Re: [DNSOP] Should root-servers.net be signed

2010-03-09 Thread Joe Abley
On 2010-03-09, at 11:59, Tony Finch wrote: > On Tue, 9 Mar 2010, Matt Larson wrote: >> >> Even after .net is signed (in Q4 2010) > > I note that Verisign's press releases say "by Q1 2011" which I find rather > hard to interpret. Why don't they say "by the start of 2011"? Do they mean > "in Q1 2

[DNSOP] today's DURZ transitions (D, E, K)

2010-03-24 Thread Joe Abley
Hi all, A quick update since we have a meeting today. From measurements made at ICANN it seems that the D, E and K root servers have all completed their DURZ transition. This leaves the current status as follows: A DURZ B unsigned C unsigned D DURZ E DURZ F unsigned G unsig

Re: [DNSOP] today's DURZ transitions (D, E, K)

2010-03-24 Thread Joe Abley
On 2010-03-24, at 11:27, Joe Abley wrote: > Hi all, > > A quick update since we have a meeting today. From measurements made at ICANN > it seems that the D, E and K root servers have all completed their DURZ > transition. This leaves the current status as follows: > > A

Re: [DNSOP] draft-ietf-dnsop-default-local-zones and the former IP6.INT.

2010-04-06 Thread Joe Abley
On 2010-04-06, at 09:22, Alfred HÎnes wrote: > The 4th paragraph of that section in the draft says: > > | This document also ignores IP6.INT. IP6.INT has been wound up with > | only legacy resolvers now generating reverse queries under IP6.INT > | [RFC4159]. I also think the text above coul

Re: [DNSOP] KSK rollover

2010-05-13 Thread Joe Abley
On 2010-05-13, at 19:33, Mark Andrews wrote: > There are lots of way to do this. > * Use UPDATE to update the delegation records in the parent. > This would work today it only requires a willingness to do so. > This can be done securely (TSIG) and will scale. >

Re: [DNSOP] KSK rollover

2010-05-13 Thread Joe Abley
On 2010-05-13, at 22:13, Joe Abley wrote: > ... and there's also the approach that is actually being implemented, which > is described in RFC 4310. Or 5910, since that seems to exist now. :-) Internet Engineering Task Force (IETF) J. Gould Request for Com

Re: [DNSOP] KSK rollover

2010-05-13 Thread Joe Abley
On 2010-05-13, at 22:32, Mark Andrews wrote: > Which is essentially registrar to registry. It really does not > make for a general solution to the problem unless every operator > of every zone that delegates any zone runs epp in addition to running > a DNS server. Sure, but be aware that you're

[DNSOP] Fwd: I-D Action:draft-liman-tld-names-03.txt

2010-06-08 Thread Joe Abley
Hi all, FYI -- see below. The authors currently plan to seek advancement of this document as an individual submission rather than a working-group document, but certainly people here should be aware of it (and reviews and suggestions, as always, would be most welcome). Joe Begin forwarded me

[DNSOP] Fwd: I-D Action:draft-ietf-dnsop-as112-under-attack-help-help-04.txt

2010-08-02 Thread Joe Abley
Hi Peter, Stephen, An earlier version of this document passed working-group last call. This document has some minor changes as described in Appendix A that the authors believe are non-substantive. The authors are of the opinion that this document is ready to be written up and sent to the IESG.

[DNSOP] Fwd: I-D Action:draft-ietf-dnsop-as112-ops-04.txt

2010-08-02 Thread Joe Abley
Hi Peter, Stephen, The authors are of the opinion that this document is ready for working-group last call. Thanks, Joe Begin forwarded message: > From: internet-dra...@ietf.org > Date: 29 July 2010 09:00:02 EDT > To: i-d-annou...@ietf.org > Cc: dnsop@ietf.org > Subject: [DNSOP] I-D Action:dr

Re: [DNSOP] I-D Action:draft-ietf-dnsop-as112-under-attack-help-help-04.txt

2010-08-02 Thread Joe Abley
On 2010-08-02, at 12:33, Peter Koch wrote: >> The authors are of the opinion that this document is ready to be written up >> and sent to the IESG. > > the chairs intend to send this version of the document to the AD/IESG > for publication as an Informational RFC in the FYI subseries (see RFC 11

Re: [DNSOP] draft-ietf-dnsop-dnssec-trust-history - discussion

2010-09-14 Thread Joe Abley
On 2010-09-13, at 10:36, W.C.A. Wijngaards wrote: > On 09/10/2010 01:24 PM, Stephen Morris wrote: >> > >> 1. Is the situation addressed by the draft - that of a validator that >> has been offline or that has missed an (emergency) rollover needing >> to reconfigure itself - a problem that needs

Re: [DNSOP] draft-ietf-dnsop-dnssec-trust-history - discussion

2010-09-14 Thread Joe Abley
On 2010-09-14, at 13:55, Tony Finch wrote: > On Tue, 14 Sep 2010, Joe Abley wrote: >> >> Doesn't trust-history impose a requirement high standards of operational >> security for key materials which have long since fallen out of >> production, and hence exte

Re: [DNSOP] draft-ietf-dnsop-dnssec-trust-history - discussion

2010-09-17 Thread Joe Abley
On 2010-09-17, at 06:28, W.C.A. Wijngaards wrote: > * The URL that iana published in their description is: > https://data.iana.org/root-anchors/root-anchors.xml > * 'widely available trust certificates' to verify the https We also specified - http:// URLs (no "s") - detached OpenPGP signatur

[DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-09-29 Thread Joe Abley
FYI Begin forwarded message: > From: internet-dra...@ietf.org > Date: 29 September 2010 12:45:03 GMT > To: i-d-annou...@ietf.org > Subject: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt > Reply-To: internet-dra...@ietf.org > list-id: Internet Draft Announcements only > > A New Internet-Dr

Re: [DNSOP] Recursive DNS service with external Shared Cache

2010-09-29 Thread Joe Abley
On 2010-09-29, at 13:07, Brian Smith wrote: > I'm looking for an installation that will use multiple resolvers. What I > would like to do is to use 1 server that will be the shared cache for all of > the resolvers to share. Theoretically this will reduce the amount of traffic > going out of th

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-09-29 Thread Joe Abley
On 2010-09-29, at 16:04, David Conrad wrote: > Useful draft. A couple of comments/questions: > > In section 2.1: > > "The document contains a complete set of > trust anchors for the root zone, including anchors suitable for > immediate use and also historical data." > > This strikes me as

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-09-30 Thread Joe Abley
Hi George, On 2010-09-30, at 06:45, George Barwood wrote: > Not directly related to this draft ( it's probably out of scope ), but is > there any guidance on the timing of rollover of the Trust Anchor for the Root > Zone? We have issued no guidance for this to date beyond (a) in an emergency,

Re: [DNSOP] draft-jabley-dnssec-trust-anchor-00 -- a quick review

2010-09-30 Thread Joe Abley
Hi Alfred, On 2010-09-30, at 09:29, Alfred HÎnes wrote: > I've taken a look at draft-jabley-dnssec-trust-anchor-00 > and have a couple of comments -- mostly editorial in nature. Many thanks for the review. I have made changes based on your editorial observations, and my co-author is working on

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-09-30 Thread Joe Abley
On 2010-09-30, at 16:51, Stephan Lagerholm wrote: > It is not clear if the validUntil time is referring to the time when the > key is expected to be rolled into RFC 5011 revoked state or when it is > expected to be removed from the zone. I see what you mean. > What will happen with the keytag f

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-09-30 Thread Joe Abley
On 2010-09-30, at 18:42, Tony Finch wrote: > I think it was a mistake to drop the trust anchor history draft, because > it has a reaasonably coherent answer to the problem. I think the arguments > that it is not secure enough are misguided. What we want is a way for > software to bootstrap its DN

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-09-30 Thread Joe Abley
On 2010-09-30, at 19:23, Paul Hoffman wrote: > At 7:42 PM +0100 9/30/10, Tony Finch wrote: >> At the moment the trust anchors are the ICANN x.509 self-signed >> certificate and/or the PGP keyring. What are the processes for rolling >> over these keys? How should manufacturers of software or hardw

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-01 Thread Joe Abley
On 2010-10-01, at 06:58, Tony Finch wrote: > What is the purpose of the historical information in the XML TA file? Debugging, context, historical record. Joe ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-03 Thread Joe Abley
On 2010-10-03, at 07:59, Tony Finch wrote: > On 3 Oct 2010, at 08:27, Jakob Schlyter wrote: >> On 1 okt 2010, at 20.59, Tony Finch wrote: >>> >>> Right, so it's aimed at human consumption rather than automatic tools? >> >> Given the historical information (together with old DNSKEY), you could

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-03 Thread Joe Abley
On 2010-10-03, at 12:32, Eric Rescorla wrote: > Why? Are you asking because you've reviewed those discussions and have issues with them, or because you didn't review those discussions? I'm not entirely sure the answer shouldn't be "because we manage the keys, and we say so" actually. Joe __

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-03 Thread Joe Abley
On 2010-10-03, at 13:31, Eric Rescorla wrote: > I'm asking because I'm pretty familiar with cryptography and I know that keys > don't suddenly become > worthless just because they get past their intended use lifetime. The > semantics of signature > security of old keys is a lot more complicated

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-04 Thread Joe Abley
Hi, On 2010-10-04, at 10:31, Eric Rescorla wrote: > On Sun, Oct 3, 2010 at 10:54 AM, Joe Abley wrote: > >> On 2010-10-03, at 13:31, Eric Rescorla wrote: >> >> > I'm asking because I'm pretty familiar with cryptography and I know that >> >

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-04 Thread Joe Abley
On 2010-10-04, at 11:11, Eric Rescorla wrote: > Carefully specified, perhaps, but what you're saying here also makes me think > it was > also incorrectly specified, since, as I said, the technique I described is > well-known, > and failing to do so leads to precisely the complications that ar

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-04 Thread Joe Abley
On 2010-10-04, at 11:24, bmann...@vacation.karoshi.com wrote: >>> So, rather than designing a bunch of kludgy workarounds, it would be better >>> to ask >>> what the right thing to do is, even if that requires changing some >>> preexisting >>> document. >> >> Workarounds to what? >> >> I have

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-04 Thread Joe Abley
On 2010-10-04, at 11:18, Tony Finch wrote: > It isn't immediately clear to me from the root KSK DPS whether you expect > RFC 5011 to work in the event of a compromise. > > [...] We seem once again to be moving from the subject at hand to a review and discussion of the KSK DPS. I would prefer t

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-04 Thread Joe Abley
On 2010-10-04, at 11:33, Tony Finch wrote: > On Mon, 4 Oct 2010, Joe Abley wrote: >> >> I have not heard a clear description of a problem yet > > How can a system that missed a TA rollover bootstrap its DNSSEC validator? The same way that it bootstraps itse

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-04 Thread Joe Abley
On 2010-10-04, at 12:56, Tony Finch wrote: > On Mon, 4 Oct 2010, Jakob Schlyter wrote: >> >> Depending on the type of compromise, a RFC 5011 may not be appropriate. > > RFC 5011 allows for smooth operation across compromise or loss of the > active KSK, or compromise or loss of the backup KSK. O

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-04 Thread Joe Abley
On 2010-10-04, at 12:53, Tony Finch wrote: > On Mon, 4 Oct 2010, Joe Abley wrote: >> On 2010-10-04, at 11:33, Tony Finch wrote: >>> On Mon, 4 Oct 2010, Joe Abley wrote: >>>> >>>> I have not heard a clear description of a problem yet >>> >&

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-04 Thread Joe Abley
On 2010-10-04, at 13:41, Tony Finch wrote: > On Mon, 4 Oct 2010, Jakob Schlyter wrote: >> >> RFC 5011 is not very useful if the active KSK is rendered in-operational >> ("lost") > > Er, yes it is. You have a pre-published standby SEP key No. We don't. Joe ___

Re: [DNSOP] Fwd: I-D Action:draft-jabley-dnssec-trust-anchor-00.txt

2010-10-04 Thread Joe Abley
On 2010-10-04, at 14:13, Tony Finch wrote: > One thing that is missing is any description of the kind of load you > expect the service to bear. Would it be OK if a vendor sold millions of > DSL modems that hit data.iana.org every time they recovered from a power > loss? This, to me, is an operat

[DNSOP] draft-liman-tld-names-04

2010-11-11 Thread Joe Abley
Hi all, [sending separately to dnsext and to dnsop, apologies for duplicates] http://www.ietf.org/id/draft-liman-tld-names-04.txt is the latest iteration of an effort started quite some time ago to clarify the somewhat vague inference in RFC 1123 and create a more precise specification for the

Re: [DNSOP] draft-liman-tld-names-04

2010-11-22 Thread Joe Abley
On 2010-11-21, at 22:53, Doug Barton wrote: > On 11/17/2010 01:19, Stephane Bortzmeyer wrote: > | On Thu, Nov 11, 2010 at 01:42:24PM -0500, > | Joe Abley wrote > | a message of 15 lines which said: > | > |> http://www.ietf.org/id/draft-liman-tld-names-04.txt &g

Re: [DNSOP] whois: the protocol that can't be killed even though it must

2010-11-22 Thread Joe Abley
Hi Jim, On 2010-11-21, at 17:56, Jim Reid wrote: > On 21 Nov 2010, at 22:20, Patrik Fältström wrote: > >> Noone is asking strong enough to get correct data from the whois service. >> Instead, ICANN is asking to have the whois protocol available, and on top of >> that money is spent on anonymou

Re: [DNSOP] draft-liman-tld-names-04

2010-11-23 Thread Joe Abley
On 2010-11-23, at 17:44, Doug Barton wrote: > I don't think you can mix those 2 terms in the same sentence. :) Just so I understand the context for your comments, you're saying that in your opinion: 1. there is no restriction to be inferred from RFC 1123 that TLD labels be alphabetic; 2. it

Re: [DNSOP] draft-liman-tld-names-04

2010-11-23 Thread Joe Abley
On 2010-11-23, at 20:26, Doug Barton wrote: > On 11/23/2010 16:19, Joe Abley wrote: >> >> 1. there is no restriction to be inferred from RFC 1123 that TLD >> labels be alphabetic; > > Unqualified "yes" to this. I presume you appreciate that not everybody s

Re: [DNSOP] draft-liman-tld-names-04

2010-11-27 Thread Joe Abley
On 2010-11-26, at 11:53, Tony Finch wrote: > Some implementers may have understood the above phrase "will be > alphabetic" to be a protocol restriction. This is incorrect. It is in fact > a description of the TLD allocation policy at that time. What's your basis for this assertion? We (authors

Re: [DNSOP] draft-liman-tld-names-04

2010-11-27 Thread Joe Abley
On 2010-11-27, at 13:02, Tony Finch wrote: > On 27 Nov 2010, at 15:57, Joe Abley wrote: >> >> I don't know how to defend an assertion in absolute terms that this >> understanding is categorically wrong. How would you do it? > > As I have said before, RFC 11

Re: [DNSOP] End of Life Notice for ITAR / State of ARPA.

2010-12-01 Thread Joe Abley
Hi Alfred, On 2010-12-01, at 08:06, Alfred HÎnes wrote: > It is now going to be two weeks since the IANA ITAR has been > factually decommissioned, but still the last entry that has > been removed from the ITAR, the DS record for the ARPA. zone, > has not been placed into the root zone -- as confi

Re: [DNSOP] End of Life Notice for ITAR / State of ARPA.

2010-12-01 Thread Joe Abley
On 2010-12-01, at 10:40, Joe Abley wrote: > I appreciate that there is eagerness amongst the technical community to see a > DS record in the root zone. Operationally, we are ready. I have no > information on the expected time at which the root zone change processing for > ARPA

[DNSOP] Fwd: Cron ${HOME}/work/watching-root-zone/watching-root-zone.sh

2010-12-06 Thread Joe Abley
Hi all, A DS RRSet for ARPA was published in the root zone a few minutes ago, details below. Joe Begin forwarded message: > From: jab...@monster.hopcount.ca (Cron Daemon) > Date: 6 December, 2010 18:40:01 EST > To: jab...@monster.hopcount.ca > Subject: Cron > ${HOME}/work/watching-root-zone

Re: [DNSOP] Question about the time of regular DS rollover by ICANN

2011-01-10 Thread Joe Abley
On 2011-01-09, at 16:40, Zheng Wang wrote: > I have a question on the ICANN's processing time of the regular DS RR rollover > request from TLD operators. > > I find in ICANN's document saying that "the emergency change process will be > completed and reflected in the root zone within 48 hours f

Re: [DNSOP] [dnsext] Fwd: Last Call: (Special-Use Domain Names) to Proposed Standard

2011-01-18 Thread Joe Abley
facilities", STD 13, RFC 1034, November 1987. [RFC1035] Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, November 1987. [RFC2606] Eastlake, D. and A. Panitz, "Reserved Top Level DNS Names", BCP 32

Re: [DNSOP] [dnsext] Fwd: Last Call: (Special-Use Domain Names) to Proposed Standard

2011-01-18 Thread Joe Abley
On 2011-01-18, at 10:17, Florian Weimer wrote: > * Joe Abley: > >> I don't think special-use names are a concept of the DNS in the >> protocol sense, but rather a set of administrative conventions. > > LOCAL. is very much protocol-enshrined, but I think it has be

[DNSOP] draft-jabley-dnsop-validator-bootstrap-00

2011-01-31 Thread Joe Abley
e: > From: IETF I-D Submission Tool > Date: 31 January 2011 14:24:56 EST > To: Joe Abley > Cc: Dave Knight > Subject: New Version Notification for > draft-jabley-dnsop-validator-bootstrap-00 > > > A new version of I-D, draft-jabley-dnsop-validator-bootstrap-00.txt has

Re: [DNSOP] [dnsext] draft-jabley-dnsop-validator-bootstrap-00

2011-01-31 Thread Joe Abley
[we should probably choose either dnsop or dnsext for this, and stop posting to both, sorry for starting that trend] On 2011-01-31, at 16:44, John Bashinski wrote: > On 2011-01-31 14:32, Joe Abley wrote: > >> Individual trust anchors are also packaged as X.509 identity >> ce

Re: [DNSOP] draft-jabley-dnsop-validator-bootstrap-00

2011-01-31 Thread Joe Abley
On 2011-01-31, at 15:26, Ted Lemon wrote: > On Jan 31, 2011, at 2:32 PM, Joe Abley wrote: >> It's scrappy, and it's little more than I have said on this list in the past >> week, but I thought it might be handy to have in written form. > > I'm not entirely s

Re: [DNSOP] WGLC [2011-05-17]

2011-04-18 Thread Joe Abley
On 2011-04-18, at 15:01, George Barwood wrote: > I have a few comments. > > (1) It's my belief that almost all Zones except for the root zone should NOT > use a KSK/ZSK split. In practice, for a TLD zone operator, rolling a KSK is a more complicated and time-consuming process than rolling a Z

Re: [DNSOP] WGLC [2011-05-17]

2011-04-20 Thread Joe Abley
On 2011-04-20, at 17:50, George Barwood wrote: > The arguments for operating with a split still seem very weak to me. Since you're proposing a SHOULD NOT, I think the pertinent point is (a) whether it does any harm, and (b) whether it is useful in some circumstances. I have seen no discussion

[DNSOP] watching for signature expiration in zones you don't sign

2011-06-02 Thread Joe Abley
Hi all, I've been poking about a bit in other signed zones looking for impending signature expirations. I've been doing this mainly because we sign a lot of zones and have had at least one accident in the past, but this also seems like something that is worth knowing if you're the operator of a

Re: [DNSOP] watching for signature expiration in zones you don't sign

2011-06-02 Thread Joe Abley
On 2011-06-02, at 13:17, João Damas wrote: > at first glance it might look useful, but this is the kind of info that tends > to go stale and then what do you do when there is a mismatch? I guess you flag it for manual investigation. The alternative is that you don't really know when a situatio

Re: [DNSOP] CDS RRtype - automated KSK rollover

2011-07-08 Thread Joe Abley
On 2011-07-08, at 14:03, Stephen Morris wrote: > If the answer is yes, then the CDS approach is certainly one to be > looked at. The answer also suggests that we should be looking at an > equivalent mechanism for updating NS (and possibly glue) information in > the parent zone. Perhaps all can

Re: [DNSOP] CDS RRtype - automated KSK rollover

2011-07-08 Thread Joe Abley
On 2011-07-08, at 18:23, Olafur Gudmundsson wrote: > Just let Whois die a peaceful death, it serves no purpose other than make > work. Other people are working on the death of whois; I was just trying to clarify the type of data I was talking about. Joe _

Re: [DNSOP] AS112/local zones documents published -- and next steps

2011-07-14 Thread Joe Abley
On 2011-07-14, at 12:02, Peter Koch wrote: > With the trilogy published, there is new work in front of us. Stephen and > me have reserved space on the Quebec agenda for a closer look at > > So, it seems to me that there are various aspects to consider in the general area of extending

Re: [DNSOP] A new appoarch for identifying anycast name server instance

2011-09-27 Thread Joe Abley
On 2011-09-27, at 10:09, Edward Lewis wrote: > A noble idea, but alas not terribly useful. Not very useful for Neustar, maybe, but I would suggest that your requirements in this regard are likely not to be universal. We respond honestly to queries for HOSTNAME.BIND, VERSION.BIND, ID.SERVER, V

Re: [DNSOP] A new appoarch for identifying anycast name server instance

2011-09-28 Thread Joe Abley
On 2011-09-27, at 14:21, Edward Lewis wrote: >> We respond honestly to queries for HOSTNAME.BIND, VERSION.BIND, ID.SERVER, >> VERSION.SERVER as well as RFC5001/NSID on L-Root, for example. > > It's not a matter of honesty. No inference intended; what I meant was we let the software report its a

Re: [DNSOP] [rssac] [I-D Action: draft-rssac-dnsop-rfc2870bis-04.txt]

2012-02-09 Thread Joe Abley
Hi Bill, On 2012-02-06, at 14:12, wrote: > Thanks to Warren, Ed, John D., David C. and Kato-san for their > comments/corrections. > Any more? I see you added some text based on our conversation in sunny Christchurch, thanks for that. As promised, here's a summary of that conversation for t

Re: [DNSOP] Batch Multiple Query Packet

2012-02-27 Thread Joe Abley
On 2012-02-27, at 19:49, Paul Vixie wrote: > On 2012-02-28 12:27 AM, Edward Lewis wrote: >> At 13:35 -0500 2/27/12, Hector Santos wrote: >>> If it doesn't already exist or not considered in the past as an >>> unfeasible concept, I am interest in seeing if this is something >>> worth pursuing. >>

Re: [DNSOP] Request to adopt draft-sotomayor-as112-ipv4-cull as WG item

2012-04-04 Thread Joe Abley
On 2012-04-04, at 08:20, William F. Maton Sotomayor wrote: > It seems that after delivering my presentation on subsequent AS112 > delegations in Quebec City, I hadn't recalled what the group thought about > adopting this work as a dnsop item. So, I'm soliciting feedback on this > request

Re: [DNSOP] Request to adopt draft-sotomayor-as112-ipv4-cull as WG item

2012-04-04 Thread Joe Abley
On 2012-04-04, at 11:31, Tony Finch wrote: > I think BIND treats NXDOMAIN replies with the wrong authority as a > FORMERR. Domainers are returning positive replies which BIND does not > subject to a SOA sanity check. monster.hopcount.ca is serving the fake (empty apart from apex SOA/NS and glue)

Re: [DNSOP] New I-D on Negative Trust Anchors

2012-04-11 Thread Joe Abley
On 2012-04-11, at 12:09, Wes Hardaker wrote: >> On Wed, 11 Apr 2012 06:28:49 -0700, Nicholas Weaver >> said: > > NW> a) If end-time is specified as a date, not an interval, you can set > NW> the date to be 'end of epoch', so you can basically have it 'stay > NW> forever', even if thats

Re: [DNSOP] New I-D on Negative Trust Anchors

2012-04-11 Thread Joe Abley
Dr Lisse, On 2012-04-11, at 13:45, Dr Eberhard Lisse wrote: > on 2012-04-11 17:56 Joe Abley said the following: > [...] >> ; example.com's DNSSEC is broken, let's not use it for a day >> example.com NTA 20120412162716 20120411162716 "ticket [HOPCOUNT-12345] >

Re: [DNSOP] on "Negative Trust Anchors"

2012-04-15 Thread Joe Abley
Patrik, Nobody is talking about creating NTAs. NTAs already exist. The question for this group is whether or not they are worth standardising. Joe Sent from my Ono-Sendai Cyberspace 7 On 2012-04-15, at 2:34, "Patrik Fältström" wrote: > On 15 apr 2012, at 03:23, Warren Kumari wrote: > >> On

Re: [DNSOP] on "Negative Trust Anchors"

2012-04-16 Thread Joe Abley
On 2012-04-15, at 20:02, Scott Schmit wrote: > On Fri, Apr 13, 2012 at 04:38:10PM -0700, David Conrad wrote: >> On Apr 13, 2012, at 3:30 PM, Jaap Akkerhuis wrote: More pragmatically, while I understand the theory behind rejecting NTAs, I have to admit it feels a bit like the IETF reject

Re: [DNSOP] NTA... the new NAT?

2012-04-18 Thread Joe Abley
On 2012-04-18, at 14:53, "Jim Reid" wrote: > On 18 Apr 2012, at 19:28, David Conrad wrote: > >> If you don't like the policy of your validator operator, change to a >> validator operator whose policy you agree with (or, better yet, run >> your own validator -- it is the only way to be sure).

Re: [DNSOP] draft-ietf-dnsop-dnssec-dps-framework-07 (was: I-D Action: draft-ietf-dnsop-rfc4641bis-11.txt)

2012-06-02 Thread Joe Abley
On 2012-06-01, at 21:04, "SM" wrote: > The authors of draft-ietf-dnsop-dnssec-dps-framework-07 have stated that: > > "This Internet-Draft is submitted in full conformance with the >provisions of BCP 78 and BCP 79." > > It is simply a matter of asking them an appropriate question. :-) I

Re: [DNSOP] I-D Action: draft-ietf-dnsop-respsize-14.txt

2012-06-05 Thread Joe Abley
On 2012-06-05, at 08:28, Gilles Massen wrote: > One set of root servers fills the additional section with 2 names, and > their v4 and v6 addresses. But it's always the same two servers, > indepently of the server asked. The other set answers with a bit more > servers, but only v4 adresses, and he

Re: [DNSOP] A good chance to get all riled up - draft-wkumari-dnsop-omniscient-as112-00

2012-06-12 Thread Joe Abley
Hi Nicholas, On 2012-06-12, at 10:58, Nicholas Weaver wrote: > On Jun 12, 2012, at 7:40 AM, Warren Kumari wrote: > >> So, back in (AFAIR) Taipei I proposed making AS112 instances simply be >> authoritative for *everything*, and then simply delegating and undelegating >> things to it as appropr

Re: [DNSOP] A good chance to get all riled up - draft-wkumari-dnsop-omniscient-as112-00

2012-06-27 Thread Joe Abley
Hi all, The only suggestion I have heard relating to this draft is that if we supplied custom software to synthesise answers we could avoid the overly-broad SOA RR returned with the NXDOMAIN. (My personal opinion is that this leads us down a path of needing to develop, publish and support part

Re: [DNSOP] A good chance to get all riled up - draft-wkumari-dnsop-omniscient-as112-00

2012-06-29 Thread Joe Abley
Hi Mark, On 2012-06-27, at 20:01, Mark Andrews wrote: > I personally think a vendor education campain would be more productive. > We can't do much about already deployed servers but we can make > sure the next major release supports RFC 6303 by default. I'm not sure we can influence the next maj

Re: [DNSOP] draft-wouters-dnsop-secure-update-use-cases-00

2012-07-12 Thread Joe Abley
On 2012-07-11, at 11:09, Chris Thompson wrote: > [That's not to say that any differences between the two NS RRsets is ever > desirable, except as may be necessary or expedient during a change.] That's a good rule of thumb, but so long as the union of the delegation and apex NS sets contains no

Re: [DNSOP] draft-wouters-dnsop-secure-update-use-cases-00

2012-07-14 Thread Joe Abley
On 2012-07-14, at 16:50, Doug Barton wrote: > I would argue further that a child NS set which is a superset of the > parent is not lame, or broken. There are valid reasons to do this, > (outside the scope of this document, certainly) and I'd hate to see this > instantiated as "an RFC violation" a

Re: [DNSOP] draft-wouters-dnsop-secure-update-use-cases-00

2012-07-14 Thread Joe Abley
On 2012-07-14, at 17:35, Doug Barton wrote: >> Any new work which needed to assert that both sets were the same >> would meet with little objection though, I think. > > It's already met with at least 2 objections, so I'm pretty sure you're > wrong. :) Well, my note wasn't an objection and yours

Re: [DNSOP] draft-wouters-dnsop-secure-update-use-cases-00

2012-07-16 Thread Joe Abley
On 2012-07-16, at 10:53, Paul Hoffman wrote: > The use cases in section 3 are fine because they are use cases for > standardized things. Patrik's objections were (all?) about the "use cases" in > section 4, which in fact are business models, some of which exist today and > others which do not.

Re: [DNSOP] I-D Action: draft-ietf-dnsop-dnssec-key-timing-03.txt

2012-07-24 Thread Joe Abley
On 2012-07-24, at 07:53, Matthijs Mekking wrote: > As you might know, I had this idea of unraveling key states. Instead > of having states that describe the overall state of the key, we would > have states for components of the key. How to divide the key into > components is based on the parts th

Re: [DNSOP] draft-wouters-dnsop-secure-update-use-cases-00

2012-07-24 Thread Joe Abley
On 2012-07-24, at 12:25, Edward Lewis wrote: > At 17:05 -0400 7/14/12, Joe Abley wrote: > >> Any new work which needed to assert that both sets were the same would >> meet with little objection though, I think. > > I disagree. > > I would object to any strengthe

Re: [DNSOP] draft-ietf-dnsop-dnssec-key-timing

2012-08-30 Thread Joe Abley
On 2012-08-30, at 13:11, Paul Hoffman wrote: > On Aug 30, 2012, at 9:45 AM, Paul Vixie wrote: > >> On 2012-08-30 9:40 AM, Johan Ihrén wrote: >>> Not to question the abilities of the WG, but I still have to ask whether >>> (in your opinion) the operations community would be better off with a

Re: [DNSOP] draft-andrews-dnsop-rfc6598-rfc6303

2012-10-10 Thread Joe Abley
On 2012-10-09, at 21:56, Mark Andrews wrote: > Please review draft-andrews-dnsop-rfc6598-rfc6303 OK! The idea is good. Reverse queries for addresses in 100.64.0.0/10 have been observed in the wild. I agree that this document should proceed. RFC 6303 did not specify the requirements for

Re: [DNSOP] draft-andrews-dnsop-rfc6598-rfc6303

2012-10-10 Thread Joe Abley
On 2012-10-10, at 08:23, "William F. Maton Sotomayor" wrote: > >> Please review draft-andrews-dnsop-rfc6598-rfc6303 > > I've read this draft and would support it, in lieu of the omniscient- > darft should that not proceed any further. I don't understand the logic in the sentence above.

Re: [DNSOP] No meeting in Atlanta [Re: Whether to meet at IETF-85 in Atlanta]

2012-10-12 Thread Joe Abley
On 2012-10-12, at 11:20, Joseph Gersch wrote: > We had posted an updated draft on the reverse-DNS naming convention for CIDR > address blocks and asked to discuss this at the Atlanta meeting. Did you > miss this request? I didn't actually reply, but there are some aspects of trust anchor pub

Re: [DNSOP] new version of IPv6 rDNS for ISPs

2012-11-22 Thread Joe Abley
Hi Lee, Some comments below, based on a fairly cursory skim through (so, I may well have missed and/or understood things). 2.2 Wildcard match There is no mention of the issue of uniqueness. What do you do when you have five thousand different customers who all attempt secure dynamic updates wi

Re: [DNSOP] new version of IPv6 rDNS for ISPs

2012-11-22 Thread Joe Abley
On 2012-11-22, at 18:10, Mark Andrews wrote: > Individual hosts should be doing dynamic DNS. Where that update > is sent to may change but all machines should be doing it and should > support TSIG as a minimum. The missing pieces here include: - what sane ISP/campus/home network/hotspot oper

Re: [DNSOP] new version of IPv6 rDNS for ISPs

2012-11-23 Thread Joe Abley
On 2012-11-23, at 06:28, Tony Finch wrote: > Joe Abley wrote: > >> I think you skipped a step -- you need to find the zone cut before you >> can find the nameservers responsible for the zone. I guess I do that by >> asking for blah.ip6.arpa/IN/SOA and checking th

Re: [DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-16 Thread Joe Abley
On 2013-02-16, at 18:04, Ted Lemon wrote: > I would suggest that the right solution is to rely on the DNSSEC security > infrastructure to publish negative trust anchors, rather than relying on > RFC5280. I realize that this means more work, probably for DNSEXT, the > chairs of which were ho

Re: [DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-17 Thread Joe Abley
On 2013-02-17, at 09:57, "Livingood, Jason" wrote: > A Negative Trust Anchor should IMO be locally configured and not rely upon > any external validation or sourcing for the Negative Trust Anchor(s). I hear you, but I'm not sure why you think so. If I was running a farm of validators inside a

Re: [DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-17 Thread Joe Abley
On 2013-02-17, at 10:37, "Livingood, Jason" wrote: > Makes sense to me. So if I added very explicit text to the effect that > "Negative Trust Anchors MUST NOT be used by host-based DNSSEC validating > DNS resolvers; this practice only pertains to network-based DNS recursive > resolvers that mul

Re: [DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-17 Thread Joe Abley
On 2013-02-17, at 10:48, Ted Lemon wrote: > On Feb 17, 2013, at 10:35 AM, Joe Abley wrote: >> - hopcount.ca's signer explodes (or something else happens such that >> hopcount.ca is badly signed) >> - since hopcount.ca is such a popular domain for Comcast customers,

Re: [DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-17 Thread Joe Abley
On 2013-02-17, at 21:59, Ralf Weber wrote: > That sounds like a negative DLV to me. I think DLV was a bad idea and I don't > think this is a good idea either when you are crossing organization > boundaries. I guess it is ok when used inside a provider as mechanism to > distribute NTA, but the

Re: [DNSOP] Posted draft-livingood-negative-trust-anchors-03

2013-02-17 Thread Joe Abley
Hi Ralf, On 2013-02-17, at 22:19, Ralf Weber wrote: > I fully agree on this, which is why I support this draft. However to achieve > that goal (making it easier for ISPs to implement DNSSEC) I don't think it is > necessary to specify how NTA will be distributed. If you think it is > important

Re: [DNSOP] New draft-livingood-negative-trust-anchors-04

2013-02-20 Thread Joe Abley
On 2013-02-20, at 14:50, Richard Lamb wrote: > FWIW: The -04 draft looks good. It is clear and well written and I think it > is a valuable resource. > As I am late to looking at this draft please take this only as a comment from > a narrow minded engineer ;-) After the rationale, explanati

Re: [DNSOP] Adoption of as a WG work item?

2013-02-22 Thread Joe Abley
On 2013-02-22, at 01:47, Mark Andrews wrote: > In message , George > Michaels > on writes: > >> On 21/02/2013, at 6:46 AM, Mark Andrews wrote: >> >>> * it changes the response from NXDOMAIN to NOERROR NODATA. >> >> And why is that "wrong" ? I dont understand what you see as the outcomes. >

Re: [DNSOP] Adoption of as a WG work item?

2013-02-22 Thread Joe Abley
On 2013-02-22, at 07:57, Paul Vixie wrote: > if we can't return nxdomain, then i'm opposed to the omniscient spec, > and we should continue as before, enumerating on the responding servers > every zone to which we wish to delegate. > > noerror/nodata is the wrong answer. It does smell a bit wr

Re: [DNSOP] Adoption of as a WG work item?

2013-02-22 Thread Joe Abley
On 2013-02-22, at 09:39, Mark Andrews wrote: > I can well imagine a machine doing a reverse lookup on a proposed > address and not proceeding with that address if it doesn't get a > NXDOMAIN. > > NODATA -> unsafe > NXDOMAIN -> may be safe So, out of interest, do you think it's legi

Re: [DNSOP] Adoption of as a WG work item?

2013-02-22 Thread Joe Abley
On 2013-02-22, at 10:42, Nick Hilliard wrote: > I agree we should be cautious. So why not run it on some as112 servers on > a pilot basis and see what happens? Full logging would be required, as > well as some idea of what sort of problems to look for (e.g. multiple > repeated queries from the

Re: [DNSOP] Adoption of as a WG work item?

2013-02-22 Thread Joe Abley
On 2013-02-22, at 12:33, "Dickson, Brian" wrote: > One question/caveat: > > What would the practical impact be, if the TTL on the SOA were the same as > the default negative caching TTL (for the NXDOMAIN)? The longevity of the negative answer in the cache is defined as min(SOA TTL, SOA MINIMU

Re: [DNSOP] Adoption of as a WG work item?

2013-02-22 Thread Joe Abley
Hi Paul, That was our starting point; however, it turned out that resolvers wouldn't cache the name error, I think because the SOA returned with the name error in the authority section was clearly bogus (i.e. conflicted with the root zone SOA presumably already cached by the resolver client). I t

<    2   3   4   5   6   7   8   9   >