Hi everyone, Stuart and I have a draft that attempts to address these issues, please let us know if you think it does or doesn't.
https://tools.ietf.org/html/draft-cheshire-sudn-ipv4only-dot-arpa <https://tools.ietf.org/html/draft-cheshire-sudn-ipv4only-dot-arpa> Thanks, David Schinazi > On Jun 12, 2018, at 18:29, Mark Andrews <ma...@isc.org> wrote: > > The Domain Name Reservation Considerations in RFC 7050 do not cover whether > a delegation should be signed or not. Due to that omission in constructing > the set > of questions to be asked RFC 7050 fails when the client is behind a > validating resolver > that has NO SPECIAL KNOWLEDGE of IPV4ONLY.ARPA. > > There are 2 pieces of work that are required. > 1) update the list of questions that need to be asked needs to include > whether a delegation > needs to be signed or not. > 2) update RFC 7050 to include explicit instructions to say DO NOT sign > IPV4ONLY.ARPA. > > Item 1 is dnsop work as far as I can see. Item 2, I think, should be v6ops > work. > > HOME.ARPA is a example of a unsigned delegation. > 10.IN-ADDR.ARPA is a example of a unsigned delegation. > > There is zero benefit in IPV4ONLY.ARPA being signed. Its contents on the > Internet > are well known. The contents with NAT64 in using are well known except for > the > AAAA query. The answer to that query is *expected to change*. That answer > cannot > be validated. > > Mark > >> Begin forwarded message: >> >> From: "Michelle Cotton via RT" <iana-questi...@iana.org >> <mailto:iana-questi...@iana.org>> >> Subject: [IANA #989438] ipv4only.arpa's delegation should be insecure. >> Date: 6 January 2018 at 8:45:10 am AEDT >> To: ma...@isc.org <mailto:ma...@isc.org> >> Reply-To: iana-questi...@iana.org <mailto:iana-questi...@iana.org> >> >> Hello, >> >> Following up on a thread from the end of the year. Who will bring this to >> the DNSOps working group? Will someone notify us if there is an consensus >> on a conclusion of what needs to be done? >> >> Thanks in advance. >> >> --Michelle Cotton >> >> >> On Sun Dec 10 22:40:29 2017, danw...@gmail.com <mailto:danw...@gmail.com> >> wrote: >>> I had replied to the errata. I agree it warrants additional >>> discussion, and had also suggested same. Dnsops seems appropriate. >>> >>> >>> >>> The question is not to much where the attacker is, but what DNSSEC >>> guarantee is provided. DNS64 imagines the client could do its own >>> validation — if it wanted. To date, effectively zero clients seem to >>> want to do their own DNSSEC validation. >>> >>> -d >>> >>>> On Dec 10, 2017, at 11:13 AM, Savolainen, Teemu (Nokia-TECH/Tampere) >>>> <teemu.savolai...@nokia.com <mailto:teemu.savolai...@nokia.com>> wrote: >>>> >>>> Hi, >>>> >>>> Dan Wing seem to have moved to VMWare, but cc'ing him now with an >>>> email address I found from an I-D.. >>>> >>>> I'm not really following IETF nowadays, so I don't know if this has >>>> been discussed. >>>> >>>> Also I'm not sure why ISPs couldn’t first verify the A response's >>>> validity and then generate AAAA response to the client as document... >>>> but I suppose it could be considered to be more proper action to >>>> modify insecure responses than secure responses. I'm just worried >>>> what happens if there's attacker between ISP and root, in which case >>>> the IPv4 address part of the response could be modified by attacker >>>> and then delivered to client in the ISP's synthetic AAAA record.. >>>> >>>> So I cannot accept the errata straight away, but it should be >>>> discussed with people who are more experts on this than I am. >>>> >>>> Best regards, >>>> >>>> Teemu >>>> >>>> >>>> -----Original Message----- >>>> From: Michelle Cotton via RT [mailto:iana-questions- >>>> comm...@iana.org <mailto:comm...@iana.org>] >>>> Sent: 9. joulukuuta 2017 1:22 >>>> Cc: i...@kuehlewind.net <mailto:i...@kuehlewind.net>; >>>> spencerdawkins.i...@gmail.com <mailto:spencerdawkins.i...@gmail.com>; >>>> jouni.nos...@gmail.com <mailto:jouni.nos...@gmail.com>; Savolainen, Teemu >>>> (Nokia-TECH/Tampere) >>>> <teemu.savolai...@nokia.com <mailto:teemu.savolai...@nokia.com>> >>>> Subject: [IANA #989438] ipv4only.arpa's delegation should be >>>> insecure. >>>> >>>> Hello, >>>> >>>> Just checking to see if anyone had a chance to look at this. >>>> Dan Wing's email addressed bounced (dw...@cisco.com >>>> <mailto:dw...@cisco.com>). >>>> >>>> Thanks, >>>> Michelle >>>> >>>> >>>> >>>>> On Tue Nov 28 14:43:00 2017, michelle.cotton wrote: >>>>> Hello Authors and Area Directors, >>>>> >>>>> We have received a message pointing out an errata report that would >>>>> modify the actions that were performed for RFC7050. >>>>> >>>>> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.rfc- >>>>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.rfc-> >>>>> 2Deditor.org_errata_eid5152&d=DwIGaQ&c=uilaK90D4TOVoH58JNXRgQ&r=IMDU0f3LtPMQf5XkZ06fNg&m=hjPiqrkJLcvBw1fuqRPXMX6h76vuapCYz_DxRRq7SkM&s=uCKCSggUUCCU7iPuRs- >>>>> usGcL3T69Fia9gTOy4UQwhLk&e= >>>>> >>>>> Has this report been discussed? Will the result be an approved >>>>> errata >>>>> report or a new RFC? >>>>> >>>>> Thanks in advance. >>>>> >>>>> Michelle Cotton >>>>> Protocol Parameters Engagement Sr. Manager >>>> >>>> >>>> >> >> >> > > -- > Mark Andrews, ISC > 1 Seymour St., Dundas Valley, NSW 2117, Australia > PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org > <mailto:ma...@isc.org> > _______________________________________________ > v6ops mailing list > v6...@ietf.org > https://www.ietf.org/mailman/listinfo/v6ops
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop