Re: [dns-operations] [Ext] dns-operationsMysteries of DNSSEC

2024-04-02 Thread Paul Hoffman
hey are doing. Recent DDoS stats indicate that redirected DNS over UDP is no longer a significant source in real-world attacks. Short of being fodder for yet another "UDP considered harmful" discussion, why even note this? --Paul Hoffman ___ dns-

Re: [dns-operations] [Ext] Enabling DNSSEC signing for pagerduty.com

2023-06-06 Thread Paul Hoffman
is not worth it. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Re: [dns-operations] [Ext] New addresses for b.root-servers.net

2023-06-04 Thread Paul Hoffman
nd of this year. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Re: [dns-operations] [Ext] New addresses for b.root-servers.net

2023-06-03 Thread Paul Hoffman
For all the people on this list who are taking a keen interest in priming: there is a call in the DNSOP WG about whether draft-klh-dnsop-rfc8109bis should be adopted as a WG item. This thread has brought up some topics related to priming that are not covered in RFC 8109. --Paul Hoffman

[dns-operations] Proposed Procedure for Selecting a Top-Level Domain String for Private Use

2023-01-13 Thread Paul Hoffman
x27;d) or someone you might know on SSAC. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Re: [dns-operations] [Ext] Browser Public suffixes list

2022-08-26 Thread Paul Hoffman
Even worse! Thanks. --Paul smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Re: [dns-operations] [Ext] Browser Public suffixes list

2022-08-26 Thread Paul Hoffman
t; The next update of firefox and hopefully chromium based browsers (sept 26), > should contain the updated list. > The only browser we could not find any documentation on this matter is > Apple's safari. > p.s It has nothing to do with right to left scripts. Whew! That's very

Re: [dns-operations] [Ext] Browser Public suffixes list

2022-08-26 Thread Paul Hoffman
sing another ccTLD IDN such as xn--4gbrim works fine. Firefox works correctly when you enter the non-existent "nic.xn--4dbrk0ce", but Safari and Chrome fall back to search. All three work fine when entering the non-existent "nic.xn--4gbrim". --Paul Hoffman smi

[dns-operations] Opportunity to operate a non-gTLD non-ccTLD TLD

2022-07-08 Thread Paul Hoffman
https://sam.gov/opp/93a697c39c3f44839a2000119c3e4956/view (tl;dr: US is soliciting bids for being the back-end for .gov) smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://li

Re: [dns-operations] [Ext] How should work name resolution on a modern system?

2022-06-15 Thread Paul Hoffman
t", whith the nsswitch code sending no A/ DNS queries for > TLDs. Only /etc/hosts and other local sources would be consulted. Advocating that a library not check for valid data (even if you believe that it is "profoundly fragile" seems more likely to lead to damage than ch

Re: [dns-operations] [Ext] SHA-1 DNSSEC verification broken in RHEL 9 and CentOS 9 Stream

2022-04-13 Thread Paul Hoffman
To date, have any of your customers or anyone in the DNS community, supported your choice of how to implement this? If not, or if only a trivial number have, does that affect your decision on how to implement this? --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature

Re: [dns-operations] [Ext] What is the reason of J-Root doesn't serve the arpa zone?

2021-12-03 Thread Paul Hoffman
ervers) was discussed in DNSOP earlier this year. --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

[dns-operations] Request for proposals for implementation for study of RSSAC028; submission date extension

2021-11-22 Thread Paul Hoffman
in advance! --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Re: [dns-operations] [Ext] K-root in CN leaking outside of CN

2021-11-08 Thread Paul Hoffman
it is not a requirement. --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Re: [dns-operations] [Ext] K-root in CN leaking outside of CN

2021-11-06 Thread Paul Hoffman
te leaks almost insignificant; given the low rate of DNSSEC validation, any impersonation can be quite important. --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.net htt

Re: [dns-operations] [Ext] K-root in CN leaking outside of CN

2021-11-06 Thread Paul Hoffman
root instance inside or outside of $country would reply to a query for "d.ns.facebook.com" with a referral, not an answer. Thus, if you are sending that query to one of the IP addresses for $x.root-servers.net and you get an A record back, the host you are hitting is not run by one o

[dns-operations] Request for proposals for implementation for study of RSSAC028

2021-11-01 Thread Paul Hoffman
qualified contractors to choose from. If you work for such a contractor, please note the deadlines listed in the overview. If you know someone who works for such a contractor, please tell them about this RFP. Thanks in advance! --Paul Hoffman smime.p7s Description: S/MIME cryptographic

Re: [dns-operations] [Ext] Obsoleting 1024-bit RSA ZSKs (move to 1280 or algorithm 13)

2021-10-20 Thread Paul Hoffman
n summary, it is fine to propose that software default to issuing larger RSA keys for ZSKs, but not with an analysis that makes a lot of unstated guesses. Instead, it is fine to say "make them as large as possible without causing automatically needi

Re: [dns-operations] [Ext] Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS

2021-08-17 Thread Paul Hoffman
no one has. As far as I can tell, no one has even tried. --Paul Hoffman (who pulled getdns together, contracted by Google) smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https:

Re: [dns-operations] [Ext] IMPORTANT: Please ensure your NSEC3 iteration count is sufficiently low

2021-04-17 Thread Paul Hoffman
OK, I know this is trivial, but: > bbn.com 93451500 Stephen Kent. Just sayin' --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.n

Re: [dns-operations] [Ext] Possibly-incorrect NSEC responses from many RSOs

2021-03-02 Thread Paul Hoffman
ore it again until it comes up again fiveish years from now. Any attempted update to RFC 4035 will cause some people to squawk even if it makes the intent clearer. --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___ dns-operati

Re: [dns-operations] [Ext] Possibly-incorrect NSEC responses from many RSOs

2021-02-28 Thread Paul Hoffman
On Feb 28, 2021, at 11:35 AM, Vladimír Čunát wrote: > > On 2/28/21 3:24 AM, Paul Hoffman wrote: >> On Feb 27, 2021, at 5:32 PM, Mark Andrews >> wrote: >> >>> It says that RRSIGs exist at that name. >>> >> Could you say more? I don't

Re: [dns-operations] [Ext] Possibly-incorrect NSEC responses from many RSOs

2021-02-27 Thread Paul Hoffman
On Feb 27, 2021, at 5:32 PM, Mark Andrews wrote: > > It says that RRSIGs exist at that name. Could you say more? I don't understand the context here. For example, "dig @f.root-servers.net -4 nl rrsig" gives a reply with no Answer section. --Paul Hoffman smime.p7

[dns-operations] Possibly-incorrect NSEC responses from many RSOs

2021-02-27 Thread Paul Hoffman
are, configurations, or in a clarification to RFC 4035), but the differing responses between RSOs with the same zone file seems worthy of discussion. --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dn

Re: [dns-operations] [Ext] Signing on the fly and UltraDNS

2021-01-06 Thread Paul Hoffman
t;dig @8.8.8.8 +dnssec +yaml {} A".format(this_name), shell=True, capture_output=True, encoding="utf-8", check=True) Given the errors, I had to add the +noidnout option. --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___

Re: [dns-operations] [Ext] Signing on the fly and UltraDNS

2021-01-05 Thread Paul Hoffman
On Jan 5, 2021, at 12:41 PM, John Levine wrote: > > In article <853ece14-271f-4e93-9473-d1dbde836...@icann.org> you write: >> On Jan 5, 2021, at 11:20 AM, Dave Lawrence wrote: >>> >>> Paul Hoffman writes: >>>> I am using tools that expect host

Re: [dns-operations] [Ext] Signing on the fly and UltraDNS

2021-01-05 Thread Paul Hoffman
On Jan 5, 2021, at 11:20 AM, Dave Lawrence wrote: > > Paul Hoffman writes: >> I am using tools that expect host names instead of domain names (in >> this case, dig); > > I think I must be misunderstanding something, or at least haven't > imagined widely enough t

Re: [dns-operations] [Ext] Signing on the fly and UltraDNS

2021-01-04 Thread Paul Hoffman
On Jan 4, 2021, at 7:44 PM, Viktor Dukhovni wrote: > > On Tue, Jan 05, 2021 at 02:39:27AM +, Paul Hoffman wrote: > >> Greetings again. Those of us who research DNSSEC adoption in the real >> world are being a bit stymied by some of the sign-on-the-fly systems

[dns-operations] Signing on the fly and UltraDNS

2021-01-04 Thread Paul Hoffman
Greetings again. Those of us who research DNSSEC adoption in the real world are being a bit stymied by some of the sign-on-the-fly systems, such as this one, apparently from UltraDNS. (Similar results are given for any nonexistent name in house.gov, such as "www1".) --Paul Hoff

Re: [dns-operations] [Ext] A? ftp://netgear.routerlogin.net/shares/.

2020-12-10 Thread Paul Hoffman
breakage. Device manufacturers tend to use a small number of codebases from a small number of OEMs for years at a time, so alerting them of problems will make the DNS work better for many people. --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature

Re: [dns-operations] [Ext] Netgear time-g.netgear.com + time-f.netgear.com - flooding....

2020-11-05 Thread Paul Hoffman
uot;update your firmware", consider "update your firmware or upgrade your hardware from a different brand". Brands that have a single UI across their line tend to be more supportable. --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature __

Re: [dns-operations] [Ext] DNS Flag Day 2020 will become effective on 2020-10-01

2020-09-11 Thread Paul Hoffman
ven flag day, please be clearer about that on the web page. Those who will be hurt by the edge case failures that this flag day causes will the authoritative and resolver operators, not the vendors. --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature _

Re: [dns-operations] [Ext] Nameserver responses from different IP than destination of request

2020-08-31 Thread Paul Hoffman
ne's logs, if we can find people who are logging. > That is the kind of thing that Geoff and George are good at, so if they want > to do such an experiment and let us all know the results, I think that would > be interesting. That, too. --Paul Hoffman smime.p7s Descriptio

Re: [dns-operations] [Ext] Nameserver responses from different IP than destination of request

2020-08-31 Thread Paul Hoffman
or IPs are exhibiting the behavior. --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Re: [dns-operations] [Ext] Nameserver responses from different IP than destination of request

2020-08-31 Thread Paul Hoffman
On Aug 31, 2020, at 12:40 AM, Thomas Mieslinger wrote: > > On 8/29/20 5:50 PM, Paul Hoffman wrote: >> On Aug 28, 2020, at 3:24 PM, Puneet Sood via dns-operations >> wrote: >>> We would be interested in hearing other operator's experience here. >>> Are

Re: [dns-operations] [Ext] Nameserver responses from different IP than destination of request

2020-08-29 Thread Paul Hoffman
ive operators about what their configuration is so that we can maybe guide others away from this path. --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns

Re: [dns-operations] [Ext] OpenDNS, Google, Nominet - New delegation update failure mode

2020-04-03 Thread Paul Hoffman
Shouldn't this part of the thread (proposed changes base on an Internet Draft) be in the DNSOP WG in the IETF? Said another way, if you don't move it there soon, when the topic appears there, you'll have to repeat yourselves. --Paul Hoffman smime.p7s Description: S/MIME cryptogr

Re: [dns-operations] [Ext] Something happening in the root?

2020-01-23 Thread Paul Hoffman
Ad the problem seems fixed now, at least from the vantage points I use (which hit Cloudflare at various places). --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.net

Re: [dns-operations] [Ext] Something happening in the root?

2020-01-23 Thread Paul Hoffman
On Jan 23, 2020, at 12:54 PM, Marco Davids wrote: > > Op 23-01-20 om 21:26 schreef Paul Hoffman: > >> It looks like ISC had bad code (or bad configuration) for answers to >> dig @f.root-servers.net net in ns +nsid >> >> At this moment, from any place I

Re: [dns-operations] [Ext] Something happening in the root?

2020-01-23 Thread Paul Hoffman
It looks like ISC had bad code (or bad configuration) for answers to dig @f.root-servers.net net in ns +nsid At this moment, from any place I try, answers are coming back from pao1a.f.root-servers.org or pao1b.f.root-servers.org, according to the NSID. --Paul Hoffman smime.p7s Description

Re: [dns-operations] [Ext] EDNS Client Subnet (ECS) in queries sent to Google Public DNS

2020-01-17 Thread Paul Hoffman
On Jan 17, 2020, at 10:10 AM, Alexander Dupuy via dns-operations wrote: > > > From: Alexander Dupuy > Subject: EDNS Client Subnet (ECS) in queries sent to Google Public DNS > Date: January 17, 2020 at 10:10:19 AM PST > To: > > > If any reader of this list is sending DNS requests with the ED

Re: [dns-operations] [Ext] Re: help with a resolution

2020-01-08 Thread Paul Hoffman
excellent example of a common situation where such a signature might be caused to occur. Thanks! --Paul Hoffman smime.p7s Description: S/MIME cryptographic signature ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns

Re: [dns-operations] [Ext] Re: help with a resolution

2020-01-08 Thread Paul Hoffman
the scenario where "I" can get "you" to sign an RRset? Aren't RRsets all signed by their owner, the creator of the RRset? If I'm a signer and I'm willing to sign something that I didn't create, I already have a lot of problems already.

Re: [dns-operations] [Ext] Re: help with a resolution

2020-01-08 Thread Paul Hoffman
ignature > period, the collision will break once the RRset is resigned with > a different inception/expiration interval). A DNSKEY RR is only useful if there is a matching DS in the parent zone that matches the DNSKEY. In your scenario, that would require a preimage attack. --Paul Hoffman sm

Re: [dns-operations] DNS Flush Protocol

2015-04-02 Thread Paul Hoffman
e effective. Further, when discovered, and the real zone owner sends out another blast of "please refresh my zone", recipients might think "I already did that" and ignore it. Thus, the protocol proposed probably has to involve a requirement for DNSSEC validation of announ

Re: [dns-operations] CloudFlare policy on ANY records changing

2015-03-10 Thread Paul Hoffman
On Mar 10, 2015, at 8:46 AM, David C Lawrence wrote: > > Paul Hoffman writes: >> On Mar 10, 2015, at 6:25 AM, Yunhong Gu wrote: >>> So the problem is, why NOTIMP? REFUSED sounds like a better choice. >> >> +1. "REFUSED" exactly describes what is goin

Re: [dns-operations] CloudFlare policy on ANY records changing

2015-03-10 Thread Paul Hoffman
On Mar 10, 2015, at 6:25 AM, Yunhong Gu wrote: > So the problem is, why NOTIMP? REFUSED sounds like a better choice. +1. "REFUSED" exactly describes what is going on. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists

Re: [dns-operations] CloudFlare policy on ANY records changing

2015-03-06 Thread Paul Hoffman
are losing mail in a way similar to what refusing to do ANY will cause, yet this isn't making the news. The new world doesn't care about mail non-delivery so much... --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.d

Re: [dns-operations] Mozilla Firefox and ANY queries

2015-03-01 Thread Paul Hoffman
o their implementation. > > The API design isn't the real issue here, it is interacting with the > Name Service Switch in a way that is compatible with all existing NSS > modules. Yep, that's part of the implementation, and Verisign seems quite aware of it. Note, too, that

Re: [dns-operations] Mozilla Firefox and ANY queries

2015-03-01 Thread Paul Hoffman
e library you got from somewhere). Difficult, but not impossible. The getdns API included non-DNS information from the beginning, and Verisign is working on getting that part into their implementation. --Paul Hoffman ___ dns-operations mailing list dns-operati

Re: [dns-operations] Root-servers returning TC=1 after 5 NXDOMAINS

2015-02-11 Thread Paul Hoffman
ork. after the tenth anniversary of > SAC004 came and went, with more rather than fewer edges lacking SAV. 25/sec > of signed nxdomain is enough to overload any DSL circuit. i'd be happy to > work with you to find an upper limit. OK, now it sounds like you don&

Re: [dns-operations] Root-servers returning TC=1 after 5 NXDOMAINS

2015-02-11 Thread Paul Hoffman
orly-thought-out experiment on the live operating DNS with, as usual, insufficient data about the experiment being collected. If I'm wrong, and your number of "25/sec" is based on analysis and data, it would be great for you to share it here. --Paul Hoffman

Re: [dns-operations] Root-servers returning TC=1 after 5 NXDOMAINS

2015-02-11 Thread Paul Hoffman
names and documentation are inadequate. Please strongly consider having ISC-f talk to ISC-BIND about the admin interface for RRL, including possible warnings for clearly bad configurations. --Paul Hoffman signature.asc Description: Message signed

Re: [dns-operations] Root-servers returning TC=1 after 5 NXDOMAINS

2015-02-10 Thread Paul Hoffman
that is the intention. The only people who can say what the intention of the F-root servers is the folks who run it. > Is there an > official policy on root-servers that allow AXFR yet? No. > Can one count on this > working? No, but you can add tooling to be sure that you are ge

Re: [dns-operations] AWS footnote: DNS firewall rules are UDP only

2015-01-28 Thread Paul Hoffman
Are there any Route 53 people on this list? If so, this should be fixed ASAP. --Paul Hoffman > On Jan 28, 2015, at 11:28 AM, Fred Morris wrote: > > I just noticed that when configuring firewall rules for an AWS instance, > if "DNS" is chosen then the (only) protocol auto

Re: [dns-operations] cache flush request

2015-01-17 Thread Paul Hoffman
ts to use them, yes it certainly would. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] Test on Priming Behavior

2014-12-23 Thread Paul Hoffman
re going to trust them to give you the root NS RRset you can trust them to give you a TLD referral", which seems about right to me. That is, is there really a reason for starting the cache with a query for ". IN NS" instead of just "whatever IN A"? --Paul Hoffman

Re: [dns-operations] Thread summary: knot-dns

2014-12-18 Thread Paul Hoffman
On Dec 18, 2014, at 5:26 PM, Michael Sinatra wrote: > Thread summary for dns-operations thread "knot-dns": > > Total Messages: 38 > Total Size: 298KB > Thread Content Summary: "It's another trade-off." Pertaining to thread title: 5% ___ dns-operati

Re: [dns-operations] Assuring the contents of the root zone

2014-12-01 Thread Paul Hoffman
7;m not seeing how zone walking validates the contents of the glue records. > i think walking the existing zone and verifying that there are no records > between the nsecs and that every signature is valid and that the nsec chain > ends at the apex, is simpler. It is. Unless I'

[dns-operations] Assuring the contents of the root zone

2014-12-01 Thread Paul Hoffman
; however, they are all more complex, and some involve using the zone signing key for signing something other than the contents of an RRSIG. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailm

Re: [dns-operations] ccTLD operators

2014-11-26 Thread Paul Hoffman
ight have the folks you want. There are various groups outside of ICANN that might as well. Two that come to mind are CENTR and APTLD. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman

Re: [dns-operations] resolvers considered harmful

2014-10-23 Thread Paul Hoffman
On Oct 23, 2014, at 10:29 AM, Andrew Sullivan wrote: > > On Thu, Oct 23, 2014 at 07:25:46AM -0700, Paul Hoffman wrote: >> Speaking as someone who supports all end systems to be their own validating >> recursive resolver. > > "Validating" I get. Why recursive?

Re: [dns-operations] resolvers considered harmful

2014-10-23 Thread Paul Hoffman
ere is only > one rcode field. So I don't think that option is as easy as the paper > makes it out to be. Fully agree. This would be a huge protocol transition, and probably not even worth considering. --Paul Hoffman ___ dns-operations m

Re: [dns-operations] Source data about root server anycast locations?

2014-10-20 Thread Paul Hoffman
On Oct 20, 2014, at 10:03 AM, Joe Abley wrote: > RSSAC are getting ready to publish a document relating to coordinated > measurement of traffic seen by the root server system. I can't speak for > others, but personally I would like to see a similar effort standardising the > geographical and to

[dns-operations] Source data about root server anycast locations?

2014-10-18 Thread Paul Hoffman
ing reports, and anycast location and proliferation has not been covered in the reports covered so far. Has anyone (maybe DNS-OARC?) kept snapshots of this type of data? Any clues would be appreciated. --Paul Hoffman ___ dns-operations mailing list dns

Re: [dns-operations] Hearing first complains about failing internal resolving due to .prod TLD

2014-09-15 Thread Paul Hoffman
On Sep 15, 2014, at 10:00 AM, Wessels, Duane wrote: > > On Sep 11, 2014, at 6:12 PM, Paul Hoffman wrote: > >> On Sep 11, 2014, at 4:27 PM, Paul Vixie wrote: >> >>> for the time being, and perhaps for a long time to come, the >>> people who call the p

Re: [dns-operations] Hearing first complains about failing internal resolving due to .prod TLD

2014-09-13 Thread Paul Hoffman
list to re-debate what ICANN should have done for new gTLDs. There was plenty of earlier discussion in ICANN and at the Verisign workshop. ICANN made a decision and implemented it. Arguing about that history here is about as useful as arguing about the history o

Re: [dns-operations] Hearing first complains about failing internal resolving due to .prod TLD

2014-09-11 Thread Paul Hoffman
ts absence a bug. How do you measure that? This is a serious question, one that affects DNS operators. If you have a way of determining how many enterprises are negatively affected as a new gTLD rolls out, that would be very useful information. --

Re: [dns-operations] First new gTLD using ICANN's "Name Collision Occurrence Management Framework"

2014-08-28 Thread Paul Hoffman
fter that date. But > only .otsuka has the records: Also correct. So, before any of those TLDs start doing anything other than "I'm in the root zone" and "I have A records for nic", they have to do the 90-day controlled interruption. --Paul Hoffman

Re: [dns-operations] Does DNSSEC provide any mitigation for SSL bugs, like Apple's?

2014-02-24 Thread Paul Hoffman
the attacked site, while simply making up a private key. Paul W's incorrect answer assumes a bug where the MITM needs to have a valid certificate. That is the most common case, but not the one relevant here; the Apple bug allowed a certificate for which the private key didn'

Re: [dns-operations] Is it illegal to query the .berlin TLD servers?

2014-01-13 Thread Paul Hoffman
ds like you have a believable business case to want something there. > A similar record has been in use under .at for ages, and never caused any > technical nor administrative issues. ccTLDs cannot have administrative issues because politics. --Paul Hoffman ___

Re: [dns-operations] Is it illegal to query the .berlin TLD servers?

2014-01-11 Thread Paul Hoffman
t as soon as they could. Which other agreements with ICANN are they willing to break? Or, if this really is a simple mistake, which other simple mistakes are they willing to make until ICANN tells them not to? --Paul Hoffman ___ dns-operations mailing

Re: [dns-operations] Is it illegal to query the .berlin TLD servers?

2014-01-10 Thread Paul Hoffman
agreed with ICANN that they would *not* put in the root zone. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/m

Re: [dns-operations] new gTLDs for fun and profit

2013-11-15 Thread Paul Hoffman
Either this thread does not pertain to DNS operations, or it will pertain to them in the most painful way possible, involving forced name changes and touching all machines on a network. Regardless, our discussing ICANN's name choice policies will change nothing. --Paul Ho

Re: [dns-operations] It's begun...

2013-11-15 Thread Paul Hoffman
On Nov 15, 2013, at 12:41 AM, Stephane Bortzmeyer wrote: > On Thu, Nov 14, 2013 at 06:02:23PM +0100, > Phil Regnauld wrote > a message of 25 lines which said: > >> I'm waiting for the first news articles reporting corporate >> networks who've used .[insert new tld] as their private d

Re: [dns-operations] It's begun...

2013-11-07 Thread Paul Hoffman
that have private TLDs. Note that these are not the first to cause name collisions: the IDNs earlier in this raft could have done so due to search lists, and of course, any new TLD causes some collisions. --Paul Hoffman ___ dns-operations mailing list

[dns-operations] All NSs for a TLD being in the TLD itself

2013-10-24 Thread Paul Hoffman
for me. Is there a history of this being unsafe? Of being more safe than NSs whose names are in other TLDs? --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs

Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-15 Thread Paul Hoffman
what sort of car you should get. :) > > Is there something wrong with this? It could have been, but the responses were a few on one pole, a few on the other, and a lot of "it depends". Some of the "it depends" responses leaned in one direction, but some leaned in the the ot

Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-14 Thread Paul Hoffman
see if X converged in a community such as this. It didn't. That's a useful data point for people creating other protocols who have to listen to commenters who say where resolvers need to be. --Paul Hoffman ___ dns-operations mailing list dns-op

[dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-14 Thread Paul Hoffman
tinue to rely on its ISP? --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] using DNSSEC to mitigate domain hijacking via the registrar channel

2013-10-10 Thread Paul Hoffman
n yours: Don't use passwords for registrant-registrar interactions, use public key crypto. Put a copy of the public key in a new RRtype in the signed zone. When the current zone owner wants to change the key (similar to a password change), they update that record. --Paul Hoffman __

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-27 Thread Paul Hoffman
ling with exit status that "this zone is ok to serve". > With a bit of state held on disk about previous zones you could include some > of those temporal checks and perhaps catch a few more problems. ...but not all of them. --Paul Hoffman _

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-22 Thread Paul Hoffman
ey are asserting that the data behind a name is unprotected by DNSSSEC. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oa

[dns-operations] EDSN0 fallback in the era of DNSSEC

2013-04-29 Thread Paul Hoffman
DNSSEC is more widely deployed? --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] N-Root

2013-04-01 Thread Paul Hoffman
I don't see why it is even a consideration. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] Force TCP for external quereis to Open Resolvers?

2013-03-31 Thread Paul Hoffman
not solve (b), and probably not (a), for the Internet. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

[dns-operations] OT: Unicode collation

2013-03-20 Thread Paul Hoffman
information", but not useful to "alphabetize the IDN TLDs" or even "figure out where IDN TLDs appear in a list of all TLDs". None of this has anything to do with DNS operations. That's the whole point of the IDNA encoding. --Paul Hoffman _

Re: [dns-operations] Who is xn--j1amh.? Well, the general problem...

2013-03-20 Thread Paul Hoffman
is data in the root. This is a perfect application of Atom feeds, FWIW. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.d

Re: [dns-operations] Capturing 8.8.8.8 Traffic

2013-02-25 Thread Paul Hoffman
mer might have gone way down and X didn't notice it. It will always hurt because it will always last longer than intended. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/l

Re: [dns-operations] Defending against DNS reflection amplification attacks

2013-02-24 Thread Paul Hoffman
e US context which I live in. You have shown no evidence that these "cases" exist, much less that they hinged on BCP38. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] RRL specified in a stable place?

2013-02-04 Thread Paul Hoffman
nce-able document describing the > RRL. That is, something stable and reviewed - and that could be an RFC. > But an RFC does not have to come through the IETF. Nor did anyone say it had to. Please consider putting your straw man back on the shelf, and maybe help people who want to

Re: [dns-operations] RRL specified in a stable place?

2013-02-04 Thread Paul Hoffman
On Feb 4, 2013, at 11:39 AM, Andrew Sullivan wrote: > On Mon, Feb 04, 2013 at 10:54:36AM -0800, Paul Hoffman wrote: >> We now have two implementation of response rate limiting (RRL). In order for >> it to be widely adopted, an Internet-Draft followed by an RFC would be &g

Re: [dns-operations] RRL specified in a stable place?

2013-02-04 Thread Paul Hoffman
On Feb 4, 2013, at 11:07 AM, Paul Vixie wrote: > Paul Hoffman wrote: >> We now have two implementation of response rate limiting (RRL). In order for >> it to be widely adopted, an Internet-Draft followed by an RFC would be >> Really Helpful. > > agreed. > >

[dns-operations] RRL specified in a stable place?

2013-02-04 Thread Paul Hoffman
. This work should begin sooner, not after another implementation has started but gone in a different direction. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns

Re: [dns-operations] OpenHardware FPGA-based HSM SCA6000 with OpenSSL?

2012-10-16 Thread Paul Hoffman
te. The security offered by a system that acts like an HSM is based on the belief that the ability to review all the software used in the system will overwhelm the problems of too much software in the system. These are two orthogonal types of theater. --Paul Hoffman

Re: [dns-operations] OpenHardware FPGA-based HSM SCA6000 with OpenSSL?

2012-10-16 Thread Paul Hoffman
signed, has the same properties. There is a real question about whether HSMs or systems that act like HSMs have side-channel attacks that would leak the private key. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net

Re: [dns-operations] OpenHardware FPGA-based HSM SCA6000 with OpenSSL?

2012-10-15 Thread Paul Hoffman
are-based HSM in a tamper-evident box would have the same property. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.ne

Re: [dns-operations] OpenHardware FPGA-based HSM (was: Summary: Anyone still using a Sun/Oracle SCA6000 with OpenSSL?)

2012-10-15 Thread Paul Hoffman
way. FWIW, I'm not saying that SoftHSM is the right design for an HSM-like box, but rather that if we design a system that can replace HSMs and can be built for $200, it will be deployed much more often. --Paul Hoffman ___ dns-operations mailin

Re: [dns-operations] Massive DNS poisoning attacks in Brazil

2012-10-03 Thread Paul Hoffman
On Oct 3, 2012, at 7:42 AM, Paul Wouters wrote: > On Wed, 3 Oct 2012, Paul Hoffman wrote: > >> I fully agree with all of this, but it leaves the question: what about >> tunneling DNS in TLS-over-HTTP? The earlier statement about why this would >> not work (c

Re: [dns-operations] Massive DNS poisoning attacks in Brazil

2012-10-03 Thread Paul Hoffman
ng MITM certificates from bad actors in the root pile) doesn't actually apply because the client will have a single TLS trust anchor, possibly even one not even in the root pile. --Paul Hoffman ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

  1   2   >