Re: [dns-privacy] [dnsdir] Dnsdir telechat review of draft-ietf-dprive-unilateral-probing-12

2023-09-04 Thread Jim Reid
> On 4 Sep 2023, at 12:32, Florian Obser via Datatracker via dnsdir > wrote: > > -12 does not address the issues that were introduced in version -11. > The status of my review does not change. Many thanks Florian. ___ dns-privacy mailing list dns-

Re: [dns-privacy] DPRIVE is officially a WG.

2014-10-18 Thread Jim Reid
On 18 Oct 2014, at 16:58, Warren Kumari wrote: > A: keep the list name as dns-privacy@ +1 ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] privacy respect... ICANN!!

2015-06-27 Thread Jim Reid
On 27 Jun 2015, at 14:26, Hosnieh Rafiee wrote: > but exposing such critical information to public is against privacy rights So get your local law enforcement and/or legislature to intervene. Please take your complaints there. If you want to join in the latest battle in this never-ending screa

Re: [dns-privacy] Call for Adoption: draft-dickinson-dprive-bcp-op

2018-07-18 Thread Jim Reid
> On 18 Jul 2018, at 19:25, Barry Raveendran Greene wrote: > > I support the adoption of this work into the WG. +1 ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] Resolver to authoritative discussion guidance

2018-07-19 Thread Jim Reid
On 19 Jul 2018, at 19:30, Tim Wicinski wrote: > > For the time being, we would like to bypass the TLD server operator > perspective. While we are in this phase of discussion, the chairs would > like everyone to follow these guidelines: > > - Focus on *what* is needed. This seems wrong

Re: [dns-privacy] Resolver to authoritative discussion guidance

2018-07-19 Thread Jim Reid
On 19 Jul 2018, at 21:17, Tim Wicinski wrote: > > For example, Verisign has .com which is quite large. My Employer has domains > at the SLD issue that 'currently' has > 100MM records. > > Are the difference serving records vs serving delegations? I doubt response sizes will be markedly dif

Re: [dns-privacy] [DNSOP] New: draft-bertola-bcp-doh-clients

2019-03-12 Thread Jim Reid
> On 12 Mar 2019, at 15:49, Stephane Bortzmeyer wrote: > > the case of a commercial > Internet access provider is clear in the other direction: a client is > not an employee, and is entitled to a free, open and neutral Internet > access. Stephane, that’s simply not true. A client of an Interne

Re: [dns-privacy] [DNSOP] [Doh] New: draft-bertola-bcp-doh-clients

2019-03-12 Thread Jim Reid
> On 12 Mar 2019, at 16:01, Stephane Bortzmeyer wrote: > > I still do not understand why people have a problem with DoH whch did > not already exist before with my-own-name-resolution-protocol-over-HTTPS. It’s a question of scale/ubiquity. These “alterate” resolution tricks have up until now

Re: [dns-privacy] [Doh] [DNSOP] [Add] Do53 vs DoT vs DoH Page Load Performance Study at ANRW

2019-07-22 Thread Jim Reid
> On 22 Jul 2019, at 21:52, Paul Vixie wrote: > > apparently ECS creates problems for privacy, but _how could we have > suspected_? IIRC the ECS privacy issues were recognised at the time. They lost out to the argument that CDNs were already doing (or about to do) ECS and it would be bette

Re: [dns-privacy] [Ext] Re: ADoT requirements for authentication?

2019-10-29 Thread Jim Reid
On 30 Oct 2019, at 01:32, Eric Rescorla wrote: > >> Yes, it's hard, but I think it's worthwhile, because the prospect of getting >> the root to offer ADoT seems very distant to me. >> > Why? Do we have estimates of the load level here as compared to (say) Quad9 > or 1.1.1.1? The root server

[dns-privacy] DoT at the DNS root

2019-10-29 Thread Jim Reid
On 30 Oct 2019, at 01:32, Eric Rescorla wrote:: > Do we have estimates of the load level here as compared to (say) Quad9 or > 1.1.1.1? NB Offlist Take a look at how long it took for the root server operators (RSOs) to make their infrastructure DNSSEC-capable. Each of them understandably took t

Re: [dns-privacy] DoT at the DNS root

2019-10-29 Thread Jim Reid
On 30 Oct 2019, at 03:48, Jim Reid wrote: > > > NB Offlist Sigh. ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] [Ext] Re: ADoT requirements for authentication?

2019-10-31 Thread Jim Reid
> On 30 Oct 2019, at 18:40, Livingood, Jason > wrote: > > I agree that this is not a technical issue of scaling the root; that quantity > of queries per day and second is not a big problem. Rather, as you note, it > is a layer-9 issue. But I don't think we should constrain our requirements

Re: [dns-privacy] [Ext] Re: ADoT requirements for authentication?

2019-10-31 Thread Jim Reid
> On 31 Oct 2019, at 01:21, John Levine wrote: > > In article > you > write: >> Encryption at the root is very possible. > > Indeed, but that's not the same question as whether it's a good idea. +1 > > ... > Let's put this in the pile of things to think about later. +1 to that too. __

[dns-privacy] ADoT deployment at the root

2019-10-31 Thread Jim Reid
> On 30 Oct 2019, at 06:37, Watson Ladd wrote: > > The root zone is data: whether one distributes it via DoT, DoH, IPv6, or > carrier pigeon is irrelevant to the policies that goven what's in it. I agree. But that's orthogonal to what I thought we were discussing. There are gazillions of l

Re: [dns-privacy] Datatracker State Update Notice:

2020-03-09 Thread Jim Reid
Could the people on this thread *please* trim their postings? It's hard to track the discussion when every email contains a jumbled set of a gazillion postings. Thanks. ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/list

Re: [dns-privacy] Call for Adoption: draft-huitema-dprive-dnsoquic

2020-04-08 Thread Jim Reid
> On 8 Apr 2020, at 17:41, Tim Wicinski wrote: > > This starts a Call for Adoption for draft-huitema-dprive-dnsoquic I support adoption of this ID and am willing to review and maybe contribute text. ___ dns-privacy mailing list dns-privacy@ietf.or

Re: [dns-privacy] [Ext] Call for Adoption: draft-huitema-dprive-dnsoquic

2020-04-08 Thread Jim Reid
> On 8 Apr 2020, at 17:55, Paul Hoffman wrote: > > This draft is better than earlier versions, but still is missing something > that seems crucial: detailed comparison between the protocol described here, > DoT, and DoH. The suggestion in the text that the comparison would be added > after t

Re: [dns-privacy] [Ext] WG Call for Adoption: draft-pp-recursive-authoritative-opportunistic

2021-02-08 Thread Jim Reid
> On 8 Feb 2021, at 17:11, Paul Hoffman wrote: > > Without a fleshwd-out proposal for a fully-authenticated protocol to compare > to, saying that this WG should not try to fulfill its charter to help encrypt > recursive to authoritative traffic just seems wrong. Paul, just because the WG *ca

Re: [dns-privacy] WG Call for Adoption: draft-pauly-dprive-oblivious-doh

2021-03-18 Thread Jim Reid
> On 18 Mar 2021, at 15:42, Tommy Pauly > wrote: > > Instead, cases where clients are particularly concerned about revealing > client IP and identity to very large public resolvers benefit more from this. There’s a much easier and far quicker solution for that problem. Clients who have thos

Re: [dns-privacy] WG Call for Adoption: draft-pauly-dprive-oblivious-doh

2021-03-18 Thread Jim Reid
> On 18 Mar 2021, at 16:21, Eric Orth > wrote: > > I disagree with your assumption that clients/users are only concerned about > particular resolvers. Eric, I didn’t make any assumptions about that at all. It was Tommy who said ODNS would benefit those who were concerned about leakage to v

Re: [dns-privacy] [Ext] next steps for draft-opportunistic-adotq

2021-03-23 Thread Jim Reid
> On 23 Mar 2021, at 14:16, Brian Haberman wrote: > > Is there an issue with putting SVCB info in the TLD zones? Yes - for gTLDs. Almost all of them have contracts with ICANN. Adding SVCB records to ccTLDs is easier (in principle) since few (any?) of them have contracts with ICANN. Since tho

Re: [dns-privacy] [Ext] next steps for draft-opportunistic-adotq

2021-03-23 Thread Jim Reid
> On 23 Mar 2021, at 14:54, Bill Woodcock wrote: > > There are a million clever and useful things that you could do, if it were > possible. Which are particularly valuable for brand TLDs, for instance. IMO, the IETF shouldn’t get into developing protocols just for the benefit of here today,

Re: [dns-privacy] [Ext] next steps for draft-opportunistic-adotq

2021-03-23 Thread Jim Reid
> On 23 Mar 2021, at 14:56, Paul Wouters wrote: > > The point of putting them into a TLD would be to be able to build up a > secure private connection to the TLD nameserver, before issuing a target > domain query within the TLD. These things can be done without needing SVCB records. Though the

Re: [dns-privacy] [Ext] next steps for draft-opportunistic-adotq

2021-03-23 Thread Jim Reid
> On 23 Mar 2021, at 21:20, Ben Schwartz > wrote: > > I think there's a miscommunication here. The proposals here are about how a > TLD operator can tell a **recursive resolver** what encrypted DNS server to > use, exactly like an NS record. This is not suggesting any change to stub > res

Re: [dns-privacy] [Ext] next steps for draft-opportunistic-adotq

2021-03-23 Thread Jim Reid
> On 23 Mar 2021, at 22:32, Paul Wouters wrote: > > So what is it that you are exactly objecting to? The syntax or the capability? The capability - mostly. TLDs should not be publishing SVCB records for the reasons I outlined before. I’m not too keen on using SVCB records apart from stubs fi

Re: [dns-privacy] [Ext] next steps for draft-opportunistic-adotq

2021-03-24 Thread Jim Reid
> On 24 Mar 2021, at 13:34, Bill Woodcock wrote: > > I’m still looking for those reasons. Could you enumerate them again? No. You can re-read my earlier mail which enumerated those reasons. If you want to discuss specifics, I’m happy to do so. Though the issue of SVCB records in TLDs is som

Re: [dns-privacy] [Ext] next steps for draft-opportunistic-adotq

2021-03-24 Thread Jim Reid
> On 24 Mar 2021, at 14:10, Bill Woodcock wrote: > > How many mqps are necessary to have a voice in your vision of > multistakeholderism? I don’t know. I think/hope we have the same vision of multistakeholderism. If not, that’s a conversation for another time and place. > Or, viewed from t

Re: [dns-privacy] Root Server Operators Statement on DNS Encryption

2021-03-30 Thread Jim Reid
> On 31 Mar 2021, at 01:08, Erik Kline wrote: > > "Root Server Operators do not feel comfortable being the early adopters > of authoritative DNS encryption and would like to first see increased > deployment in other parts of the DNS hierarchy." > > Seems fair to me, for the time being.

Re: [dns-privacy] Root Server Operators Statement on DNS Encryption

2021-03-31 Thread Jim Reid
> On 31 Mar 2021, at 13:33, Brian Haberman wrote: > > I was wondering the same thing. 8806 would definitely preclude the need > to support encryption at the root. This is one of the things that puzzles me about the current discussion. The WG seems to be pushing TLS-based solutions and ignorin

Re: [dns-privacy] Root Server Operators Statement on DNS Encryption

2021-03-31 Thread Jim Reid
> On 31 Mar 2021, at 13:58, Stephen Farrell wrote: > >> And is TLS the *only* game in town? > When encrypting DNS based on some standard protocol? It is I know that Stephen. The point I was trying (and apparently failing) to make was there are other privacy-friendly tools/protocols available

Re: [dns-privacy] Root Server Operators Statement on DNS Encryption

2021-03-31 Thread Jim Reid
> On 31 Mar 2021, at 14:05, Stephane Bortzmeyer wrote: > > RFC 7626 (the threat model and problem analysis > that some people claim is missing) is clear (section 2.5.2 for > instance). Stephane, RFC7626 is 6 years old. It predates the DoH and DoT (and soon DoQ) specs. Some other risks have ch

[dns-privacy] RFC7626 and risk/threat analysis

2021-04-01 Thread Jim Reid
> On 1 Apr 2021, at 14:04, Stephane Bortzmeyer wrote: > > RFC 793 is 39 years old. Let's drop TCP and move to QUIC (the RFCs are > in the RCF-EDITOR state). > > And I'm too charitable to mention the age of DNS RFCs You should be above whatabootery* Stephane. >> Some other risks have changed

Re: [dns-privacy] Comments on draft-dkgjsal-dprive-unilateral-probing

2021-11-11 Thread Jim Reid
> On 11 Nov 2021, at 15:28, Christian Huitema wrote: > > It is not uncommon to see upgrades being rolled out at different times to > different servers in the farm. Opportunistic strategies and probing > strategies have to deal with that. This can be complex. Lots of busy domain names (like