possibly state why) giving
> DNSSEC capable clients a method to act differently, knowing the data was
> changed for a reason and is not simply a DNS spoofing attack. It can be
> added without breaking existing deployments. If the authors aren't willing
> to do this, why should IETF rubberstamp a DNS protocol that breaks DNSSEC?
> 
> Paul
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to