All

Chairs wish to Thank everyone for attending and participating.  Special
thanks to Paul Hoffman for these minutes.  If you spoke at the mic line,
check to make sure you were quoted correctly.

The minutes also contain a link to the chat logs - I have found that
helpful myself.

We're working on a short list of chair actions that we will follow up on in
the coming weeks.

The minutes can be found at these links or attached to this email for the
extremely Busy DNS Person.

thanks again

tim
---

https://datatracker.ietf.org/doc/minutes-120-dnsop/

https://github.com/ietf-wg-dnsop/wg-materials/blob/main/dnsop-ietf120/dnsop-ietf120-minutes.txt
DNSOP WG
Vancouver, BC, Canada
Session 1
Date: Monday, July 22, 2024
Time: 15:30-17:00 local
Chairs: Benno Overeinder, Suzanne Woolf, Tim Wicinski

https://datatracker.ietf.org/doc/chatlog-120-dnsop-202407221530/

Only discussion during the mic line are covered here, not the slides
You should definitely read the slides

Administrivia, Chairs
    Opening, Note Well and Blue Sheets
    Lots of review of the past few months in the slides
    Side meeting on DNS "load balancing" on Wednesday
    Hackathon update: Willem Toorop and Johan Stenstam

Generalized DNS Notifications, Peter Thomassen
    draft-ietf-dnsop-generalized-notify

    Ben Schwartz: Litmus test for SVCB records is whether it is under a URI 
scheme
        Only useful if you have a URI for the things you want to use
    Ondřej Surý: Confusing to use the word "notify" and "notifications"
    Robert Story: You don't want to send the notify until all your nameservers 
are in sync
        Maybe set a timer in a record to tell when to revalidate
    Q Misell: No different notifications for CDS and CDNSKEY
        Is it appropriate for a registrar to implement this?
        Peter: how would a registrar announce the endpoint for this?
    Johan Stenstam: Sympathize with Ondřej's confusion
        This is a new use case, keep with the NOTIFY name
        Child has no way to know when a parental scan will happen, so scan now
    Matt Pounsett: Break the assumption of about NOTIFY
        SVCB is not appropriate without doing new stuff

Automating DNS Delegation Management via DDNS, Johan Stenstam
    draft-johani-dnsop-delegation-mgmt-via-ddns

    Ondřej: Wanted to deprecate SIG(0)
        Johan: We really like it
    Paul Hoffman: What is the KSK you talked about?
        Johan: It is the same
    Ted Lemon: Can't get rid of SIG(0)

Delegation Revalidation by DNS Resolvers, Willem Toorop
    draft-ietf-dnsop-ns-revalidation

    Ben Schwartz: If the resolver doesn't block responding, what is the 
security advantage?
        Willem: After the first response
        Ben: Are there deployed resolvers with strict resolver security?
        Willem: Maybe RHEL
        Ben: Wants to be cautious about security claims
    Ondřej: Document is underspecified for when you get no nameservers
        More on error conditions
    Robert: Would like more description of the rankings
        Maybe new terminology
    Mark Andrews: A lot of things broke when they turned this on
        Needs to get Google and other public resolvers and fail fully when 
child records don't match
        Willem: Some places in DNS namespace are more resilient, still work to 
do
    Jim Reid: Mark's idea is unrealistic, non-starter

Secure Nameserver Selection Algorithm for DNS Resolvers, Fenglu Zhang
    draft-zhang-dnsop-ns-selection

    Ondřej: Purpose of multiple nameservers is not balancing, but resilience
        Language of the draft is overly aggressive, tone it down
        Disagrees with the vulnerabilities in BIND
        Based on wrong premise
        Fenglu: About 3% of nameservers are non-responsive
            Was imprecise about BIND9 status for some things in the draft
    Ben: A lot of these issues are inappropriate for IETF draft
        The one that seems closed to this is the disabling attack
        Question about what constitutes a vulnerability
        Think carefully about what the promises that are being made
    Benno: Ask an implementer about the next draft

-----

Session 2
Date: Thursday, July 25, 2024
Time: 18:30-19:30 local
Chairs: Benno Overeinder, Suzanne Woolf, Tim Wicinski

464 Customer-side Translator (CLAT): Node Recommendations, Tommy Jensen
    draft-link-v6ops-claton

    Warren: Can we be creative with the wording in 7050
    Jen Linkova: Would like 7050 to disappear
        Send clear message with MUST NOT
    Ben: SHOULD but we know you won't
        Can change the examples
        But if nobody does this, we should reflect reality
        Validating stub resolver
    Mark: The text does not say what the secure channel is
        DNS64 will change the AAAA records because it breaks DNSSEC
        Make DNS64 obsolete
    David Schinazi: Has implemented RFC 7050
        There are cases where you need to use NAT64 directly for happy eyeballs
        Deprecate 7050 and DNS64
    Lorenzo Colitti: This is not a good mechanism
        It would be nice of 7050 goes away, not using prefs option
        Tommy: We should be honest
        Could update 7050 to point out that most links are already encrypted
    Nick Buraglio: Deprecating this would not preclude anything that exists
        Sends a message because this is the modern way to do it
        Better from an operator perspective
    Warren: Everybody is doing this
        We don't have to keep DNS64, and say why
    Jen: In V6OPS WG, they already have a document to deprecate
        Good to say "don't use this because it is obsolete"

DNS based load balancing (a.k.a. GeoDNS, GSLB) side meeting summary, Ben 
Schwartz
    Will need a name for the mailing list
    Should we be thinking in terms internal to nameservers, or the protocols 
talking between the parties

Client Authentication Recommendations for Encrypted DNS, Tommy Jensen
    draft-tjjk-cared

    Warren: Comcast can say "please fill in this form to get access to our 
resolver"
        Tommy: This would be inappropriate
            Would be willing to write why this is bad
        Why not do this in ADD?
        Tommy: ADD is for discovering server properties
    Tobias Fiebig: The connection must be very explicit
        Tommy: Does not want to be over-inclusive
    Wes: Likes the guidance; it is supercritical
        Knowing whether you expect to authenticate is important
        If you can spell it out to say "managed devices", that would be better
    Ben: Agrees with substantive content of the draft, horrified by everything 
else
        We are not empowered to tell people "of the things that can work 
together, don't use these two"
        We can give a list of implications, don't require a specific protocol
        Maybe can use Privacy Pass for this
        Doesn't like the normative language
        Tommy: We don't say "shouldn't do anything else"
        Talk about the properties, don't do a survey
    Jim: Great piece of work, should be adopted in DNSOP
        No one else is the right home
    Joe: Agrees with Jim
        Volunteers to help
        Interop is important, annoying if everyone does it their own way
        Bad if you get this wrong
        Defending the user of devices, preventing privacy leaking everywhere
    Jessica Krynitsky: Like the energy and hate of what it is worded
        Agrees with the idea of enumerating properties
    Erik Nygren: Will help interop
        Warn people about the sharp edges
    Q: Good informational document
        Might have reasons to run something else
    Warren: Corporate resolvers horrifies us
        Interoperability is good; we should document this
        Is not clear if this is in the charter
        Wants a poll: more "yes" than "no", equal number of "no opinion"

Zone Hopping: A method to prevent zone-walking in DNSSEC, Fatema Bannat Wala
    draft-fbw-dnsop-dnszonehop

    Joe: Aggressive NSEC caching
        Stopped zone walking, but also stops resolution in the real world
        Fatema: Interested in the drawbacks
    Ondřej: Horrible idea, wearing a developer's hat
        DNS deployment has a long tail, it will take years
        Will not implement this
    Evan Hunt: Same remark as NSEC5
        Zone walking is not a problem
        Don't need another solution
        Waste of WG time for something that is not a problem
    Q: There is no such thing as a sensitive DNS name
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to