Attached. I thought that the mix of in-person mic and MeetEcho went very well!

--Paul
DNSOP WG
IETF 113, Vienna
2022-03-22
Minutes by Paul Hoffman
Text on slides is not reproduced here
~125 people in MeetEcho

Administrivia
        Sent longer note top the mailing list with full status
        https://mailarchive.ietf.org/arch/msg/dnsop/jZ2OYzwvGaHLD9caC4a4Q_pXRMk
        Warren Kumari: Would really like something in addition
                Discussed with the IESG to start up a short WG for 
DNSSEC-as-BCP, weren't interested
                Asks WG for a favor to move this to the front of the queue
        Adjustments for Multi-signer: Ulrich Wisser
                Request to consider changes to RFC 4034 about requiring 
signatures for all algorithms
                Wants more discussion on list

Negative Caching of DNS Resolution Failures
draft-dwmtwc-dnsop-caching-resolution-failures, Duane Wessels
        Also presented at the DNS-OARC meeting in 2022-02
        Paul Wouters: Why is exponential backoff a must?
                Duane: Most important is "at least 5 seconds"
                 Would be willing to make this mandatory
        Ralf Weber: Supports adoption
        Lars-Johan Liman: Supports adoption
        Hazel Smith: Good idea
                What proportion is coming from large public resolvers?
                Are these restrictions supposed to be across all anycast 
addresses?
                        Duane: This is per backend server
                                Maybe can be more specific in language
                                Sees thousands of queries per second from each 
backend server
        Jim Reid: Strong support
                Wants the numbers of seconds to wait to be more evidence-based
                Was the bulk from a small number of resolvers?
                        Duane: Verisign identified some of the sources, 
including the large recursive resolvers (by address)
        WG chairs will send out call for adoption soon

DNS Referral Glue Requirements
draft-ietf-dnsop-glue-is-not-optional, Duane Wessels
        Ben Schwartz: Terminology is confusing, with conflicting defintions in 
different RFCs
                Doesn't think "referral glue" distinction is helpful
                Should be from parents uniformly
                Duane: But we have sibling glue different than in-domain glue
                Important distinction is location
        Paul Hoffman: Put definition in the terminology document
        Brett Carr: Put it in the terminology doucment
                Good for training new staff
                Keep the terminology document active
        Ralf: All glue is for referral
                Not sure if taking out the registry requirement is good
                If a registry doesn't need to implement this, we are not 
gaining anything
                Duane: Take this to the list
                        Different registries have different modes of operation, 
didn't want to change their models
                        "Host object" use
        Hazel: Could not find a straight answer whether DS records are glue or 
not
        Alexander Mayrhofer: Important to differentiate "registry accepts 
data", "registry puts data in zone", "auth server sends data"
                This document focuses on third step
                Maybe second step could be in REGEXT WG
        Some things will go back to the list

Using Service Bindings with DANE,
draft-rebs-dnsop-svcb-dane, Ben Schwartz
        Wes Hardaker: The reason DANE changes the target is about control of 
the certificate
                Doesn't want to chase CDN certs, do the least amount of 
management
                Ben: Thinks this pushes the furthest in that direction

dry-run DNSSEC
draft-yorgos-dnsop-dry-run-dnssec, Willem Toorop
        Gavin Brown: Useful tool
                Validate DS algorithms from EPP, check the hash lengths
                Can't add dry run, would need an EPP extension
        Shane Kerr: Can this help with a root algorithm rollover?
                Willem: Useful for any dommain
        Ralf: Adding complexity to validation code
                Get clients to implement EDE
                Should not make resolver more and more complex
                Willem: Goal is to give operators more confidence
        Ben: This is a recurring paterm (stuff things into DS types)
                Should maybe have a general-purpose meta DS type
                Would we be better off providing some best practice on how to 
set up a duplicate parallel zone  

Stateful Hash-Based Signatures for DNSSEC
draft-afrvrd-dnsop-stateful-hbs-for-dnssec, Roland van Rijswijk-Deij
        Stephen Farrell: "Safe" is not the whole thing
                Roland: Must stop with the finite number of signatures
        Gavin: How much state needs to be stored, and for how long?
                Roland: Which key has been used (sequence number) for the 
lifetime of the key
                Have a finite time for your key, need to roll before you finish
                Roland: Depends on parameter choices
                Should implement but not use?
                Rolamd: Maybe for the root and TLDs?
                        Would be not be MUST implement, MUST be able to 
valdidated
        Paul: Would not want adoption until the implementation aspects doc is 
published
        Stephen: Bad idea all arond
                Never think about stateful signatures for DNSSEC
        Peter Thomassen: Confused about how it could be not preferred but 
implemented
                Roland: Should be implemented but not deployed

Expressing Quality of Service Requirements (QoS) in Domain Name System (DNS) 
Queries
draft-eastlake-dnsop-expressing-qos-requirements, Donald Eastlake III
        Ben: This sounds like a job for service bindings
                Doesn't like the idea of putting this in a label very appealing
                Use SVBC instead
                Donald: Requires application know about SVCB, but this could be 
used without
        Ulrich: QoS is a property of the network path
                How would resolver know about the path?

Structured Data for Filtered DNS
draft-wing-dnsop-structured-dns-error-page, Tirumal Reddy
        Ralf: Shows good usage of extended errors, has an experimental 
implementation
        Tommy Pauly: Supportive of this area, wants adoption
        Ben: Meant for the client that opens a web page that is selected by the 
resolver
                Very different security model than what we have now
                Wants it to be truly machine-readable, not presented to the user
                Tiru: Text fields are optional

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to