On Jul 17, 2023, at 20:10, John Levine <jo...@taugh.com> wrote: > >> I’m sure there are still plenty of tools crafting dns packets or using >> simplistic tools that are not able to do TCP or DNSSEC. > > I'm sure there used to be, but in 2023? Really? An example or two would be > intersting.
As most of the people implementing this write in house code and are not DNS engineers, we won’t know. Again, for my $dayjob, where we are also in need of customer proof of ownership of domain, the engineers started mucking with python-dns DNS queries until I told them to use python-unbound. So yes, if they didn’t have a dns engineer on staff they would have ended up with partial UDP packets and possible false negatives in their code. >>> It’s literally what happened to me in the first week of my current $dayjob. >>> I found 5 tokens that no one knew what they were, whom they were >> for and whether or not they were still needed. > > Um, no. John, please do not make claims about my experiences. They are mine not yours. > I believe you don't know what they were, but that doesn't mean > anyone or anything thought that a token for A was a token for B. I didn’t claim that. Perhaps reread what I wrote. I said no one within the the company knew what or whom these were for. I did not say anything about collisions. > Anyway, we agree that adding a bunch of extra stuff to SPF results is a bad > idea and > that's sufficient motivation to tell people to use _names for their tokens. It’s interesting that you care about SPF TXT records needing to parse through other TXT records, but didn’t seem to care about domain validation TXT records needing to parse through SPF TXT records. Paul, respectfully agreeing with Brian _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop