[DNSOP] Re: [dtn] An Interplanetary DNS Model

2024-07-23 Thread Scott Johnson
Hi Ondrej, On Mon, 22 Jul 2024, Ondřej Surý wrote: Hi Scott, FTR .arpa is not "reverse DNS", only the in-addr.arpa and ipv6.arpa is. .arpa now stands for Address and Routing Parameter Area, and there are more subdomains than just these two mentioned above. Ack. Thanks for clarification. S

[DNSOP] Re: Introducing Relative Label for DNS

2024-07-23 Thread Peter Thomassen
Hi Ben, Welcome to DNSOP! :-) Your proposal reads like you'd like to add relative names to the DNS protocol. Reading this thread, however, I realize that you'd simply like to use the 0x40 label type *within the confines of your system*, and are asking to this added to the DNS Label Types regi

[DNSOP] Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt

2024-07-23 Thread Jessica Krynitsky
Thanks Ben and Erik for the comments! Erik, yes I agree, I think we had TLS 1.3 in mind when writing the draft and when evaluating alternatives for this encrypted DNS scenario. I think we can make an edit to specify TLS 1.3 or at least post-handshake client authentication with TLS 1.2. It sound

[DNSOP] Re: Introducing Relative Label for DNS

2024-07-23 Thread Ben van Hartingsveldt
Dear all, Today, I released a new version of the draft: https://datatracker.ietf.org/doc/html/draft-yocto-dns-relative-label-01. I tried to clarify things a little bit more, added some examples and fixed some references. Ben Ben van Hartingsveldt schreef op 2024-07-21 18:50: Dear all, In

[DNSOP] Re: Introducing Relative Label for DNS

2024-07-23 Thread Ben van Hartingsveldt
Hi Peter, It is a little bit of both, I think. Yes, I use relative labels already in my own system internally (now as 0xFF, but I'm planning to move to 0x40). It works and it works very well. However, I'm planning to add DNS UPDATE to my DNS services, so that my customers can use it in their

[DNSOP] Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt

2024-07-23 Thread tirumal reddy
In enterprise networks, DNS services typically enforce policies at the organization and user-group levels, rather than at the individual user level. DNS filtering is generally not imposed based on individual user identities. It would be interesting to evaluate other possible solutions that could e

[DNSOP] Potentially interesting DNSSEC library CVE

2024-07-23 Thread Bellebaum, Thomas
Hello everyone, a while ago I asked for guidance concerning a vulnerability I found in a DNS library. Unfortunately I cannot find the message right now, so please excuse the new thread. The vulnerability now has a CVE and a GitHub Advisory published here: https://github.com/dnsjava/dnsjava/secu

[DNSOP] Re: Potentially interesting DNSSEC library CVE

2024-07-23 Thread Philip Homburg
> The vulnerability now has a CVE and a GitHub Advisory published > here: > https://github.com/dnsjava/dnsjava/security/advisories/GHSA-cfxw-4h78-h7fw > > I suspect this might be useful feedback to some of you designing > DNSSEC validation routines, especially for validating stub resolvers. > I ha

[DNSOP] Re: An Interplanetary DNS Model

2024-07-23 Thread Lorenzo Breda
Il giorno mar 23 lug 2024 alle ore 08:16 Scott Johnson < sc...@spacelypackets.com> ha scritto: > Hi Lorenzo, > > On Mon, 22 Jul 2024, Lorenzo Breda wrote: > > > I don't like the way this system permits the same name to refer to > > different resources on different planets. > > It is not one of my

[DNSOP] Re: Fwd: New Version Notification for draft-andrews-private-ds-digest-types-00.txt

2024-07-23 Thread Ben Schwartz
Two questions I didn't see addressed: Why would a zone need to be signed with multiple private algorithms? Why isn't it sufficient to treat all private algorithms as a single algorithm for DS purposes, and distinguish by the Key Tag and/or trial hashing? --Ben Schwartz _

[DNSOP] Re: Fwd: New Version Notification for draft-andrews-private-ds-digest-types-00.txt

2024-07-23 Thread Mark Andrews
At the moment you can only have one private algorithm per key type world wide. This is all to do with how you prove a zone is to be treated as insecure.   If example.com is using private.example.com and example.net is using private.example.net how done  validator that knows about private.example.co

[DNSOP] Re: New Version Notification for draft-andrews-private-ds-digest-types-00.txt

2024-07-23 Thread Mark Andrews
Remember that a DNSKEY RRset doesn’t have to match all DS records. It only has to match one. Multi-signer depends on this. > On 23 Jul 2024, at 09:28, Mark Andrews wrote: > > At the moment you can only have one private algorithm per key type world > wide. > > This is all to do with how you

[DNSOP] IDKEY and Keytrap

2024-07-23 Thread Mark Andrews
The ANRW talk "Protocol Fixes for KeyTrap Vulnerabilities” this afternoon by Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner is proposing that there is a type roll for DS and DNSKEY. I don’t think this is needed. The only change actually need is to add a new requirement that says

[DNSOP] Re: Fwd: New Version Notification for draft-andrews-private-ds-digest-types-00.txt

2024-07-23 Thread Ben Schwartz
OK, thanks for the explanation. That helps me understand the scenario where this would be needed, but it seems like simpler solutions are possible. For example, the resolver could be configured to restrict the use of PRIVATEDNS keys to specific subtrees where their usage is known. This draft

[DNSOP] Re: New Version Notification for draft-andrews-private-ds-digest-types-00.txt

2024-07-23 Thread Mark Andrews
> On 23 Jul 2024, at 10:41, Ben Schwartz wrote: > > OK, thanks for the explanation. That helps me understand the scenario where > this would be needed, but it seems like simpler solutions are possible. For > example, the resolver could be configured to restrict the use of PRIVATEDNS > keys

[DNSOP] Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt

2024-07-23 Thread Paul Vixie
On Monday, July 22, 2024 5:11:23 PM PDT Jessica Krynitsky wrote: > Thanks Ben and Erik for the comments! > > Erik, yes I agree, I think we had TLS 1.3 in mind when writing the draft and > when evaluating alternatives for this encrypted DNS scenario. I think we > can make an edit to specify TLS 1.3

[DNSOP] Re: IDKEY and Keytrap

2024-07-23 Thread Philip Homburg
> The ANRW talk "Protocol Fixes for KeyTrap Vulnerabilities this > afternoon by Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael > Waidner is proposing that there is a type roll for DS and DNSKEY. > I dont think this is needed. The only change actually need is to > add a new requirement that s

[DNSOP] Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt

2024-07-23 Thread Paul Wouters
On Jul 23, 2024, at 12:09, Paul Vixie wrote: > >  > Making TLS 1.2 available as a fallback is vital. Many secure private edge > networks will never allow TLS 1.3 because of ECH. You can do TLS 1.3 without ECH ? Making a weaker version of TLS mandatory would be unwise, unless it’s to give mor

[DNSOP] Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt

2024-07-23 Thread Paul Vixie
-- P Vixie On Tuesday, July 23, 2024 12:52:28 PM PDT Paul Wouters wrote: > On Jul 23, 2024, at 12:09, Paul Vixie wrote: > > Making TLS 1.2 available as a fallback is vital. Many secure private edge > > networks will never allow TLS 1.3 because of ECH. > > You can do TLS 1.3 without ECH ? if

[DNSOP] Re: IDKEY and Keytrap

2024-07-23 Thread Mark Andrews
> On 23 Jul 2024, at 12:51, Philip Homburg wrote: > >> The ANRW talk "Protocol Fixes for KeyTrap Vulnerabilities this >> afternoon by Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael >> Waidner is proposing that there is a type roll for DS and DNSKEY. >> I dont think this is needed. The on

[DNSOP] Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt

2024-07-23 Thread Jessica Krynitsky
Hi Tiru, I agree, and the need to be able to enforce an organizational hierarchy was one of our early requirements as well. Our thinking was that with mTLS, the organization could naturally use PKI to represent this structure (although I will not pretend that OAuth cannot do this too). With cli

[DNSOP] Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt

2024-07-23 Thread Ben Schwartz
It seems like there's some confusion here. ECH is an extension to TLS that is still under development (and now nearly final). Use of ECH is optional in TLS 1.3. Any entity that can control the TLS version in use also has the ability to disable ECH, so allowing TLS 1.3 does not require an admi

[DNSOP] Re: Fwd: New Version Notification - draft-ietf-dnsop-domain-verification-techniques-05.txt

2024-07-23 Thread Shumon Huque
On Tue, Jul 9, 2024 at 2:25 PM John Levine wrote: > It appears that Tim Wicinski said: > >This is one of those DNSOP documents that may not be relevant to those who > >implement DNS, or those who operate DNS infrastructure. It is relevant to > >Applications that use the DNS, and those who focus

[DNSOP] Re: Fwd: New Version Notification - draft-ietf-dnsop-domain-verification-techniques-05.txt

2024-07-23 Thread Shumon Huque
On Tue, Jul 9, 2024 at 2:54 PM Wessels, Duane wrote: > I read through draft-ietf-dnsop-domain-verification-techniques-05 and have > a few minor comments / suggestions. > Thanks Duane! > > this may result in IP fragmentation, which often does not work > > While it’s true we have come to agree t

[DNSOP] Re: [Ext] Dnsdir last call review of draft-ietf-dnsop-rfc8109bis-05

2024-07-23 Thread Paul Hoffman
On Jul 16, 2024, at 00:06, Di Ma via Datatracker wrote: > > Reviewer: Di Ma > Review result: Ready with Issues > > This version adds more discussions about DNSSEC to priming exchange, which I > think need clearer statements. > > In this document, the authors say “With such resolvers, an attacke

[DNSOP] Re: Fwd: New Version Notification - draft-ietf-dnsop-domain-verification-techniques-05.txt

2024-07-23 Thread John R Levine
On Tue, 23 Jul 2024, Shumon Huque wrote: The simplest thing to do would be to follow the precedent of SPF, DKIM, etc TXT using protocols and state that multiple TXT strings (if present) need to be concatenated before use. We can state this. That should be fine. Wildcards can cause some annoyi

[DNSOP] Re: [IPNSIG PWG] Re: [dtn] Re: An Interplanetary DNS Model

2024-07-23 Thread Sivasubramanian M
On Tue, 23 Jul, 2024, 02:50 Scott Johnson, wrote: > Hi Ben, > > On Mon, 22 Jul 2024, Ben Schwartz wrote: > > > This document seems to propose that "https" URLs will route through > > "route through" is exactly what is not happening here. https will be > secure to the edge of the IP network, whic

[DNSOP] Re: [IPNSIG PWG] Re: [dtn] Re: An Interplanetary DNS Model

2024-07-23 Thread Sivasubramanian M
On Wed, 24 Jul, 2024, 11:07 Sivasubramanian M, <6.inter...@gmail.com> wrote: > > > On Tue, 23 Jul, 2024, 02:50 Scott Johnson, > wrote: > >> Hi Ben, >> >> On Mon, 22 Jul 2024, Ben Schwartz wrote: >> >> > This document seems to propose that "https" URLs will route through >> >> "route through" is e