Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-11-27 Thread Peter Hessler
True, but many smaller networks don't particularly care about DNS, and are only willing to put in a token effort due to lack of personnel and lack of understanding. What problem are we trying to solve? If its "small networks have good dns", then unfortunately we do need to keep that in mind. -pe

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-11-27 Thread Michele Neylon - Blacknight via dns-wg
Running critical infrastructure isn’t “easy” so if a relatively short document scares people off then that’s probably not the worst thing. I don’t mean to be dismissive of your comments, but providing a DNS resolver to users while not super complicated in many respects is a serious undertaking.

Re: [dns-wg] Candidates for the open co-chair position at the DNS WG

2023-11-27 Thread Peter Hessler
I think all three would do a great job, but I would like to support Doris for WG Co-Chair. -- Brain, n.: The apparatus with which we think that we think. -- Ambrose Bierce, "The Devil's Dictionary" -- To unsubscribe from this mailing list, get a password reminder, or c

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-11-27 Thread Moritz Müller via dns-wg
If I recall correctly, someone just mentioned at the mic during the BCOP BOF session that such a long list of recommendations might actually scare people off from running their own resolver. Maybe adding a short paragraph in the introduction like the one below might address this: "Operators int

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-11-27 Thread Ralf Weber
Moin! On 26 Nov 2023, at 18:01, Shane Kerr wrote: > ### Aggressive NSEC caching > > **Aggressive NSEC caching should be enabled.** > > For: Public resolver operators. > > "Aggressive NSEC caching", meaning negative caching based on NSEC and > NSEC3 values, can reduce traffic greatly. It is importa