On Wed, Dec 13, 2023 at 1:27 PM Joe Abley <jab...@strandkip.nl> wrote:
> On 13 Dec 2023, at 18:12, Paul Wouters <p...@nohats.ca> wrote: > > > On Wed, 13 Dec 2023, Joe Abley wrote: > > > >>> On 13 Dec 2023, at 16:37, Paul Wouters <p...@nohats.ca> wrote: > >>> > >>> It should probably change TCP to “source IP validated transports (dns > over stuff, tcp and udp cookies) > >> > >> Since it is possible to imagine networks in which source address > spoofing is not possible, and hence in which queries received over UDP > could be said to fit that description, any phrase like that would need a > careful definition. > > > > Why? If the network has a guarantee against source spoofing, isn't it by > > definition that its UDP is a "source IP validated transport" ? > > Well, because private networks leak all over the place, and I think we > want to be conservative in what we recommend is implemented. > > More generally, "validated" invites the question of who is validating what > and how, and I think there is a big set of possible answers to that > question. > > >> However if we just mean "all transports currently defined that are not > UDP" we could just say that. Anticipating the full range of variables > associated with future transports that are not yet specified seems a bit > much. > > > > I dont think we should say that. Especially also because UDP with > > COOKIES is a source ip validated transport. > > Imagining that we fixed the phrase to accommodate the case of UDP > transport with cookies, why? > > Joe > > I like "source IP validated transport" but perhaps we could say "transports that are protected against source address spoofing". I think that makes it obvious what we are trying to protect against. -- Bob Harold
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop