Re: [DNSOP] Off-Topic: Stub Marking & Testing Suggestions for IETF NQB DNS?

2023-09-30 Thread Livingood, Jason
Oh – and to clarify the QRT reduction – these measurements are happening while load is being generated on the connection – so it is a test of ‘working latency’ for DNS in this case. Jason From: "Livingood, Jason" Date: Saturday, September 30, 2023 at 09:37 To: dnsop Subject: Off-T

[DNSOP] Off-Topic: Stub Marking & Testing Suggestions for IETF NQB DNS?

2023-09-30 Thread Livingood, Jason
For those of you that have missed work happening in TSVWG – there are recent L4S and NQB docs that specify a method to achieve low latency via a 2nd network queue at bottleneck links. That depends on a client marking traffic using ECN – via ECT(1) or CE – and/or DSCP-45. I am in the midst of le

Re: [DNSOP] Working Group Last Call for draft-ietf-dnsop-dnssec-validator-requirements

2023-01-30 Thread Livingood, Jason
Since it is in WGLC – are you able to close out the issues in Github? (https://github.com/mglt/draft-mglt-dnsop-dnssec-validator-requirements/issues) Jason From: DNSOP on behalf of Tim Wicinski Date: Tuesday, January 24, 2023 at 21:55 To: Daniel Migault Cc: Florian Obser , dnsop Subject: Re

Re: [DNSOP] Call for Adoption: Structured Data for Filtered DNS

2023-01-24 Thread Livingood, Jason
I support adoption. I also suggest the authors take a look at two long-ago-expired I-Ds that are related to this subject: https://www.ietf.org/archive/id/draft-livingood-dns-malwareprotect-02.html https://www.ietf.org/archive/id/draft-livingood-dns-redirect-03.html Lastly, to the contents of th

Re: [DNSOP] Is DNSSEC a Best Current Practice?

2022-03-10 Thread Livingood, Jason
Good idea, and I volunteer to assist if you'd like. Some stuff that may be good to consider including: - Negative Trust Anchors - https://datatracker.ietf.org/doc/rfc7646/ - In case of DNSSEC validation failures, don't switch resolvers - https://datatracker.ietf.org/doc/draft-livingood-dnsop-dont

Re: [DNSOP] [dns-privacy] Do53 vs DoT vs DoH Page Load Performance Study at ANRW

2019-07-22 Thread Livingood, Jason
On 7/21/19, 4:27 PM, "DNSOP on behalf of Puneet Sood": > Running the experiment from locations which are further away from cloud > providers would provide another interesting set of data. [JL] +1. I understand the US FCC is considering running DoH tests from their Measuring Broadband America end

Re: [DNSOP] New draft for consideration:

2019-03-25 Thread Livingood, Jason
DoT and DoH seem fine. But maybe skip the acronym for Do53 - just call it conventional DNS or unencrypted DNS, or DNS over Port 53. Compared to RDoT/ADoT/DaT/DaO however, Do53 is the least offensive IMO. I don’t think you do much for clarity with RDoT and ADoT - seems mostly to be used because

Re: [DNSOP] [Doh] New I-D: draft-reid-doh-operator

2019-03-22 Thread Livingood, Jason
On 3/22/19, 3:53 AM, "Doh on behalf of Vittorio Bertola" wrote: > letting each application pick its own default resolver, creates a fragmented > mess of a network [JL] Troubleshooting also becomes potentially more complicated. I can't ask a user to run dig or nslookup and tell me what it says

Re: [DNSOP] [Doh] [hrpc] Proposal for a side-meeting on services centralization at IETF 104 Prague

2019-03-21 Thread Livingood, Jason
Last week I did a draft agenda at https://github.com/jlivingood/IETF-104-SideMtg/blob/master/draft-agenda.txt but to some extent large parts may have been overcome by events and need major changes. Maybe it is sufficient to have the various drafts presented and let discussion flow from that? It

Re: [DNSOP] [Doh] [dns-privacy] New: draft-bertola-bcp-doh-clients

2019-03-13 Thread Livingood, Jason
On 3/12/19, 11:40 PM, "Doh on behalf of Christian Huitema" wrote: > Why do you think you can filter content? Who made you king? [JL] End users may have opted into / subscribed to such a parental control system. An enterprise may say we'll only connect to the Internet and allow traffic of X or

[DNSOP] Two Resurrected WG I-Ds: Don't Switch Resolvers & Auth DNS Mistakes

2019-02-20 Thread Livingood, Jason
A few years ago I had somehow succeeded in getting WG adoption of 2 documents that addressed some pet peeves I had as a recursive DNS operator. Things got busy and my attention wandered elsewhere and I did not advance them. Since these issues continue to haunt RDNS operators, I have decided to u

Re: [DNSOP] Draft for dynamic discovery of secure resolvers

2018-08-19 Thread Livingood, Jason
On 8/19/18, 1:02 PM, "DNSOP on behalf of Doug Barton" wrote: > Personally I see securing the path from the stub to the resolver as a good step in the ultimate goal of encrypting all of the things. :) [JL] No disagreement here. I think the issue may be more to do with choice over the r

Re: [DNSOP] Draft for dynamic discovery of secure resolvers

2018-08-19 Thread Livingood, Jason
On 8/18/18, 7:03 PM, "DNSOP on behalf of bert hubert" wrote: Especially when such a move will incidentally kill intranets, VPNs, split horizon, DNS monitoring & DNS malware detecion and blocking. It seems to me that the underlying protocol is separable from the operational implementatio

Re: [DNSOP] Draft for dynamic discovery of secure resolvers

2018-08-19 Thread Livingood, Jason
In a DOCSIS network, for whatever that's worth, the link from the home (cable modem) to the next hop (CMTS) is encrypted. It is then usually just one or two hops within the ISP's regional network to the recursive DNS (in some cases DNSSEC-validating, as in our case). So I suppose that the threat

Re: [DNSOP] Alissa Cooper's No Objection on draft-ietf-dnsop-negative-trust-anchors-10: (with COMMENT)

2015-07-13 Thread Livingood, Jason
On 7/9/15, 11:56 AM, "Evan Hunt" wrote: >Valid point. When the NTA for a name expires, the cached data at and >below that name can also be discarded, so TTLs aren't a major concern >when the cache and the validator are coresident, Yeah, in my experience when we remove a NTA we do a cache flush fo

Re: [DNSOP] Interim DNSOP WG meeting on Special Use Names: some reading material

2015-05-07 Thread Livingood, Jason
On 5/7/15, 10:41 AM, "Ted Lemon" wrote: >I think this is an unfortunate way to look at the issue. FWIW, it is not necessarily my opinion. I could just see people asking about it in that way - in which case the IETF needs to have a firm and logical response. I think some of the emails already sen

Re: [DNSOP] Interim DNSOP WG meeting on Special Use Names: some reading material

2015-05-07 Thread Livingood, Jason
On 5/6/15, 2:07 PM, "Suzanne Woolf" mailto:suzworldw...@gmail.com>> wrote: c) The requests we're seeing for .onion and the other p2p names already in use are arguing that they should get their names to enable their technologies with minimal disruption to their installed base. While the

Re: [DNSOP] call for adoption: draft-vandergaast-dnsop-edns-client-subnet

2015-02-13 Thread Livingood, Jason
On 2/13/15, 9:05 AM, "Livingood, Jason" mailto:jason_living...@cable.comcast.com>> wrote: we've got running code in bind. and no doubt other product. Should be also in Nominet’s resolver. BTW, I meant NomiNUM not NomiNET. Darned

Re: [DNSOP] call for adoption: draft-vandergaast-dnsop-edns-client-subnet

2015-02-12 Thread Livingood, Jason
Fair point. IMO whitelisting is a common tactic used early on in deployment of new stuff to help manage deployment risk. It was also used in early IPv6 days where query access to RRs was whitelisted (see http://tools.ietf.org/html/rfc6589). I suspect it would be similar here; that the need

Re: [DNSOP] call for adoption: draft-vandergaast-dnsop-edns-client-subnet

2015-02-12 Thread Livingood, Jason
On 2/12/15, 2:54 PM, "George Michaelson" mailto:g...@algebras.org>> wrote: we've got two agencies who do DNS, and probably have > 20% worldwide eyeball share in DNS (I don't know, thats a guesstimate) now doing edns0_client_subnet albiet with whitelist, so its a permit-list, but its functionall

Re: [DNSOP] call for adoption: draft-vandergaast-dnsop-edns-client-subnet

2015-02-12 Thread Livingood, Jason
On 2/12/15, 2:51 PM, "Mark Delany" wrote: >Tap tap tap. Is this thing turned on? > >I think 3-4 people made some well-considered feedback on this draft, but >there has been zero discussion or author feedback for some six weeks now. > >Does that mean there is insufficient interest in progressing t

Re: [DNSOP] Workshop on DNS Future Root Service Architecture (2014 WDFRSA), Hong Kong, December 8-9, 2014

2014-11-19 Thread Livingood, Jason
Unfortunately, I won’t be able to attend this workshop. I understand the need and desire for many geographic area and networks to run a local anycast node associated with one of the existing root letters. I have heard that in some cases the root operator is willing to enable a local anycast nod

Re: [DNSOP] New Version Notification for draft-livingood-dnsop-negative-trust-anchors-01.txt

2014-10-26 Thread Livingood, Jason
On 10/25/14, 10:12 PM, "Warren Kumari" mailto:war...@kumari.net>> wrote: On Sat, Oct 25, 2014 at 9:50 PM, Paul Hoffman mailto:paul.hoff...@vpnc.org>> wrote: On Oct 25, 2014, at 6:43 PM, Olafur Gudmundsson mailto:o...@ogud.com>> wrote: We want humans in the loop, I would love to see a twitter fe

Re: [DNSOP] Fwd: New Version Notification for draft-livingood-dnsop-negative-trust-anchors-01.txt

2014-10-25 Thread Livingood, Jason
On 10/24/14, 6:06 PM, "Doug Barton" wrote: >But worse yet, in the operator error case you make such errors painless. >Instead, if they are painful (as in, screw up DNSSEC and you go off line) >then it leads to more people taking DNSSEC seriously, and doing it right. >Of course I realize that the

Re: [DNSOP] New draft-livingood-negative-trust-anchors-04

2013-02-22 Thread Livingood, Jason
On 2/18/13 4:56 PM, "Mark Andrews" wrote: >In message <51228dfb.3070...@ogud.com>, Olafur Gudmundsson writes: >> Jason, in section 10 you talk about possible early removal the NTA when >>validation succeeds but there may be instances where validation succeeds >>when using a sub-set of the authori

Re: [DNSOP] New draft-livingood-negative-trust-anchors-04

2013-02-22 Thread Livingood, Jason
On 2/20/13 1:52 PM, "Joe Abley" wrote: > >On 2013-02-20, at 14:50, Richard Lamb wrote: > >> FWIW: The -04 draft looks good. It is clear and well written and I >>think it is a valuable resource. >> As I am late to looking at this draft please take this only as a >>comment from a narrow minded e

Re: [DNSOP] New draft-livingood-negative-trust-anchors-04

2013-02-22 Thread Livingood, Jason
On 2/18/13 3:24 PM, "Olafur Gudmundsson" wrote: >Jason, in section 10 you talk about possible early removal the NTA when >validation succeeds but there may be instances where validation succeeds >when using a sub-set of the authoritative servers thus NTA should only >be removed if all servers ar

Re: [DNSOP] New draft-livingood-negative-trust-anchors-04

2013-02-22 Thread Livingood, Jason
On 2/20/13 1:50 PM, "Richard Lamb" mailto:richard.l...@icann.org>> wrote: As I am late to looking at this draft please take this only as a comment from a narrow minded engineer ;-) After the rationale, explanations and caveats I kept looking for how to implement a NTA. After initially thinkin

Re: [DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-22 Thread Livingood, Jason
Ack. Tracking the need for examples in the open issues log for the I-D. On 2/19/13 4:21 PM, "Warren Kumari" wrote: > >On Feb 16, 2013, at 7:43 PM, Paul Hoffman wrote: > >> Ted's misunderstanding of what you are proposing is a valid one. You >>don't actually say what a negative trust anchor is,

Re: [DNSOP] New draft-livingood-negative-trust-anchors-04

2013-02-18 Thread Livingood, Jason
Thanks for catching that - will correct this in -05. Jason On 2/18/13 10:57 AM, "Marco Davids (SIDN)" wrote: >Jason, > >On 17/02/2013 10:22, Livingood, Jason wrote: >>> Based on feedback yesterday on the list, I did a quick ­04 update > >Personally I would a

Re: [DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-17 Thread Livingood, Jason
Inline below (and some proposed text for you to give feedback on). - Jason On 2/17/13 10:19 AM, "Ted Lemon" wrote: >On Feb 17, 2013, at 9:57 AM, "Livingood, Jason" > > wrote: >> A Negative Trust Anchor should IMO be locally configured and not rely >>up

[DNSOP] New draft-livingood-negative-trust-anchors-04

2013-02-17 Thread Livingood, Jason
Based on feedback yesterday on the list, I did a quick –04 update, which is now at https://datatracker.ietf.org/doc/draft-livingood-negative-trust-anchors/. The are seven open issues documented at the end of the I-D. But the most important questions for this WG are: 1 – Is this worth considerat

Re: [DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-17 Thread Livingood, Jason
On 2/16/13 7:43 PM, "Paul Hoffman" wrote: >Ted's misunderstanding of what you are proposing is a valid one. You >don't actually say what a negative trust anchor is, and what it is a >trust anchor for, until section 7. Readers such as Ted (and myself!) will >have strong prejudices by then. Yeah,

Re: [DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-17 Thread Livingood, Jason
On 2/16/13 6:21 PM, "Joe Abley" wrote: >Jason: you didn't ask directly, but if the working group was polled to >determine support for adopting this document, I would say yes and >volunteer to review it. Thanks, Joe, for prodding me to be more explicit! ;-) Yes, that is indeed one of my questions

Re: [DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-17 Thread Livingood, Jason
On 2/16/13 6:32 PM, "Ted Lemon" wrote: >> I'm confused where you drew the reference to 5280 from (or X.509). I >>don't see anything in the draft that concerns publication or automatic >>retrieval of NTAs from elsewhere; which section did I miss? > >Sorry, I was one RFC deeper in the reference tr

[DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-16 Thread Livingood, Jason
I just posted (finally, I know) an update to draft-livingood-negative-trust-anchors, which you can find at https://datatracker.ietf.org/doc/draft-livingood-negative-trust-anchors/. This update incorporates feedback from Paul Vixie, Antoin Verschuren, Patrik Wallstrom, Patrik Falstrom, Marc Lamp

Re: [DNSOP] Data format for DNS looking glasses

2013-01-21 Thread Livingood, Jason
Seems a really interesting idea. Jason On 1/21/13 10:37 AM, "Paul Hoffman" wrote: >On Jan 21, 2013, at 3:02 AM, Stephane Bortzmeyer >wrote: > >> I already mentioned this service here, but it is now officially in >> production: >> >> http://www.bortzmeyer.org/dns-lg.html >> >> What is of spe

Re: [DNSOP] Models of DNS cache behavior?

2013-01-18 Thread Livingood, Jason
effects on recursive resolvers (system shocks where QPS load may go up 100% - 200% in a few minutes) Jason On 1/18/13 11:03 AM, "Livingood, Jason" wrote: >If there is anyone out there interested in doing research into DNS >recursive resolvers and are seeking either (1) access to d

Re: [DNSOP] Models of DNS cache behavior?

2013-01-18 Thread Livingood, Jason
If there is anyone out there interested in doing research into DNS recursive resolvers and are seeking either (1) access to data (stripped of PII of course) and/or (2) modest funding support, please let me know off-list. - Jason On 2/20/12 2:27 PM, "Emiliano Casalicchio" wrote: >John, >may be

Re: [DNSOP] identitytheft.gov DNSSEC Issue

2012-04-19 Thread Livingood, Jason
em. Scott On Apr 19, 2012, at 10:39 AM, Livingood, Jason wrote: In case anyone knows the domain admins… Jason On 4/11/12 5:58 PM, "Szymanski, Todd M [NTK]" mailto:todd.szyman...@sprint.com>> wrote: For those who can’t see pictures, it’s identitytheft.gov. Looks like

Re: [DNSOP] on "Negative Trust Anchors"

2012-04-16 Thread Livingood, Jason
On 4/15/12 10:42 AM, "Joe Abley" wrote: >Patrik, > >Nobody is talking about creating NTAs. NTAs already exist. The question >for this group is whether or not they are worth standardising. > >Joe Quite true, Joe! We'll keep using NTAs as needed. But I've had enough people ask me to document what

Re: [DNSOP] on "Negative Trust Anchors"

2012-04-16 Thread Livingood, Jason
On 4/14/12 9:23 PM, "Warren Kumari" wrote: >Yes, but AT&T, Verizon, Cox, BestWeb, RR, TW, etc are currently *not* >doing validation, and currently don't have much in the way of incentives >to start -- yes, NASA was an unusual event, but what was the standard >advice that kept popping up on twitte

Re: [DNSOP] on "Negative Trust Anchors"

2012-04-16 Thread Livingood, Jason
On 4/13/12 9:51 PM, "Doug Barton" wrote: >The problem, and I cannot emphasize this highly enough, is that there is >absolutely no way for an ISP (or other end-user site doing >recursion/validation) to determine conclusively that the failure they >are seeing is due to a harmless stuff-up, vs. an

Re: [DNSOP] on "Negative Trust Anchors"

2012-04-16 Thread Livingood, Jason
On 4/13/12 5:18 PM, "Patrik Fältström" mailto:p...@frobbit.se>> wrote: On 13 apr 2012, at 22:44, Nicholas Weaver wrote: Because practice has shown that it is the recursive resolver, not the authority, that gets blamed. As you saw in my mail, I completely disagree from my own personal experienc

Re: [DNSOP] on "Negative Trust Anchors"

2012-04-16 Thread Livingood, Jason
On 4/13/12 5:00 PM, "Patrik Fältström" mailto:p...@frobbit.se>> wrote: In a private chat I am asked to explain my "+1". Let me explain why. Today, before negative trust anchors, the responsibility for whether a the resolution that is basis for a connection establishment is with the zone owner.

Re: [DNSOP] on "Negative Trust Anchors"

2012-04-16 Thread Livingood, Jason
On 4/13/12 1:43 PM, "Paul Vixie" wrote: >we need to move quickly to the point where lots of large eyeball-facing >network operators are validating, such that any failure to properly >maintain signatures and keys and DS records, is felt most severely by >whomever's domain is thus rendered unreach

Re: [DNSOP] New I-D on Negative Trust Anchors

2012-04-16 Thread Livingood, Jason
>Joe Abley writes: > >> On 2012-04-11, at 12:09, Wes Hardaker wrote: >>> NTA example.com Thu Apr 12 09:06:42 PDT 2012 >> >> I realise this is just a thought experiment > >Well, true it certainly is. And in fact the above thought experiment >wasn't meant to imply a resource record, but rather a c

Re: [DNSOP] New I-D on Negative Trust Anchors

2012-04-16 Thread Livingood, Jason
Inline On 4/11/12 10:16 AM, "Tony Finch" wrote: >Griffiths, Chris wrote: >> On Apr 10, 2012, at 8:11 PM, Wes Hardaker wrote: >> >> > Suggested rewrite: >> > >> > Furthermore, a Negative Trust Anchor MUST only be used for a >> > short duration, perhaps for a day or less. >> >> Agr

Re: [DNSOP] on "Negative Trust Anchors"

2012-04-16 Thread Livingood, Jason
Inline. - JL On 4/12/12 8:21 AM, "Marc Lampo" wrote: >The draft of Negative Trust Anchors does not mention anything about >informing the operator of the failing domain. I'll make a note to call this out in the next version. Something about making reasonable attempts to notify the domain of the

Re: [DNSOP] Limiting duration for Negative Trust Anchors, was Re: New I-D on Negative Trust Anchors

2012-04-16 Thread Livingood, Jason
Had a double copy & paste error! Here is the 2nd domain: http://dnsviz.net/d/www.bitcoinica.com/T4pqsA/dnssec/ >http://dnsviz.net/d/www.bayfieldelectric.com/T4wofg/dnssec/ > > >http://dnsviz.net/d/www.bayfieldelectric.com/T4wofg/dnssec/ > ___ DNSOP ma

Re: [DNSOP] Limiting duration for Negative Trust Anchors, was Re: New I-D on Negative Trust Anchors

2012-04-16 Thread Livingood, Jason
Inline below. - JL On 4/10/12 10:06 AM, "Shane Kerr" wrote: >Jason, > >On Tuesday, 2012-03-27 15:19:23 +, >"Livingood, Jason" wrote: >> I posted a ­01 a short time ago >> (http://tools.ietf.org/html/draft-livingood-negative-trust-anchors-01) &

[DNSOP] re Many Comments on Negative Trust Anchor I-D (back from vacation)

2012-04-16 Thread Livingood, Jason
I am an author of the document and am just back from vacation today. I will start to read and respond to the many emails now – did not want anyone to think I was ignoring the discussion. :-) Jason ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.

Re: [DNSOP] New I-D on Negative Trust Anchors

2012-03-27 Thread Livingood, Jason
I posted a –01 a short time ago (http://tools.ietf.org/html/draft-livingood-negative-trust-anchors-01) and listed this in open items for the next version. I may have some questions on the best way to include that. Jason On 3/27/12 2:04 PM, "Antoin Verschuren" mailto:antoin.verschu...@sidn.nl>

Re: [DNSOP] New I-D on Negative Trust Anchors

2012-03-26 Thread Livingood, Jason
>I read the draft and like the direction of it. >It looks like you are proposing turning off a validation for domain by >the negative trust anchor. Correct >An alternative is to insert a negative trust anchor for a particular >trust anchor. Do you mean when an alternative trust anchor is used by

[DNSOP] New I-D on Negative Trust Anchors

2012-03-26 Thread Livingood, Jason
I just posted a –00 of a draft that may be of interest to this WG. It covers an issue we have found in our DNSSEC deployment. My co-author is doing some markup of the doc now so I am hoping to post a –01 before the end of this week. (I've already found some minor typographical and grammatical er

[DNSOP] draft-ietf-v6ops-v6-aaaa-whitelisting-implications-01

2011-01-26 Thread Livingood, Jason
At the last IETF meeting I presented my individual I-D on IPv6 DNS whitelisting. This was subsequently adopted as a WG item in v6ops. Yesterday, I posted a new -01 version of this draft for WG feedback by v6ops and dnsop at http://tools.ietf.org/html/draft-ietf-v6ops-v6--whitelisting-implica

Re: [DNSOP] draft-ietf-dnsop-dnssec-key-timing-00

2010-10-19 Thread Livingood, Jason
+1 (from the 'something is better than nothing' school of thought) :-) On 10/19/10 7:01 AM, "Tony Finch" wrote: >On Tue, 19 Oct 2010, Jim Reid wrote: >> On 19 Oct 2010, at 09:26, Johan Ihren wrote: >> > >> > B. "Better to publish what we have and initiate work on a -bis >>document >> > immediat

[DNSOP] Soliciting feedback on draft-livingood-dns-whitelisting-implications

2010-10-01 Thread Livingood, Jason
Hi - I am soliciting feeback on this new draft, available at http://tools.ietf.org/html/draft-livingood-dns-whitelisting-implications. This was a subject that was touched on during the DNSOP WG session at IETF 77. In particular, I am looking for more text to add in the justifications / rational

Re: [DNSOP] Updated DNS Redirect Draft

2010-09-06 Thread Livingood, Jason
legal mandate and one for content filtering. I plan to hold off on investing time in either of those for now, unless the WG would like to see those specified in a new document. Jason On 9/6/10 2:30 PM, "Livingood, Jason" wrote: >It's been a little over a year since the firs

[DNSOP] Updated DNS Redirect Draft

2010-09-06 Thread Livingood, Jason
It's been a little over a year since the first draft on this subject was submitted. I received a lot of feedback on that draft from the WG, including a request to remove all forms of redirect mentioned other than web error redirection (such as malware protection) and to add a much more pointed

Re: [DNSOP] Choice in draft-livingood-dns-redirect

2009-07-28 Thread Livingood, Jason
Good points, all. One of the things I noted from the WG meeting was the desire to separate the different types of redirect into distinct I-Ds, which I plan to do. That should help avoid conflating what are very different sort of redirect in practice. Thanks Jason On 7/28/09 5:02 AM, "Alissa Co

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-20 Thread Livingood, Jason
Great feedback, Dave. Thank you and we¹ll take it into account as we work on a revision. Jason On 7/17/09 1:02 PM, "Dave CROCKER" wrote: > > > Jason, et al, > > This note suggests changes in both style and detail in > draft-livingood-dns-redirect-00. All of the points made here have been

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Livingood, Jason
>> FWIW, I think most ISPs that introduce such services see around a >> 0.1% opt-out rate. > > What does it prove? Most ISP that introduces lying resolvers as an > opt-in service see a 0.1 % opt-out rate, too. It proves only that most > users do not dare to change the settings or are not informed

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Livingood, Jason
> TLDs, including your own zones. This is indeed not just Site Finder > all over again - it's far worse, and breaks far more applications than > Site Finder did. Please do send me that list of applications. I would very much like to describe these use cases in the next version of the draft. Tha

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Livingood, Jason
>> SSAC's Report on DNS Response Modification >> http://www.icann.org/en/committees/security/sac032.pdf > > Indeed. Good document. There is no need to discuss about > draft-livingood-dns-lie, Is that really necessary? > all the issues raised here in this WG were > already in the SSAC document

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Livingood, Jason
>> > I'll speak for my parents here: a DNS resolver that reduces the chance that >> they'll get a drive-by malware >> > infection is something they would happily use. Having said that, a DNS >> resolver that gives them a page of >> > search results instead of the browser's error page when they mist

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Livingood, Jason
On 7/16/09 3:22 AM, "Stephane Bortzmeyer" wrote: > >> > I did not hear them so this sort of users is obviously not in the >> > dnsop WG :-) More seriously, noone mentioned here any survey about >> > this. So, we can just guess and speculate. > > You can probably safely assume that any large I

Re: [DNSOP] Comments on draft-livingood-dns-redirect-00

2009-07-14 Thread Livingood, Jason
Thanks for your detailed review. We¹ll reply when we start to work on the ­01 update. Regards Jason On 7/14/09 7:21 PM, "SM" wrote: > Hello, > > When I first read draft-livingood-dns-redirect-00, my first thought > was about how would it be received if the author was from some > country in t

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-14 Thread Livingood, Jason
On 7/14/09 8:58 AM, "Suzanne Woolf" wrote: > In this case, we're talking about resolvers replacing > authoritative server data with their own. Actually, I thought the case was resolvers providing an alternate response, where NO authoritative data exists. ?? > To the draft specifically: the

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
t 11:23:48AM -0400, Livingood, Jason > wrote: > If anyone is interested and has time before IETF 75, I¹m happy to > take > feedback before then obviously. Please note that there is a list of > open > items at the end, which we plan to address in subsequent versions. I > have read d

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
Thanks for the suggestion, Tony. I will add that to my tracking list for the next revision (and may email you to confirm what I have might be satisfactory). I think we probably also need to address the fact that mail servers should not use resolvers that perform DNS redirect (this was assumed but

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
> On Jul 9, 2009, at 5:23 PM, Livingood, Jason wrote: > >> > I submitted this draft, which you can find at >> http://tools.ietf.org/html/draft-livingood-dns-redirect-00 >> > , before the ­00 cutoff on Monday, and it will be discussed in the >> > DNSOP

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
Thx for the **very detailed** and thoughtful feedback. I will review & respond in detail when I start working on the ­01 revision. Jason On 7/12/09 4:30 AM, "Florian Weimer" wrote: > * Jason Livingood: > >> > If anyone is interested and has time before IETF 75, I¹m happy to take >> > feedbac

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
Thx for the feedback. I will try to address your concern in the ­01 revision. If you have any specific textual recommendations, let me know. Jason On 7/12/09 3:34 AM, "Florian Weimer" wrote: > * Stephane Bortzmeyer: > >> > Unless I'm wrong, the I-D about lying resolvers do not discuss the >

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
Good guidance on Informational vs. BCP. We may get there eventually, but I thought that starting as a draft BCP might provoke more detailed and useful debate. ;-) On the topic of Œlying resolvers¹ though, that seems a bit strong IMHO. But perhaps I have missed a strong MUST statement (per RFC 2

[DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-09 Thread Livingood, Jason
I submitted this draft, which you can find at http://tools.ietf.org/html/draft-livingood-dns-redirect-00, before the ­00 cutoff on Monday, and it will be discussed in the DNSOP WG meeting at IETF 75 (it is listed on the agenda). If anyone is interested and has time before IETF 75, I¹m happy to tak

[DNSOP] (Off-Topic) DNSSEC Technical Testing

2008-10-02 Thread Livingood, Jason
Yesterday, we attended a DNSSEC policy meeting in Washington, where we announced that we've started a DNSSEC technical trial at Comcast. We tend to be rather hands-on learners, so we implemented a DNSSEC-capable resolver in our production network. Anyone on the public Internet is welcome to point