[DNSOP] Re: New draft on collision free key tags in DNSSEC

2024-07-30 Thread libor.peltan
Hi all, as an authoritative DNS server (and signer) vendor, let me state my opinions on this topic and this draft. 1) I'd very much like to see more exact guidance of how the auth server / signer should prevent keytag collisions. For example, what our Knot DNS does is: (a) on a signle signer,

[DNSOP] Re: [core] Re: Fwd: WG Adoption Call for draft-lenders-core-coap-dtls-svcb

2024-07-30 Thread Christian Amsüss
Hello Rich, > I'm also surprised by the choice of mnemonic, which is very short. If > the extra 7 octets of "coap-dtls" would make a material difference in > some use case, perhaps the draft should explain that. This was mentioned just very briefly during the tls-reg-review[1], so I'm happy to

[DNSOP] Re: [core] Re: Fwd: WG Adoption Call for draft-lenders-core-coap-dtls-svcb

2024-07-30 Thread Martine Sophie Lenders
Hi Med, On 29.07.24 13:56, mohamed.boucad...@orange.com wrote: Hi Carsten, all, There is a mismatch between what is claimed in the abstract/into vs. core documents. Concretely, when reading “This document specifies the usage of Service Parameters..” or “This document specifies which informat

[DNSOP] Re: [core] Re: Fwd: WG Adoption Call for draft-lenders-core-coap-dtls-svcb

2024-07-30 Thread mohamed . boucadair
Hi Martine, Please see inline. Cheers, Med > -Message d'origine- > De : Martine Sophie Lenders > Envoyé : mardi 30 juillet 2024 12:43 > À : c...@ietf.org; dnsop@ietf.org; BOUCADAIR Mohamed INNOV/NET > > Objet : Re: [core] Re: Fwd: WG Adoption Call for draft-lenders- > core-coap-dtls-

[DNSOP] Re: [core] Re: Fwd: WG Adoption Call for draft-lenders-core-coap-dtls-svcb

2024-07-30 Thread Ben Schwartz
Thanks for the background, Christian. I think one or two sentences on this topic would be worth including in the draft. --Ben From: Christian Amsüss Sent: Tuesday, July 30, 2024 6:26 AM To: Ben Schwartz Cc: mohamed.boucad...@orange.com; Carsten Bormann; c...@ie

[DNSOP] Secdir early review of draft-ietf-dnsop-compact-denial-of-existence-04

2024-07-30 Thread Brian Weis via Datatracker
Reviewer: Brian Weis Review result: Has Nits I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG ch

[DNSOP] Re: Secdir early review of draft-ietf-dnsop-compact-denial-of-existence-04

2024-07-30 Thread Michael Sinatra
I have also added a nit (as an Issue) to the github repo for this doc, as I'd like the authors consider explicitly stating that the inability for resolvers to synthesize NXDOMAIN responses for zones using this CDoE mechanism can make certain DOS attacks (e.g. Water Torture) more effective than

[DNSOP] Re: Secdir early review of draft-ietf-dnsop-compact-denial-of-existence-04

2024-07-30 Thread Shumon Huque
On Tue, Jul 30, 2024 at 7:51 PM Brian Weis via Datatracker wrote: > Reviewer: Brian Weis > Review result: Has Nits > Thank you for your review Brian. [... Good summary deleted for brevity ...] > Security Considerations also mentions that some security tools rely > on particular return codes t

[DNSOP] Re: Secdir early review of draft-ietf-dnsop-compact-denial-of-existence-04

2024-07-30 Thread Shumon Huque
Thank you Michael, Your observation is certainly true. However, I want to point out that inability to synthesize NXDOMAIN via aggressive negative caching applies to any online signing scheme that uses minimally covering NSEC, not just Compact DoE. Your suggestion to explicitly mention the impact

[DNSOP] Re: Secdir early review of draft-ietf-dnsop-compact-denial-of-existence-04

2024-07-30 Thread John Levine
It appears that Shumon Huque said: >-=-=-=-=-=- > >Thank you Michael, > >Your observation is certainly true. However, I want to point out that >inability to >synthesize NXDOMAIN via aggressive negative caching applies to any online >signing scheme that uses minimally covering NSEC, not just Compa