Re: [DNSOP] Review of draft-ietf-dnsop-rfc2845bis-02.txt

2019-02-26 Thread Francis Dupont
In your previous mail you wrote: > Two points that I request this WG to discuss are: > > 1. Sparsely TSIG signed TCP continuation messages (section 6.4 in draft) => I'd like to do this but it is not possible to change requirements for existing implementations so easily. I added a SHOULD for

Re: [DNSOP] draft-ietf-dnsop-rfc2845bis-01

2018-11-17 Thread Francis Dupont
In your previous mail you wrote: > The setting of the time fields on BADKEY is not well defined. We had implem > entations setting the values to zero. Handling of BADKEY with a bad time is > also not handled well. I would recommend always copying the time fields fro > m the request to the

Re: [DNSOP] Review of draft-dupont-dnsop-rfc2845bis-00.txt

2017-11-10 Thread Francis Dupont
In your previous mail you wrote: > After a reading, I felt that this document needs the following: > > * Editing for clarity of sentences => I agree until the text comes from original RFCs (i.e. you are 17 year too late) or can only be clarified at the margin. > * Addressing insufficient p

Re: [DNSOP] Agenda topics for IETF100

2017-10-30 Thread Francis Dupont
Need a short slot (5 mn) about the revision of TSIG specs just submitted as draft-dupont-dnsop-rfc2845bis-00.txt Thanks francis.dup...@fdupont.fr PS: there are in fact only a few since IETF99: just the work is in progress and should one day become a WG item. IMHO today the main difference is the

Re: [DNSOP] Call for Adoption: draft-wkumari-dnsop-extended-error

2017-07-30 Thread Francis Dupont
In your previous mail you wrote: > But, yes, you're correct -- diagnostic information included with a > SERVFAIL is about as trustworthy as the AD bit, and in the absence of an > authentication mechanism such as TSIG, clients should not rely on it or > base policy on it. => TSIG can be in a

Re: [DNSOP] Call for Adoption: draft-wkumari-dnsop-extended-error

2017-07-29 Thread Francis Dupont
+1 (in favor) francis.dup...@fdupont.fr ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] NSEC/NSEC3 for unsigned zones and aggressive use

2017-07-19 Thread Francis Dupont
In your previous mail you wrote: > NSEC needs no keys, only their RRSIGs would which wouldn't exist in > unsigned zones. In this case the unsigned NSEC would also not be part of > the zone (it would have to be synthesized and maintained outside the > zone). => but it is created by an authori

Re: [DNSOP] NSEC/NSEC3 for unsigned zones and aggressive use

2017-07-18 Thread Francis Dupont
In your previous mail you wrote: > There are still many popular unsigned zones, many of which don't look > like they will be signed soon due to operational and other reasons. > > Will you give some thought and reply with your opinion on NSEC/NSEC3 for > unsigned zones requiring the DNS COOK

Re: [DNSOP] IETF 99: Call for agenda items, and draft cutoff reminder

2017-07-01 Thread Francis Dupont
As you should know now there are some security problems in different TSIG implementations. IMHO the source of the problem is in TSIG RFCs so it is likely we'll have to discuss about publishing one or two Erratas. So even with a formal request for time in the agenda I believe we should consider to k

[DNSOP] RSASHA512 SHOULD-

2016-04-08 Thread Francis Dupont
In draft-wouters-sury-dnsop-algorithm-update-01.txt the RSASHA512 (code 10) DNSKEY/RRSIG algo got a SHOULD- for DNSSEC signing. The argument is it is not currently heavily used but I am afraid it is not a very good argument. I have a question for cryptographers in the list: as far as I know there i

Re: [DNSOP] Seeking more WG Last Call review for draft-ietf-dnsop-cookies

2015-07-20 Thread Francis Dupont
Here is a short review of draft-ietf-dnsop-cookies-04.txt. Note I was heavily involved into the "SIT" experiment (SIT was a scaled down version of the DNS cookie idea provided by bind9 version 9.9) so you should not surprise I like the DNS cookie. I have two comments about the current text which a

Re: [DNSOP] TCP server timeout

2015-03-26 Thread Francis Dupont
I like your proposed text so if there is no objection I suggest to simply adopt it (and to close this particular point). Thanks francis.dup...@fdupont.fr PS: for people who want to match the text here are the first 2 lines: we should allow servers to use whatever timeout they want -- but we

Re: [DNSOP] make TCP mandatory

2015-03-25 Thread Francis Dupont
In your previous mail you wrote: > > IMHO to not change the TCP requirement (which is today a MAY for > > deployment on clients and servers) will be very irresponsible because > > DNS + TCP was *never* a MAY. RFC 1123 says SHOULD. People took > liberties and treated it as a MAY. => ther

Re: [DNSOP] go further about DNS over TCP?

2015-03-25 Thread Francis Dupont
(other points, i.e., not TCP mandatory or timeouts) In your previous mail you wrote: > this means that while it's not ideal, it's not as broken as it could be. > with changes to recommended initiator behaviour, we could make these > existing servers more broken, or we could preserve their pre

Re: [DNSOP] TCP server timeout

2015-03-25 Thread Francis Dupont
In your previous mail you wrote: > i believe that the last of the old-style initiators who treated > premature closure by the responder as an urgent condition warranting a > message to the console or the system log file have diminished to the > level of noise, but that the change francis is a

Re: [DNSOP] make TCP mandatory

2015-03-25 Thread Francis Dupont
In your previous mail you wrote: > >> I believe 5966bis already addresses your first point quite clearly. > >> (note: first point is to make TCP support mandatory) > >> > >> For example, it says: > >> > >> This document therefore updates the core DNS protocol specifications > >>

Re: [DNSOP] go further about DNS over TCP?

2015-03-25 Thread Francis Dupont
I am splitting the thread in separate points. francis.dup...@fdupont.fr ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] go further about DNS over TCP?

2015-03-25 Thread Francis Dupont
In your previous mail you wrote: > As mentioned in the wg yesterday an informational document with > current behaviors may be helpful? => I am afraid it could only add confusion so IMHO it may not. > > On Mar 25, 2015, at 9:52 AM, Paul Vixie wrote: > > > > initiators have historically been

Re: [DNSOP] go further about DNS over TCP?

2015-03-25 Thread Francis Dupont
In your previous mail you wrote: > > => unfortunately this is a change in the protocol the document is > > not supposed to do here even it both makes sense and follows the real > > world situation. > > I disagree that this is a change. > > RFC 1035 allows the server to close the connecti

Re: [DNSOP] go further about DNS over TCP?

2015-03-24 Thread Francis Dupont
In your previous mail you wrote: > >>This document therefore updates the core DNS protocol specifications > >>such that support for TCP is henceforth a REQUIRED part of a full DNS > >>protocol implementation. > > Sorry, I should have realized that RFC 5966 (August 2010) already >

Re: [DNSOP] go further about DNS over TCP?

2015-03-24 Thread Francis Dupont
In your previous mail you wrote: > I believe 5966bis already addresses your first point quite clearly. >(note: first point is to make TCP support mandatory) > > For example, it says: > > This document therefore updates the core DNS protocol specifications > such that support for TCP

Re: [DNSOP] go further about DNS over TCP?

2015-03-24 Thread Francis Dupont
In your previous mail you wrote: > > So I propose: > > - make clear that TCP support is mandatory. > > - allow servers to use the timeout they like, even a zero timeout > > (the last point should be discussed). Note a zero timeout doesn't > > mean "send the response and close" but "send th

[DNSOP] go further about DNS over TCP?

2015-03-24 Thread Francis Dupont
As we have more and more DNS over TCP (large responses, response rate limitation, even TLS for privacy) I think we should fix the way DNS over TCP is supposed to be handled by servers. Quoting RFC 1035 4.2.2 "TCP usage": - The server should assume that the client will initiate connection c

Re: [DNSOP] Is there a concise and comprehensive definition of a "zone file"?

2015-02-20 Thread Francis Dupont
In your previous mail you wrote: > Defining a canonical form in no way is meant to imply that any other form > is wrong. The objective is to put a name on a canonical form, and provide > a reference, so that anyone who wants to see zone files meeting a strict > format can say so succinctly.

Re: [DNSOP] Is there a concise and comprehensive definition of a "zone file"?

2015-02-20 Thread Francis Dupont
In your previous mail you wrote: > Okay, well, maybe something new. Like - should the master files be in > ASCII or accommodate, say UTF-8? Just a teaser of what would be part of a > definition. (I have seen some zone files put IDNA U-Labels in the owner > field.) => at least one of the I

Re: [DNSOP] Is there a concise and comprehensive definition of a "zone file"?

2015-02-20 Thread Francis Dupont
What about RFC 1035 (aka STD 13) section 5 "MASTER FILES"? Thanks francis.dup...@fdupont.fr PS: the concept was introduced in RFC 1034, RFC 2308 added $TTL, RFC 2540 (dead?) added $DATE, $GENERATE is a BIND extension (Mark shall confirm but it is what the BIND 9 ARM says). And I agree there is n

Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-02-02 Thread Francis Dupont
In your previous mail you wrote: > If you want to make the connections full-duplex instead of > half-duplex, you need to negotiate connection teardown at the DNS > layer. Otherwise, the TCP connection teardown will result in loss of > already-transmitted responses. => I don't understand: to

Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-28 Thread Francis Dupont
In your previous mail you wrote: > Francis, while my own thinking goes further-- an initiator should > not leave a persistent TCP session idle, even for a microsecond, > unless the responder has signaled its approval of such strategy-- => it is what RFC 1035 said so a bit difficult to change

Re: [DNSOP] Followup Discussion on TCP keepalive proposals

2015-01-27 Thread Francis Dupont
In your previous mail you wrote: > If you see a use case for the EDNS tcp-keepalive option as originally > discussed, please say so, on the list, by February 4, 2015. => I have one (more later). > If you want to pursue the connection-close draft, please say so, on the > list, by February

Re: [DNSOP] RSA/SHA-1 to >= RSA/SHA-256 ?

2015-01-19 Thread Francis Dupont
In your previous mail you wrote: > Currently a number of validators don't do ECC, because of the openssl > library from the distribution they are using doesn't include support. > This makes ECC an unsupported algorithm, and so it "fails open" (See > RFC4035, Section 5.2, around "If the valida

[DNSOP] About DNS over TCP query pipelining

2015-01-08 Thread Francis Dupont
I am working on the different aspects of the query pipeling (for DNS over TCP or any stream / sequenced packet transport). I try a new tool which sends multiple queries to check which authoritative nameserver implementations support out-of-order responses with a funny result! I never got a conclusi

[DNSOP] review of draft-dickinson-dnsop-5966-bis-00.txt

2014-11-15 Thread Francis Dupont
Some comments: - 4 page 5: "It (TCP) SHOULD NOT be used only for zone transfers and as a fallback." this SHOULD NOT is very hard to implement without dubious interpretations (i.e., the idea is right but the current wording could lead to unexpected/unwanted results). - 5 page 4: "both c

Re: [DNSOP] Call for Adoption: draft-dickinson-dnsop-5966-bis

2014-11-15 Thread Francis Dupont
In your previous mail you wrote: > This starts a Call for Adoption for draft-dickinson-dnsop-5966-bis => I support the adoption (even there are many points I disagree, BTW it is more a reason to adopt it :-). I'll review it, etc. Regards francis.dup...@fdupont.fr

Re: [DNSOP] Call for Adoption: draft-eastlake-dnsext-cookies

2014-11-13 Thread Francis Dupont
In your previous mail you wrote: > This starts a call for adoption for draft-eastlake-dnsext-cookies. => for adoption (and review/implementation/etc) francis.dup...@fdupont.fr ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listin

Re: [DNSOP] Call for Adoption: draft-bortzmeyer-dns-qname-minimisation

2014-10-10 Thread Francis Dupont
+1 for adoption (and at the occasion contribute, review, implement, etc). francis.dup...@fdupont.fr ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] Masataka Ohta's 2004 draft...

2014-07-24 Thread Francis Dupont
In your previous mail you wrote: > >> Does "several thousands of queries per second during normal > >> operations" with TCP matter? > > > > => yes because it is at the limit current OSs can do on cheap stock > > hardware... > > Are you saying real root servers are using cheap stock h

Re: [DNSOP] Masataka Ohta's 2004 draft...

2014-07-23 Thread Francis Dupont
In your previous mail you wrote: > Does "several thousands of queries per second during normal > operations" with TCP matter? => yes because it is at the limit current OSs can do on cheap stock hardware... Regards francis.dup...@fdupont.fr PS: I wrote OS because the first reached perf limit

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-04-03 Thread Francis Dupont
In your previous mail you wrote: > The verification performance is bad, P256 takes 24x times longer to verify a > signature than 2048 bit RSA key. => I got a different figure (6x) for my ECC paper, and: - it was published the 3 may 2013 so one can expect ECC performance has been improved s

Re: [DNSOP] deploying security

2014-03-06 Thread Francis Dupont
In your previous mail you wrote: > If we follow this line of reasoning, why do we deploy more security, > then? => because we want (and as you noticed they don't want). > With this argument, we would never have deployed HTTPS > either. => have we? I am afraid most HTTPS are MITM'ed where S

Re: [DNSOP] my dnse vision (3 cases)

2014-03-06 Thread Francis Dupont
This is an update of my previous messages. The generic DNS confidentiality problem can be divided into 3 cases: 1- stubs <-> local resolver 2- stubs <-> remote open resolver 3- resolver <-> auth. servers In the first case the local resolver is in the same security area (I use "area" to avoi

Re: [DNSOP] my dnse vision (A+E vs E)

2014-03-05 Thread Francis Dupont
Another note about builtin/inline encryption solutions: there is a trade-off between encryption + authentication/integrity as recommended by crypto design rules vs. performances and message sizes. Of course this will be addressed during the crypto design, so when/after we reach a consensus about w

Re: [DNSOP] my dnse vision

2014-03-05 Thread Francis Dupont
In your previous mail you wrote: > > I consider the first one to be already solved, cf. the Microsoft > > deployed solution which puts clients, local networks, the resolver > > (also the Microsoft Domain Server :-), in the same area and uses > > IPsec to protect it. > > Which may be great

Re: [DNSOP] my dnse vision

2014-03-05 Thread Francis Dupont
In your previous mail you wrote: > > Or with other words you don't need confidentiality with 8.8.8.8 > > Why don't we need confidentiality with open resolvers like google? => because the goal is not confidentiality at the level a Microsoft environment needs (because Microsoft adopted and ex

Re: [DNSOP] my dnse vision

2014-03-05 Thread Francis Dupont
In your previous mail you wrote: > This is some good summarizing. With your solution, you don't mention > UDP. I would consider the lack of UDP an issue with moving forward at > least for wide deployment. Others seem to think otherwise. => I didn't add UDP in constraints but I made the "s

[DNSOP] my dnse vision

2014-03-05 Thread Francis Dupont
>From discussions with Stephane Bortzmeyer and Mark Andrews... First I come back to the fact there are two different problems (aka divide and conquer): * stubs <-> resolver * resolver <-> auth servers I consider the first one to be already solved, cf. the Microsoft deployed solution which puts

Re: [DNSOP] dnse related docs.

2014-03-05 Thread Francis Dupont
In your previous mail you wrote: > And perhaps even start earlier and/or end a bit later than the > allocated slot (0900-1130) if it's allowed and works for many? => to start earlier won't fit for people leaving London Friday (checkout, etc). For me the other side (end later) could work. Than

Re: [DNSOP] dnse related docs.

2014-03-05 Thread Francis Dupont
In your previous mail you wrote: > If we created a new session in the thursday evening 18:40-20:40 slot => already booked in this slot. Sorry... francis.dup...@fdupont.fr ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dn

Re: [DNSOP] rfc4641bis: ZSK-roll-frequency

2010-01-27 Thread Francis Dupont
In your previous mail you wrote: That might be draft-hoffman-dnssec-ecdsa. => IMHO we have a problem with ECDSA (and DSA too): verify is too slow, in particular it is slower than signature. You can expect a crypto accelerator for a master authoritative server, but not (yet?) for a caching ser

Re: [DNSOP] rfc4641bis: ZSK-roll-frequency

2010-01-25 Thread Francis Dupont
In your previous mail you wrote: But AFAIK, no dns implementation supports ECC yet. => *** flame war ON *** In fact it is no true: GOST (in its second version which will be used for DNSSEC) is based on ECC. *** flame war OFF *** francis.dup...@fdupont.fr PS: there is no real technical

Re: [DNSOP] RFC 2671 (dnsmasq author's answer)

2009-12-25 Thread Francis Dupont
om: Simon Kelley User-Agent: Mozilla-Thunderbird 2.0.0.22 (X11/20090706) MIME-Version: 1.0 To: Francis Dupont Subject: Re: dnsmasq and DNSSEC References: <200912210949.nbl9njhg084...@givry.fdupont.fr> In-Reply-To: <200912210949.nbl9njhg084...@givry.fdupont.fr> X-Enigmail-Version: 0.9

Re: [DNSOP] RFC 2671

2009-12-23 Thread Francis Dupont
In your previous mail you wrote: I've found another "culprit" in the program DNSMASQ - distributed with FedoraCore 10 and later versions of RedHat. => I asked some days ago the author to change the defaut to 4096 and in his answer he wrote it will be fixed in the next release. BTW as y

Re: [DNSOP] where is the validating resolver ?

2009-05-07 Thread Francis Dupont
In your previous mail you wrote: On May 5, 2009, at 10:11 PM, YAO Jiankang wrote: > thanks for your information. > so we can say that in the current practise, the (validating ) > resolvers are not run by local host or machine. => between the two solutions, not-validating securit

Re: [DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-28 Thread Francis Dupont
In your previous mail you wrote: => there are places where cryptography is required to be implemented in hardware, and many business reasons or even regulations which mandate HSMs. But the risk for the key is not only people modifying it, it is simply people *reading* it (a concern which a

Re: [DNSOP] "MX 0 ." standard way of saying "we don't do email" ?

2009-04-15 Thread Francis Dupont
In your previous mail you wrote: There is no standard way to say "I don't want to receive email" (unfortunately). => it is an old problem, RFC 1846 tried to mitigate it... Regards francis.dup...@fdupont.fr (as a co-author of 1846). ___ DNSOP

Re: [DNSOP] Potential root impact of draft-wing-behave-learn-prefix-00

2008-11-20 Thread Francis Dupont
In your previous mail you wrote: So they are aware that this is broken. Let's hope that this type of service discovery through a fraction DNS root doesn't make its way into the final standard. => I agree but what you propose to do? There will be a double session of behave WG tomorrow a

Re: [DNSOP] The sad fate of T/TCP (Was: deprecating dangerous bit patterns and non-TC non-AXFR)

2008-08-27 Thread Francis Dupont
In your previous mail you wrote: > it seems T/TCP is dead because of some security issues. Correct (RFC 4614, section 5) but, unfortunately, these issues were apparently never properly documented (no "T/TCP deprecated" RFC) and it is hard to find a reference to a description of th

Re: [DNSOP] A different question

2008-08-21 Thread Francis Dupont
In your previous mail you wrote: The concern I see (that I had hoped would be avoided by DO being set to 1 only when the caching server administrator had explicitly configured DNSSEC awareness) is that folks who are blissfully unaware of the root being signed would, through no f

Re: [DNSOP] A different question (was Re: Kaminsky on djbdns bugs (fwd))

2008-08-20 Thread Francis Dupont
In your previous mail you wrote: Now, I'm saying, for these 10 years, that PKI is broken. => what is broken? Crypto, trust model, architecture (including the RA/CA stuff), etc. There should be many ways to be broken (:-). That signature generation mechanism is accessible on line does n

Re: [DNSOP] Cache poisoning on DNSSEC

2008-08-20 Thread Francis Dupont
In your previous mail you wrote: If a caching server is required to perform public key computation to verify RRs before caching, it can't support much clients... => the common assumption that public key computation is slow or expensive is *wrong*. According to 'openssl speed rsa', My old 2

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR

2008-08-20 Thread Francis Dupont
In your previous mail you wrote: nobody to complete or champion T/TCP => it seems T/TCP is dead because of some security issues. In another thread about fragmentation (vs firewalls) someone proposed DCCP. At least, it avoids RFC 1035 4.2.2 (:-)! [EMAIL PROTECTED] ___

Re: [DNSOP] A different question

2008-08-20 Thread Francis Dupont
In your previous mail you wrote: Yes. I've just been told by a fairly authoritative source that BIND 9.5.1 (at least) sets the DO bit on by default, regardless of whether DNSSEC is configured. This would explain the high number of queries coming in with DO set. => as you kn

Re: [DNSOP] A different question (was Re: Kaminsky on djbdns bugs (fwd))

2008-08-20 Thread Francis Dupont
In your previous mail you wrote: So please consider other options before repeating the holy mantra 'DNSSEC is the only solution'. => it is not a mantra but the reality: - transaction protection is not enough if we want to keep caching in the middle (the argument is it has to be a