Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2024-02-08 Thread Dave Knight
I haven’t seen a final draft yet, so hopefully it’s not too late to suggest further additions :) A talk [1] at DNS OARC 42 this morning reminded me of a common pitfall we might do well to point out in the document. Beware of state in the network! State holding middleware, e.g. firewalls, loa

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2024-02-02 Thread Peter Thomassen
Hi all, Thanks a lot for this draft. I know my response is kinda late, but I understand that this is still an active endeavor. In addition to the comments below, I'd like to raise the point of a "false-positive" rate for any kind of filtering. This is, in my view, a crucial aspect, and not cu

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-12-05 Thread Dave Knight
Shane and other TF members, Great document! I have some comments about the anycast bit :) > On Nov 26, 2023, at 12:01 PM, Shane Kerr wrote: > > Colleagues, > > Here is a draft of the RIPE DNS Resolver Best Common Practices document > that the task force of that name has been working on. [.

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-11-30 Thread Willem Toorop
Thanks Shane and the Resolver BCP task force. Excellent work! I'd like to propose to, besides suggesting to transparently disclose the list of blocked websites (when the law requires blocking), also suggest to carry that information in the blocked response in an Extended DNS Error with code Bl

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-11-29 Thread Petr Špaček
On 27. 11. 23 13:16, Ralf Weber wrote: ### Aggressive NSEC caching **Aggressive NSEC caching should be enabled.** For: Public resolver operators. "Aggressive NSEC caching", meaning negative caching based on NSEC and NSEC3 values, can reduce traffic greatly. It is important to protect against r

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-11-29 Thread Petr Špaček
Hello everyone, thank your for hard work on this. I think it's well written document. More substantial feedback below relates to: - TTL recommendations - Selection of transport protocols - EDNS Client Subnet (ECS) - Missing mention of RFC 8906 More in-line below, including couple nits. On 26.

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-11-27 Thread Peter Hessler
sent this email at a time that is convenient for me. I do not expect you to respond to it outside of your usual working hours. : : :From: dns-wg on behalf of Moritz Müller via dns-wg :Date: Monday, 27 November 2023 at 17:47 :To: Shane Kerr :Cc: dns-wg@ripe.net :Subject: Re: [dns-wg] Draft o

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-11-27 Thread Michele Neylon - Blacknight via dns-wg
dns-wg on behalf of Moritz Müller via dns-wg Date: Monday, 27 November 2023 at 17:47 To: Shane Kerr Cc: dns-wg@ripe.net Subject: Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices [EXTERNAL EMAIL] Please use caution when opening attachments from unrecognised sources. If I re

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-11-27 Thread Moritz Müller via dns-wg
If I recall correctly, someone just mentioned at the mic during the BCOP BOF session that such a long list of recommendations might actually scare people off from running their own resolver. Maybe adding a short paragraph in the introduction like the one below might address this: "Operators int

Re: [dns-wg] Draft of RIPE DNS Resolver Best Common Practices

2023-11-27 Thread Ralf Weber
Moin! On 26 Nov 2023, at 18:01, Shane Kerr wrote: > ### Aggressive NSEC caching > > **Aggressive NSEC caching should be enabled.** > > For: Public resolver operators. > > "Aggressive NSEC caching", meaning negative caching based on NSEC and > NSEC3 values, can reduce traffic greatly. It is importa