Re: [DNSOP] automating RFC2317 via IPv6 reverse map/DHCPv6

2022-12-08 Thread Havard Eidnes
> Hi, while editing draft-ietf-homenet-front-end-naming-delegation, it occured > to me that the automatic reverse that > draft-ietf-homenet-naming-architecture-dhc-options could enable > better/simpler RFC2317 delegation for IPv4 subnets. > > My experience is that some of the pushback for doing 231

Re: [DNSOP] Meaning of lame delegation

2023-04-03 Thread Havard Eidnes
> Dear DNSOP, > > I am participating in an SSAC work party where we are writing > about DNS delegations where a delegated name server might be > available for registration, allowing an attacker to participate in > the resolution for the domain. During report drafting we > considered using the ter

Re: [DNSOP] Meaning of lame delegation

2023-04-03 Thread Havard Eidnes
>> There are three possible situations in which this might be >> considered a lame delegation: > > (4) What if NS.EXAMPLE.ORG does respond to EXAMPLE.NET queries > but claims that the correct name server is NS.EXAMPLE.COM? > > Does that make the delegation NS "lame" since resolvers > wi

Re: [DNSOP] DNSOPMeaning of lame delegation

2023-04-03 Thread Havard Eidnes
>> We welcome the working group's thoughts whether "lame delegation" >> encompasses these three possibilities. > > FYI, when working on the EDE draft [RFC8914] we discussed lame > delegations some and actually did not document a particular error code > related to it, as the meaning both uses impro

Re: [DNSOP] Meaning of lame delegation

2023-04-04 Thread Havard Eidnes
>> I believe that the most natural perspective is from the view point of a >> resolver attempting to classify a (non?)response to a query sent to an >> authoritative server. > > Another way of thinking about this perspective is that, e.g., a > delegation response from a.gtld-servers.net (.COM names

Re: [DNSOP] Meaning of lame delegation

2023-04-04 Thread Havard Eidnes
>> > ; ANSWER >> > ; AUTHORITY >> > example.com. IN NS ns1.provider.net. >> > example.com. IN NS ns2.provider.net. >> > >> > is a valid delegation response (and so not from this perspective a LAME >> > delegation), whether or not the target servers actualy serve the zone. >> >> I ag

Re: [DNSOP] Meaning of lame delegation

2023-04-06 Thread Havard Eidnes
> What I'm trying to suggest (resolver perspective), is that > questions of responsibility, ... are not something a resolver > can or should attempt to determine. All one can attempt to do > is classify query responses. Yes, I agree, as far as a recursive resolver is concerned. However, talking

Re: [DNSOP] Meaning of lame delegation

2023-04-08 Thread Havard Eidnes
>> > Well, one would, in fact, expect a delegation to be a >> > non-authoritative answer: >> >> Yes, but one would presume that before any of the two above >> queries were sent, the recursive resolver already have cached the >> delegation for jshsos.ksyunv5.com. > > It doesn't matter, there can be

Re: [DNSOP] Meaning of lame delegation

2023-04-12 Thread Havard Eidnes
> Joe Abley> One nameserver in the delegation set of a particular > Joe Abley> child zone might provide non-authoritative > Joe Abley> responses. By my usage, that nameserver is lame for > Joe Abley> that zone. The delegation of that zone to that > Joe Abley> nameserver is a lame delegation. Ident

Re: [DNSOP] [Ext] WGLC rfc8499bis one week extension for lame delegation definition

2023-05-02 Thread Havard Eidnes
>>"A lame delegation is said to exist when one or more authoritative >>servers designated by the delegating NS RRset or by the child's apex >>NS RRset answers non-authoritatively [or not at all] for a zone". >> >> ... without the "or not at all" part (so, an answer is required for >> "l

Re: [DNSOP] [Ext] WGLC rfc8499bis one week extension for lame delegation definition

2023-05-02 Thread Havard Eidnes
> My parent says that the NS for exmple.com are ns1.example.com, > ns2.example.com , but I (example.com) say that my NS are ns1.example.com, > ns2.example.com *and* ns3.example.com. I don't (personally) think that this > is a lame delegation. Do others? Nope. Given this information, this is simpl

Re: [DNSOP] [Ext] WGLC rfc8499bis one week extension for lame delegation definition

2023-05-03 Thread Havard Eidnes
> A lame delegation is said to exist when a server assumed (by > the querier) to be authoritative for a zone replies > non-authoritatively for {any|all} data within the zone. ... > 3) {any|all} open question...can a server be "partially lame?" Sadly, yes, ref. suspected load balancers who have bee

Re: [DNSOP] [Ext] WGLC rfc8499bis one week extension for lame delegation definition

2023-05-04 Thread Havard Eidnes
> I have one last question. Regardless of whether we agree > precisely on what "lame" means, what is the call to action when > a zone or its name servers are declared lame? "Get your ducks in a row!" A domain owner is presumably normally interested in name resolution for names in his/hers domain

Re: [DNSOP] [Ext] WGLC rfc8499bis one week extension for lame delegation definition

2023-05-04 Thread Havard Eidnes
> As an example, it's quite common for people to register a > domain and point the DNS at some nameservers which they don't > control, and have no relationship with. If this is common, I'm abhorred. Having the delegating party check for service for the requested zone at time of delegation request

Re: [DNSOP] Delegation acceptance checks

2023-05-05 Thread Havard Eidnes
>> I imagine that others also spend time on sorting out these entirely >> unnecessary issues. If guidance were developed on delegation acceptance >> checks, > > Well, yes... but where? ccNSO, perhaps? My advice would be to only enforce checks where violations would negatively impact operations (e

Re: [DNSOP] Delegation acceptance checks

2023-05-06 Thread Havard Eidnes
> Pre-delegation checks add friction to the domain registration > process. They further complicate the commuications between > different actors in the commercial graph (registrars, registries, > resellers, DNS operators, hosting companies) and introduce delay > and manual intervention into what mig

Re: [DNSOP] rfc8499bis: lame

2023-06-10 Thread Havard Eidnes
> Then, how about we stop using "lame delegation" and use terms like > "imperfect delegation" or "incomplete delegation"? Hm, not sure I like either of those two alternatives. I'll give my reasons. In general, to my ear they sound very "generic". A delegation may be "perfect", meaning that it's

Re: [DNSOP] WGLC rfc8499bis for revised lame delegation definition

2023-07-18 Thread Havard Eidnes
> With the DNSOP interim meeting last June, we reworded the definition > of "lame delegation". This new definition of "lame delegation" has > been shared on the mailing list and included by the document authors > in the latest revision of the rfc8499bis draft, > https://author-tools.ietf.org/iddif

Re: [DNSOP] WGLC rfc8499bis for revised lame delegation definition

2023-07-18 Thread Havard Eidnes
>> Note that Scott's current EPP draft is still using this term, >> citing the definition in 1912. Should the term be removed >> from Scott's draft, or acknowledged that it is now historic? >> If Scott replaces it with another more precise term, can we >> get that term in this document so that fut

Re: [DNSOP] Resolver behaviour in the presence of unrequested answer records

2024-01-16 Thread Havard Eidnes
> We have been looking at some DNS resolvers and encountered a question: > > When a DNS response contains (in the answer section) records which were > not requested, how should the resolver react to those and what should > it return to the requesting client? > > For example: > > QUESTION: > example

Re: [DNSOP] DELEG and parent only resolution

2024-02-01 Thread Havard Eidnes
Stupid question time: > The target of a DELEG alias cannot be stored in the child > zone. It would not resolve if you do. Doesn't this mean that we can never get to an environment where there only exists DELEG records and no NS records, and still have a working DNS? Regards, - Håvard _

Re: [DNSOP] DELEG and parent only resolution

2024-02-01 Thread Havard Eidnes
>>Stupid question time: >> >>> The target of a DELEG alias cannot be stored in the child >>> zone. It would not resolve if you do. >> >> Doesn't this mean that we can never get to an environment where >> there only exists DELEG records and no NS records, and still have >> a working DNS? > > DELEG r

Re: [DNSOP] [Ext] About key tags

2024-02-14 Thread Havard Eidnes
>>In my mind this is good enough reason to outlaw keytag collisions - >>without them it would be _much_ easier to implement reasonable limits >>without risk of breaking legitimate clients. > > That would make key tags meaningful. ;--) That may be an inevitable consequence. To my min

Re: [DNSOP] partial glue is not enough, I-D Action: draft-ietf-dnsop-glue-is-not-optional-00.txt

2020-07-07 Thread Havard Eidnes
>> this is the draft where that issue would be decided, so it's >> good we're talking about it. ... > > by the way, this is what kato and i, and later jabley, were > trying to get at with > > https://datatracker.ietf.org/doc/draft-ietf-dnsop-respsize/ > > but it was like moving mud with a toothpick

Re: [DNSOP] partial glue is not enough, I-D Action: draft-ietf-dnsop-glue-is-not-optional-00.txt

2020-07-07 Thread Havard Eidnes
>>> by the way, this is what kato and i, and later jabley, were >>> trying to get at with >>> >>> https://datatracker.ietf.org/doc/draft-ietf-dnsop-respsize/ >>> >>> but it was like moving mud with a toothpick, so after eleven >>> years (2003 to 2014) we gave it up. there are probably some >>> good

Re: [DNSOP] I-D Action: draft-ietf-dnsop-dns-catalog-zones-01.txt

2021-02-19 Thread Havard Eidnes
> During the last hackathon at IETF-109, a new idea emerged where the > version of a member zone in a catalog (indicated by the member zone's > SOA serial number) is also in the catalog. This can help ensuring > dissemination of member zones in a catalog from the primary to the > secondary nameserv

Re: [DNSOP] signalling mandatory DNSSEC in the parent zone

2021-03-01 Thread Havard Eidnes
>- Switching providers while staying secure requires >inter-provider cooperation, including publishing ZSKs from >both providers in the DNSKEY RRSET served by both providers. What? Maybe I just don't understand the context or conditions here, but ... Isn't it possible to stand up a n

Re: [DNSOP] FIPS 140-3 mode on RHEL 9 and RSA validation of <2048 keys

2022-04-25 Thread Havard Eidnes
>> On Apr 25, 2022, at 11:20 AM, Petr Menšík wrote: >> I think the only good way would be starting considering shorter keys as >> insecure in FIPS mode. > > Agreed. We've been using 2408-bit ZSKs for more than ten years > now. It's definitely time to sunset acceptance of shorter keys > at this p

[DNSOP] Terminology: "primary master"

2017-11-23 Thread Havard Eidnes
Hi, draft 07 says: Primary master: "The primary master is named in the zone's SOA MNAME field and optionally by an NS RR". (Quoted from [RFC1996], Section 2.1). [RFC2136] defines "primary master" as "Master server at the root of the AXFR/IXFR dependency graph. The primary

Re: [DNSOP] Terminology: "primary master"

2017-11-23 Thread Havard Eidnes
>> Secondly: can someone please explain to me why the idea of a >> "primary master" where the zone data originates from and where >> updates are performed is considered archaic? > > I think the only in-protocol use of the MNAME field is to > specify the name to which UPDATE messages are sent. Rea

Re: [DNSOP] Minimum viable ANAME

2018-09-27 Thread Havard Eidnes
>> If I look up foo and it has an ANAME to bar, which of these do I get >> back? > > ; ANSWER SECTION > foo. A 1.2.3.4 Who provides the DNSSEC proof for this record? AIUI, there is no A 1.2.3.4 in the "foo." zone originally, but there is an ANAME. How, then, does this avoid DNSSEC-signing-on-the-

Re: [DNSOP] Minimum viable ANAME

2018-09-27 Thread Havard Eidnes
>> I also feel from this discussion, we are all roughly on the same >> page. We want SRV as the long term solution ... > > except that we heard at the side meeting in Montreal (albeit from > browser people rather than content people) that they *don't* want > SRV, because it has fields that are not

Re: [DNSOP] Minimum viable ANAME

2018-10-03 Thread Havard Eidnes
>> > except that we heard at the side meeting in Montreal (albeit from >> > browser people rather than content people) that they *don't* want >> > SRV, because it has fields that are not compatible with the web >> > security model. >> >> Can you summarize the particulars of the web security model (

Re: [DNSOP] Asking TLD's to perform checks.

2015-11-11 Thread Havard Eidnes
>> It may not be possible for everyone to agree on a comprehensive >> set of 'wrongs' with no omissions, but it should be possible to >> get consensus on a core set of 'wrongs' that are not controversial. > > Yes and no. I think going for a minimum will be a good goal, > but for example to have la

Re: [DNSOP] Asking TLD's to perform checks.

2015-11-11 Thread Havard Eidnes
>> Does the scenario look like this? >> >> * Client asks to registrar to set up frobbit.se > > Yes, someone want to register frobbit.se domain name. For pure > IPR reasons. It should not resolve. Ah, OK. Then this is first and foremost a registry policy issue: do you in your policy support regist

Re: [DNSOP] Lame? - was Re: Asking TLD's to perform checks.

2015-11-12 Thread Havard Eidnes
> When I did inspection of "lameness" I ran across the definition > of a lame server (in a few RFCs) being a name server, named in > an NS set that responded that it was not authoritative for the > answer sought. > > I cannot say that I have ever seen a definition of a lame > delegation, just a lam

Re: [DNSOP] simple question

2015-11-13 Thread Havard Eidnes
> consider a nameserver ns.example.com serving example.com. There is a > delegation from com. including glue. > Now we add a childzone sub.example.com. served by the same nameserver > ns.example.com. > > should I add a entry in example.com to delegate the subzone to myself? Generally, yes, althoug

Re: [DNSOP] Second Working Group Last Call: draft-ietf-dnsop-refuse-any

2017-03-17 Thread Havard Eidnes
>>> If something gets an ANY response that does not include the thing it >>> really needs, how is it supposed to know that it needs to ask again? >> >> If something is unable to unambiguously ask for the exact thing it >> really needs, that's their problem. It's not a concern for this WG or >> the

[DNSOP] Sanity check

2011-10-27 Thread Havard Eidnes
Hi, I wonder if I could please have someone say whether they agree with me on this one: I've come across a configuration "in the wild" where a given zone 'z' contains both a.z. NS some.name.server. *and* sub.a.z. NS some.other.name.server. and where the owner of 'a.z' could not un

Re: [DNSOP] Sanity check

2011-10-27 Thread Havard Eidnes
>> I've come across a configuration "in the wild" where a given zone >> 'z' contains both >> >> a.z. NS some.name.server. >> >> *and* >> >> sub.a.z. NS some.other.name.server. > > are some.name.server and some.other.name.server really > different servers? Different instances of name server >

Re: [DNSOP] Definitions of foo-centric

2015-02-25 Thread Havard Eidnes
>> However in the child-centric case this can cause problems when the >> NS set held by the parent changes (i.e. the zone is redelegated) but >> the NS set in the old set of servers isn't also updated. Such a >> child-centric resolver may completely fail to notice the >> redelegation. > > Yes, thi

Re: [DNSOP] Definitions of foo-centric

2015-02-25 Thread Havard Eidnes
>>Firstly, isn't this "child-centric resolver" / "parent-centric >>resolver" simply an euphemism papering over the more distinct >>"correctly" and "wrongly" implemented resolver? > > That's my thought exactly. (But that doesn't mean the terms > needn't be given definitions.) ... >>>Phantom domai

Re: [DNSOP] Definitions of foo-centric

2015-02-26 Thread Havard Eidnes
>> > Child-centric resolver: a DNS resolver which will replace, in its >> > memory, the NS RRset and glue records obtained from the parent, by >> > data from the authoritative servers of the zone they belong to. This >> > is the proper behaviour (but note that a resolver MUST re-check from >> > the