LGTM. It sounds like Mark is arguing that RFC6761 also needs updated. Possibly this document could do that, but it would need to be reframed a bit.
On Tue, Jun 12, 2018 at 7:28 PM, David Schinazi <dschin...@apple.com> wrote: > Hi everyone, > > Stuart and I have a draft that attempts to address these issues, please > let us know if you think it does or doesn't. > > https://tools.ietf.org/html/draft-cheshire-sudn-ipv4only-dot-arpa > > Thanks, > David Schinazi > > > On Jun 12, 2018, at 18:29, Mark Andrews <ma...@isc.org> wrote: > > The Domain Name Reservation Considerations in RFC 7050 do not cover > whether > a delegation should be signed or not. Due to that omission in > constructing the set > of questions to be asked RFC 7050 fails when the client is behind a > validating resolver > that has NO SPECIAL KNOWLEDGE of IPV4ONLY.ARPA. > > There are 2 pieces of work that are required. > 1) update the list of questions that need to be asked needs to include > whether a delegation > needs to be signed or not. > 2) update RFC 7050 to include explicit instructions to say DO NOT sign > IPV4ONLY.ARPA. > > Item 1 is dnsop work as far as I can see. Item 2, I think, should be > v6ops work. > > HOME.ARPA is a example of a unsigned delegation. > 10.IN-ADDR.ARPA is a example of a unsigned delegation. > > There is zero benefit in IPV4ONLY.ARPA being signed. Its contents on the > Internet > are well known. The contents with NAT64 in using are well known except > for the > AAAA query. The answer to that query is *expected to change*. That > answer cannot > be validated. > > Mark > > Begin forwarded message: > > *From: *"Michelle Cotton via RT" <iana-questi...@iana.org> > *Subject: **[IANA #989438] ipv4only.arpa's delegation should be insecure.* > *Date: *6 January 2018 at 8:45:10 am AEDT > *To: *ma...@isc.org > *Reply-To: *iana-questi...@iana.org > > Hello, > > Following up on a thread from the end of the year. Who will bring this to > the DNSOps working group? Will someone notify us if there is an consensus > on a conclusion of what needs to be done? > > Thanks in advance. > > --Michelle Cotton > > > On Sun Dec 10 22:40:29 2017, danw...@gmail.com wrote: > > I had replied to the errata. I agree it warrants additional > discussion, and had also suggested same. Dnsops seems appropriate. > > > > The question is not to much where the attacker is, but what DNSSEC > guarantee is provided. DNS64 imagines the client could do its own > validation — if it wanted. To date, effectively zero clients seem to > want to do their own DNSSEC validation. > > -d > > On Dec 10, 2017, at 11:13 AM, Savolainen, Teemu (Nokia-TECH/Tampere) > <teemu.savolai...@nokia.com> wrote: > > Hi, > > Dan Wing seem to have moved to VMWare, but cc'ing him now with an > email address I found from an I-D.. > > I'm not really following IETF nowadays, so I don't know if this has > been discussed. > > Also I'm not sure why ISPs couldn’t first verify the A response's > validity and then generate AAAA response to the client as document... > but I suppose it could be considered to be more proper action to > modify insecure responses than secure responses. I'm just worried > what happens if there's attacker between ISP and root, in which case > the IPv4 address part of the response could be modified by attacker > and then delivered to client in the ISP's synthetic AAAA record.. > > So I cannot accept the errata straight away, but it should be > discussed with people who are more experts on this than I am. > > Best regards, > > Teemu > > > -----Original Message----- > From: Michelle Cotton via RT [mailto:iana-questions- > comm...@iana.org] > Sent: 9. joulukuuta 2017 1:22 > Cc: i...@kuehlewind.net; spencerdawkins.i...@gmail.com; > jouni.nos...@gmail.com; Savolainen, Teemu (Nokia-TECH/Tampere) > <teemu.savolai...@nokia.com> > Subject: [IANA #989438] ipv4only.arpa's delegation should be > insecure. > > Hello, > > Just checking to see if anyone had a chance to look at this. > Dan Wing's email addressed bounced (dw...@cisco.com). > > Thanks, > Michelle > > > > On Tue Nov 28 14:43:00 2017, michelle.cotton wrote: > Hello Authors and Area Directors, > > We have received a message pointing out an errata report that would > modify the actions that were performed for RFC7050. > > https://urldefense.proofpoint.com/v2/url?u=https-3A__www.rfc- > 2Deditor.org_errata_eid5152&d=DwIGaQ&c=uilaK90D4TOVoH58JNXRgQ&r= > IMDU0f3LtPMQf5XkZ06fNg&m=hjPiqrkJLcvBw1fuqRPXMX6h76vuapCYz_DxRRq7SkM&s= > uCKCSggUUCCU7iPuRs- > usGcL3T69Fia9gTOy4UQwhLk&e= > > Has this report been discussed? Will the result be an approved > errata > report or a new RFC? > > Thanks in advance. > > Michelle Cotton > Protocol Parameters Engagement Sr. Manager > > > > > > > > > -- > Mark Andrews, ISC > 1 Seymour St., Dundas Valley, NSW 2117, Australia > PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org > > _______________________________________________ > v6ops mailing list > v6...@ietf.org > https://www.ietf.org/mailman/listinfo/v6ops > > > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop