Re: [DNSOP] draft-fujiwara-dnsop-fragment-attack-01.txt

2019-05-24 Thread Florian Weimer
* Daisuke HIGASHI: > draft-fujiwara-dnsop-fragment-attack-01: > >> 3. Current status >> >> [Brandt2018] showed that Linux version 3.13 and older versions are >> vulnerable to crafted ICMP fragmentation needed and DF set packet and >> off-path attackers can set some of authoritative servers'

Re: [DNSOP] One Chair's comments on draft-wessels-dns-zone-digest

2018-07-29 Thread Florian Weimer
* Tim Wicinski: > For the ZONEMD RR Type, where in the registry do the authors think it > should go? While some of that falls on the Expert Review process, I think > the document authors should capture their rationale in the document. If > the proposed RR Type is greater than 256 (which I think

Re: [DNSOP] New Version Notification for draft-wessels-dns-zone-digest-01.txt

2018-07-29 Thread Florian Weimer
* John R. Levine: > On Sat, 28 Jul 2018, Florian Weimer wrote: >> A malicious server might never stop sending data, or claim that the >> transfer is ridiculously large. If the zone digest does not include >> information about the amount of data, this can only be detecte

Re: [DNSOP] New Version Notification for draft-wessels-dns-zone-digest-01.txt

2018-07-28 Thread Florian Weimer
* Paul Wouters: > Another reason for an rr count number in the rrtype. The typical RR size is perhaps 1/300 of the protocol maximum (much less without DNSSEC), so this is only sufficient for small zones. ___ DNSOP mailing list DNSOP@ietf.org https://w

Re: [DNSOP] New Version Notification for draft-wessels-dns-zone-digest-01.txt

2018-07-28 Thread Florian Weimer
* John R. Levine: that the served zone is too large. Otherwise, the receiver has to download the entire zone before it can determine that the hash does not match. ... > >> On the other hand, clients will likely have a pretty good idea for the >> size of the zone, so they could tran

Re: [DNSOP] New Version Notification for draft-wessels-dns-zone-digest-01.txt

2018-07-28 Thread Florian Weimer
* John Levine: > In article <87h8kp7sqf@mid.deneb.enyo.de> you write: >>The ZONEMD record should contain a size indicator for the zone, >>something that allows a receiver to stop downloading if it is clear >>that the served zone is too large. Otherwise, the receiver has to >>download the enti

Re: [DNSOP] New Version Notification for draft-wessels-dns-zone-digest-01.txt

2018-07-24 Thread Florian Weimer
* Duane Wessels: > I wouldn't be opposed to this in principle -- say an RR count field. That doesn't really bound the amount of transferred data, I think, because RR size can still vary widely. I believe something that counts the hashed bytes would be more helpful and about as easy to implemen

Re: [DNSOP] New Version Notification for draft-wessels-dns-zone-digest-01.txt

2018-07-23 Thread Florian Weimer
The ZONEMD record should contain a size indicator for the zone, something that allows a receiver to stop downloading if it is clear that the served zone is too large. Otherwise, the receiver has to download the entire zone before it can determine that the hash does not match.

Re: [DNSOP] BCP on rrset ordering for round-robin? Also head's up on bind 9.12 bug (sorting rrsets by default)

2018-06-18 Thread Florian Weimer
* Paul Vixie: > in other words we should re-order rrsets by default, so that very few > people or agents are ever prone to think their order is stable. the spec > says they are unordered, but human nature says, expect more of what > you're seeing. But the client has to sort them again based on

Re: [DNSOP] BCP on rrset ordering for round-robin? Also head's up on bind 9.12 bug (sorting rrsets by default)

2018-06-18 Thread Florian Weimer
On 06/15/2018 05:45 PM, Erik Nygren wrote: I suspect starting assumptions are roughly in the range of: * Recursive (and stub?) resolvers (SHOULD/MUST?) do some form of round-robin in RRset responses. * There are a variety of ways to implement round-robin (randomize, permute, etc). * Server

Re: [DNSOP] tdns, 'hello-dns' progress, feedback requested

2018-04-20 Thread Florian Weimer
On 04/13/2018 04:47 PM, bert hubert wrote: 2) Try: ping goes-via-embedded-nul.tdns.powerdns.org ping goes-via-embedded-space.tdns.powerdns.org. ping goes-via-embedded-dot.tdns.powerdns.org. None of these resolve when I try them, I wonder if that is because implementations want CNA

Re: [DNSOP] Clarifying referrals (#35)

2017-11-30 Thread Florian Weimer
On 11/28/2017 08:50 PM, Andrew Sullivan wrote: That leaves the task of the referrals definition. I have some new text below: ---%<---cut here--- Referral: A type of response in which a server, signalling that it is not authoritative for an answer, provides the querying resolver with an alterna

Re: [DNSOP] 答复: Fwd: I-D Action: draft-song-atr-large-resp-00.txt

2017-09-25 Thread Florian Weimer
On 09/21/2017 06:50 AM, Paul Vixie wrote: both ideas are wrong. what we have to do is arrange to fragment, using the ipv6 extension header, all ipv6 udp, for a period of not less than five years. noone who blocks ipv6 extension headers should be able to get reliable ipv6 udp services. we have t

Re: [DNSOP] Redefining name canonicalization

2017-05-05 Thread Florian Weimer
On 04/21/2017 05:08 PM, Bob Harold wrote: I can understand you wanting a "getfqdn" function to return the FQDN (fully qualified domain name) without doing canonicalization. But just so we are clear on the DNS terms, "access.redhat.com" and "access.redhat.com.edgekey.net" are "aliases" "e133.b.a

Re: [DNSOP] RCODE and CNAME chain

2017-04-27 Thread Florian Weimer
On 04/27/2017 11:31 AM, Mark Andrews wrote: If you want to advocate for changes to behaviour that is fine, but advocate for that. Just saying "shouldn't the rcode be NOERROR" isn't doing that. Then there is DNSSEC. If the target zone is signed and DO=1 is set in the query should you include th

Re: [DNSOP] new ANAME draft: draft-hunt-dnsop-aname-00.txt

2017-04-20 Thread Florian Weimer
On 04/20/2017 08:36 AM, Evan Hunt wrote: On Wed, Apr 19, 2017 at 10:47:24PM -0400, Paul Wouters wrote: ANAME could just be a regular RRTYPE without any special handling, meaning "go look there for up to date information on A/". It could come along A/ records using one of the existing bit

Re: [DNSOP] new ANAME draft: draft-hunt-dnsop-aname-00.txt

2017-04-12 Thread Florian Weimer
On 04/11/2017 10:47 PM, Evan Hunt wrote: On Tue, Apr 11, 2017 at 10:20:31PM +0200, Florian Weimer wrote: And in order to accommodate them, we upgrade the DNS server infrastructure across the Internet? Them, and web browser implementers who just don't want to use SRV. SRV wouldn&#

Re: [DNSOP] new ANAME draft: draft-hunt-dnsop-aname-00.txt

2017-04-11 Thread Florian Weimer
On 04/11/2017 10:16 PM, Evan Hunt wrote: On Tue, Apr 11, 2017 at 09:11:54PM +0200, Florian Weimer wrote: I don't see how you can detect loops without DNS protocol changes. The query that comes back will look like a completely fresh query. We can put a limit on the number of hops tha

Re: [DNSOP] new ANAME draft: draft-hunt-dnsop-aname-00.txt

2017-04-11 Thread Florian Weimer
On 04/11/2017 10:15 PM, Tony Finch wrote: On 11 Apr 2017, at 20:39, Florian Weimer wrote: On 04/11/2017 09:15 PM, Tony Finch wrote: That doesn't work if the web server is at 3rd party provider A but you want provider B's mail service not provider A's. I don't und

Re: [DNSOP] new ANAME draft: draft-hunt-dnsop-aname-00.txt

2017-04-11 Thread Florian Weimer
On 04/11/2017 09:15 PM, Tony Finch wrote: On 11 Apr 2017, at 20:09, Florian Weimer wrote: On 04/11/2017 08:42 PM, Tony Finch wrote: If you have a subdomain that needs to be a mail domain and a web site, you need an MX pointing at your mail server and address records pointing at your web

Re: [DNSOP] new ANAME draft: draft-hunt-dnsop-aname-00.txt

2017-04-11 Thread Florian Weimer
On 04/10/2017 12:04 PM, Peter van Dijk wrote: Section 3 is currently written in such a way that a recursive DNS lookup must be performed at the authoritative server side. I don't think it is necessary to require that. A recursive DNS lookup of the target is just one way to implement this. Wh

Re: [DNSOP] new ANAME draft: draft-hunt-dnsop-aname-00.txt

2017-04-11 Thread Florian Weimer
On 04/11/2017 08:42 PM, Tony Finch wrote: Paul Wouters wrote: Can you give me an example of deploying ANAME outside the zone APEX that is not solved by allowing a CNAME to point to a CNAME (which most code I think already allows anyway) https://www.ietf.org/mail-archive/web/dnsop/current/msg

Re: [DNSOP] new ANAME draft: draft-hunt-dnsop-aname-00.txt

2017-04-11 Thread Florian Weimer
On 04/11/2017 05:45 PM, Tony Finch wrote: Florian Weimer wrote: I think the introduction should discuss why it is not possible to push the CNAME to the parent zone, replacing the entire zone with an alias. You can't replace an entire zone with a CNAME if it has subdomains. ANAME record

Re: [DNSOP] new ANAME draft: draft-hunt-dnsop-aname-00.txt

2017-04-10 Thread Florian Weimer
On 04/07/2017 08:11 PM, Evan Hunt wrote: Title: Address-specific DNS Name Redirection (ANAME) I think the introduction should discuss why it is not possible to push the CNAME to the parent zone, replacing the entire zone with an alias. Section 3 is currently written in such a way th

Re: [DNSOP] Mandated order of CNAME records in a CNAME chain?

2016-10-09 Thread Florian Weimer
* Mark Andrews: > In message <87bmz3p4lt@mid.deneb.enyo.de>, Florian Weimer writes: >> * Robert Edmonds: >> >> > I think there was already a thread on this topic recently on this list >> > ("Order of CNAME and A in Authoritative Reply" from

Re: [DNSOP] Mandated order of CNAME records in a CNAME chain?

2016-10-02 Thread Florian Weimer
* Robert Edmonds: > I think there was already a thread on this topic recently on this list > ("Order of CNAME and A in Authoritative Reply" from August 2015). There > was some discussion over "adding" versus "appending" and it was pointed > out that a lot of existing code (e.g., the BSD stub resol

Re: [DNSOP] Introducing draft-vavrusa-dnsop-aaaa-for-free

2016-03-23 Thread Florian Weimer
On 03/23/2016 09:03 PM, Andrew Sullivan wrote: > I don't understand how it's a way to evaluate this claim. DNSSEC > includes a bit (DO) that says you're prepared to handle the additional > data in the answer section. Indeed, the unpreparedness of people for > this data was just exactly the reason

Re: [DNSOP] Introducing draft-vavrusa-dnsop-aaaa-for-free

2016-03-23 Thread Florian Weimer
On 03/22/2016 12:45 AM, Marek Vavruša wrote: > there was an interest in reducing latency for address record lookups. > Me and Olafur wrote a draft on adding records to A answers and > treating them as authoritative. This fixes latency issues with NS > A/ discovery in resolvers and improve

Re: [DNSOP] Introducing draft-vavrusa-dnsop-aaaa-for-free

2016-03-23 Thread Florian Weimer
On 03/22/2016 01:15 AM, Paul Vixie wrote: > > > Marek Vavruša wrote: >> ... >> >> https://datatracker.ietf.org/doc/draft-vavrusa-dnsop--for-free/ > > +1. we ought to have done this from the get-go. It did not work back then because unexpected RRsets in the answer broke resolvers. This is h

Re: [DNSOP] Big reduction in the number of TLD zones blocking EDNS(1) queries

2015-08-09 Thread Florian Weimer
specially* during an unscheduled security update. If you were running BIND 9.3 before, you are essentially running it afterwards as well. -- Florian Weimer / Red Hat Product Security ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] Last Call: (The .onion Special-Use Domain Name) to Proposed Standard

2015-07-19 Thread Florian Weimer
* Stephane Bortzmeyer: > On Wed, Jul 15, 2015 at 02:22:58PM -0700, > Francisco Obispo wrote > a message of 48 lines which said: > >> Well, even worse, what happens if decides >> to create a new dns-like protocol that uses .foo, does that mean >> that we should automatically block it? > > No n

Re: [DNSOP] another way to minimize ANY responses

2015-03-26 Thread Florian Weimer
* Tony Finch: > What does 2 return to 3? It can't send a signed NSEC because DO=0. ANY is special, you can get NSEC and RRSIG in responces with DO=0 (some implementations do that). With suitably aligned TTLs, I suppose you can even end up with just a NSEC/RRSIG RRset pair. NSEC3 is different be

Re: [DNSOP] another way to minimize ANY responses

2015-03-26 Thread Florian Weimer
* Evan Hunt: > Last night the dumb-idea fairy visited me as I was falling asleep, and > suggested that another way to reduce the impact of ANY queries would be > to pick *one* rrset and return just that. (Probably the numerically > smallest rrtype present at the node, plus RRSIGs if any.) Yes, th

Re: [DNSOP] [dns-operations] dnsop-any-notimp violates the DNS standards

2015-03-22 Thread Florian Weimer
* Olafur Gudmundsson: >> On Mar 18, 2015, at 11:55 AM, Paul Vixie wrote: >> >> we need a document that says "If you don't want to answer ANY, >> here's how to do it interoperably." we don't need to say "you >> should not answer ANY", but we do need to say "if you want to query >> for ANY, here's

Re: [DNSOP] remarks on draft-ietf-dnsop-5966bis-01

2015-03-22 Thread Florian Weimer
* Paul Vixie: >> As a counterexample, RFC 6891 requires FORMERR responses without OPT >> RRs from implementations which do not support EDNS: >> >>Responders that choose not to implement the protocol extensions >>defined in this document MUST respond with a return code (RCODE) of >>FORM

Re: [DNSOP] remarks on draft-ietf-dnsop-5966bis-01

2015-03-21 Thread Florian Weimer
* W. C. A. Wijngaards: > +1. Backwards compatibility means you cannot specify that existing > implementations have to change. Does it matter if they do not exist or are not considered practically relevant? As a counterexample, RFC 6891 requires FORMERR responses without OPT RRs from implementat

Re: [DNSOP] discussion for draft-appelbaum-dnsop-onion-tld-00.txt

2015-03-18 Thread Florian Weimer
r companies, The reservation of “local” took more than a decade if I remember correctly, and it did not benefit just Apple. -- Florian Weimer / Red Hat Product Security ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] Call for Adoption: draft-ogud-dnsop-acl-metaqueries

2015-03-14 Thread Florian Weimer
* Tim Wicinski: > This starts a Call for Adoption for draft-ogud-dnsop-acl-metaqueries > > The draft is available here: > https://datatracker.ietf.org/doc/draft-ogud-dnsop-acl-metaqueries/ No real comments on adoptions below, just some technical issues. Is there are definition now what constitut

Re: [DNSOP] CloudFlare policy on ANY records changing

2015-03-14 Thread Florian Weimer
* Tony Finch: >> Evan Hunt wrote: >> > >> > This could be a pretty brilliant solution, actually: If you're >> > authoritative for a signed zone and you receive a query of type ANY, >> > return the applicable NSEC/NSEC3; if the zone is *not* signed, synthesize >> > a response containing a single R

Re: [DNSOP] CloudFlare policy on ANY records changing

2015-03-14 Thread Florian Weimer
* Evan Hunt: > (It doesn't address qmail's problem, but that's a lost cause no > matter which method is chosen.) I think it does. qmail already copes correctly with a partially cached ANY response (due to TTL mismatch between RRset), does it? The new behavior just looks like a partially cached r

Re: [DNSOP] CloudFlare policy on ANY records changing

2015-03-14 Thread Florian Weimer
* Evan Hunt: > On Thu, Mar 12, 2015 at 11:38:04PM +, Darcy Kevin (FCA) wrote: >> So you're thinking it's more likely that we'll get folks to understand >> this new type, that's designed to frustrate QTYPE=* queries in a >> more-or-less graceful way, than it is to convince them to stop making >

Re: [DNSOP] CloudFlare policy on ANY records changing

2015-03-12 Thread Florian Weimer
* Tony Finch: > I also tried a stupid hack to send an ANY RR in the response. BIND's > resolver treats this as a FORMERR and returns SERVFAIL to the client. What about introducing a new non-meta RR type for this purpose? It would not increase the response size by much. _

Re: [DNSOP] Fwd: New Version Notification for draft-ogud-dnsop-any-notimp-00.txt

2015-03-12 Thread Florian Weimer
* Olafur Gudmundsson: > Title: Standard way for Authoratitive DNS servers to refuse ANY NOTIMP doesn't do that, it tells resolvers to query another name server for the zone. The authoriative server part of this proposal increases the number of upstream ANY queries instead of reducing th

Re: [DNSOP] Definition of "validating resolver"

2015-03-12 Thread Florian Weimer
* Ted Lemon: > On Mar 8, 2015, at 6:31 PM, Ralf Weber wrote: >> I was told that the difference is that a security aware resolver does >> not validate, but instead relies on the "Validating Stub Resolver" to >> protect the user. So it would handle all the DNSSEC processing to the >> authoritative

Re: [DNSOP] Comments regarding the NSEC5

2015-03-12 Thread Florian Weimer
On 03/12/2015 11:36 AM, Jan Včelák wrote: >> And does anyone actually use opt out with NSEC3? > > Yes, .com for example. My impression was that Opt-Out was the selling point > of > NSEC3, not the domain name hashing. Okay. Are they interested in switching to NSEC5? -- Fl

Re: [DNSOP] Comments regarding the NSEC5

2015-03-12 Thread Florian Weimer
r less). Online keys are less threatening than they used to be, and we aren't even talking about long-term keys baked into software, but short/medium-term keys which are easily replaced. And does anyone actually use opt out with NSEC3? -- Florian Weimer / Red Hat Product Security

Re: [DNSOP] Comments regarding the NSEC5

2015-03-11 Thread Florian Weimer
kipped? You really need to make this explicit. > I agree that the description is insufficient. We will fix that. Thanks. -- Florian Weimer / Red Hat Product Security ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

[DNSOP] Comments regarding the NSEC5

2015-03-11 Thread Florian Weimer
FDH values. As specified in the draft, the NSEC5 protocol still exposes the chain of SHA-256 hashes of owner names. It does not offer better protection against offline dictionary attacks than NSEC3. Florian -- Florian Weimer / Red Hat Product Security ___ DNS

Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-31 Thread Florian Weimer
* John Heidemann: > DNS over TCP/53 is *already* persistent. No *protocol* changes are > needed. If you want to make the connections full-duplex instead of half-duplex, you need to negotiate connection teardown at the DNS layer. Otherwise, the TCP connection teardown will result in loss of alre

Re: [DNSOP] Extended CNAME (ENAME)

2014-05-24 Thread Florian Weimer
* Mark Andrews: > ENAME could be used immediately once the authoritative servers for > the zone support it. It would just be insecure until validators > catch up. Uhm. Why insecure and not bogus? ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf

Re: [DNSOP] DNS privacy : now at least two drafts

2014-03-17 Thread Florian Weimer
* Mark Andrews: > In message <87y50auqqf@mid.deneb.enyo.de>, Florian Weimer writes: >> * Mark Andrews: >> >> >>>Another note is that the answer to the NS query, unlike the referral >> >>>sent when the question is a full qn

Re: [DNSOP] DNS privacy : now at least two drafts

2014-03-16 Thread Florian Weimer
* Mark Andrews: >>>Another note is that the answer to the NS query, unlike the referral >>>sent when the question is a full qname, is in the Answer section, not >>>in the Authoritative section. It has probably no practical >>>consequences. >> >> Most resolvers do not make NS quer

Re: [DNSOP] An approach to DNS privacy

2014-03-16 Thread Florian Weimer
* Phillip Hallam-Baker: >> If your ordinary resolver operator is a "carrier" is somewhat >> questionable, but resolver operators generally comply with requests >> for cleartext copies of traffic transitioning through their networks. >> >> I have no doubts that these operators will ask implementors

Re: [DNSOP] DNS privacy : now at least two drafts

2014-03-16 Thread Florian Weimer
* Florian Weimer: > There is another privacy-enhancing approach that is not mentioned in > the draft: defensive delegations. For example, with current resolver > behavior, the lack of a delegation for 1.E164.ARPA means that queries > under that tree are sent to the E164.ARPA server

Re: [DNSOP] An approach to DNS privacy

2014-03-09 Thread Florian Weimer
* Phillip Hallam-Baker: > But first, cite actual legal authority because I don't believe your > interpretation of the law is remotely correct. § 8 Abs. 3 TKÜV: | Wenn der Verpflichtete die ihm zur Übermittlung anvertraute | Telekommunikation netzseitig durch technische Maßnahmen gegen | unbefugt

Re: [DNSOP] An approach to DNS privacy

2014-03-09 Thread Florian Weimer
* Phillip Hallam-Baker: > For a heavily trafficked resolver, the resolver-authoritative > interaction can be addressed with caching and by pre-fetching the > bulk of the requests. But this approach does not work so well for > the lightly trafficked resolver and especially not a local resolver > d

Re: [DNSOP] DNS privacy : now at least two drafts

2014-03-08 Thread Florian Weimer
* Stephane Bortzmeyer: > On Sat, Mar 08, 2014 at 06:07:48PM +0100, > Florian Weimer wrote > a message of 17 lines which said: > >> > It is. Section 2.2.2 >> >> Can you quote it here? > > 2.2.2. In the authoritative name servers Ahhh, this section he

Re: [DNSOP] DNS privacy : now at least two drafts

2014-03-08 Thread Florian Weimer
* Stephane Bortzmeyer: > On Sat, Mar 08, 2014 at 05:50:55PM +0100, > Florian Weimer wrote > a message of 22 lines which said: > >> The -sol draft mentions QNAME minimization without defining the >> term. > > It is. Section 2.2.2 Can you quote it here? It s

Re: [DNSOP] DNS privacy : now at least two drafts

2014-03-08 Thread Florian Weimer
* Stephane Bortzmeyer: > I just posted a new version of the DNS privacy draft, > draft-bortzmeyer-dnsop-dns-privacy-01. The most important difference > is that it is now split in two, one pure problem statement, > draft-bortzmeyer-dnsop-dns-privacy and an exploration of possible > solutions, draft

Re: [DNSOP] Data model and field names for DNS in JSON or XML

2012-01-30 Thread Florian Weimer
* Stephane Bortzmeyer: > I'm aware of draft-mohan-dns-query-xml, which partially solves my > problem (except I would like the RDATA to be structured as well, not a > blob of "hexadecimal data"). In this area, draft-levine-dnsextlang-00 might be helpful. -- Florian We

Re: [DNSOP] DNS Server Selection document last call in MIF

2011-09-23 Thread Florian Weimer
re an API proposal somewhere? I can't see how this can be implemented on top of the BSD sockets API, especially not with the weak end system model. -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100 tel: +49-721-96201-1 D-76133 Karlsru

Re: [DNSOP] Do negative cache entries have to be consistent ?

2011-04-14 Thread Florian Weimer
troducing sub-zones for the network ranges which should receive longer TTLs. In the non-DNSSEC case, you can simply return a SOA record whose owner name is the full QNAME. -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100 tel: +49-721

Re: [DNSOP] [dnsext] Fwd: Last Call: (Special-Use Domain Names) to Proposed Standard

2011-01-18 Thread Florian Weimer
imilar fate? Then you might be right in the sense that the IETF cannot set aside names for use at the protocol level. -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100 tel: +49-721-96201-1 D-76133 Karlsruhe fax: +49-7

Re: [DNSOP] On resolver priming

2010-11-16 Thread Florian Weimer
mary concern during the DURZ phase. -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100 tel: +49-721-96201-1 D-76133 Karlsruhe fax: +49-721-96201-99 ___ DNSOP mailing list DNSOP@ie

Re: [DNSOP] [dnsext] New Version Notification - draft-gudmundsson-dnsext-srv-clarify-01.txt (fwd)

2010-07-01 Thread Florian Weimer
me-grown pseudo-transport layers, and with SRV records, it is not possible to figure out if HTTP is to be used or not. -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100 tel: +49-721-96201-1 D-76133 Karlsruhe fax: +49-721-9

Re: [DNSOP] Should root-servers.net be signed

2010-03-08 Thread Florian Weimer
* Jim Reid: > So what? If the served zones are signed, it simply doesn't matter if > the address of a name server is spoofed or hijacked. This is only true if the whole DNS tree is signed (and if you don't value query privacy). -- Florian Weimer BFK edv

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Florian Weimer
SASHA1 completely (in the sense that you can register a crafted org domain name and get an RRSIG from org that fits example.org as well, with private key material known to you). -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100 tel: +

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Florian Weimer
appen with NSEC3 records because their owner name does not normally match the queried name. Therefore, NSEC3 records provide better insulation of child zones from the DNSSEC deployment in the parent zone. -- Florian Weimer BFK edv-consulting GmbH

Re: [DNSOP] Priming query transport selection

2010-01-15 Thread Florian Weimer
* Jim Reid: > On 15 Jan 2010, at 13:20, Florian Weimer wrote: > >> DO is rather pointless because the priming response cannot be >> validated anyway (even if ROOT-SERVERS.NET were secure, which is >> currently not planned). > > It's not pointless. Validatin

Re: [DNSOP] Priming query transport selection

2010-01-15 Thread Florian Weimer
5] Vanilla UDP (no EDNS0) if [4] fails DO is rather pointless because the priming response cannot be validated anyway (even if ROOT-SERVERS.NET were secure, which is currently not planned). -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100

Re: [DNSOP] [dnsext] Re: Computerworld apparently has changed DNS protocol

2009-11-11 Thread Florian Weimer
n this at the DNS-OARC meeting last week: > > https://www.dns-oarc.net/files/workshop-200911/Duane_Wessels.pdf Have you installed any trust anchors in the resolver? (I don't think so, the packet numbers are a bit on the lower side for that.) -- Florian Weimer BFK ed

Re: [DNSOP] [dnsext] Re: Computerworld apparently has changed DNS protocol

2009-11-04 Thread Florian Weimer
* Nicholas Weaver: > Also, has someone done a study what the major recursive resolvers do > on response failures from a root? Do they go to another first or do > they try a smaller EDNS MTU? Note that switching seems beneficial because six roots MTUs clearly support MTUs less than 1500, and seve

Re: [DNSOP] Computerworld apparently has changed DNS protocol

2009-11-04 Thread Florian Weimer
* David Blacka: > I actually researched this, and need to spend some time cleaning up > the report before posting it to this list. But the bottom line is > that yes, all responses save a few at the apex of root are below 1500b > (actually, below 1100b). The responses that are larger are ". rrsig

Re: [DNSOP] [dnsext] Computerworld apparently has changed DNS protocol

2009-11-04 Thread Florian Weimer
* Alfred Hönes: > There must be a hidden trick to introduce DNS Jumbograms we just > forgot to mention The claims about firewall issues seems dubious to me. It's certainly not the 512 byte limit which is a problem here---I think we've got pretty good empiric evidence that it's not a problem

Re: [DNSOP] [dnsext] Re: Computerworld apparently has changed DNS protocol

2009-11-04 Thread Florian Weimer
* Matthew Dempsky: > On Wed, Nov 4, 2009 at 11:26 AM, wrote: >>        The current deployment plan is to stage things to push out large >> responses >>        early - prior to having any actual DNSSEC usable data ... ostensibly >> to >>        flush out DNSmtu problems. > > Is this plan to pus

Re: [DNSOP] Fw: New Version Notification for draft-bellis-dns-recursive-discovery-00

2009-10-21 Thread Florian Weimer
t: If I have got a client device (not DNS proxy) which supports the proposed protocol, it will not work when I connect it to a network which uses a resolver that performs this type of spoofing, unless the spoofing resolver has specific support for this protocol. It's not "someone could do

Re: [DNSOP] Fw: New Version Notification for draft-bellis-dns-recursive-discovery-00

2009-10-21 Thread Florian Weimer
* Alex Bligh: > --On 21 October 2009 08:34:39 +0000 Florian Weimer wrote: > >>>> Mark, I din't think this is true given how the proposed protocol >>>> works. For a start, you often cannot fetch the DNSKEY RR for ARPA >>>> before running the proto

Re: [DNSOP] Fw: New Version Notification for draft-bellis-dns-recursive-discovery-00

2009-10-21 Thread Florian Weimer
o exist in the public tree at all? All we need is agreement from both ICANN and IETF that LOCAL.ARPA is reserved and not to be delegated in the official tree. -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100 tel: +49-721-96201-1 D-76

Re: [DNSOP] Fw: New Version Notification for draft-bellis-dns-recursive-discovery-00

2009-10-20 Thread Florian Weimer
* Mark Andrews: > For LOCAL.ARPA to be accepted you need a break in the DNSSEC trust > chain. Mark, I din't think this is true given how the proposed protocol works. For a start, you often cannot fetch the DNSKEY RR for ARPA before running the protocol. -- Florian Weimer

Re: [DNSOP] Fw: New Version Notification for draft-bellis-dns-recursive-discovery-00

2009-10-20 Thread Florian Weimer
oned anyway". ARPA will soon be signed, so I don't think this is much to worry about. If the powers that be finally agree to make NXDOMAIN/NODATA synthesis the default in the upcoming minor DNSSEC revision, this will also help to cut down the number of requests. -- Florian Weime

Re: [DNSOP] Fw: New Version Notification for draft-bellis-dns-recursive-discovery-00

2009-10-19 Thread Florian Weimer
ort this protocol due to widespread DNS poisoning. I wholeheartedly support the creation of LOCAL.ARPA, though. But you should mention that mDNS MUST NOT be used for LOCAL.ARPA (so that some people don't get funny ideas). -- Florian Weimer BFK edv-consulting GmbH http

Re: [DNSOP] Key Management and Provisioningl was Re: .PR ...

2009-10-07 Thread Florian Weimer
* Roy Arends: > On Oct 7, 2009, at 8:57 AM, Florian Weimer wrote: > >> * Roy Arends: >> >>> At least for Nominet, I want (2) to do cross-checking, be able to >>> check what things look like before they enter the pipeline, >>> preferably >>

Re: [DNSOP] Key Management and Provisioningl was Re: .PR ...

2009-10-06 Thread Florian Weimer
publish button, its in > the root, and world can check it with me, using dig. Have you already got this self-service capability for non-DS changes? -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100 tel: +49-721-96201-1 D-76133 Karls

Re: [DNSOP] Trust History draft

2009-10-04 Thread Florian Weimer
istory service to get back on | track. The trust history location is assumed available from the | validator configuration. The validator then fetches old DNSKEY | RRsets and checks they form a chain to the latest key. Doesn't this defeat the purpose of key rollovers? -- Florian Weimer

Re: [DNSOP] measuring TCP query performance

2009-08-25 Thread Florian Weimer
* Paul Vixie: > since time is short, i would prefer a server-side change, supported by a > spec change (which means this would head back to namedroppers@) whereby > (bufsize<1220 && DO=1) would be treated as (DO=0). And what does the resolver with a trust anchor do with the DO=0 answer? Requery

Re: [DNSOP] how DNS redirect works with empty response

2009-08-02 Thread Florian Weimer
* JINMEI Tatuya / 神明達哉: > What does a recursive server that implements the DNS redirect service > do in this case? Empty responses are typically rewritten. "NXDOMAIN redirect" is a misnomer. > then I guess authoritative server implementors who don't like > NXDOMAIN redirect could introduce a "a

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Florian Weimer
* Tony Finch: > On Thu, 16 Jul 2009, Florian Weimer wrote: >> >> If you want to address the issue with hotspot doorway pages, you need >> protocol changes. > > Better to use an intercepting proxy in that case, and for quarantining > infected hosts. Doesn't w

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Florian Weimer
* Jason Livingood: > Actual consumer behavior doesn¹t really seem to work that > way, but I¹m not a behavioral psychologist. ;-) FWIW, I think most > ISPs that introduce such services see around a 0.1% opt-out rate. I would expect a higher rate of Dnschange/Zlob infections at a typical

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Florian Weimer
* Tony Finch: > On Thu, 16 Jul 2009, Florian Weimer wrote: >> >> (But I agree that a clean solution requires protocol development.) > > No, it just requires browser user interface improvements. If you want to address the issue with hotspot doorway pages, you

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Florian Weimer
* Paul Hoffman: > Paul: that's over the top. Some of the services defined in the draft > are highly desired by some Internet users. Which ones? Currently, when a user enters "mcrsoft" in the address bar, many browsers will automatically send her to the Microsoft homepage. With spoofed answers,

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Florian Weimer
* Alan Barrett: > I think that this sort of lying recursive resolver is a bad idea. > Instead, I suggest a new "SUGGESTION" RR type that could be returned > in the additional section of an error message. For example, if > you ask for www.example.invalid, you could get back an NXDOMAIN > error, wi

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Florian Weimer
* Jelte Jansen: > Ralf Weber wrote: >>> No redirection on SERVFAIL seems to be a strange recommendation. >>> Wouldn't this be a very good reason to provide a diagnostics page, >>> especially if there's been a DNSSEC validation failure? >> This sounds like an excellent idea to help DNSSEC adoption

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Florian Weimer
* Ralf Weber: > That really is an issue and could be addressed, there are a lot of > case where a A record for a domain doesn't exists, but one for > www.domain does exist. True, and some browser have code to deal with this. > Question then would be how that rewrite should be presented. As a > n

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-12 Thread Florian Weimer
* Jason Livingood: > If anyone is interested and has time before IETF 75, I¹m happy to take > feedback before then obviously. Few players perform NXDOMAIN rewriting. Instead, ANCOUNT=0 rewriting is used. This causes all kinds of problems, including redirections for example.com when it hasn't go

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-12 Thread Florian Weimer
* Stephane Bortzmeyer: > Unless I'm wrong, the I-D about lying resolvers do not discuss the > issue of zone cuts. > > If I type www.doesnotexistatall.com (the SLD does not exist and so I > should get a NXDOMAIN), I get the IP address of the ad Web server. If > I type .afnic.fr, I will get thi

Re: [DNSOP] Problems with DS change in registry/registrar environment

2009-07-03 Thread Florian Weimer
vior because the RFCs do not tightly specify it. There is very likely no way to make zone changes in a way that pleases all resolvers. So most operators don't even try to do it. -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100

Re: [DNSOP] RFC4641bis Section 4.4.5 proposed new text

2009-05-26 Thread Florian Weimer
de mitigation mechanisms are a side effect of dealing with the unsigned referral/glue issue. After all, if you've never validated the NS RRset and its addresses, a registrar switch is indistinguishable from a previously unnoticed attack based on a spoofed referral. -- Florian Weimer

Re: [DNSOP] I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Florian Weimer
e it out of schedule, you might have got some explaining to do. 8-) Of course, this isn't a strong argument in favor of HSMs. -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstraße 100 tel: +49-721-96201-1 D-76133 Karlsruhe

Re: [DNSOP] "MX 0 ." standard way of saying "we don't do email" ?

2009-04-14 Thread Florian Weimer
* Paul Vixie: >> > As for "MX 0 ." the sooner this gets defined as no SMTP service for this >> > domain the better. The cost for changing this is only every going to >> > increase. >> >> It may take years before a significant portion of SMTP servers recognize >> root domains as meaning no ser

Re: [DNSOP] "MX 0 ." standard way of saying "we don't do email" ?

2009-04-11 Thread Florian Weimer
> The MX RR will be ignored. There will be an DNS request and a > fallback to the A RR for security.eu.debian.org. Newer versions of > sendmail and Postfix will treat that MX RR as a bad MX and reject the > message instead of retrying. Exim also treats the record as a "no SMTP service here"

  1   2   >