Re: [dns-operations] Implementation of negative trust anchors?

2013-08-27 Thread Carlos M. Martinez
Hello, On Aug 27, 2013, at 12:56 PM, Paul Hoffman wrote: > > ...but not all of them. No feature / idea will ever catch all of them. This should not let us from implementing some of the good ideas that are going around. In fact, when I read 'an authoritative nameserver SHOULD NOT publish an

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-27 Thread Carlos M. Martinez
I agree, triggering some script after certain events and condition zone acceptance to the result of the script is a nice approach. I like it. On Aug 27, 2013, at 3:54 PM, Joe Abley wrote: > > On 2013-08-27, at 14:51, "UFJORw==" wrote: > >> That would mean having a full-fledged DNSSEC validato

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-27 Thread Carlos M. Martinez
On Aug 27, 2013, at 3:51 PM, "UFJORw==" wrote: > On Tue, Aug 27, 2013 at 6:06 PM, Carlos M. Martinez > wrote: >> when I read 'an authoritative nameserver SHOULD NOT publish an invalid zone >> _ever_', well, I was struck by how obvious this is, and a bit

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-27 Thread Carlos M. Martinez
On Aug 27, 2013, at 4:18 PM, "UFJORw==" wrote: > On Tue, Aug 27, 2013 at 9:01 PM, Carlos M. Martinez > wrote: >> I mostly agree, but as someone pointed out, the zone operator will be >> immediately (and painfully) aware of the mishap. Just as if you have a >&

Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-14 Thread Carlos M. martinez
I run my own recursive server for my four machine network. So I guess the answer is just, 'of course'. On 10/14/13 2:08 PM, Paul Hoffman wrote: > A fictitious 100-person company has an IT staff of 2 who have average IT > talents. They run some local servers, and they have adequate connectivity

Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-14 Thread Carlos M. Martinez
The problem that i see is that if you don't run your local DNS, then if your link with the outside world goes down, you're essentially toasted even for your own, locally hosted, services. This may not be a concern if you live in the more developed parts of the world, but down south here, trust me,

Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-14 Thread Carlos M. Martinez
Agreed. However, at least in my experience, it is usually easy to achieve high availability figures running a linux box on relatively cheap hardware, while links are much less dependable. I've seen 400-day plus uptimes on very cheap, dubious looking, PC clones. Now that I think of it, rather than

Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-17 Thread Carlos M. Martinez
Hello! On 10/17/13 8:03 AM, Jared Mauch wrote: > > On Oct 17, 2013, at 4:09 AM, Daniel Kalchev wrote: > >> >> On 17.10.13 00:12, Jared Mauch wrote: >>> Even small networks (I have a friend with a ~100 user wisp) shouldn't run >>> their own caches. The economics of it don't support this. >>> >>

Re: [dns-operations] Why would an MTA issue an ANY query instead of an MX query?

2012-06-12 Thread Carlos M. Martinez
I don't really think that is the ISPs business to 'correct' 'unwise' behaviour on the part of equipment. The devil is in the details. What does an ISP mean by 'correct' or what is 'unwise' ? Whatever filtering you can currently seem a 'good idea' quickly becomes abused, misunderstood and applied l

Re: [dns-operations] keeping ICANN busy

2012-09-21 Thread Carlos M. martinez
I'm on Randy on this... if we restrict the things protocols can / should do to the lowest level of what applications support, we'll be empty handed pretty quickly. On 9/21/12 9:20 AM, Randy Bush wrote: >> It would be nice if the IAB or IETF could issue some sort of "RRs in >> single-label domain

Re: [dns-operations] Summary: Anyone still using a Sun/Oracle SCA6000 with OpenSSL?

2012-10-14 Thread Carlos M. Martinez
gt; -- > Ondřej Surý -- Chief Science Officer > --- > CZ.NIC, z.s.p.o.--Laboratoře CZ.NIC > Americka 23, 120 00 Praha 2, Czech Republic > mailto:ondrej.s...@nic.czhttp://nic.cz/ > tel:+420.222745110 fax:+420.222745112 > ----------- >

Re: [dns-operations] Summary: Anyone still using a Sun/Oracle SCA6000 with OpenSSL?

2012-10-14 Thread Carlos M. Martinez
Hi! On 10/14/12 5:01 PM, Ondřej Surý wrote: > On 14. 10. 2012, at 13:37, Carlos M. Martinez wrote: > >> That could be a really interesting project. I'm not sure how can I >> contribute, but I'd love to see that happen. > Even helping defining requirements (when we

Re: [dns-operations] Google Public DNS

2012-11-15 Thread Carlos M. Martinez
I'm willing to bet there is no single set of 'actual working servers'. And since they are recursive servers, there are no 'hidden master' servers anywhere either. Just a happy bunch of servers with the same IPs :-) regards Carlos On 11/15/12 11:35 AM, Liu Mingxing wrote: > How do you know where

Re: [dns-operations] underline in TXT's host

2012-12-14 Thread Carlos M. Martinez
Back in the day we all did weird things. I used to sysadmin the boxes (yeah, all two of them :-) ) which served .com.uy and we allowed domain names with underscores, like my_domain.com.uy Actually there were quite a few of them and when we stopped allowing that we had to weather a lot of complaint

Re: [dns-operations] getting .CW recognised in the Google ccTLD tables/databases ...

2013-01-21 Thread Carlos M. Martinez
Agree, but anyways checking suffixes is a bizarre and broken way of validating an email. Just because a suffix exists it doesn't mean that the domain exists, and if a domain doesn't exist because the TLD is wrong or the 2nd level, or the 3rd level labels are wrong, the net effect on the application

Re: [dns-operations] validating TLD labels for fun and profit

2013-01-21 Thread Carlos M. Martinez
Sad but true :( On 1/21/13 12:08 PM, Jim Reid wrote: > On 21 Jan 2013, at 13:56, "Carlos M. Martinez" wrote: > >> I certainly hope that lousy web programmers start feeling the hot breath >> of pissed off people who have just spent a gazillion dollars on their >>

Re: [dns-operations] getting .CW recognised in the Google ccTLD tables/databases ...

2013-01-22 Thread Carlos M. Martinez
Mr. Pengel, Is there a way for people interested in debugging this problem to get a .CW email address. I wonder if there is any free webmail provider in the island, or if your organization could provide a few test accounts under some special-purpose domain. regards, ~Carlos On 1/20/13 8:55 PM,

Re: [dns-operations] Capturing 8.8.8.8 Traffic

2013-02-25 Thread Carlos M. Martinez
On principle I would hate my ISP messing around with my traffic, regardless of any good intentions. regards, ~Carlos On 2/25/13 3:26 PM, Graham Beneke wrote: > I discovered the other day that a large customer of $dayjob has decided > that it is a good idea to outsource the LAN support for their

Re: [dns-operations] Capturing 8.8.8.8 Traffic

2013-02-25 Thread Carlos M. Martinez
It might sound stupid, but I firmly believe the main reason everyone is now switching to Google's servers is that they are easy to remember and to dictate over the phone. In my case... (DSL provider at home), I have the choice of 200.40.230.245 or 8.8.8.8. Which one do you think my 63-year-old dad

Re: [dns-operations] Capturing 8.8.8.8 Traffic

2013-02-25 Thread Carlos M. Martinez
Hi! On 2/25/13 5:38 PM, Graham Beneke wrote: > ... snip ... >> Needless to say that if you add to the mix ISPs who are willing to mess >> with your NXDOMAINs for a buck the deal is sealed. > > I have no interest in fiddling with the responses to that extent but > where is the line? ;-) Is th

Re: [dns-operations] Capturing 8.8.8.8 Traffic

2013-02-25 Thread Carlos M. Martinez
I know. And I agree. But we are all seeing people going to 8.8.8.8, even people at home. So maybe having an alternative you can locally 'spoof' wouldn't hurt. cheers! ~Carlos On 2/25/13 6:11 PM, wbr...@e1b.org wrote: >> From: "Carlos M. Martinez" > >

Re: [dns-operations] Capturing 8.8.8.8 Traffic

2013-02-26 Thread Carlos M. Martinez
Google might be doing X,Y or Z with DNS data, but IMO, the fact doesn't excuse ISPs border filtering requests or spoofing 8.8.8.8/8.8.4.4 What happened to personal responsibility by the way? Do we really want our ISPs to nanny us just in case Big Evil Google data mines my DNS queries ? Why can't

Re: [dns-operations] Capturing 8.8.8.8 Traffic

2013-02-26 Thread Carlos M. Martinez
+1 ! On 2/26/13 12:34 PM, Cutler James R wrote: > On Feb 26, 2013, at 8:32 AM, Carlos M. Martinez wrote: > >> >> >> Google might be doing X,Y or Z with DNS data, but IMO, the fact doesn't >> excuse ISPs border filtering requests or spoofing 8.8.8.8/8.8.4.

Re: [dns-operations] DS keys for child zones on same server & inline signing

2013-03-15 Thread Carlos M. Martinez
It is not, starting with 9.9.0. However, you should _never_ edit the signed version of the zone manually. Edit the unsigned file, increment the SOA serial appropriately and then rndc sign. The SOA increment can be a bit tricky, If you have a signed zone with autodnssec maintain, then BIND will pe

Re: [dns-operations] DS keys for child zones on same server & inline signing

2013-03-17 Thread Carlos M. Martinez
I sent an email to the list with some details on that, but somehow it didn't make it to the list. In a few words: always edit your unsigned zone, never the signed one. Always check the CURRENT serial as published on the signed zone before incrementing. This last thing almost drove me crazy a ye

Re: [dns-operations] N-Root

2013-04-01 Thread Carlos M. Martinez
Good one :-) Sent from my iPad On 01 Apr 2013, at 21:28, Robert Edmonds wrote: > Paul Hoffman wrote: >> I thought this was an elaborate April 1 "joke", and am concerned that >> others did not. > > yes, it was. (check the last octet in the IP address: 198.51.100.41.) > i'm sorry, i must have b

Re: [dns-operations] Multi-master setups

2013-05-20 Thread Carlos M. martinez
rsync sounds like a fine solution, the problem imo, is what happens when something goes wrong, when a file transfer fails. right now i'm thinking about not rsync'ing the zone files by eash one, but rsync a tar file with all the zone files, so if it fails, it fails atomically (i know that this work

Re: [dns-operations] http://www.intodns.com/ no go for tlds

2013-05-21 Thread Carlos M. Martinez
And it believes that not having a MX record or an A record for 'www.' is somehow a DNS error. On 5/21/13 11:01 AM, Randy Bush wrote: > http://www.intodns.com/ does not seem to work for cctlds > > randy > ___ > dns-operations mailing list > dns-operation

Re: [dns-operations] OARC website down ?

2013-06-14 Thread Carlos M. Martinez
On 6/14/13 9:05 AM, Mehmet Akcin wrote: > Seems to be up for me too. From Hawaii. And that begs the question, isn't there anything better to do in Hawaii just now ? :D ~C. ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://list

Re: [dns-operations] .US problems?

2013-08-15 Thread Carlos M. Martinez
Yes, there is something strange going on. From my PoV (AS 28000) I only get answers from a.cctld.us cheers ~Carlos On 8/15/13 4:52 PM, Casey Deccio wrote: > On Thu, Aug 15, 2013 at 12:42 PM, wrote: >> Is anyone else seeing problems resolving .us addresses? >> > > Hmm, availability doesn't loo

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-23 Thread Carlos M. Martinez
I'm _very_ torn on the issue. On one hand I fully agree with Patrik in the sense that documenting such practices could lead to widespread 'holes' in validation. However, in my opinion the first knee jerk reaction of a recursive resolver operator will probably be 'if 1M clients of mine are unable t

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-23 Thread Carlos M. Martinez
Hello, On 8/23/13 2:03 PM, Paul Vixie wrote: > > > > on the other hand i would not be glad to see NTA as an IETF RFC, FYI, > BCP, or other standards-like artifact. A long time ago a group of people said the same about NAT and now, a few years on many of them regret it, while us who were not p