> > > I have proposed a method that would not change the RPZ response for a > > > non-DNSSEC client, but would add data for DNSSEC capable clients to be
I forgot to mention what I think is a completely upward compatible "fix" for RPZ+DNSSEC that requires no protocol or implementation changes anywhere and little installation work. In cartoon form, it is "If RPZ+DNSSEC hurts, then stop doing that." In other words, if your DNS clients verify and if they don't want to deny themselves answers when their resolver lies, then switch to a DNS resolver without RPZ on another IP address or port number. If your resolver uses BIND9, then it could switch selected clients to an honest view (not using RPZ) on port 53 and its current IP addresses based on client IP address or TSIG key. This is all yet another way of saying that if changes are required in the RPZ protocol before the current Informational draft is advanced, then it is months too early for a last call for any draft. Calls for RPZ protocol changes in the current draft even as small sounding as some sort of version signaling should be treated as calls to reject the draft. Perhaps ISPs and anothers running open or large scale DNS resolvers should be encouraged to provide resolvers without RPZ if they provide resolvers with RPZ. Because there are plenty of DNS resolver operators (not to mention policy zone vendors) who charge for their special policy zone recipes, this does not sound controversial. Vernon Schryver v...@rhyolite.com _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop