
From vixie@isc.org  Fri Sep 30 21:55:40 2011
Return-Path: <vixie@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C007B21F85F7 for <dnsext@ietfa.amsl.com>; Fri, 30 Sep 2011 21:55:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.45
X-Spam-Level: 
X-Spam-Status: No, score=-2.45 tagged_above=-999 required=5 tests=[AWL=0.150,  BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B-Jjbg8efTlw for <dnsext@ietfa.amsl.com>; Fri, 30 Sep 2011 21:55:40 -0700 (PDT)
Received: from ss.vix.com (ss.vix.com [IPv6:2001:559:8000:cb::2]) by ietfa.amsl.com (Postfix) with ESMTP id 4E40921F85F2 for <dnsext@ietf.org>; Fri, 30 Sep 2011 21:55:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at redbarn.org
Received: from ww.vix.com (ww.vix.com [IPv6:2001:559:8000:cb:215:17ff:fed4:730a]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by ss.vix.com (Postfix) with ESMTPS id 49A2FEE515 for <dnsext@ietf.org>; Sat,  1 Oct 2011 04:58:27 +0000 (UTC) (envelope-from vixie@isc.org)
From: Paul Vixie <vixie@isc.org>
Organization: Internet Systems Consortium
To: dnsext@ietf.org
Date: Sat, 1 Oct 2011 04:58:26 +0000
User-Agent: KMail/1.13.5 (FreeBSD/8.1-RELEASE; KDE/4.4.5; amd64; ; )
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com>
In-Reply-To: <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com>
MIME-Version: 1.0
Content-Type: Text/Plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Message-Id: <201110010458.26859.vixie@isc.org>
X-Mailman-Approved-At: Sat, 01 Oct 2011 07:42:45 -0700
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 04:55:40 -0000

Checking back in on this discussion after several days of watching it run.

On Friday, September 30, 2011 06:36:11 am Patrik F=E4ltstr=F6m wrote:
> On 30 sep 2011, at 00:21, Jakob Schlyter wrote:
> > I would prefer a RESTful API where the response data format is dependent
> > on the HTTP accept headers. Using such an API, one could receive various
> > formats, e.g., XML, JSON or plain old DNS wire format. A DNS client in
> > Javascript would probably like JSON, a libresolv-like DNS library would
> > like wire format and someone else (although I fail to see who) might
> > prefer XML.
>=20
> My claim/feelings/religious view is that JSON is so much better than XML
> when coming to the kind of usage we talk about.
>=20
> So if _one_ format is to be used, please choose JSON and not XML.

I like the binary format first proposed here by Edmonds.  I'm not as sure=20
about Jakob's "use the accept headers to determine the format" idea since t=
he=20
only reason I wanted a printable format was so I could debug with "telnet".=
 =20
All clients, even those written in javascript, already know how to handle=20
"plain old DNS wire format".  I truly do only expect this transport to be u=
sed=20
when the normal UDP/53 and TCP/53 paths are middlebox-corrupted.

Assuming that Mohan agrees with me on "just use wire format" in the respons=
e,=20
my observation is, we should not be using GET at all, nor should we be=20
encoding the query into the URI.  We should use POST and our request body=20
should be in DNS wire format.  This would defeat web caches but I think tha=
t's=20
fine since I worry about web caches that don't understand DNS TTL and I wor=
ry=20
even more about web caches that are intercepting rather than explicit.  POS=
T=20
is presumed by web caches to be unique data to which a unique response will=
 be=20
needed.

A side benefit of this is, the UPDATE opcode gets easy.

=46eel free to respond 1x1, I would summarize.

Paul

From colm@allcosts.net  Sat Oct  1 07:53:50 2011
Return-Path: <colm@allcosts.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62C8421F97B3 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 07:53:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.677
X-Spam-Level: 
X-Spam-Status: No, score=-2.677 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fHWB-nYXYleA for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 07:53:49 -0700 (PDT)
Received: from mail-qw0-f44.google.com (mail-qw0-f44.google.com [209.85.216.44]) by ietfa.amsl.com (Postfix) with ESMTP id C94BE21F97B2 for <dnsext@ietf.org>; Sat,  1 Oct 2011 07:53:49 -0700 (PDT)
Received: by qadb12 with SMTP id b12so1149513qad.31 for <dnsext@ietf.org>; Sat, 01 Oct 2011 07:56:46 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.224.185.205 with SMTP id cp13mr6259459qab.221.1317481006298; Sat, 01 Oct 2011 07:56:46 -0700 (PDT)
Received: by 10.224.89.2 with HTTP; Sat, 1 Oct 2011 07:56:45 -0700 (PDT)
In-Reply-To: <j62lvu$cv5$1@dough.gmane.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <CA+9kkMAozdS=F8FF5SRz0gTCfz7nXch578ZtU7pi25NYwB=8-Q@mail.gmail.com> <alpine.LSU.2.00.1109291153110.30178@hermes-2.csi.cam.ac.uk> <j62lvu$cv5$1@dough.gmane.org>
Date: Sat, 1 Oct 2011 10:56:45 -0400
Message-ID: <CAAF6GDcrEU3CVS9WpXOp-VTz9iKL8_W7W_iMFTGZz0VyT9z9cg@mail.gmail.com>
From: =?ISO-8859-1?Q?Colm_MacC=E1rthaigh?= <colm@allcosts.net>
To: Robert Edmonds <edmonds@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 14:53:50 -0000

On Thu, Sep 29, 2011 at 4:55 PM, Robert Edmonds <edmonds@isc.org> wrote:
> the actual HTTP response payload would simply be a binary wire-format
> DNS response message, possibly with a leading two byte length field like
> plain TCP DNS.

"Content-Length:"  or a chunked encoding should take care of this.

-- 
Colm

From nweaver@icsi.berkeley.edu  Sat Oct  1 07:58:35 2011
Return-Path: <nweaver@icsi.berkeley.edu>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52F3721F95CF for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 07:58:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.499
X-Spam-Level: 
X-Spam-Status: No, score=-2.499 tagged_above=-999 required=5 tests=[AWL=0.100,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ogX-2CBI1AWh for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 07:58:34 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id CB92621F95CD for <dnsext@ietf.org>; Sat,  1 Oct 2011 07:58:34 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id E0A412C4016; Sat,  1 Oct 2011 08:01:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id wz4hEIYjbbyx; Sat,  1 Oct 2011 08:01:31 -0700 (PDT)
Received: from [10.0.1.2] (c-76-103-166-40.hsd1.ca.comcast.net [76.103.166.40]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 707172C4002; Sat,  1 Oct 2011 08:01:31 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: text/plain; charset=iso-8859-1
From: Nicholas Weaver <nweaver@icsi.berkeley.edu>
In-Reply-To: <201110010458.26859.vixie@isc.org>
Date: Sat, 1 Oct 2011 08:01:33 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org>
To: Paul Vixie <vixie@isc.org>
X-Mailer: Apple Mail (2.1244.3)
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 14:58:35 -0000

On Sep 30, 2011, at 9:58 PM, Paul Vixie wrote:
> I like the binary format first proposed here by Edmonds.  I'm not as =
sure=20
> about Jakob's "use the accept headers to determine the format" idea =
since the=20
> only reason I wanted a printable format was so I could debug with =
"telnet". =20
> All clients, even those written in javascript, already know how to =
handle=20
> "plain old DNS wire format".  I truly do only expect this transport to =
be used=20
> when the normal UDP/53 and TCP/53 paths are middlebox-corrupted.
>=20
> Assuming that Mohan agrees with me on "just use wire format" in the =
response,=20
> my observation is, we should not be using GET at all, nor should we be=20=

> encoding the query into the URI.  We should use POST and our request =
body=20
> should be in DNS wire format.  This would defeat web caches but I =
think that's=20
> fine since I worry about web caches that don't understand DNS TTL and =
I worry=20
> even more about web caches that are intercepting rather than explicit. =
 POST=20
> is presumed by web caches to be unique data to which a unique response =
will be=20
> needed.
>=20
> A side benefit of this is, the UPDATE opcode gets easy.
>=20
> Feel free to respond 1x1, I would summarize.

Use GET, but if you want it to get through the most busted of web =
caches, do the following:

In the fetch, include cache-busters in the URL:  rather than things that =
translate to get http://dns_server/name/rtype use things like get =
http;//dns_server/name/rtype/NONCE


Web caches don't work.  In our experience, nearly 50% of those in =
Netalyzr tests cache things they shouldn't, so if the worry is =
cache-staleness, include a cache-buster. But you don't need to use POST =
to get through the bustedness if the URLs can have nonces in them.



And I'd have the return value be JSON rather than raw DNS on the wire.  =
Why?

Because since the point is validating DNSSEC, the HTTP-server should not =
just return the record asked for, but the whole signature chain that it =
has.  Since this is more information than a normal DNS reply, it might =
benefit from a new encoding.

And if you are going to do a new encording, JSON is the way to go:  it =
is FAR far easier to parse than any specialized format.


The other alternative is to say its "OK to put the whole signature chain =
in the additional field", in which case this would be DNS wire format, =
but that might be a good policy for ALL resolvers to support: why =
shouldn't a DNSSEC aware resolver provide the whole signature chain that =
it has in a reply?


From colm@allcosts.net  Sat Oct  1 08:00:37 2011
Return-Path: <colm@allcosts.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 997E521F961F for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 08:00:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.677
X-Spam-Level: 
X-Spam-Status: No, score=-2.677 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5faNO1MBOIQX for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 08:00:37 -0700 (PDT)
Received: from mail-qw0-f44.google.com (mail-qw0-f44.google.com [209.85.216.44]) by ietfa.amsl.com (Postfix) with ESMTP id 1356D21F95FD for <dnsext@ietf.org>; Sat,  1 Oct 2011 08:00:37 -0700 (PDT)
Received: by qadb12 with SMTP id b12so1151692qad.31 for <dnsext@ietf.org>; Sat, 01 Oct 2011 08:03:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.224.217.73 with SMTP id hl9mr10275072qab.121.1317481413797; Sat, 01 Oct 2011 08:03:33 -0700 (PDT)
Received: by 10.224.89.2 with HTTP; Sat, 1 Oct 2011 08:03:33 -0700 (PDT)
In-Reply-To: <201110010458.26859.vixie@isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org>
Date: Sat, 1 Oct 2011 11:03:33 -0400
Message-ID: <CAAF6GDcv=MgiKP2C7=bNEA4TxMNtELPo8sCoJDYSQGSnSZjUYA@mail.gmail.com>
From: =?ISO-8859-1?Q?Colm_MacC=E1rthaigh?= <colm@allcosts.net>
To: dnsext@ietf.org
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 15:00:37 -0000

On Sat, Oct 1, 2011 at 12:58 AM, Paul Vixie <vixie@isc.org> wrote:
> I like the binary format first proposed here by Edmonds. =A0I'm not as su=
re
> about Jakob's "use the accept headers to determine the format" idea since=
 the
> only reason I wanted a printable format was so I could debug with "telnet=
".
> All clients, even those written in javascript, already know how to handle
> "plain old DNS wire format". =A0I truly do only expect this transport to =
be used
> when the normal UDP/53 and TCP/53 paths are middlebox-corrupted.

Printable formats for DNS payloads are also lossy and sacrifice
monotonicity. If a binary response is turned into, say, json and then
back again - the original points of label compression may be not be
the same. Since not all implementations compress equivalently, it's a
minor loss of information - probably only relevant to fingerprinting,
but still a loss.

--=20
Colm

From paul.hoffman@vpnc.org  Sat Oct  1 08:22:38 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A00A21F9206 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 08:22:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.57
X-Spam-Level: 
X-Spam-Status: No, score=-102.57 tagged_above=-999 required=5 tests=[AWL=0.029, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gwH--IKwUHSK for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 08:22:37 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 797AE21F9200 for <dnsext@ietf.org>; Sat,  1 Oct 2011 08:22:37 -0700 (PDT)
Received: from [10.20.30.100] (50-0-66-4.dsl.dynamic.fusionbroadband.com [50.0.66.4]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p91FPXGD054842 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Sat, 1 Oct 2011 08:25:33 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: text/plain; charset=us-ascii
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu>
Date: Sat, 1 Oct 2011 08:25:33 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <5C4E07BC-E6CC-45A6-8018-10C2A799A55E@vpnc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu>
To: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
X-Mailer: Apple Mail (2.1244.3)
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 15:22:38 -0000

On Oct 1, 2011, at 8:01 AM, Nicholas Weaver wrote:

> Web caches don't work. =20

+1.

> In our experience, nearly 50% of those in Netalyzr tests cache things =
they shouldn't, so if the worry is cache-staleness, include a =
cache-buster.

-.5. You are assuming that a bad HTTP cache will be bad in a predictable =
fashion. I'm not against using nonces to bust caches, but I don't think =
we should rely on it.

> But you don't need to use POST to get through the bustedness if the =
URLs can have nonces in them.

True, but is there really any disadvantage to using POST in the design?

My sense is that we will get less HTTP caching with POST than we would =
with GET-with-nonce, but I have no data to back that up.

--Paul Hoffman


From paul@xelerance.com  Sat Oct  1 10:30:45 2011
Return-Path: <paul@xelerance.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4099121F8FB0 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 10:30:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.444
X-Spam-Level: 
X-Spam-Status: No, score=-4.444 tagged_above=-999 required=5 tests=[AWL=-1.845, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RzFPFcMnduv5 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 10:30:44 -0700 (PDT)
Received: from mx.xelerance.com (mx.xelerance.com [193.110.157.188]) by ietfa.amsl.com (Postfix) with ESMTP id 252BB21F8FA8 for <dnsext@ietf.org>; Sat,  1 Oct 2011 10:30:44 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mx.xelerance.com (Postfix) with ESMTP id 4184463; Sat,  1 Oct 2011 13:33:37 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=xelerance.com; h= content-type:content-type:mime-version:user-agent:references :message-id:in-reply-to:subject:subject:from:from:date:date :received:received:received:received; s=smtp; t=1317490416; x= 1318095216; bh=IEaNPLH06p/4VZUpGZyVOHO5z8Nem4MjiH0YxkQExsQ=; b=Z YTdeRbuy0jP+/qB0iUfiOtGZNN8BGDGaBkr7UNoc4L/OGcxhE7iVRTf+2nrXqer1 ONK9jlSftPwj7MvqPYgh6sUKUrSUDfhbmGE+Q+eZZMTtPGv2Nhou5dh5hU6xFJic X4MZe0jNFewtj1xzvsPYIY6PcwLhSBLqAiiToXvbwE=
Received: from mx.xelerance.com ([127.0.0.1]) by localhost (mx.xelerance.com [127.0.0.1]) (amavisd-new, port 10026) with LMTP id 8Q9bKPA0Gq4g; Sat,  1 Oct 2011 13:33:36 -0400 (EDT)
Received: from mail.xelerance.com (mail.xelerance.com [193.110.157.189]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.xelerance.com (Postfix) with ESMTPS id D5DEB2C; Sat,  1 Oct 2011 13:33:35 -0400 (EDT)
Received: by mail.xelerance.com (Postfix, from userid 1001) id B5F9D19DE; Sat,  1 Oct 2011 13:33:29 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by mail.xelerance.com (Postfix) with ESMTP id AFFBF19D9; Sat,  1 Oct 2011 13:33:29 -0400 (EDT)
Date: Sat, 1 Oct 2011 13:33:29 -0400 (EDT)
From: Paul Wouters <paul@xelerance.com>
To: Paul Vixie <vixie@isc.org>
In-Reply-To: <201110010458.26859.vixie@isc.org>
Message-ID: <alpine.DEB.2.00.1110011322430.20645@mail.xelerance.com>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org>
User-Agent: Alpine 2.00 (DEB 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 17:30:45 -0000

On Sat, 1 Oct 2011, Paul Vixie wrote:

> "plain old DNS wire format".  I truly do only expect this transport to be used
> when the normal UDP/53 and TCP/53 paths are middlebox-corrupted.

I am not sure people agree on the user cases for this.

If you truly think you are addressing the middlebox problem, most likely
you could just run the DNS over port 54 or 80/443.

This proposal does not at all address the problem where DNS is mangled due
to hotspot and captive portal scenarios. Once you work around that scenario,
for example like with the dnssec-trigger experiment that's still far from
workable to non-engineers, you usually get a clean connection with the
exception of port 53 mangling, which just moving to another port seems to
almost always fix it (with 80/443 having a slightly better chance then a
random port.

Doing DNS-over-HTTP is still going to get broken results in captive portals.

What dnssec-trigger is trying to do now is:
- selectable (but should be automatic) hot spot mode where you allow
   insecure dns only to go past captivity
- attempt to use DHCP assigned DNS servers as cache, validate locally
   - if broken, try and query auth servers directly
     - if broken, try an open resolver on port 80/443
       - if broken give user option for "insecure or cached only"

Aside from this, we have the new dnssec chains via alternative source,
both as a speedup and as a workaround using a leap of faith in TLS. this
is useful, though not a replacement for the above. It would also be nice
if any dnssec-chain extension would use some kind of standard so we can
feed it into a validating caching server.

Doing dns-over-http for broken middlewhere alone is going to be a partial
solution that is not going to be very useful on its own.

Paul


From vixie@isc.org  Sat Oct  1 10:33:40 2011
Return-Path: <vixie@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3210D21F907A for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 10:33:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.5
X-Spam-Level: 
X-Spam-Status: No, score=-2.5 tagged_above=-999 required=5 tests=[AWL=0.100, BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W8DYhfq-FnWt for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 10:33:39 -0700 (PDT)
Received: from ss.vix.com (ss.vix.com [IPv6:2001:559:8000:cb::2]) by ietfa.amsl.com (Postfix) with ESMTP id A40AC21F9079 for <dnsext@ietf.org>; Sat,  1 Oct 2011 10:33:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at redbarn.org
Received: from ww.vix.com (ww.vix.com [IPv6:2001:559:8000:cb:215:17ff:fed4:730a]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by ss.vix.com (Postfix) with ESMTPS id 517ECEE51C for <dnsext@ietf.org>; Sat,  1 Oct 2011 17:36:28 +0000 (UTC) (envelope-from vixie@isc.org)
From: Paul Vixie <vixie@isc.org>
Organization: Internet Systems Consortium
To: dnsext@ietf.org
Date: Sat, 1 Oct 2011 17:36:27 +0000
User-Agent: KMail/1.13.5 (FreeBSD/8.1-RELEASE; KDE/4.4.5; amd64; ; )
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu>
In-Reply-To: <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu>
MIME-Version: 1.0
Content-Type: Text/Plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <201110011736.27664.vixie@isc.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 17:33:40 -0000

On Saturday, October 01, 2011 03:01:33 pm Nicholas Weaver wrote:
> > A side benefit of this is, the UPDATE opcode gets easy.
> 
> Use GET, but if you want it to get through the most busted of web caches,
> do the following:

why "use GET"?  if POST allows us to send a dns message as post-body, which 
could either be a query or an update, then why would we prefer GET?

> And I'd have the return value be JSON rather than raw DNS on the wire. 
> Why?
> 
> Because since the point is validating DNSSEC, the HTTP-server should not
> just return the record asked for, but the whole signature chain that it
> has.  Since this is more information than a normal DNS reply, it might
> benefit from a new encoding.

i've got a draft in production that adds an EDNS option "send chain" where the 
option payload is any ancestor of the QNAME and indicates the requestor's 
deepest validated trusted domain name.  this will solicit a longer trust chain 
(all the RRSIG, DNSKEY, DS RRs) between this ancestor and the QNAME.  it is 
something i'd like for UDP/53 whenever ip fragmentation is working, and 
something i'd like for TCP/53 whenever that's not firewalled out.  it could 
also be used in DNS-over-HTTP, assuming that we allow transmission of full DNS 
messages in both directions (therefore, using POST).

in other words i don't see this as HTTP-specific which is why it's not in this 
draft.

From vixie@isc.org  Sat Oct  1 10:40:13 2011
Return-Path: <vixie@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1BBDA21F90E3 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 10:40:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.525
X-Spam-Level: 
X-Spam-Status: No, score=-2.525 tagged_above=-999 required=5 tests=[AWL=0.075,  BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x181zC9-PogC for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 10:40:12 -0700 (PDT)
Received: from ss.vix.com (ss.vix.com [IPv6:2001:559:8000:cb::2]) by ietfa.amsl.com (Postfix) with ESMTP id A9EAE21F90E2 for <dnsext@ietf.org>; Sat,  1 Oct 2011 10:40:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at redbarn.org
Received: from ww.vix.com (ww.vix.com [IPv6:2001:559:8000:cb:215:17ff:fed4:730a]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by ss.vix.com (Postfix) with ESMTPS id 06916EE51C for <dnsext@ietf.org>; Sat,  1 Oct 2011 17:43:04 +0000 (UTC) (envelope-from vixie@isc.org)
From: Paul Vixie <vixie@isc.org>
Organization: Internet Systems Consortium
To: dnsext@ietf.org
Date: Sat, 1 Oct 2011 17:43:03 +0000
User-Agent: KMail/1.13.5 (FreeBSD/8.1-RELEASE; KDE/4.4.5; amd64; ; )
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <alpine.DEB.2.00.1110011322430.20645@mail.xelerance.com>
In-Reply-To: <alpine.DEB.2.00.1110011322430.20645@mail.xelerance.com>
MIME-Version: 1.0
Content-Type: Text/Plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <201110011743.03563.vixie@isc.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 17:40:13 -0000

On Saturday, October 01, 2011 05:33:29 pm Paul Wouters wrote:
> If you truly think you are addressing the middlebox problem, most likely
> you could just run the DNS over port 54 or 80/443.

no, because all-that-is-not-allowed-is-denied for most firewalls.  random udp 
ports especially low numbered ones just don't work in a lot of places.  it's 
not that UDP/53 is special by being middleboxed, it's that UDP/53 is special 
by being allowed to work at all (where "work" and "middlebox" are at odds.)

> ... (with 80/443 having a slightly better chance then a random port.

indeed, 80 and 443 are often cleaner.  especially 443 with private keys (no 
CA).  especially if the request is a POST.

> Doing DNS-over-HTTP is still going to get broken results in captive
> portals.

alas, you are right, there is no universal way to get our packets through, 
since just about everybody between the dns requestor and the dns responder 
wants a piece of the action these days, or thinks they know better, or both.  
however, TCP/80 and TCP/443 are "the RS232 of the new millenium" and i expect 
good results on average from making these available as a fallback to the long 
corrupted UDP/53 and TCP/53.

> Doing dns-over-http for broken middlewhere alone is going to be a partial
> solution that is not going to be very useful on its own.

right, agreed, but the things it will work better alongside are also useful in 
their own right, like "send me the trust chain from the QNAME back to the 
deepest trust anchor i've currently validated".  therefore that proposal is 
going to come separately.

paul

From nweaver@ICSI.Berkeley.EDU  Sat Oct  1 11:22:29 2011
Return-Path: <nweaver@ICSI.Berkeley.EDU>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 024EF21F91D2 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 11:22:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.209
X-Spam-Level: 
X-Spam-Status: No, score=-2.209 tagged_above=-999 required=5 tests=[AWL=-0.210, BAYES_00=-2.599, J_CHICKENPOX_14=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3igWOeRbLo86 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 11:22:28 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id 21FC521F91CA for <dnsext@ietf.org>; Sat,  1 Oct 2011 11:22:28 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id A8A382C4015; Sat,  1 Oct 2011 11:25:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 5Ww8qHS+gck6; Sat,  1 Oct 2011 11:25:24 -0700 (PDT)
Received: from [10.0.1.2] (c-76-103-166-40.hsd1.ca.comcast.net [76.103.166.40]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 4313F2C4002; Sat,  1 Oct 2011 11:25:24 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: text/plain; charset=us-ascii
From: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
In-Reply-To: <5C4E07BC-E6CC-45A6-8018-10C2A799A55E@vpnc.org>
Date: Sat, 1 Oct 2011 11:25:22 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <66077D12-F568-426A-8E5C-CC077CC24622@ICSI.Berkeley.EDU>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu> <5C4E07BC-E6CC-45A6-8018-10C2A799A55E@vpnc.org>
To: Paul Hoffman <paul.hoffman@vpnc.org>
X-Mailer: Apple Mail (2.1244.3)
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 18:22:29 -0000

On Oct 1, 2011, at 8:25 AM, Paul Hoffman wrote:

> On Oct 1, 2011, at 8:01 AM, Nicholas Weaver wrote:
>=20
>> Web caches don't work. =20
>=20
> +1.
>=20
>> In our experience, nearly 50% of those in Netalyzr tests cache things =
they shouldn't, so if the worry is cache-staleness, include a =
cache-buster.
>=20
> -.5. You are assuming that a bad HTTP cache will be bad in a =
predictable fashion. I'm not against using nonces to bust caches, but I =
don't think we should rely on it.

No, what I'm assuming is SOME minimal-level of nonborkenness.

IF a cache takes url=20

http://www.example.com/url_a

and instead returns

http://www.example.com/url_b

Its going to be so b0rken for everything that HTTP will be nonusable.


Thus making the URLs like

http://www.dnsresolver.com/name/rtype/NONCEA.json

will be noncached, because if it instead returns the results of a =
previous fetch

http://www.dnsresolver.com/name/rtype/NONCEB.json

the cache will be not subtly broken, but so broken-as-to-uselessness.


THats the other reason for json:  If the middlebox is content aware, =
JSON is one thing that will be let through because block =
application/json these days you might as well block the web altogether.

So encoded as JSON, transfered as mimetype application/json, is most =
likely to get through.


From alex@alex.org.uk  Sat Oct  1 14:00:06 2011
Return-Path: <alex@alex.org.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D987C21F8F80 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 14:00:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.562
X-Spam-Level: 
X-Spam-Status: No, score=-2.562 tagged_above=-999 required=5 tests=[AWL=0.038,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yalBWXv7TroR for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 14:00:05 -0700 (PDT)
Received: from mail.avalus.com (mail.avalus.com [IPv6:2001:41c8:10:1dd::10]) by ietfa.amsl.com (Postfix) with ESMTP id 6292E21F8F7F for <dnsext@ietf.org>; Sat,  1 Oct 2011 14:00:04 -0700 (PDT)
Received: from [192.168.100.16] (87-194-71-186.bethere.co.uk [87.194.71.186]) by mail.avalus.com (Postfix) with ESMTPSA id 785FCC56103; Sat,  1 Oct 2011 22:02:59 +0100 (BST)
Date: Sat, 01 Oct 2011 22:02:58 +0100
From: Alex Bligh <alex@alex.org.uk>
To: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>, Paul Hoffman <paul.hoffman@vpnc.org>
Message-ID: <33BA32D8CFF5BCB5D2895142@nimrod.local>
In-Reply-To: <66077D12-F568-426A-8E5C-CC077CC24622@ICSI.Berkeley.EDU>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu> <5C4E07BC-E6CC-45A6-8018-10C2A799A55E@vpnc.org> <66077D12-F568-426A-8E5C-CC077CC24622@ICSI.Berkeley.EDU>
X-Mailer: Mulberry/4.0.8 (Mac OS X)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Alex Bligh <alex@alex.org.uk>
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 21:00:06 -0000

--On 1 October 2011 11:25:22 -0700 Nicholas Weaver 
<nweaver@ICSI.Berkeley.EDU> wrote:

>> -.5. You are assuming that a bad HTTP cache will be bad in a predictable
>> fashion. I'm not against using nonces to bust caches, but I don't think
>> we should rely on it.
>
> No, what I'm assuming is SOME minimal-level of nonborkenness.
>
> IF a cache takes url
>
> http://www.example.com/url_a
>
> and instead returns
>
> http://www.example.com/url_b

This is true, but the GET/POST question is half orthogonal (so that would 
be 45 degrees?) to the nonce question. IE you could use a POST plus a nonce 
if you wanted. IIRC POST /should/ do enough alone to avoid the need for a 
nonce though, as I can't see how any web cache would cache POSTs.

-- 
Alex Bligh

From nweaver@ICSI.Berkeley.EDU  Sat Oct  1 14:05:27 2011
Return-Path: <nweaver@ICSI.Berkeley.EDU>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 232D121F901D for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 14:05:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.49
X-Spam-Level: 
X-Spam-Status: No, score=-2.49 tagged_above=-999 required=5 tests=[AWL=0.109,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pkG3jvtCUaOs for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 14:05:26 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id 4357F21F901C for <dnsext@ietf.org>; Sat,  1 Oct 2011 14:05:26 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id C99C82C400A; Sat,  1 Oct 2011 14:08:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id dzGg0TXJWNNJ; Sat,  1 Oct 2011 14:08:21 -0700 (PDT)
Received: from [10.0.1.2] (c-76-103-166-40.hsd1.ca.comcast.net [76.103.166.40]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 65FE22C4002; Sat,  1 Oct 2011 14:08:21 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: text/plain; charset=us-ascii
From: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
In-Reply-To: <33BA32D8CFF5BCB5D2895142@nimrod.local>
Date: Sat, 1 Oct 2011 14:08:20 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <4C6F86F7-9FFD-4C71-B1A0-4CCD56E48D12@ICSI.Berkeley.EDU>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu> <5C4E07BC-E6CC-45A6-8018-10C2A799A55E@vpnc.org> <66077D12-F568-426A-8E5C-CC077CC24622@ICSI.Berkeley.EDU> <33BA32D8CFF5BCB5D2895142@nimrod.local>
To: Alex Bligh <alex@alex.org.uk>
X-Mailer: Apple Mail (2.1244.3)
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 21:05:27 -0000

On Oct 1, 2011, at 2:02 PM, Alex Bligh wrote:
>> No, what I'm assuming is SOME minimal-level of nonborkenness.
>>=20
>> IF a cache takes url
>>=20
>> http://www.example.com/url_a
>>=20
>> and instead returns
>>=20
>> http://www.example.com/url_b
>=20
> This is true, but the GET/POST question is half orthogonal (so that =
would be 45 degrees?) to the nonce question. IE you could use a POST =
plus a nonce if you wanted. IIRC POST /should/ do enough alone to avoid =
the need for a nonce though, as I can't see how any web cache would =
cache POSTs.

Yeah, but if we're assuming maximum borkennes, I could see truly borken =
proxies failing to properly return data in the reply of a POST.

Thus if the goal of using POST instead of GET is cache-busting, GET with =
NONCE should work unless the case is "Broken to the point of uselessness =
HTTP proxy".


Oh, one BIG warning that might sabotage this that I just realized:  I've =
seen proxies, eg the Bluecoat proxy, which will intercept all traffic =
until the BROWSER is logged into the proxy and has a cookie set, so =
there isn't HTTP access unless through a browser that's already gone =
through the login process.  :(

Since thats likely to the the same sort of network where you can't =
bypass the DNS borkenness by TCP or UDP port 53, this could be a =
problem.




From drc@virtualized.org  Sat Oct  1 14:23:58 2011
Return-Path: <drc@virtualized.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13DEE21F8E75 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 14:23:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.799
X-Spam-Level: 
X-Spam-Status: No, score=-2.799 tagged_above=-999 required=5 tests=[AWL=-0.200, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gYE0fKK5q8WO for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 14:23:57 -0700 (PDT)
Received: from trantor.virtualized.org (trantor.virtualized.org [199.48.134.42]) by ietfa.amsl.com (Postfix) with ESMTP id 929B021F8E71 for <dnsext@ietf.org>; Sat,  1 Oct 2011 14:23:57 -0700 (PDT)
Received: from [10.0.1.9] (cpe-66-91-109-17.hawaii.res.rr.com [66.91.109.17]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: drc) by trantor.virtualized.org (Postfix) with ESMTPSA id 118F01704E; Sat,  1 Oct 2011 21:26:53 +0000 (UTC)
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: text/plain; charset=us-ascii
From: David Conrad <drc@virtualized.org>
In-Reply-To: <4C6F86F7-9FFD-4C71-B1A0-4CCD56E48D12@ICSI.Berkeley.EDU>
Date: Sat, 1 Oct 2011 11:26:51 -1000
Content-Transfer-Encoding: quoted-printable
Message-Id: <6F36FE11-36C6-4F56-B6C7-50B9C3705C13@virtualized.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu> <5C4E07BC-E6CC-45A6-8018-10C2A799A55E@vpnc.org> <66077D12-F568-426A-8E5C-CC077CC24622@ICSI.Berkeley.EDU> <33BA32D8CFF5BCB5D2895142@nimrod.local> <4C6F86F7-9FFD-4C71-B1A0-4CCD56E48D12@ICSI.Berkeley.EDU>
To: Nicholas Weaver <nweaver@icsi.berkeley.edu>
X-Mailer: Apple Mail (2.1244.3)
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 21:23:58 -0000

On Oct 1, 2011, at 11:08 AM, Nicholas Weaver wrote:
> Since thats likely to the the same sort of network where you can't =
bypass the DNS borkenness by TCP or UDP port 53, this could be a =
problem.

This succinctly captures my ill-ease about this proposal.

Pretending (in effect) HTTP{,S} is IPv7 will work until the network =
administrators/middlebox vendors decide they want to block/intercept =
that traffic. Then what?  How many levels of turtles are we willing to =
go down?

Regards,
-drc


From mohta@necom830.hpcl.titech.ac.jp  Sat Oct  1 16:30:28 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A06E021F8C1A for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 16:30:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.7
X-Spam-Level: 
X-Spam-Status: No, score=0.7 tagged_above=-999 required=5 tests=[AWL=-0.699, BAYES_05=-1.11, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uhJTSF00lly4 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 16:30:28 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id BDBD521F8C19 for <dnsext@ietf.org>; Sat,  1 Oct 2011 16:30:27 -0700 (PDT)
Received: (qmail 16528 invoked from network); 1 Oct 2011 23:47:38 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 1 Oct 2011 23:47:38 -0000
Message-ID: <4E87A351.3070206@necom830.hpcl.titech.ac.jp>
Date: Sun, 02 Oct 2011 08:33:37 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: dnsext@ietf.org
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu> <5C4E07BC-E6CC-45A6-8018-10C2A799A55E@vpnc.org> <66077D12-F568-426A-8E5C-CC077CC24622@ICSI.Berkeley.EDU> <33BA32D8CFF5BCB5D2895142@nimrod.local> <4C6F86F7-9FFD-4C71-B1A0-4CCD56E48D12@ICSI.Berkeley.EDU> <6F36FE11-36C6-4F56-B6C7-50B9C3705C13@virtualized.org>
In-Reply-To: <6F36FE11-36C6-4F56-B6C7-50B9C3705C13@virtualized.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 23:30:28 -0000

I'm not sure about the environment to use this proposal.

Perhaps, DHCP is not expected to work and the raw addresses
of http servers are written in /etc/resolv.conf.

But, how can a client get secure time?

						Masataka Ohta

From mohta@necom830.hpcl.titech.ac.jp  Sat Oct  1 16:57:43 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D503821F8B71 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 16:57:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.033
X-Spam-Level: 
X-Spam-Status: No, score=-0.033 tagged_above=-999 required=5 tests=[AWL=0.057,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lz6t5yNv2JQv for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 16:57:43 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 21BEF21F8B70 for <dnsext@ietf.org>; Sat,  1 Oct 2011 16:57:43 -0700 (PDT)
Received: (qmail 16701 invoked from network); 2 Oct 2011 00:15:08 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 2 Oct 2011 00:15:08 -0000
Message-ID: <4E87A9C8.8090401@necom830.hpcl.titech.ac.jp>
Date: Sun, 02 Oct 2011 09:01:12 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: dnsext@ietf.org
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org>
In-Reply-To: <201110010458.26859.vixie@isc.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Oct 2011 23:57:43 -0000

Paul Vixie wrote:

> I truly do only expect this transport to be used
> when the normal UDP/53 and TCP/53 paths are middlebox-corrupted.

And only for SDNS.

Maybe, google is considering to always use this transport with
hardwired addresses of 8.8.8.8 and 8.8.4.4 even for plain DNS
to get privacy information of clients from HTTP headers.

							Masataka Ohta

From nweaver@icsi.berkeley.edu  Sat Oct  1 17:06:40 2011
Return-Path: <nweaver@icsi.berkeley.edu>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DDE221F8E22 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 17:06:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.499
X-Spam-Level: 
X-Spam-Status: No, score=-2.499 tagged_above=-999 required=5 tests=[AWL=0.100,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Eorneguo5iHm for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 17:06:40 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id F142021F8C18 for <dnsext@ietf.org>; Sat,  1 Oct 2011 17:06:39 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id D66982C4015; Sat,  1 Oct 2011 17:09:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id pg6knNqDJlHx; Sat,  1 Oct 2011 17:09:37 -0700 (PDT)
Received: from [10.0.1.2] (c-76-103-166-40.hsd1.ca.comcast.net [76.103.166.40]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 80F8A2C4002; Sat,  1 Oct 2011 17:09:37 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: text/plain; charset=us-ascii
From: Nicholas Weaver <nweaver@icsi.berkeley.edu>
In-Reply-To: <4E87A9C8.8090401@necom830.hpcl.titech.ac.jp>
Date: Sat, 1 Oct 2011 17:09:37 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <6C66E591-5278-415B-A7A8-21AB824F2599@icsi.berkeley.edu>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <4E87A9C8.8090401@necom830.hpcl.titech.ac.jp>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
X-Mailer: Apple Mail (2.1244.3)
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Oct 2011 00:06:40 -0000

On Oct 1, 2011, at 5:01 PM, Masataka Ohta wrote:
> And only for SDNS.
>=20
> Maybe, google is considering to always use this transport with
> hardwired addresses of 8.8.8.8 and 8.8.4.4 even for plain DNS
> to get privacy information of clients from HTTP headers.

For google, the information they get from Public DNS is a poor source of =
data by Google's standards.


a)  Google's privacy policy is clear on what data they keep and discard =
from Public DNS.  http://code.google.com/speed/public-dns/privacy.html

Full IP logs are kept for 24-48 hours, after that, IP addresses are =
replaced with a network & city level GeoIP localization, which means it =
is very poor for user tracking.  Which is excellent for tracking =
aggregate information but fails completely for user tracking.


b)  Google +1 and Analytics capture much much much more information =
about what users are reading on the web.  The rumors (threats?) about +1 =
being used by the pagerank algorithm are particularly disturbing.


Rather, it appears Google Public DNS is about having a public DNS =
service where an NXDOMAIN remains an NXDOMAIN, since half of those =
NXDOMAINs from the browser result in a Google search anyway (the other =
half go to Bing), so there is little point in monetizing NXDOMAINs for =
Google.


From brian.peter.dickson@gmail.com  Sat Oct  1 18:01:12 2011
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9743F21F8E42 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 18:01:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tL5Je0aoCZqy for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 18:01:12 -0700 (PDT)
Received: from mail-bw0-f44.google.com (mail-bw0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id C230F21F8E41 for <dnsext@ietf.org>; Sat,  1 Oct 2011 18:01:11 -0700 (PDT)
Received: by bkaq10 with SMTP id q10so3892028bka.31 for <dnsext@ietf.org>; Sat, 01 Oct 2011 18:04:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=YBYSCAdcEatO1/Mnw63Dv2Wn+XUsbmMK3S85QOI3Z5M=; b=i0Jj/Zz91xomUxXThvCMk836sxE+f8vHj6NlNv2bLcoCXTJRO3rlSdMyqIDSCpElDm qbqgrtuqVz0bPRcq8fIuT9gULsmhOxxJ/Ud2JdqUyw9RLPEfojoDLp9uLqqSkYV6AV4A jZl9FeTErYd7rorPx1VTEUAQQ8tLtNznQ1pJM=
MIME-Version: 1.0
Received: by 10.223.55.218 with SMTP id v26mr8896701fag.82.1317517449226; Sat, 01 Oct 2011 18:04:09 -0700 (PDT)
Received: by 10.223.144.135 with HTTP; Sat, 1 Oct 2011 18:04:09 -0700 (PDT)
In-Reply-To: <6F36FE11-36C6-4F56-B6C7-50B9C3705C13@virtualized.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu> <5C4E07BC-E6CC-45A6-8018-10C2A799A55E@vpnc.org> <66077D12-F568-426A-8E5C-CC077CC24622@ICSI.Berkeley.EDU> <33BA32D8CFF5BCB5D2895142@nimrod.local> <4C6F86F7-9FFD-4C71-B1A0-4CCD56E48D12@ICSI.Berkeley.EDU> <6F36FE11-36C6-4F56-B6C7-50B9C3705C13@virtualized.org>
Date: Sat, 1 Oct 2011 21:04:09 -0400
Message-ID: <CAH1iCiqjQSr-OHm004xV7Ex+aAswZEzBxaRcL6pNuzU4RgoJjw@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: David Conrad <drc@virtualized.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Oct 2011 01:01:12 -0000

On Sat, Oct 1, 2011 at 5:26 PM, David Conrad <drc@virtualized.org> wrote:
> On Oct 1, 2011, at 11:08 AM, Nicholas Weaver wrote:
>> Since thats likely to the the same sort of network where you can't bypas=
s the DNS borkenness by TCP or UDP port 53, this could be a problem.
>
> This succinctly captures my ill-ease about this proposal.
>
> Pretending (in effect) HTTP{,S} is IPv7 will work until the network admin=
istrators/middlebox vendors decide they want to block/intercept that traffi=
c. Then what? =A0How many levels of turtles are we willing to go down?

Including this, depending on how you count, one, or two if you treat
http and https in this proposal as two turtles instead of one.

Here's why:

Intercept precludes https (since the "s" means end-to-end TLS).
And blocking https requires some way of determining what to block, on
a destination basis alone, for the same reason. The http component is
opaque in an https connection, protected by the TLS connection.

So, in the case of the middlebox vendors or network administrators not
reacting to the use of DNS over HTTP(S), problem solved. Otherwise, it
then becomes baby+bathwater for those trying to block this, based only
on IP addresses. Name-based HTTP servers that support this (on 80 or
443) on shared infrastructure (web hosting etc.), plus popularity of
use (large numbers of sites and/or well known large sites), including
phone-home use with client-authentication by HTTPS servers, means
there will be significant benefit to this, and significant pressure to
not try to break it (at least in the HTTPS case).

Where practical to do so, eg for business enterprise employees away
from the office, having server running on both 80 and 443 is ideal. If
80 works, there is low cost for doing this. If 80 does not (ie blocked
or mangled), 443 should. Blocking 443 on a given IP is particularly
ill-advised for hot-spot operators and hotels.

As for encoding, I definitely support wire-format over XML.

Brian

From mohta@necom830.hpcl.titech.ac.jp  Sat Oct  1 22:41:01 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A48121F8E39 for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 22:41:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.034
X-Spam-Level: 
X-Spam-Status: No, score=-0.034 tagged_above=-999 required=5 tests=[AWL=0.056,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 514oZgE+3imi for <dnsext@ietfa.amsl.com>; Sat,  1 Oct 2011 22:41:00 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 1FA9521F8E33 for <dnsext@ietf.org>; Sat,  1 Oct 2011 22:40:59 -0700 (PDT)
Received: (qmail 19643 invoked from network); 2 Oct 2011 05:58:10 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 2 Oct 2011 05:58:10 -0000
Message-ID: <4E87FA22.5010700@necom830.hpcl.titech.ac.jp>
Date: Sun, 02 Oct 2011 14:44:02 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Nicholas Weaver <nweaver@icsi.berkeley.edu>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <4E87A9C8.8090401@necom830.hpcl.titech.ac.jp> <6C66E591-5278-415B-A7A8-21AB824F2599@icsi.berkeley.edu>
In-Reply-To: <6C66E591-5278-415B-A7A8-21AB824F2599@icsi.berkeley.edu>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Oct 2011 05:41:01 -0000

Nicholas Weaver wrote:

> a)  Google's privacy policy is clear on what data they
> keep and discard from Public DNS.

That's not the point. See client subnet thread.

						Masataka Ohta

From nweaver@ICSI.Berkeley.EDU  Sun Oct  2 04:39:41 2011
Return-Path: <nweaver@ICSI.Berkeley.EDU>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD42121F8E62 for <dnsext@ietfa.amsl.com>; Sun,  2 Oct 2011 04:39:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.507
X-Spam-Level: 
X-Spam-Status: No, score=-2.507 tagged_above=-999 required=5 tests=[AWL=0.092,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8JrLsCRu-yAi for <dnsext@ietfa.amsl.com>; Sun,  2 Oct 2011 04:39:40 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id E9BFB21F8D8C for <dnsext@ietf.org>; Sun,  2 Oct 2011 04:39:40 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 3FB1B2C4018; Sun,  2 Oct 2011 04:42:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id ye5EfD8Eg82a; Sun,  2 Oct 2011 04:42:38 -0700 (PDT)
Received: from [10.0.1.2] (c-76-103-166-40.hsd1.ca.comcast.net [76.103.166.40]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id E488D2C4002; Sun,  2 Oct 2011 04:42:37 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: text/plain; charset=iso-2022-jp
From: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
In-Reply-To: <4E87FA22.5010700@necom830.hpcl.titech.ac.jp>
Date: Sun, 2 Oct 2011 04:42:39 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <54496460-643C-4ECC-BFAA-BAE3B545FFB4@ICSI.Berkeley.EDU>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <4E87A9C8.8090401@necom830.hpcl.titech.ac.jp> <6C66E591-5278-415B-A7A8-21AB824F2599@icsi.berkeley.edu> <4E87FA22.5010700@necom830.hpcl.titech.ac.jp>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
X-Mailer: Apple Mail (2.1244.3)
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Oct 2011 11:39:41 -0000

On Oct 1, 2011, at 10:44 PM, Masataka Ohta wrote:

> Nicholas Weaver wrote:
>=20
>> a)  Google's privacy policy is clear on what data they
>> keep and discard from Public DNS.
>=20
> That's not the point. See client subnet thread.

Oh, THAT particular weird meme, which makes no sense either since:

a)  Client subnet doesn't send IP, only subnet

b)  It sends this information to the DNS authority representing the =
domain the user is going to contact anyway.



From nweaver@ICSI.Berkeley.EDU  Sun Oct  2 04:45:17 2011
Return-Path: <nweaver@ICSI.Berkeley.EDU>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3AF921F8E80 for <dnsext@ietfa.amsl.com>; Sun,  2 Oct 2011 04:45:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.513
X-Spam-Level: 
X-Spam-Status: No, score=-2.513 tagged_above=-999 required=5 tests=[AWL=0.086,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Lby4XLcGsj3 for <dnsext@ietfa.amsl.com>; Sun,  2 Oct 2011 04:45:17 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id 5503B21F8E77 for <dnsext@ietf.org>; Sun,  2 Oct 2011 04:45:17 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id E6FAF2C4017; Sun,  2 Oct 2011 04:48:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id B8CT-eqBQwdl; Sun,  2 Oct 2011 04:48:16 -0700 (PDT)
Received: from [10.0.1.2] (c-76-103-166-40.hsd1.ca.comcast.net [76.103.166.40]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 7FBB72C4002; Sun,  2 Oct 2011 04:48:16 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: text/plain; charset=iso-8859-1
From: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
In-Reply-To: <CAH1iCiqjQSr-OHm004xV7Ex+aAswZEzBxaRcL6pNuzU4RgoJjw@mail.gmail.com>
Date: Sun, 2 Oct 2011 04:48:18 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <B8621ACC-BEC9-4B59-BBE3-153A5FA8C9DE@ICSI.Berkeley.EDU>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu> <5C4E07BC-E6CC-45A6-8018-10C2A799A55E@vpnc.org> <66077D12-F568-426A-8E5C-CC077CC24622@ICSI.Berkeley.EDU> <33BA32D8CFF5BCB5D2895142@nimrod.local> <4C6F86F7-9FFD-4C71-B1A0-4CCD56E48D12@ICSI.Berkeley.EDU> <6F36FE11-36C6-4F56-B6C7-50B9C3705C13@virtualized.org> <CAH1iCiqjQSr-OHm004xV7Ex+aAswZEzBxaRcL6pNuzU4RgoJjw@mail.gmail.com>
To: Brian Dickson <brian.peter.dickson@gmail.com>
X-Mailer: Apple Mail (2.1244.3)
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Oct 2011 11:45:17 -0000

On Oct 1, 2011, at 6:04 PM, Brian Dickson wrote:

> So, in the case of the middlebox vendors or network administrators not
> reacting to the use of DNS over HTTP(S), problem solved. Otherwise, it
> then becomes baby+bathwater for those trying to block this, based only
> on IP addresses. Name-based HTTP servers that support this (on 80 or
> 443) on shared infrastructure (web hosting etc.), plus popularity of
> use (large numbers of sites and/or well known large sites), including
> phone-home use with client-authentication by HTTPS servers, means
> there will be significant benefit to this, and significant pressure to
> not try to break it (at least in the HTTPS case).

There is actually two cases that this seems to want to address:

a)  The amazingly borken middlebox at a consumer/hotspot.  In this case, =
DNS over TCP is likely to work (they don't get it), and DNS over TCP on =
a high port is really likely to work. =20

The network is probably not trying to restrict DNS AFTER login anyway.


b)  A corporate network with a vicious firewall.  In this case, well, =
its less clear that THIS proposal would work if the network =
administrator doesn't want it to work.  These networks sometimes do =
proxy HTTPS as well as HTTP, by having an additional certificate =
installed in the client.

EG, I've seen Netalyzr runs from corporate networks that block =
EVERYTHING out (and I mean EVERYTHING), routing ALL traffic through =
HTTP/HTTPS proxies and blocking everything else.


So for a:  (which is mostly ignorant network), having a few global =
recursive resolvers with high ports is probably sufficient.

For b:  (which is the deliberate corporate network), I don't think this =
proposal is guarenteed to work.


From mohta@necom830.hpcl.titech.ac.jp  Sun Oct  2 05:50:06 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10BB621F8B49 for <dnsext@ietfa.amsl.com>; Sun,  2 Oct 2011 05:50:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.035
X-Spam-Level: 
X-Spam-Status: No, score=-0.035 tagged_above=-999 required=5 tests=[AWL=0.055,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IJ9zmGpK90PQ for <dnsext@ietfa.amsl.com>; Sun,  2 Oct 2011 05:50:05 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 4505321F8B43 for <dnsext@ietf.org>; Sun,  2 Oct 2011 05:50:04 -0700 (PDT)
Received: (qmail 22250 invoked from network); 2 Oct 2011 13:07:19 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 2 Oct 2011 13:07:19 -0000
Message-ID: <4E885EBC.7010902@necom830.hpcl.titech.ac.jp>
Date: Sun, 02 Oct 2011 21:53:16 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org> <4E87A9C8.8090401@necom830.hpcl.titech.ac.jp> <6C66E591-5278-415B-A7A8-21AB824F2599@icsi.berkeley.edu> <4E87FA22.5010700@necom830.hpcl.titech.ac.jp> <54496460-643C-4ECC-BFAA-BAE3B545FFB4@ICSI.Berkeley.EDU>
In-Reply-To: <54496460-643C-4ECC-BFAA-BAE3B545FFB4@ICSI.Berkeley.EDU>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Oct 2011 12:50:06 -0000

Nicholas Weaver wrote:

> Oh, THAT particular weird meme, which makes no sense either since:
> 
> a)  Client subnet doesn't send IP, only subnet
> 
> b)  It sends this information to the DNS authority representing the domain the user is going to contact anyway.

You completely miss the point.

I acknowledge you don't understand the problem of implied business
model.

					Masataka Ohta

From fanf2@hermes.cam.ac.uk  Mon Oct  3 07:23:40 2011
Return-Path: <fanf2@hermes.cam.ac.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CA2521F8A91 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 07:23:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.585
X-Spam-Level: 
X-Spam-Status: No, score=-6.585 tagged_above=-999 required=5 tests=[AWL=0.014,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GZ-beGrMFgDX for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 07:23:36 -0700 (PDT)
Received: from ppsw-41.csi.cam.ac.uk (ppsw-41.csi.cam.ac.uk [131.111.8.141]) by ietfa.amsl.com (Postfix) with ESMTP id 1A5F821F8586 for <dnsext@ietf.org>; Mon,  3 Oct 2011 07:23:35 -0700 (PDT)
X-Cam-AntiVirus: no malware found
X-Cam-SpamDetails: not scanned
X-Cam-ScannerInfo: http://www.cam.ac.uk/cs/email/scanner/
Received: from hermes-2.csi.cam.ac.uk ([131.111.8.54]:49201) by ppsw-41.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.156]:25) with esmtpa (EXTERNAL:fanf2) id 1RAjTY-0001er-S8 (Exim 4.72) (return-path <fanf2@hermes.cam.ac.uk>); Mon, 03 Oct 2011 15:26:36 +0100
Received: from fanf2 (helo=localhost) by hermes-2.csi.cam.ac.uk (hermes.cam.ac.uk) with local-esmtp id 1RAjTY-0002wS-Ms (Exim 4.67) (return-path <fanf2@hermes.cam.ac.uk>); Mon, 03 Oct 2011 15:26:36 +0100
Date: Mon, 3 Oct 2011 15:26:36 +0100
From: Tony Finch <dot@dotat.at>
X-X-Sender: fanf2@hermes-2.csi.cam.ac.uk
To: Paul Vixie <vixie@isc.org>
In-Reply-To: <201110011736.27664.vixie@isc.org>
Message-ID: <alpine.LSU.2.00.1110031523351.30178@hermes-2.csi.cam.ac.uk>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu> <201110011736.27664.vixie@isc.org>
User-Agent: Alpine 2.00 (LSU 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: Tony Finch <fanf2@hermes.cam.ac.uk>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 14:23:40 -0000

Paul Vixie <vixie@isc.org> wrote:
>
> i've got a draft in production that adds an EDNS option "send chain" where the
> option payload is any ancestor of the QNAME and indicates the requestor's
> deepest validated trusted domain name.  this will solicit a longer trust chain
> (all the RRSIG, DNSKEY, DS RRs) between this ancestor and the QNAME.

What about support for lookaside trust anchors?

> [...] i don't see this as HTTP-specific which is why it's not in this draft.

Sensible.

Tony.
-- 
f.anthony.n.finch  <dot@dotat.at>  http://dotat.at/
Viking, North Utsire: Southerly veering southwesterly 6 to gale 8,
occasionally severe gale 9 at first in northwest Viking. Moderate or rough
becoming very rough or high. Rain then squally showers. Moderate or good,
occasionally poor.

From vixie@isc.org  Mon Oct  3 08:46:35 2011
Return-Path: <vixie@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA60E21F8BB7 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 08:46:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.54
X-Spam-Level: 
X-Spam-Status: No, score=-2.54 tagged_above=-999 required=5 tests=[AWL=0.060,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GZj8eLEOAogx for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 08:46:15 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id A3E3021F8BAD for <dnsext@ietf.org>; Mon,  3 Oct 2011 08:46:15 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 419CDC9423 for <dnsext@ietf.org>; Mon,  3 Oct 2011 15:49:05 +0000 (UTC) (envelope-from vixie@isc.org)
Received: from unknown (75-54-222-121.lightspeed.rdcyca.sbcglobal.net [75.54.222.121]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 22573216C3B for <dnsext@ietf.org>; Mon,  3 Oct 2011 15:49:05 +0000 (UTC) (envelope-from vixie@isc.org)
Date: Mon, 3 Oct 2011 15:49:02 +0000
From: Paul Vixie <vixie@isc.org>
To: dnsext@ietf.org
Message-ID: <20111003154902.000049f1@unknown>
In-Reply-To: <alpine.LSU.2.00.1110031523351.30178@hermes-2.csi.cam.ac.uk>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <D3890C96-DA07-4BA1-AB57-1A81EA2ED477@icsi.berkeley.edu> <201110011736.27664.vixie@isc.org> <alpine.LSU.2.00.1110031523351.30178@hermes-2.csi.cam.ac.uk>
Organization: ISC
X-Mailer: Claws Mail 3.7.8cvs47 (GTK+ 2.16.6; i586-pc-mingw32msvc)
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 15:46:36 -0000

On Mon, 3 Oct 2011 15:26:36 +0100
Tony Finch <dot@dotat.at> wrote:

> Paul Vixie <vixie@isc.org> wrote:
> > i've got a draft in production that adds an EDNS option "send
> > chain" where the option payload is any ancestor of the QNAME and
> > indicates the requestor's deepest validated trusted domain name.
> > this will solicit a longer trust chain (all the RRSIG, DNSKEY, DS
> > RRs) between this ancestor and the QNAME.
> 
> What about support for lookaside trust anchors?

i don't think we should enshrine lookaside in dnssec validation, so i
was not planning to incorporate that in a "send chain" edns option
proposal.

complete support for lookaside would include support for ISP-layer data
replacement (perhaps under government mandate), as well as enterprise
(private keys), and the quasi-public deployment aid represented by DLV.

none of these things have a place in my long term vision for ubiquitous
DNSSEC, though i have championed DLV as an early deployment aid.
-- 
Paul Vixie

From dwessels@verisign.com  Mon Oct  3 08:51:35 2011
Return-Path: <dwessels@verisign.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C22B121F8BC4 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 08:51:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WgXEzAR9zTUG for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 08:51:35 -0700 (PDT)
Received: from exprod6og106.obsmtp.com (exprod6og106.obsmtp.com [64.18.1.191]) by ietfa.amsl.com (Postfix) with ESMTP id 077B221F8BC3 for <dnsext@ietf.org>; Mon,  3 Oct 2011 08:51:34 -0700 (PDT)
Received: from peregrine.verisign.com ([216.168.239.74]) (using TLSv1) by exprod6ob106.postini.com ([64.18.5.12]) with SMTP;  Mon, 03 Oct 2011 08:54:38 PDT
Received: from dul1wnexcn01.vcorp.ad.vrsn.com (dul1wnexcn01.vcorp.ad.vrsn.com [10.170.12.138]) by peregrine.verisign.com (8.13.6/8.13.4) with ESMTP id p93FsSQR023164;  Mon, 3 Oct 2011 11:54:28 -0400
Received: from mail.labs.vrsn.com ([10.173.152.121]) by dul1wnexcn01.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.4675); Mon, 3 Oct 2011 11:54:27 -0400
Received: from [10.100.1.22] (unknown [10.100.1.22]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mail.labs.vrsn.com (Postfix) with ESMTP id B7CA91BC8CA; Mon,  3 Oct 2011 11:54:27 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: "Wessels, Duane" <dwessels@verisign.com>
In-Reply-To: <201110010458.26859.vixie@isc.org>
Date: Mon, 3 Oct 2011 08:54:24 -0700
Content-Transfer-Encoding: 7bit
Message-Id: <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0394FB3B-6C2B-4D47-B1FA-AA54B7EB1053@kirei.se> <DDD7529C-9EF3-427F-AF90-2872CCD71ECF@cisco.com> <201110010458.26859.vixie@isc.org>
To: Paul Vixie <vixie@isc.org>
X-Mailer: Apple Mail (2.1084)
X-OriginalArrivalTime: 03 Oct 2011 15:54:27.0974 (UTC) FILETIME=[BB2D5A60:01CC81E4]
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 15:51:35 -0000

On Sep 30, 2011, at 9:58 PM, Paul Vixie wrote:

> I like the binary format first proposed here by Edmonds.

I also like that format. 

> my observation is, we should not be using GET at all, nor should we be 
> encoding the query into the URI.  We should use POST and our request body 

I have a slight preference for GET over POST.  I find GET simpler to
implement (maybe code size isn't a concern) and probably more likely
to get through.  OTOH I also like that POST has the content-length
header.

DW

From vixie@isc.org  Mon Oct  3 10:10:20 2011
Return-Path: <vixie@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 373E221F8C74 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 10:10:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p8i4ZfzjhTi1 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 10:10:19 -0700 (PDT)
Received: from nsa.vix.com (nsa.vix.com [IPv6:2001:4f8:3:30::3]) by ietfa.amsl.com (Postfix) with ESMTP id A9D7221F8C7F for <dnsext@ietf.org>; Mon,  3 Oct 2011 10:10:19 -0700 (PDT)
Received: from nsa.vix.com (localhost [127.0.0.1]) by nsa.vix.com (Postfix) with ESMTP id 81514A1063 for <dnsext@ietf.org>; Mon,  3 Oct 2011 17:13:20 +0000 (UTC) (envelope-from vixie@isc.org)
Received: from six.localnet (six.vix.com [IPv6:2001:4f8:3:30::2]) by nsa.vix.com (Postfix) with ESMTP id 5A804A1051 for <dnsext@ietf.org>; Mon,  3 Oct 2011 17:13:20 +0000 (UTC) (envelope-from vixie@isc.org)
From: Paul Vixie <vixie@isc.org>
Organization: ISC
To: dnsext@ietf.org
Date: Mon, 3 Oct 2011 17:13:19 +0000
User-Agent: KMail/1.13.5 (FreeBSD/8.1-RELEASE; KDE/4.4.5; amd64; ; )
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com>
In-Reply-To: <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com>
MIME-Version: 1.0
Content-Type: Text/Plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <201110031713.20103.vixie@isc.org>
X-Virus-Scanned: ClamAV using ClamSMTP
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 17:10:20 -0000

On Monday, October 03, 2011 15:54:24 Wessels, Duane wrote:
> On Sep 30, 2011, at 9:58 PM, Paul Vixie wrote:
> > my observation is, we should not be using GET at all, nor should we be
> > encoding the query into the URI.  We should use POST and our request body
> 
> I have a slight preference for GET over POST.  I find GET simpler to
> implement (maybe code size isn't a concern) and probably more likely
> to get through.  OTOH I also like that POST has the content-length
> header.

what's your view of the need to someday express UPDATE, and to include future 
extensions to QUERY (like more stuff in the additional section)?  if those 
seem like worthwhile goals, then we really need to put the request into the 
body rather than into the URI or into the http headers.  that calls for POST.

From paul.hoffman@vpnc.org  Mon Oct  3 10:18:25 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BE4D21F8C22 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 10:18:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.571
X-Spam-Level: 
X-Spam-Status: No, score=-102.571 tagged_above=-999 required=5 tests=[AWL=0.028, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4JtwKGJwhnGB for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 10:18:24 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 0C5A721F8B56 for <dnsext@ietf.org>; Mon,  3 Oct 2011 10:18:16 -0700 (PDT)
Received: from [10.20.30.100] (50-0-66-4.dsl.dynamic.fusionbroadband.com [50.0.66.4]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p93HLIPs004215 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <dnsext@ietf.org>; Mon, 3 Oct 2011 10:21:19 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Apple Message framework v1244.3)
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <201110031713.20103.vixie@isc.org>
Date: Mon, 3 Oct 2011 10:21:19 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org>
To: DNSEXT Working Group <dnsext@ietf.org>
X-Mailer: Apple Mail (2.1244.3)
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 17:18:25 -0000

On Oct 3, 2011, at 10:13 AM, Paul Vixie wrote:

> On Monday, October 03, 2011 15:54:24 Wessels, Duane wrote:
>> On Sep 30, 2011, at 9:58 PM, Paul Vixie wrote:
>>> my observation is, we should not be using GET at all, nor should we =
be
>>> encoding the query into the URI.  We should use POST and our request =
body
>>=20
>> I have a slight preference for GET over POST.  I find GET simpler to
>> implement (maybe code size isn't a concern) and probably more likely
>> to get through.  OTOH I also like that POST has the content-length
>> header.
>=20
> what's your view of the need to someday express UPDATE, and to include =
future=20
> extensions to QUERY (like more stuff in the additional section)?  if =
those=20
> seem like worthwhile goals, then we really need to put the request =
into the=20
> body rather than into the URI or into the http headers.  that calls =
for POST.

+1. The slight increase in programming difficulty of using POST vs. GET =
buys you a huge amount of flexibility in queries. It's not just about =
cache-prevention.

--Paul Hoffman


From ted.ietf@gmail.com  Mon Oct  3 10:29:56 2011
Return-Path: <ted.ietf@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA6B621F8B4A for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 10:29:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.503
X-Spam-Level: 
X-Spam-Status: No, score=-3.503 tagged_above=-999 required=5 tests=[AWL=0.095,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uF7WyM4CDt2b for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 10:29:56 -0700 (PDT)
Received: from mail-yw0-f44.google.com (mail-yw0-f44.google.com [209.85.213.44]) by ietfa.amsl.com (Postfix) with ESMTP id 840CC21F8C60 for <dnsext@ietf.org>; Mon,  3 Oct 2011 10:29:44 -0700 (PDT)
Received: by ywm3 with SMTP id 3so1336508ywm.31 for <dnsext@ietf.org>; Mon, 03 Oct 2011 10:32:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=LWz+4jRLcVajWoZO/EVa0b4N7/756t5+R3mOYzGKPlI=; b=FPlQFcSMgzHFrO+COdVppkCs61Ti464WZvAv8b2d8RzLrRpxkBjFMh5Qnxe/rjo5G4 3QXbRlUvMiCPKdgakiCnoL9ZnWKWm/VLQMtqzUW0KDjYAdwOcQxWtpn8zinPWTjik1N2 RyLKQ46MFNvhPUH8B1h8phH/fbP9Hr3Omnp3A=
MIME-Version: 1.0
Received: by 10.236.191.71 with SMTP id f47mr1021120yhn.125.1317663167208; Mon, 03 Oct 2011 10:32:47 -0700 (PDT)
Received: by 10.236.105.169 with HTTP; Mon, 3 Oct 2011 10:32:47 -0700 (PDT)
In-Reply-To: <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org>
Date: Mon, 3 Oct 2011 10:32:47 -0700
Message-ID: <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: multipart/alternative; boundary=20cf303f649603dd2f04ae685d93
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 17:29:57 -0000

--20cf303f649603dd2f04ae685d93
Content-Type: text/plain; charset=ISO-8859-1

On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman <paul.hoffman@vpnc.org> wrote:

>
> +1. The slight increase in programming difficulty of using POST vs. GET
> buys you a huge amount of flexibility in queries. It's not just about
> cache-prevention.
>
>
All silver linings have their clouds...  The only unfortunate thing about
POST, in my view, is that the flexibility can trend you away from
interoperability as people add and change things at  different  speeds at
different hosts.  If you want standard behavior the descending list goes:
New Method, GET, POST, at least in my view.

Since new methods are notoriously hard to get deployed, POST seems like the
best choice if you want something that can handle any DNS operation.  If it
is meant to be only retrieval, then I would personally say that keeping it
within GET is the best choice.

I'm also increasingly of the opinion that this should have the validation
bits sets by default.  Allowing a web site to update the local DNS cache for
a client system by including a reference and a DNS result for the reference
causes my paranoia to ratchet up a few notches.  The only other defense
against it I see is using Web results only in same-origin web contexts, and
that's going to be very hard to make work.

Ted

--20cf303f649603dd2f04ae685d93
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman <span dir=3D"ltr">&lt;<a href=
=3D"mailto:paul.hoffman@vpnc.org">paul.hoffman@vpnc.org</a>&gt;</span> wrot=
e:<br><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D=
"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div class=3D"im"><br>
</div>+1. The slight increase in programming difficulty of using POST vs. G=
ET buys you a huge amount of flexibility in queries. It&#39;s not just abou=
t cache-prevention.<br>
<br></blockquote><div><br>All silver linings have their clouds...=A0 The on=
ly unfortunate thing about POST, in my view, is that the flexibility can tr=
end you away from interoperability as people add and change things at=A0 di=
fferent=A0 speeds at different hosts.=A0 If you want standard behavior the =
descending list goes: New Method, GET, POST, at least in my view.<br>
<br>Since new methods are notoriously hard to get deployed, POST seems like=
 the best choice if you want something that can handle any DNS operation.=
=A0 If it is meant to be only retrieval, then I would personally say that k=
eeping it within GET is the best choice.<br>
<br>I&#39;m also increasingly of the opinion that this should have the vali=
dation bits sets by default.=A0 Allowing a web site to update the local DNS=
 cache for a client system by including a reference and a DNS result for th=
e reference causes my paranoia to ratchet up a few notches.=A0 The only oth=
er defense against it I see is using Web results only in same-origin web co=
ntexts, and that&#39;s going to be very hard to make work.<br>
<br>Ted<br></div></div>

--20cf303f649603dd2f04ae685d93--

From dwessels@verisign.com  Mon Oct  3 10:32:02 2011
Return-Path: <dwessels@verisign.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0392921F8B26 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 10:32:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BdPnA2DvYWv3 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 10:32:01 -0700 (PDT)
Received: from exprod6og101.obsmtp.com (exprod6og101.obsmtp.com [64.18.1.181]) by ietfa.amsl.com (Postfix) with ESMTP id 3BDB621F8B05 for <dnsext@ietf.org>; Mon,  3 Oct 2011 10:32:00 -0700 (PDT)
Received: from peregrine.verisign.com ([216.168.239.74]) (using TLSv1) by exprod6ob101.postini.com ([64.18.5.12]) with SMTP;  Mon, 03 Oct 2011 10:35:04 PDT
Received: from dul1wnexcn03.vcorp.ad.vrsn.com (dul1wnexcn03.vcorp.ad.vrsn.com [10.170.12.113]) by peregrine.verisign.com (8.13.6/8.13.4) with ESMTP id p93HYt15026919;  Mon, 3 Oct 2011 13:34:55 -0400
Received: from mail.labs.vrsn.com ([10.173.152.121]) by dul1wnexcn03.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.4675); Mon, 3 Oct 2011 13:34:55 -0400
Received: from [10.100.1.22] (unknown [10.100.1.22]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mail.labs.vrsn.com (Postfix) with ESMTP id 41E061BC8CA; Mon,  3 Oct 2011 13:34:54 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: "Wessels, Duane" <dwessels@verisign.com>
In-Reply-To: <201110031713.20103.vixie@isc.org>
Date: Mon, 3 Oct 2011 10:34:48 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <58EB32F9-08D2-4579-BC56-1423C00FC371@verisign.com>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org>
To: Paul Vixie <vixie@isc.org>
X-Mailer: Apple Mail (2.1084)
X-OriginalArrivalTime: 03 Oct 2011 17:34:55.0613 (UTC) FILETIME=[C3EE12D0:01CC81F2]
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 17:32:02 -0000

On Oct 3, 2011, at 10:13 AM, Paul Vixie wrote:
>=20
> what's your view of the need to someday express UPDATE, and to include =
future=20
> extensions to QUERY (like more stuff in the additional section)?  if =
those=20
> seem like worthwhile goals, then we really need to put the request =
into the=20
> body rather than into the URI or into the http headers.  that calls =
for POST.

Robert's idea was to take a (binary) UDP message, express it in hex, and =
it
becomes the URL-pathname.  I don't see why you can't also do that with =
UPDATE.

(I'd add a message TCP-like length prefix, as you suggested, so the =
receiver
knows it got the whole thing).

Maybe your point is that URL length becomes a problem?  We've all seen
very long URLs I'm sure. =20

Anyway, my preference for GET over POST is not that strong.

DW=

From vixie@isc.org  Mon Oct  3 11:13:33 2011
Return-Path: <vixie@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B525421F8C8B for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 11:13:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 28ss8rRfXSUI for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 11:13:33 -0700 (PDT)
Received: from nsa.vix.com (nsa.vix.com [IPv6:2001:4f8:3:30::3]) by ietfa.amsl.com (Postfix) with ESMTP id E1BC721F8CE8 for <dnsext@ietf.org>; Mon,  3 Oct 2011 11:13:32 -0700 (PDT)
Received: from nsa.vix.com (localhost [127.0.0.1]) by nsa.vix.com (Postfix) with ESMTP id 59BE2A1037 for <dnsext@ietf.org>; Mon,  3 Oct 2011 18:16:33 +0000 (UTC) (envelope-from vixie@isc.org)
Received: from six.localnet (six.vix.com [IPv6:2001:4f8:3:30::2]) by nsa.vix.com (Postfix) with ESMTP id 3CA62A101E for <dnsext@ietf.org>; Mon,  3 Oct 2011 18:16:33 +0000 (UTC) (envelope-from vixie@isc.org)
From: Paul Vixie <vixie@isc.org>
Organization: ISC
To: dnsext@ietf.org
Date: Mon, 3 Oct 2011 18:16:32 +0000
User-Agent: KMail/1.13.5 (FreeBSD/8.1-RELEASE; KDE/4.4.5; amd64; ; )
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110031713.20103.vixie@isc.org> <58EB32F9-08D2-4579-BC56-1423C00FC371@verisign.com>
In-Reply-To: <58EB32F9-08D2-4579-BC56-1423C00FC371@verisign.com>
MIME-Version: 1.0
Content-Type: Text/Plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <201110031816.32959.vixie@isc.org>
X-Virus-Scanned: ClamAV using ClamSMTP
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 18:13:33 -0000

On Monday, October 03, 2011 17:34:48 Wessels, Duane wrote:
> Robert's idea was to take a (binary) UDP message, express it in hex, and it
> becomes the URL-pathname.  I don't see why you can't also do that with
> UPDATE.

theoretically we could, yes.

> (I'd add a message TCP-like length prefix, as you suggested, so the
> receiver knows it got the whole thing).
> 
> Maybe your point is that URL length becomes a problem?  We've all seen
> very long URLs I'm sure.

i'm not sure i've seen 64KB URL's.  i have seen 64KB UPDATE's.  but it's not 
the size that concerns me, rather the content-aware routers out there who may 
or may not respect our http cacheability headers.  we have no need of another 
layer of caching at the transport layer, especially if it means we have to 
translate our DNS TTL's into http expiration times.  and i don't know how to 
reliably avoid that caching on this data path if we use GET.

> Anyway, my preference for GET over POST is not that strong.

does anyone here have anecdotal evidence of POST being intercepted by a 
content aware router, or otherwise painfully middleboxed the way GET so often 
is?  at the moment i've got three weak reasons for preferring POST, but if any 
of the three is silly, they would not add up to a strong preference as they do 
(for me) at the moment.

paul

From alex@alex.org.uk  Mon Oct  3 11:28:54 2011
Return-Path: <alex@alex.org.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E52B21F8CAB for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 11:28:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.569
X-Spam-Level: 
X-Spam-Status: No, score=-2.569 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RUVhQnks7gmj for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 11:28:54 -0700 (PDT)
Received: from mail.avalus.com (mail.avalus.com [IPv6:2001:41c8:10:1dd::10]) by ietfa.amsl.com (Postfix) with ESMTP id 07EAA21F8C89 for <dnsext@ietf.org>; Mon,  3 Oct 2011 11:28:53 -0700 (PDT)
Received: from [192.168.100.16] (87-194-71-186.bethere.co.uk [87.194.71.186]) by mail.avalus.com (Postfix) with ESMTPSA id E5A44C56104; Mon,  3 Oct 2011 19:31:53 +0100 (BST)
Date: Mon, 03 Oct 2011 19:31:52 +0100
From: Alex Bligh <alex@alex.org.uk>
To: Paul Vixie <vixie@isc.org>, dnsext@ietf.org
Message-ID: <EA70785432657FDF8A31D31C@nimrod.local>
In-Reply-To: <201110031816.32959.vixie@isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110031713.20103.vixie@isc.org> <58EB32F9-08D2-4579-BC56-1423C00FC371@verisign.com> <201110031816.32959.vixie@isc.org>
X-Mailer: Mulberry/4.0.8 (Mac OS X)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Alex Bligh <alex@alex.org.uk>
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 18:28:54 -0000

--On 3 October 2011 18:16:32 +0000 Paul Vixie <vixie@isc.org> wrote:

> i'm not sure i've seen 64KB URL's.  i have seen 64KB UPDATE's.  but it's
> not  the size that concerns me, rather the content-aware routers out
> there who may  or may not respect our http cacheability headers.

I would also bet money that application layer interceptors of http
traffic are more likely to fail on 64KB GET URLs than 64KB POST.

I presume we could base64 encode POST data if we couldn't send it
binary, whereas IIRC we couldn't do much more than hex encode GET URLs.

So +1 for POST here, with body content as close to UDP message format
as possible, save that we should surely be able to junk a pile of UDP
restrictions (e.g. we can surely mandate EDNS, assume 'packet' size
can 2^32 bytes, etc.). I presume we also don't need UDP headers etc.

-- 
Alex Bligh

From vixie@isc.org  Mon Oct  3 11:38:39 2011
Return-Path: <vixie@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B05F021F8D4D for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 11:38:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ByJjrauAE4rs for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 11:38:39 -0700 (PDT)
Received: from nsa.vix.com (nsa.vix.com [IPv6:2001:4f8:3:30::3]) by ietfa.amsl.com (Postfix) with ESMTP id 3EC9121F8D2B for <dnsext@ietf.org>; Mon,  3 Oct 2011 11:38:39 -0700 (PDT)
Received: from nsa.vix.com (localhost [127.0.0.1]) by nsa.vix.com (Postfix) with ESMTP id 168B6A1058 for <dnsext@ietf.org>; Mon,  3 Oct 2011 18:41:42 +0000 (UTC) (envelope-from vixie@isc.org)
Received: from six.localnet (six.vix.com [IPv6:2001:4f8:3:30::2]) by nsa.vix.com (Postfix) with ESMTP id E4076A1021 for <dnsext@ietf.org>; Mon,  3 Oct 2011 18:41:41 +0000 (UTC) (envelope-from vixie@isc.org)
From: Paul Vixie <vixie@isc.org>
Organization: ISC
To: dnsext@ietf.org
Date: Mon, 3 Oct 2011 18:41:41 +0000
User-Agent: KMail/1.13.5 (FreeBSD/8.1-RELEASE; KDE/4.4.5; amd64; ; )
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110031816.32959.vixie@isc.org> <EA70785432657FDF8A31D31C@nimrod.local>
In-Reply-To: <EA70785432657FDF8A31D31C@nimrod.local>
MIME-Version: 1.0
Content-Type: Text/Plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <201110031841.41629.vixie@isc.org>
X-Virus-Scanned: ClamAV using ClamSMTP
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 18:38:39 -0000

On Monday, October 03, 2011 18:31:52 Alex Bligh wrote:
> I presume we could base64 encode POST data if we couldn't send it
> binary, whereas IIRC we couldn't do much more than hex encode GET URLs.

the ability to base64-encode POST data is part of the HTTP spec, so yes.  the 
response could also come back encoded that way.  this is supposed to be "just 
web traffic."

> So +1 for POST here, with body content as close to UDP message format
> as possible, save that we should surely be able to junk a pile of UDP
> restrictions (e.g. we can surely mandate EDNS, assume 'packet' size
> can 2^32 bytes, etc.). I presume we also don't need UDP headers etc.

i don't think we should overly constrain the message (like mandating EDNS) 
since this adds test cases to compliance suites and precludes future DNS 
protocol extensions that could be better than EDNS.

we would only include the DNS message, which UDP thinks of as a "payload";
not the transport or network headers.  also note, this isn't necessarily a 
tunneling protocol -- if it's used by a stub then there is no underlying UDP 
packet to pull anything from.  and where it is used as a tunneling protocol, 
the underlying DNS message could have arrived via TCP/53 or even HTTP.

paul

From suruti94@gmail.com  Mon Oct  3 12:19:44 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F71E21F8DF6 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 12:19:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DCf4QPZU87C4 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 12:19:43 -0700 (PDT)
Received: from mail-vw0-f44.google.com (mail-vw0-f44.google.com [209.85.212.44]) by ietfa.amsl.com (Postfix) with ESMTP id 7621821F8DF2 for <dnsext@ietf.org>; Mon,  3 Oct 2011 12:19:43 -0700 (PDT)
Received: by vws5 with SMTP id 5so4768874vws.31 for <dnsext@ietf.org>; Mon, 03 Oct 2011 12:22:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=KA+zT1JCYg9azbNo9wfA2JYfHVuvj32UI4veAuvhigg=; b=g+eonugDV1fzlrsUjhAFQ5vsJA3yatH7HLM6WVayoilFUhhGZOtJ7FxDxZhk+cR1Bi wXsRFC7ndwrQAPWsnJuSyNWiVUOuig9RldOupCEvhjyCVL2gti9AQ554gq2L/xb5JdOl 4nBKJdRGA3oxMvHAo8uDrrBVULF20kT+1+bck=
MIME-Version: 1.0
Received: by 10.68.19.2 with SMTP id a2mr3417718pbe.72.1317669765081; Mon, 03 Oct 2011 12:22:45 -0700 (PDT)
Received: by 10.68.46.200 with HTTP; Mon, 3 Oct 2011 12:22:44 -0700 (PDT)
In-Reply-To: <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com>
Date: Mon, 3 Oct 2011 12:22:44 -0700
Message-ID: <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Ted Hardie <ted.ietf@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 19:19:44 -0000

On Mon, Oct 3, 2011 at 10:32 AM, Ted Hardie <ted.ietf@gmail.com> wrote:
> On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman <paul.hoffman@vpnc.org> wro=
te:
>>
>> +1. The slight increase in programming difficulty of using POST vs. GET
>> buys you a huge amount of flexibility in queries. It's not just about
>> cache-prevention.
>>
>
> All silver linings have their clouds...=A0 The only unfortunate thing abo=
ut
> POST, in my view, is that the flexibility can trend you away from
> interoperability as people add and change things at=A0 different=A0 speed=
s at
> different hosts.=A0 If you want standard behavior the descending list goe=
s:
> New Method, GET, POST, at least in my view.
>
> Since new methods are notoriously hard to get deployed, POST seems like t=
he
> best choice if you want something that can handle any DNS operation.=A0 I=
f it
> is meant to be only retrieval, then I would personally say that keeping i=
t
> within GET is the best choice.
>
> I'm also increasingly of the opinion that this should have the validation
> bits sets by default.=A0 Allowing a web site to update the local DNS cach=
e for
> a client system by including a reference and a DNS result for the referen=
ce
> causes my paranoia to ratchet up a few notches.=A0 The only other defense
> against it I see is using Web results only in same-origin web contexts, a=
nd
> that's going to be very hard to make work.
>

I am not sure I understand this concern fully. I guess you mean that
you want to use this only with CD =3D1 which also implies that you want
to use only with DNSSEC . Though this is the primary use case that
this draft is trying to address, should we restrict it ? Previously,
your concern was cache poisoning of the HTTP proxies having an impact
on DNS. If we require HTTPS and POST, is this still a concern ?

-mohan

> Ted
>
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>
>

From ted.ietf@gmail.com  Mon Oct  3 13:22:27 2011
Return-Path: <ted.ietf@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FB0521F8DB5 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 13:22:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.505
X-Spam-Level: 
X-Spam-Status: No, score=-3.505 tagged_above=-999 required=5 tests=[AWL=0.093,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E1i13q+mbHxi for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 13:22:25 -0700 (PDT)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by ietfa.amsl.com (Postfix) with ESMTP id A9B1921F8D4F for <dnsext@ietf.org>; Mon,  3 Oct 2011 13:22:25 -0700 (PDT)
Received: by yxt33 with SMTP id 33so4855318yxt.31 for <dnsext@ietf.org>; Mon, 03 Oct 2011 13:25:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=vzeH9dDVX3ZTnvXnJ8gUySuLzefQyCZqQaCesv1svxI=; b=uckVYBcjFWwxa04LzQBkscLk4WD5yNoARfg0hBb9iW8rkJmUTZCVfKcZ0Hlg4qLXo9 DagLJYC3CaZTeZlrIG7Fwy5kpemsSEr3ZUiUg8XilMrrBmBO86DyTPs1YQtgI8yhFYi0 G5dCVNGwqzjNUiUu12I2J6e7F5L7ajHQOCdFM=
MIME-Version: 1.0
Received: by 10.236.127.144 with SMTP id d16mr2342327yhi.40.1317673528477; Mon, 03 Oct 2011 13:25:28 -0700 (PDT)
Received: by 10.236.105.169 with HTTP; Mon, 3 Oct 2011 13:25:27 -0700 (PDT)
In-Reply-To: <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com> <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com>
Date: Mon, 3 Oct 2011 13:25:27 -0700
Message-ID: <CA+9kkMDG3vpETecTHMCLdOf8SDpzum=vMC=mGBsSw5JaORMYig@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
To: Mohan Parthasarathy <suruti94@gmail.com>
Content-Type: multipart/alternative; boundary=20cf3010e3c598468004ae6ac644
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 20:22:27 -0000

--20cf3010e3c598468004ae6ac644
Content-Type: text/plain; charset=ISO-8859-1

On Mon, Oct 3, 2011 at 12:22 PM, Mohan Parthasarathy <suruti94@gmail.com>wrote:

> On Mon, Oct 3, 2011 at 10:32 AM, Ted Hardie <ted.ietf@gmail.com> wrote:
> > On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman <paul.hoffman@vpnc.org>
> wrote:
> >
> > I'm also increasingly of the opinion that this should have the validation
> > bits sets by default.  Allowing a web site to update the local DNS cache
> for
> > a client system by including a reference and a DNS result for the
> reference
> > causes my paranoia to ratchet up a few notches.  The only other defense
> > against it I see is using Web results only in same-origin web contexts,
> and
> > that's going to be very hard to make work.
> >
>
> I am not sure I understand this concern fully. I guess you mean that
> you want to use this only with CD =1 which also implies that you want
> to use only with DNSSEC . Though this is the primary use case that
> this draft is trying to address, should we restrict it ? Previously,
> your concern was cache poisoning of the HTTP proxies having an impact
> on DNS. If we require HTTPS and POST, is this still a concern ?
>
>
Well, I don't think you can functionally say that it can only be used with
DNSSEC at the protocol level; there's always the risk that you want to use
it for some zone that hasn't been signed.  But I think we're going to have
to strongly suggest that it should be used when DNSSEC validation can be
done and, if it has not been, how to handle the results with respect to the
local cache.

If I am a helpful web site with the ability to do this DNS return, I could
theoretically get slightly higher speed for web page loads by providing the
DNS data for the component loads along with the initial return.  If those
can be trusted because of DNSSEC validation, using the data and storing it
in the local cache for use by other applications (subject to TTL expiry
etc.) should be fine.  But if I cannot validate it, then I have to have some
other trust model for the data.  One potential model is to use (but likely
not store) data with the same origin as the web server from which I got it.
So if I land at financial.example.com, I use the data it gives me for
nasdaq.financial.example.com and sp500.financial.example.com, but not for
ftse.example.co.uk or, even worse, for social.network.com of
deposit.bank.com.

It's still a cache poisoning problem, but it is the local cache that might
be poisoned in this worry.

In the case where you are getting this from a 3rd party DNS provider which
supports HTTPS transport, the trust is presumably between you and that
provider.  That may be the initial use case.  But I'm guessing that once
this is available, other uses, included blended content/DNS returns will
occur.

regards,

Ted



-mohan
>
> > Ted
> >
> > _______________________________________________
> > dnsext mailing list
> > dnsext@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsext
> >
> >
>

--20cf3010e3c598468004ae6ac644
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

On Mon, Oct 3, 2011 at 12:22 PM, Mohan Parthasarathy <span dir=3D"ltr">&lt;=
<a href=3D"mailto:suruti94@gmail.com">suruti94@gmail.com</a>&gt;</span> wro=
te:<br><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div><div></div><div class=3D"h5">On Mon, Oct 3, 2011 at 10:32 AM, Ted Hard=
ie &lt;<a href=3D"mailto:ted.ietf@gmail.com">ted.ietf@gmail.com</a>&gt; wro=
te:<br>
&gt; On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman &lt;<a href=3D"mailto:pa=
ul.hoffman@vpnc.org">paul.hoffman@vpnc.org</a>&gt; wrote:<br>
&gt;<br>
&gt; I&#39;m also increasingly of the opinion that this should have the val=
idation<br>
&gt; bits sets by default.=A0 Allowing a web site to update the local DNS c=
ache for<br>
&gt; a client system by including a reference and a DNS result for the refe=
rence<br>
&gt; causes my paranoia to ratchet up a few notches.=A0 The only other defe=
nse<br>
&gt; against it I see is using Web results only in same-origin web contexts=
, and<br>
&gt; that&#39;s going to be very hard to make work.<br>
&gt;<br>
<br>
</div></div>I am not sure I understand this concern fully. I guess you mean=
 that<br>
you want to use this only with CD =3D1 which also implies that you want<br>
to use only with DNSSEC . Though this is the primary use case that<br>
this draft is trying to address, should we restrict it ? Previously,<br>
your concern was cache poisoning of the HTTP proxies having an impact<br>
on DNS. If we require HTTPS and POST, is this still a concern ?<br>
<br></blockquote><div><br>Well, I don&#39;t think you can functionally say =
that it can only be used with DNSSEC at the protocol level; there&#39;s alw=
ays the risk that you want to use it for some zone that hasn&#39;t been sig=
ned.=A0 But I think we&#39;re going to have to strongly suggest that it sho=
uld be used when DNSSEC validation can be done and, if it has not been, how=
 to handle the results with respect to the local cache.<br>
<br>If I am a helpful web site with the ability to do this DNS return, I co=
uld theoretically get slightly higher speed for web page loads by providing=
 the DNS data for the component loads along with the initial return.=A0 If =
those can be trusted because of DNSSEC validation, using the data and stori=
ng it in the local cache for use by other applications (subject to TTL expi=
ry etc.) should be fine.=A0 But if I cannot validate it, then I have to hav=
e some other trust model for the data.=A0 One potential model is to use (bu=
t likely not store) data with the same origin as the web server from which =
I got it.=A0 So if I land at <a href=3D"http://financial.example.com">finan=
cial.example.com</a>, I use the data it gives me for <a href=3D"http://nasd=
aq.financial.example.com">nasdaq.financial.example.com</a> and <a href=3D"h=
ttp://sp500.financial.example.com">sp500.financial.example.com</a>, but not=
 for <a href=3D"http://ftse.example.co.uk">ftse.example.co.uk</a> or, even =
worse, for <a href=3D"http://social.network.com">social.network.com</a> of =
<a href=3D"http://deposit.bank.com">deposit.bank.com</a>.<br>
<br>It&#39;s still a cache poisoning problem, but it is the local cache tha=
t might be poisoned in this worry.<br><br>In the case where you are getting=
 this from a 3rd party DNS provider which supports HTTPS transport, the tru=
st is presumably between you and that provider.=A0 That may be the initial =
use case.=A0 But I&#39;m guessing that once this is available, other uses, =
included blended content/DNS returns will occur.<br>
<br>regards,<br><br>Ted<br><br><br><br></div><blockquote class=3D"gmail_quo=
te" style=3D"margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204=
, 204); padding-left: 1ex;">
-mohan<br>
<br>
&gt; Ted<br>
<div><div></div><div class=3D"h5">&gt;<br>
&gt; _______________________________________________<br>
&gt; dnsext mailing list<br>
&gt; <a href=3D"mailto:dnsext@ietf.org">dnsext@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/dnsext" target=3D"_bl=
ank">https://www.ietf.org/mailman/listinfo/dnsext</a><br>
&gt;<br>
&gt;<br>
</div></div></blockquote></div><br>

--20cf3010e3c598468004ae6ac644--

From mohta@necom830.hpcl.titech.ac.jp  Mon Oct  3 14:55:45 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C106821F8E8C for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 14:55:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.036
X-Spam-Level: 
X-Spam-Status: No, score=-0.036 tagged_above=-999 required=5 tests=[AWL=0.054,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3YDWtUYoTqSW for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 14:55:45 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id C672B21F8E89 for <dnsext@ietf.org>; Mon,  3 Oct 2011 14:55:44 -0700 (PDT)
Received: (qmail 35670 invoked from network); 3 Oct 2011 22:13:25 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 3 Oct 2011 22:13:25 -0000
Message-ID: <4E8A3043.1060203@necom830.hpcl.titech.ac.jp>
Date: Tue, 04 Oct 2011 06:59:31 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: dnsext@ietf.org
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com> <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com>
In-Reply-To: <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 21:55:45 -0000

Mohan Parthasarathy wrote:

> Though this is the primary use case that
> this draft is trying to address,

The primary use case is not clear.

How can a client know an address of an HTTP server?

How can a client know secure time?

Both are important information of a use case.

						Masataka Ohta

From marka@isc.org  Mon Oct  3 17:13:36 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0C6B721F8F26 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 17:13:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2WirneynejAE for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 17:13:35 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id 784C321F8F24 for <dnsext@ietf.org>; Mon,  3 Oct 2011 17:13:31 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id B7952C9496; Tue,  4 Oct 2011 00:16:16 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 692AC216C36; Tue,  4 Oct 2011 00:16:13 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 7ED7C149063F; Tue,  4 Oct 2011 11:15:47 +1100 (EST)
To: Mohan Parthasarathy <suruti94@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com> <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com>
In-reply-to: Your message of "Mon, 03 Oct 2011 12:22:44 PDT." <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com>
Date: Tue, 04 Oct 2011 11:15:47 +1100
Message-Id: <20111004001547.7ED7C149063F@drugs.dv.isc.org>
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 00:13:36 -0000

In message <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com>, Mohan Parthasarathy writes:
> On Mon, Oct 3, 2011 at 10:32 AM, Ted Hardie <ted.ietf@gmail.com> wrote:
> > On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman <paul.hoffman@vpnc.org> wro=
> te:
> >>
> >> +1. The slight increase in programming difficulty of using POST vs. GET
> >> buys you a huge amount of flexibility in queries. It's not just about
> >> cache-prevention.
> >>
> >
> > All silver linings have their clouds...=A0 The only unfortunate thing abo=
> ut
> > POST, in my view, is that the flexibility can trend you away from
> > interoperability as people add and change things at=A0 different=A0 speed=
> s at
> > different hosts.=A0 If you want standard behavior the descending list goe=
> s:
> > New Method, GET, POST, at least in my view.
> >
> > Since new methods are notoriously hard to get deployed, POST seems like t=
> he
> > best choice if you want something that can handle any DNS operation.=A0 I=
> f it
> > is meant to be only retrieval, then I would personally say that keeping it
> > within GET is the best choice.
> >
> > I'm also increasingly of the opinion that this should have the validation
> > bits sets by default.=A0 Allowing a web site to update the local DNS cach=
> e for
> > a client system by including a reference and a DNS result for the referen=
> ce
> > causes my paranoia to ratchet up a few notches.=A0 The only other defense
> > against it I see is using Web results only in same-origin web contexts, a=
> nd
> > that's going to be very hard to make work.
> >
> 
> I am not sure I understand this concern fully. I guess you mean that
> you want to use this only with CD =3D1 which also implies that you want
> to use only with DNSSEC . Though this is the primary use case that
> this draft is trying to address, should we restrict it ? Previously,
> your concern was cache poisoning of the HTTP proxies having an impact
> on DNS. If we require HTTPS and POST, is this still a concern ?

DO=1 implies DNSSEC.  Stubs/forwarders SHOULD NOT set CD=1.  The
upstream validator needs to filter out the spoofed responses
on behalf of the stub/forwarder.

Also it is just a "DNS message".  UDP/TCP/HTTP/HTTPS is just the
transport for the DNS message.

> -mohan
> 
> > Ted
> >
> > _______________________________________________
> > dnsext mailing list
> > dnsext@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsext
> >
> >
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From suruti94@gmail.com  Mon Oct  3 19:32:54 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CAC821F8CC4 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 19:32:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JDopq7a7DoBW for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 19:32:53 -0700 (PDT)
Received: from mail-gx0-f172.google.com (mail-gx0-f172.google.com [209.85.161.172]) by ietfa.amsl.com (Postfix) with ESMTP id 8953B21F8CB5 for <dnsext@ietf.org>; Mon,  3 Oct 2011 19:32:53 -0700 (PDT)
Received: by ggnk3 with SMTP id k3so757717ggn.31 for <dnsext@ietf.org>; Mon, 03 Oct 2011 19:35:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=aTeXVENQ4oewLta6irCykCo4g4DFtqiiv2Ycavqw+Ow=; b=vJ0yjufPmkJiJ0PkNLb9UJHZ+YpM11rqxOaHngfwy6ppra8KEgYTHoE9M3eaw+GP6r mr8VEe1DsvuzjjKOkPtu24Qb/pGBxqAVaaxBVa5EojA7Vn9MqxayW09eRIrqKEkjlTvA u+dU0jSgnAO2StJBmULTOAb8lMJXCUDqn9GSM=
MIME-Version: 1.0
Received: by 10.68.9.104 with SMTP id y8mr5951732pba.21.1317695756666; Mon, 03 Oct 2011 19:35:56 -0700 (PDT)
Received: by 10.68.46.200 with HTTP; Mon, 3 Oct 2011 19:35:56 -0700 (PDT)
In-Reply-To: <20111004001547.7ED7C149063F@drugs.dv.isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com> <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com> <20111004001547.7ED7C149063F@drugs.dv.isc.org>
Date: Mon, 3 Oct 2011 19:35:56 -0700
Message-ID: <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 02:32:54 -0000

On Mon, Oct 3, 2011 at 5:15 PM, Mark Andrews <marka@isc.org> wrote:
>
> In message <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmai=
l.com>, Mohan Parthasarathy writes:
>> On Mon, Oct 3, 2011 at 10:32 AM, Ted Hardie <ted.ietf@gmail.com> wrote:
>> > On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman <paul.hoffman@vpnc.org> =
wro=3D
>> te:
>> >>
>> >> +1. The slight increase in programming difficulty of using POST vs. G=
ET
>> >> buys you a huge amount of flexibility in queries. It's not just about
>> >> cache-prevention.
>> >>
>> >
>> > All silver linings have their clouds...=3DA0 The only unfortunate thin=
g abo=3D
>> ut
>> > POST, in my view, is that the flexibility can trend you away from
>> > interoperability as people add and change things at=3DA0 different=3DA=
0 speed=3D
>> s at
>> > different hosts.=3DA0 If you want standard behavior the descending lis=
t goe=3D
>> s:
>> > New Method, GET, POST, at least in my view.
>> >
>> > Since new methods are notoriously hard to get deployed, POST seems lik=
e t=3D
>> he
>> > best choice if you want something that can handle any DNS operation.=
=3DA0 I=3D
>> f it
>> > is meant to be only retrieval, then I would personally say that keepin=
g it
>> > within GET is the best choice.
>> >
>> > I'm also increasingly of the opinion that this should have the validat=
ion
>> > bits sets by default.=3DA0 Allowing a web site to update the local DNS=
 cach=3D
>> e for
>> > a client system by including a reference and a DNS result for the refe=
ren=3D
>> ce
>> > causes my paranoia to ratchet up a few notches.=3DA0 The only other de=
fense
>> > against it I see is using Web results only in same-origin web contexts=
, a=3D
>> nd
>> > that's going to be very hard to make work.
>> >
>>
>> I am not sure I understand this concern fully. I guess you mean that
>> you want to use this only with CD =3D3D1 which also implies that you wan=
t
>> to use only with DNSSEC . Though this is the primary use case that
>> this draft is trying to address, should we restrict it ? Previously,
>> your concern was cache poisoning of the HTTP proxies having an impact
>> on DNS. If we require HTTPS and POST, is this still a concern ?
>
> DO=3D1 implies DNSSEC. =A0Stubs/forwarders SHOULD NOT set CD=3D1. =A0The
> upstream validator needs to filter out the spoofed responses
> on behalf of the stub/forwarder.
>
> Also it is just a "DNS message". =A0UDP/TCP/HTTP/HTTPS is just the
> transport for the DNS message.
>

If a validating stub resolver can set CD =3D 1 for UDP/TCP why not for
HTTP or HTTPS ?

-mohan

>> -mohan
>>
>> > Ted
>> >
>> > _______________________________________________
>> > dnsext mailing list
>> > dnsext@ietf.org
>> > https://www.ietf.org/mailman/listinfo/dnsext
>> >
>> >
>> _______________________________________________
>> dnsext mailing list
>> dnsext@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsext
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
c.org
>

From marka@isc.org  Mon Oct  3 19:52:23 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C96121F8CDC for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 19:52:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.001
X-Spam-Level: **
X-Spam-Status: No, score=2.001 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MANGLED_LIST=2.3, MANGLED_WANT=2.3]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5+fGhs29jQ6c for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 19:52:22 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id 2A21921F8C70 for <dnsext@ietf.org>; Mon,  3 Oct 2011 19:52:22 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id BCC325F98E9; Tue,  4 Oct 2011 02:55:10 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 75865216C56; Tue,  4 Oct 2011 02:55:07 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 504DD14924EC; Tue,  4 Oct 2011 13:55:02 +1100 (EST)
To: Mohan Parthasarathy <suruti94@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com> <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com> <20111004001547.7ED7C149063F@drugs.dv.isc.org> <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gmail.com>
In-reply-to: Your message of "Mon, 03 Oct 2011 19:35:56 PDT." <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gmail.com>
Date: Tue, 04 Oct 2011 13:55:02 +1100
Message-Id: <20111004025502.504DD14924EC@drugs.dv.isc.org>
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 02:52:23 -0000

In message <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gmail.com>
, Mohan Parthasarathy writes:
> On Mon, Oct 3, 2011 at 5:15 PM, Mark Andrews <marka@isc.org> wrote:
> >
> > In message <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmai=
> l.com>, Mohan Parthasarathy writes:
> >> On Mon, Oct 3, 2011 at 10:32 AM, Ted Hardie <ted.ietf@gmail.com> wrote:
> >> > On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman <paul.hoffman@vpnc.org> =
> wro=3D
> >> te:
> >> >>
> >> >> +1. The slight increase in programming difficulty of using POST vs. G=
> ET
> >> >> buys you a huge amount of flexibility in queries. It's not just about
> >> >> cache-prevention.
> >> >>
> >> >
> >> > All silver linings have their clouds...=3DA0 The only unfortunate thin=
> g abo=3D
> >> ut
> >> > POST, in my view, is that the flexibility can trend you away from
> >> > interoperability as people add and change things at=3DA0 different=3DA=
> 0 speed=3D
> >> s at
> >> > different hosts.=3DA0 If you want standard behavior the descending lis=
> t goe=3D
> >> s:
> >> > New Method, GET, POST, at least in my view.
> >> >
> >> > Since new methods are notoriously hard to get deployed, POST seems lik=
> e t=3D
> >> he
> >> > best choice if you want something that can handle any DNS operation.=
> =3DA0 I=3D
> >> f it
> >> > is meant to be only retrieval, then I would personally say that keepin=
> g it
> >> > within GET is the best choice.
> >> >
> >> > I'm also increasingly of the opinion that this should have the validat=
> ion
> >> > bits sets by default.=3DA0 Allowing a web site to update the local DNS=
>  cach=3D
> >> e for
> >> > a client system by including a reference and a DNS result for the refe=
> ren=3D
> >> ce
> >> > causes my paranoia to ratchet up a few notches.=3DA0 The only other de=
> fense
> >> > against it I see is using Web results only in same-origin web contexts=
> , a=3D
> >> nd
> >> > that's going to be very hard to make work.
> >> >
> >>
> >> I am not sure I understand this concern fully. I guess you mean that
> >> you want to use this only with CD =3D3D1 which also implies that you wan=
> t
> >> to use only with DNSSEC . Though this is the primary use case that
> >> this draft is trying to address, should we restrict it ? Previously,
> >> your concern was cache poisoning of the HTTP proxies having an impact
> >> on DNS. If we require HTTPS and POST, is this still a concern ?
> >
> > DO=3D1 implies DNSSEC. =A0Stubs/forwarders SHOULD NOT set CD=3D1. =A0The
> > upstream validator needs to filter out the spoofed responses
> > on behalf of the stub/forwarder.
> >
> > Also it is just a "DNS message". =A0UDP/TCP/HTTP/HTTPS is just the
> > transport for the DNS message.
> >
> 
> If a validating stub resolver can set CD =3D 1 for UDP/TCP why not for
> HTTP or HTTPS ?

A validating stub resolver really doesn't want to set CD=1, by
default.  If it gets SERVFAIL back to a CD=0 query then resending
with CD=1, may help if the SERVFAIL was a validation failure caused
by a bad clock on the recursive server / out of date trust anchors.
A stub resolver *needs* the upstream server to weed out the bogus
responses due to spoofing or, more likely, operational stuff ups
and only pass through those that pass validation.  Remember a stub
resolver does not have access to multiple authoritative sources,
only the recursive server does.  If you are willing to bet that
every response you get back is good then always set CD=1 otherwise
CD=1 should only be set if the CD=0 lookup fails.

> -mohan
> 
> >> -mohan
> >>
> >> > Ted
> >> >
> >> > _______________________________________________
> >> > dnsext mailing list
> >> > dnsext@ietf.org
> >> > https://www.ietf.org/mailman/listinfo/dnsext
> >> >
> >> >
> >> _______________________________________________
> >> dnsext mailing list
> >> dnsext@ietf.org
> >> https://www.ietf.org/mailman/listinfo/dnsext
> > --
> > Mark Andrews, ISC
> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
> c.org
> >
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From suruti94@gmail.com  Mon Oct  3 20:14:57 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2224921F8EE0 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 20:14:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.397
X-Spam-Level: **
X-Spam-Status: No, score=2.397 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MANGLED_LIST=2.3, MANGLED_WANT=2.3, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CL8ytoH4aToS for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 20:14:56 -0700 (PDT)
Received: from mail-gy0-f172.google.com (mail-gy0-f172.google.com [209.85.160.172]) by ietfa.amsl.com (Postfix) with ESMTP id 43FFD21F8EDF for <dnsext@ietf.org>; Mon,  3 Oct 2011 20:14:56 -0700 (PDT)
Received: by gyd12 with SMTP id 12so67922gyd.31 for <dnsext@ietf.org>; Mon, 03 Oct 2011 20:17:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=references:in-reply-to:mime-version:content-transfer-encoding :content-type:message-id:cc:x-mailer:from:subject:date:to; bh=qRB4W0qv2h9DsV/M2oyDWoUwwAIh4DUg/O5w3hplTwM=; b=j59X+SlF3qpAqSV/Dq6CDSk924jPOsx+xHSgtNLl7WiomsG97+NlRI81bIbHjdDHou s0gDTBD6LJo39h625W1uzBS5u1fa6mSA+WAlfbVymLxffu82a4ltEVL+Z9ap4RbgU5Of h3M9AvGFgELTEVbH9HzFh2mKlPHvqpizDHLlY=
Received: by 10.236.143.99 with SMTP id k63mr3672123yhj.64.1317698278959; Mon, 03 Oct 2011 20:17:58 -0700 (PDT)
Received: from [10.89.135.116] ([166.205.138.53]) by mx.google.com with ESMTPS id w70sm18148120yhk.6.2011.10.03.20.17.56 (version=TLSv1/SSLv3 cipher=OTHER); Mon, 03 Oct 2011 20:17:58 -0700 (PDT)
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com> <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com> <20111004001547.7ED7C149063F@drugs.dv.isc.org> <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gmail.com> <20111004025502.504DD14924EC@drugs.dv.isc.org>
In-Reply-To: <20111004025502.504DD14924EC@drugs.dv.isc.org>
Mime-Version: 1.0 (iPhone Mail 8L1)
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset=us-ascii
Message-Id: <F168B690-446E-4BFD-82F9-5031FF12BE27@gmail.com>
X-Mailer: iPhone Mail (8L1)
From: Mohan <suruti94@gmail.com>
Date: Mon, 3 Oct 2011 20:17:48 -0700
To: Mark Andrews <marka@isc.org>
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 03:14:57 -0000

On Oct 3, 2011, at 7:55 PM, Mark Andrews <marka@isc.org> wrote:

>=20
> In message <CACU5sD=3D2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gma=
il.com>
> , Mohan Parthasarathy writes:
>> On Mon, Oct 3, 2011 at 5:15 PM, Mark Andrews <marka@isc.org> wrote:
>>>=20
>>> In message <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gma=
i=3D
>> l.com>, Mohan Parthasarathy writes:
>>>> On Mon, Oct 3, 2011 at 10:32 AM, Ted Hardie <ted.ietf@gmail.com> wrote:=

>>>>> On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman <paul.hoffman@vpnc.org> =3D=

>> wro=3D3D
>>>> te:
>>>>>>=20
>>>>>> +1. The slight increase in programming difficulty of using POST vs. G=
=3D
>> ET
>>>>>> buys you a huge amount of flexibility in queries. It's not just about=

>>>>>> cache-prevention.
>>>>>>=20
>>>>>=20
>>>>> All silver linings have their clouds...=3D3DA0 The only unfortunate th=
in=3D
>> g abo=3D3D
>>>> ut
>>>>> POST, in my view, is that the flexibility can trend you away from
>>>>> interoperability as people add and change things at=3D3DA0 different=3D=
3DA=3D
>> 0 speed=3D3D
>>>> s at
>>>>> different hosts.=3D3DA0 If you want standard behavior the descending l=
is=3D
>> t goe=3D3D
>>>> s:
>>>>> New Method, GET, POST, at least in my view.
>>>>>=20
>>>>> Since new methods are notoriously hard to get deployed, POST seems lik=
=3D
>> e t=3D3D
>>>> he
>>>>> best choice if you want something that can handle any DNS operation.=3D=

>> =3D3DA0 I=3D3D
>>>> f it
>>>>> is meant to be only retrieval, then I would personally say that keepin=
=3D
>> g it
>>>>> within GET is the best choice.
>>>>>=20
>>>>> I'm also increasingly of the opinion that this should have the validat=
=3D
>> ion
>>>>> bits sets by default.=3D3DA0 Allowing a web site to update the local D=
NS=3D
>> cach=3D3D
>>>> e for
>>>>> a client system by including a reference and a DNS result for the refe=
=3D
>> ren=3D3D
>>>> ce
>>>>> causes my paranoia to ratchet up a few notches.=3D3DA0 The only other d=
e=3D
>> fense
>>>>> against it I see is using Web results only in same-origin web contexts=
=3D
>> , a=3D3D
>>>> nd
>>>>> that's going to be very hard to make work.
>>>>>=20
>>>>=20
>>>> I am not sure I understand this concern fully. I guess you mean that
>>>> you want to use this only with CD =3D3D3D1 which also implies that you w=
an=3D
>> t
>>>> to use only with DNSSEC . Though this is the primary use case that
>>>> this draft is trying to address, should we restrict it ? Previously,
>>>> your concern was cache poisoning of the HTTP proxies having an impact
>>>> on DNS. If we require HTTPS and POST, is this still a concern ?
>>>=20
>>> DO=3D3D1 implies DNSSEC. =3DA0Stubs/forwarders SHOULD NOT set CD=3D3D1. =3D=
A0The
>>> upstream validator needs to filter out the spoofed responses
>>> on behalf of the stub/forwarder.
>>>=20
>>> Also it is just a "DNS message". =3DA0UDP/TCP/HTTP/HTTPS is just the
>>> transport for the DNS message.
>>>=20
>>=20
>> If a validating stub resolver can set CD =3D3D 1 for UDP/TCP why not for
>> HTTP or HTTPS ?
>=20
> A validating stub resolver really doesn't want to set CD=3D1, by
> default.  If it gets SERVFAIL back to a CD=3D0 query then resending
> with CD=3D1, may help if the SERVFAIL was a validation failure caused
> by a bad clock on the recursive server / out of date trust anchors.
> A stub resolver *needs* the upstream server to weed out the bogus
> responses due to spoofing or, more likely, operational stuff ups
> and only pass through those that pass validation.  Remember a stub

Why does a validating stub resolver care ? If there was spoofing or other pr=
oblems, it can find out itself. It is much easier to set CD=3D1 always.=20

-mohan

> resolver does not have access to multiple authoritative sources,
> only the recursive server does.  If you are willing to bet that
> every response you get back is good then always set CD=3D1 otherwise
> CD=3D1 should only be set if the CD=3D0 lookup fails.
>=20
>> -mohan
>>=20
>>>> -mohan
>>>>=20
>>>>> Ted
>>>>>=20
>>>>> _______________________________________________
>>>>> dnsext mailing list
>>>>> dnsext@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/dnsext
>>>>>=20
>>>>>=20
>>>> _______________________________________________
>>>> dnsext mailing list
>>>> dnsext@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dnsext
>>> --
>>> Mark Andrews, ISC
>>> 1 Seymour St., Dundas Valley, NSW 2117, Australia
>>> PHONE: +61 2 9871 4742 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 I=
NTERNET: marka@is=3D
>> c.org
>>>=20
> --=20
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From marka@isc.org  Mon Oct  3 21:00:18 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1F5521F8EA0 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 21:00:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.149
X-Spam-Level: 
X-Spam-Status: No, score=-1.149 tagged_above=-999 required=5 tests=[AWL=0.850,  BAYES_00=-2.599, J_CHICKENPOX_13=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NhKrsyaW-m-T for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 21:00:18 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id C3F2921F8E82 for <dnsext@ietf.org>; Mon,  3 Oct 2011 21:00:17 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 6D5F8C94A6; Tue,  4 Oct 2011 04:03:02 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id EFA67216C56; Tue,  4 Oct 2011 04:03:01 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 324041492901; Tue,  4 Oct 2011 15:02:59 +1100 (EST)
To: Mohan <suruti94@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com> <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com> <20111004001547.7ED7C149063F@drugs.dv.isc.org> <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gmail.com> <20111004025502.504DD14924EC@drugs.dv.isc.org> <F168B690-446E-4BFD-82F9-5031FF12BE27@gmail.com>
In-reply-to: Your message of "Mon, 03 Oct 2011 20:17:48 PDT." <F168B690-446E-4BFD-82F9-5031FF12BE27@gmail.com>
Date: Tue, 04 Oct 2011 15:02:59 +1100
Message-Id: <20111004040259.324041492901@drugs.dv.isc.org>
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 04:00:18 -0000

In message <F168B690-446E-4BFD-82F9-5031FF12BE27@gmail.com>, Mohan writes:
> 
> 
> On Oct 3, 2011, at 7:55 PM, Mark Andrews <marka@isc.org> wrote:
> 
> > 
> > In message <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gma=
> il.com>
> > , Mohan Parthasarathy writes:
> >> On Mon, Oct 3, 2011 at 5:15 PM, Mark Andrews <marka@isc.org> wrote:
> >>> 
> >>> In message <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gma=
> i=
> >> l.com>, Mohan Parthasarathy writes:
> >>>> On Mon, Oct 3, 2011 at 10:32 AM, Ted Hardie <ted.ietf@gmail.com> wrote:=
> 
> >>>>> On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman <paul.hoffman@vpnc.org> =
> 3D=
> 
> >> wro=
> >>>> te:
> >>>>>> 
> >>>>>> +1. The slight increase in programming difficulty of using POST vs. G=
> =
> >> ET
> >>>>>> buys you a huge amount of flexibility in queries. It's not just about=
> 
> >>>>>> cache-prevention.
> >>>>>> 
> >>>>> 
> >>>>> All silver linings have their clouds...  The only unfortunate th=
> in=
> >> g abo=
> >>>> ut
> >>>>> POST, in my view, is that the flexibility can trend you away from
> >>>>> interoperability as people add and change things at  different=
> =
> 3DA=
> >> 0 speed=
> >>>> s at
> >>>>> different hosts.  If you want standard behavior the descending l=
> is=
> >> t goe=
> >>>> s:
> >>>>> New Method, GET, POST, at least in my view.
> >>>>> 
> >>>>> Since new methods are notoriously hard to get deployed, POST seems lik=
> =
> >> e t=
> >>>> he
> >>>>> best choice if you want something that can handle any DNS operation.=
> =
> 
> >>   I=
> >>>> f it
> >>>>> is meant to be only retrieval, then I would personally say that keepin=
> =
> >> g it
> >>>>> within GET is the best choice.
> >>>>> 
> >>>>> I'm also increasingly of the opinion that this should have the validat=
> =
> >> ion
> >>>>> bits sets by default.  Allowing a web site to update the local D=
> NS=
> >> cach=
> >>>> e for
> >>>>> a client system by including a reference and a DNS result for the refe=
> =
> >> ren=
> >>>> ce
> >>>>> causes my paranoia to ratchet up a few notches.  The only other d
> =
> e=
> >> fense
> >>>>> against it I see is using Web results only in same-origin web contexts=
> =
> >> , a=
> >>>> nd
> >>>>> that's going to be very hard to make work.
> >>>>> 
> >>>> 
> >>>> I am not sure I understand this concern fully. I guess you mean that
> >>>> you want to use this only with CD =1 which also implies that you w
> =
> an=
> >> t
> >>>> to use only with DNSSEC . Though this is the primary use case that
> >>>> this draft is trying to address, should we restrict it ? Previously,
> >>>> your concern was cache poisoning of the HTTP proxies having an impact
> >>>> on DNS. If we require HTTPS and POST, is this still a concern ?
> >>> 
> >>> DO=1 implies DNSSEC.  Stubs/forwarders SHOULD NOT set CD=1. =
> 3D=
> A0The
> >>> upstream validator needs to filter out the spoofed responses
> >>> on behalf of the stub/forwarder.
> >>> 
> >>> Also it is just a "DNS message". UDP/TCP/HTTP/HTTPS is just the
> >>> transport for the DNS message.
> >>> 
> >> 
> >> If a validating stub resolver can set CD = 1 for UDP/TCP why not for
> >> HTTP or HTTPS ?
> > 
> > A validating stub resolver really doesn't want to set CD=1, by
> > default.  If it gets SERVFAIL back to a CD=0 query then resending
> > with CD=1, may help if the SERVFAIL was a validation failure caused
> > by a bad clock on the recursive server / out of date trust anchors.
> > A stub resolver *needs* the upstream server to weed out the bogus
> > responses due to spoofing or, more likely, operational stuff ups
> > and only pass through those that pass validation.  Remember a stub
> 
> Why does a validating stub resolver care?

Say example.com is served by a DNSSEC aware authoritative server
(D) and a DNSSEC unaware authoritative server (P).  The stub resolver
asks for www.example.com/DO=1/CD=1.  The validating recurive server
get a answer from P (without DNSSEC records) and passes it on.
Validation fails.  The stub resolver asks for www.example.com/DO=1/CD=1
again and it gets the same answer (from thout DNSSEC records) the
CD=1 cache and again fails.  Rince, lather, repeat.

Now if the stub asks for www.example.com/DO=1/CD=0 the validating
resolver will reject any answers from P and only pass on answers
from D (with DNSSEC record) which should then validate.

Now if the recursive server doesn't validate or it validates as
insecure you are left with first senario hoping that you are getting
answers from the DNSSEC aware authoritative server.

What would help would be a EDNS option to send to the recursive
server the closest trust anchor(s) and current time so that it can
validate responses in a consistant manner to the stub resolver.

Mark

> If there was spoofing or other problems, it can find out itself.
> It is much easier to set CD=1 always.
>
> -mohan
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From suruti94@gmail.com  Mon Oct  3 21:40:51 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A3FC421F8F2B for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 21:40:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.299
X-Spam-Level: 
X-Spam-Status: No, score=-3.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G8rzFqzoICCf for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 21:40:50 -0700 (PDT)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by ietfa.amsl.com (Postfix) with ESMTP id 6F79E21F8F29 for <dnsext@ietf.org>; Mon,  3 Oct 2011 21:40:50 -0700 (PDT)
Received: by yxt33 with SMTP id 33so127107yxt.31 for <dnsext@ietf.org>; Mon, 03 Oct 2011 21:43:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=0oReWdodsbRMrBdQuHFEkhXuwOqMpyzrJ0+ae45s31M=; b=kWdkL6xj30LiVAqvbROtq7sQHbMoaGqyHeUAtLhWCbZorzAF4W6OlDuGVWNg7jHhvO 99117FLeLhcTXVSyXOsDUdoaEPlaoEvQQXG56WsHWNOdft0rqjlmipHy00Fi8SrOhU4c 43+2j8q7w+xkcUoCKJS6aEk4jQPrFYVrvh90I=
MIME-Version: 1.0
Received: by 10.68.32.130 with SMTP id j2mr6652261pbi.4.1317703433844; Mon, 03 Oct 2011 21:43:53 -0700 (PDT)
Received: by 10.68.46.200 with HTTP; Mon, 3 Oct 2011 21:43:53 -0700 (PDT)
In-Reply-To: <20111004040259.324041492901@drugs.dv.isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com> <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com> <20111004001547.7ED7C149063F@drugs.dv.isc.org> <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gmail.com> <20111004025502.504DD14924EC@drugs.dv.isc.org> <F168B690-446E-4BFD-82F9-5031FF12BE27@gmail.com> <20111004040259.324041492901@drugs.dv.isc.org>
Date: Mon, 3 Oct 2011 21:43:53 -0700
Message-ID: <CACU5sDnCB62cbBYW_E26fcmGuKU0+V_-BSeF=pjyvB2dyGw_Qw@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 04:40:51 -0000

On Mon, Oct 3, 2011 at 9:02 PM, Mark Andrews <marka@isc.org> wrote:
>
> In message <F168B690-446E-4BFD-82F9-5031FF12BE27@gmail.com>, Mohan writes=
:
>>
>>
>> On Oct 3, 2011, at 7:55 PM, Mark Andrews <marka@isc.org> wrote:
>>
>> >
>> > In message <CACU5sD=3D2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail=
.gma=3D
>> il.com>
>> > , Mohan Parthasarathy writes:
>> >> On Mon, Oct 3, 2011 at 5:15 PM, Mark Andrews <marka@isc.org> wrote:
>> >>>
>> >>> In message <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail=
.gma=3D
>> i=3D
>> >> l.com>, Mohan Parthasarathy writes:
>> >>>> On Mon, Oct 3, 2011 at 10:32 AM, Ted Hardie <ted.ietf@gmail.com> wr=
ote:=3D
>>
>> >>>>> On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman <paul.hoffman@vpnc.o=
rg> =3D
>> 3D=3D
>>
>> >> wro=3D
>> >>>> te:
>> >>>>>>
>> >>>>>> +1. The slight increase in programming difficulty of using POST v=
s. G=3D
>> =3D
>> >> ET
>> >>>>>> buys you a huge amount of flexibility in queries. It's not just a=
bout=3D
>>
>> >>>>>> cache-prevention.
>> >>>>>>
>> >>>>>
>> >>>>> All silver linings have their clouds... =A0The only unfortunate th=
=3D
>> in=3D
>> >> g abo=3D
>> >>>> ut
>> >>>>> POST, in my view, is that the flexibility can trend you away from
>> >>>>> interoperability as people add and change things at =A0different=
=3D
>> =3D
>> 3DA=3D
>> >> 0 speed=3D
>> >>>> s at
>> >>>>> different hosts. =A0If you want standard behavior the descending l=
=3D
>> is=3D
>> >> t goe=3D
>> >>>> s:
>> >>>>> New Method, GET, POST, at least in my view.
>> >>>>>
>> >>>>> Since new methods are notoriously hard to get deployed, POST seems=
 lik=3D
>> =3D
>> >> e t=3D
>> >>>> he
>> >>>>> best choice if you want something that can handle any DNS operatio=
n.=3D
>> =3D
>>
>> >> =A0 I=3D
>> >>>> f it
>> >>>>> is meant to be only retrieval, then I would personally say that ke=
epin=3D
>> =3D
>> >> g it
>> >>>>> within GET is the best choice.
>> >>>>>
>> >>>>> I'm also increasingly of the opinion that this should have the val=
idat=3D
>> =3D
>> >> ion
>> >>>>> bits sets by default. =A0Allowing a web site to update the local D=
=3D
>> NS=3D
>> >> cach=3D
>> >>>> e for
>> >>>>> a client system by including a reference and a DNS result for the =
refe=3D
>> =3D
>> >> ren=3D
>> >>>> ce
>> >>>>> causes my paranoia to ratchet up a few notches. =A0The only other =
d
>> =3D
>> e=3D
>> >> fense
>> >>>>> against it I see is using Web results only in same-origin web cont=
exts=3D
>> =3D
>> >> , a=3D
>> >>>> nd
>> >>>>> that's going to be very hard to make work.
>> >>>>>
>> >>>>
>> >>>> I am not sure I understand this concern fully. I guess you mean tha=
t
>> >>>> you want to use this only with CD =3D1 which also implies that you =
w
>> =3D
>> an=3D
>> >> t
>> >>>> to use only with DNSSEC . Though this is the primary use case that
>> >>>> this draft is trying to address, should we restrict it ? Previously=
,
>> >>>> your concern was cache poisoning of the HTTP proxies having an impa=
ct
>> >>>> on DNS. If we require HTTPS and POST, is this still a concern ?
>> >>>
>> >>> DO=3D1 implies DNSSEC. =A0Stubs/forwarders SHOULD NOT set CD=3D1. =
=3D
>> 3D=3D
>> A0The
>> >>> upstream validator needs to filter out the spoofed responses
>> >>> on behalf of the stub/forwarder.
>> >>>
>> >>> Also it is just a "DNS message". UDP/TCP/HTTP/HTTPS is just the
>> >>> transport for the DNS message.
>> >>>
>> >>
>> >> If a validating stub resolver can set CD =3D 1 for UDP/TCP why not fo=
r
>> >> HTTP or HTTPS ?
>> >
>> > A validating stub resolver really doesn't want to set CD=3D1, by
>> > default. =A0If it gets SERVFAIL back to a CD=3D0 query then resending
>> > with CD=3D1, may help if the SERVFAIL was a validation failure caused
>> > by a bad clock on the recursive server / out of date trust anchors.
>> > A stub resolver *needs* the upstream server to weed out the bogus
>> > responses due to spoofing or, more likely, operational stuff ups
>> > and only pass through those that pass validation. =A0Remember a stub
>>
>> Why does a validating stub resolver care?
>
> Say example.com is served by a DNSSEC aware authoritative server
> (D) and a DNSSEC unaware authoritative server (P). =A0The stub resolver

Isn't this a broken configuration ? Why do we end up with this configuratio=
n ?

> asks for www.example.com/DO=3D1/CD=3D1. =A0The validating recurive server
> get a answer from P (without DNSSEC records) and passes it on.
> Validation fails. =A0The stub resolver asks for www.example.com/DO=3D1/CD=
=3D1
> again and it gets the same answer (from thout DNSSEC records) the
> CD=3D1 cache and again fails. =A0Rince, lather, repeat.
>
> Now if the stub asks for www.example.com/DO=3D1/CD=3D0 the validating
> resolver will reject any answers from P and only pass on answers
> from D (with DNSSEC record) which should then validate.
>
So, this is a validating resolver, sets CD=3D0 (ignoring what is said in
RFC 4035), gets the "proper" responses, ignores the AD bit,
validates the responses. Is this discussed in any document ?

> Now if the recursive server doesn't validate or it validates as
> insecure you are left with first senario hoping that you are getting
> answers from the DNSSEC aware authoritative server.
>
> What would help would be a EDNS option to send to the recursive
> server the closest trust anchor(s) and current time so that it can
> validate responses in a consistant manner to the stub resolver.
>

This seems complex to me. Perhaps, the operational document should say
that a dnssec signed zone should be served only by dnssec aware
authoritative servers. If there is still an operational error, the
validating resolver should just give up. For example, if i set
DO=3D1/CD=3D1 and there are no RRSIGS, then abort and declare insecure.

-mohan

> Mark
>
>> If there was spoofing or other problems, it can find out itself.
>> It is much easier to set CD=3D1 always.
>>
>> -mohan
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
c.org
>

From marka@isc.org  Mon Oct  3 22:21:42 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18DA521F8F37 for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 22:21:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.649
X-Spam-Level: 
X-Spam-Status: No, score=-1.649 tagged_above=-999 required=5 tests=[AWL=0.350,  BAYES_00=-2.599, J_CHICKENPOX_13=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X62HsuyKB3Xi for <dnsext@ietfa.amsl.com>; Mon,  3 Oct 2011 22:21:41 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id CDDC821F8F5C for <dnsext@ietf.org>; Mon,  3 Oct 2011 22:21:40 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id CA286C9422; Tue,  4 Oct 2011 05:24:14 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 20416216C33; Tue,  4 Oct 2011 05:24:14 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id D92451492DC2; Tue,  4 Oct 2011 16:24:09 +1100 (EST)
To: Mohan Parthasarathy <suruti94@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com> <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com> <20111004001547.7ED7C149063F@drugs.dv.isc.org> <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gmail.com> <20111004025502.504DD14924EC@drugs.dv.isc.org> <F168B690-446E-4BFD-82F9-5031FF12BE27@gmail.com> <20111004040259.324041492901@drugs.dv.isc.org> <CACU5sDnCB62cbBYW_E26fcmGuKU0+V_-BSeF=pjyvB2dyGw_Qw@mail.gmail.com>
In-reply-to: Your message of "Mon, 03 Oct 2011 21:43:53 PDT." <CACU5sDnCB62cbBYW_E26fcmGuKU0+V_-BSeF=pjyvB2dyGw_Qw@mail.gmail.com>
Date: Tue, 04 Oct 2011 16:24:09 +1100
Message-Id: <20111004052409.D92451492DC2@drugs.dv.isc.org>
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 05:21:42 -0000

In message <CACU5sDnCB62cbBYW_E26fcmGuKU0+V_-BSeF=pjyvB2dyGw_Qw@mail.gmail.com>, Mohan Parthasarathy writes:
> On Mon, Oct 3, 2011 at 9:02 PM, Mark Andrews <marka@isc.org> wrote:
> >
> > In message <F168B690-446E-4BFD-82F9-5031FF12BE27@gmail.com>, Mohan writes=
> :
> >>
> >>
> >> On Oct 3, 2011, at 7:55 PM, Mark Andrews <marka@isc.org> wrote:
> >>
> >> >
> >> > In message <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail=
> .gma=
> >> il.com>
> >> > , Mohan Parthasarathy writes:
> >> >> On Mon, Oct 3, 2011 at 5:15 PM, Mark Andrews <marka@isc.org> wrote:
> >> >>>
> >> >>> In message <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail=
> .gma=
> >> i=
> >> >> l.com>, Mohan Parthasarathy writes:
> >> >>>> On Mon, Oct 3, 2011 at 10:32 AM, Ted Hardie <ted.ietf@gmail.com> wr=
> ote:=
> >>
> >> >>>>> On Mon, Oct 3, 2011 at 10:21 AM, Paul Hoffman <paul.hoffman@vpnc.o=
> rg> =
> >> 3D=
> >>
> >> >> wro=
> >> >>>> te:
> >> >>>>>>
> >> >>>>>> +1. The slight increase in programming difficulty of using POST v=
> s. G=
> >> =
> >> >> ET
> >> >>>>>> buys you a huge amount of flexibility in queries. It's not just a=
> bout=
> >>
> >> >>>>>> cache-prevention.
> >> >>>>>>
> >> >>>>>
> >> >>>>> All silver linings have their clouds...  The only unfortunate th=
> =
> >> in=
> >> >> g abo=
> >> >>>> ut
> >> >>>>> POST, in my view, is that the flexibility can trend you away from
> >> >>>>> interoperability as people add and change things at  different=
> =
> >> =
> >> 3DA=
> >> >> 0 speed=
> >> >>>> s at
> >> >>>>> different hosts.  If you want standard behavior the descending l=
> =
> >> is=
> >> >> t goe=
> >> >>>> s:
> >> >>>>> New Method, GET, POST, at least in my view.
> >> >>>>>
> >> >>>>> Since new methods are notoriously hard to get deployed, POST seems=
>  lik=
> >> =
> >> >> e t=
> >> >>>> he
> >> >>>>> best choice if you want something that can handle any DNS operatio=
> n.=
> >> =
> >>
> >> >>   I=
> >> >>>> f it
> >> >>>>> is meant to be only retrieval, then I would personally say that ke=
> epin=
> >> =
> >> >> g it
> >> >>>>> within GET is the best choice.
> >> >>>>>
> >> >>>>> I'm also increasingly of the opinion that this should have the val=
> idat=
> >> =
> >> >> ion
> >> >>>>> bits sets by default.  Allowing a web site to update the local D=
> =
> >> NS=
> >> >> cach=
> >> >>>> e for
> >> >>>>> a client system by including a reference and a DNS result for the =
> refe=
> >> =
> >> >> ren=
> >> >>>> ce
> >> >>>>> causes my paranoia to ratchet up a few notches.  The only other =
> d
> >> =
> >> e=
> >> >> fense
> >> >>>>> against it I see is using Web results only in same-origin web cont=
> exts=
> >> =
> >> >> , a=
> >> >>>> nd
> >> >>>>> that's going to be very hard to make work.
> >> >>>>>
> >> >>>>
> >> >>>> I am not sure I understand this concern fully. I guess you mean tha=
> t
> >> >>>> you want to use this only with CD =1 which also implies that you =
> w
> >> =
> >> an=
> >> >> t
> >> >>>> to use only with DNSSEC . Though this is the primary use case that
> >> >>>> this draft is trying to address, should we restrict it ? Previously=
> ,
> >> >>>> your concern was cache poisoning of the HTTP proxies having an impa=
> ct
> >> >>>> on DNS. If we require HTTPS and POST, is this still a concern ?
> >> >>>
> >> >>> DO=1 implies DNSSEC.  Stubs/forwarders SHOULD NOT set CD=1. =
> =
> >> 3D=
> >> A0The
> >> >>> upstream validator needs to filter out the spoofed responses
> >> >>> on behalf of the stub/forwarder.
> >> >>>
> >> >>> Also it is just a "DNS message". UDP/TCP/HTTP/HTTPS is just the
> >> >>> transport for the DNS message.
> >> >>>
> >> >>
> >> >> If a validating stub resolver can set CD = 1 for UDP/TCP why not fo=
> r
> >> >> HTTP or HTTPS ?
> >> >
> >> > A validating stub resolver really doesn't want to set CD=1, by
> >> > default.  If it gets SERVFAIL back to a CD=0 query then resending
> >> > with CD=1, may help if the SERVFAIL was a validation failure caused
> >> > by a bad clock on the recursive server / out of date trust anchors.
> >> > A stub resolver *needs* the upstream server to weed out the bogus
> >> > responses due to spoofing or, more likely, operational stuff ups
> >> > and only pass through those that pass validation.  Remember a stub
> >>
> >> Why does a validating stub resolver care?
> >
> > Say example.com is served by a DNSSEC aware authoritative server
> > (D) and a DNSSEC unaware authoritative server (P).  The stub resolver
> 
> Isn't this a broken configuration ? Why do we end up with this configuratio=
> n ?

Because people make mistakes.  I've definitely seen this sort of
configuration error. Remember this misconfiguration is indistigishable
from a spoof attack.  Validators are expected to cope with spoof
attacks.  They are not expected to cope with MITM attacks other
than to reject the bogus answers.

> > asks for www.example.com/DO=1/CD=1.  The validating recurive server
> > get a answer from P (without DNSSEC records) and passes it on.
> > Validation fails.  The stub resolver asks for www.example.com/DO=1/CD=
> =1
> > again and it gets the same answer (from thout DNSSEC records) the
> > CD=1 cache and again fails.  Rince, lather, repeat.
> >
> > Now if the stub asks for www.example.com/DO=1/CD=0 the validating
> > resolver will reject any answers from P and only pass on answers
> > from D (with DNSSEC record) which should then validate.
>
> So, this is a validating resolver, sets CD=0 (ignoring what is said in
> RFC 4035), gets the "proper" responses, ignores the AD bit,
> validates the responses. Is this discussed in any document ?

No, its not ignoring what is said in RFC 4035, CD=1 is a SHOULD
(4.9.2).  In this case I'm recommending that defaulting to CD=0 as
the default is what should be done and falling back to CD=1 in
SERVFAIL is what should be done.  AD should be ignored by a validating
stub resolver.  It's for stubs that trust the resolver, not stubs
that validate.

As for whether this is documented anywhere, apart from the archive
of this list and dns/dnssec lists I doubt it.  I've definitely
mentioned this before.  Mike St John's discussion of CD/DO setting
is similar in nature if I'm remembering it correctly.

Remember when RFC 4035 was written there was very little experience
with validating stub resolvers.  There still isn't much but defaulting
to CD=1 is clearly wrong.  Making stub validating resolvers work
well may still require more work or what we have may be "good
enough".

> > Now if the recursive server doesn't validate or it validates as
> > insecure you are left with first senario hoping that you are getting
> > answers from the DNSSEC aware authoritative server.
> >
> > What would help would be a EDNS option to send to the recursive
> > server the closest trust anchor(s) and current time so that it can
> > validate responses in a consistant manner to the stub resolver.
> 
> This seems complex to me. Perhaps, the operational document should say
> that a dnssec signed zone should be served only by dnssec aware
> authoritative servers. If there is still an operational error, the
> validating resolver should just give up. For example, if i set
> DO=1/CD=1 and there are no RRSIGS, then abort and declare insecure.

Except you can't do that most of the time because there could be a
zone cut that makes that name insecure.

Mark

> -mohan
> 
> > Mark
> >
> >> If there was spoofing or other problems, it can find out itself.
> >> It is much easier to set CD=1 always.
> >>
> >> -mohan
> > --
> > Mark Andrews, ISC
> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > PHONE: +61 2 9871 4742   =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
> c.org
> >
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From fanf2@hermes.cam.ac.uk  Tue Oct  4 04:01:42 2011
Return-Path: <fanf2@hermes.cam.ac.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B67A21F8C34 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 04:01:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.585
X-Spam-Level: 
X-Spam-Status: No, score=-6.585 tagged_above=-999 required=5 tests=[AWL=0.014,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DsuyloEfICDz for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 04:01:41 -0700 (PDT)
Received: from ppsw-51.csi.cam.ac.uk (ppsw-51.csi.cam.ac.uk [131.111.8.151]) by ietfa.amsl.com (Postfix) with ESMTP id 1F0DE21F8B16 for <dnsext@ietf.org>; Tue,  4 Oct 2011 04:01:40 -0700 (PDT)
X-Cam-AntiVirus: no malware found
X-Cam-SpamDetails: not scanned
X-Cam-ScannerInfo: http://www.cam.ac.uk/cs/email/scanner/
Received: from hermes-2.csi.cam.ac.uk ([131.111.8.54]:56393) by ppsw-51.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.158]:25) with esmtpa (EXTERNAL:fanf2) id 1RB2ni-0001D3-WQ (Exim 4.72) (return-path <fanf2@hermes.cam.ac.uk>); Tue, 04 Oct 2011 12:04:42 +0100
Received: from fanf2 (helo=localhost) by hermes-2.csi.cam.ac.uk (hermes.cam.ac.uk) with local-esmtp id 1RB2ni-0001oN-1O (Exim 4.67) (return-path <fanf2@hermes.cam.ac.uk>); Tue, 04 Oct 2011 12:04:42 +0100
Date: Tue, 4 Oct 2011 12:04:42 +0100
From: Tony Finch <dot@dotat.at>
X-X-Sender: fanf2@hermes-2.csi.cam.ac.uk
To: Alex Bligh <alex@alex.org.uk>
In-Reply-To: <EA70785432657FDF8A31D31C@nimrod.local>
Message-ID: <alpine.LSU.2.00.1110041159200.16577@hermes-2.csi.cam.ac.uk>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110031713.20103.vixie@isc.org> <58EB32F9-08D2-4579-BC56-1423C00FC371@verisign.com> <201110031816.32959.vixie@isc.org> <EA70785432657FDF8A31D31C@nimrod.local>
User-Agent: Alpine 2.00 (LSU 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: Tony Finch <fanf2@hermes.cam.ac.uk>
Cc: Paul Vixie <vixie@isc.org>, dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 11:01:42 -0000

Alex Bligh <alex@alex.org.uk> wrote:
>
> I presume we could base64 encode POST data if we couldn't send it
> binary, whereas IIRC we couldn't do much more than hex encode GET URLs.

You can send it in binary, otherwise multipart/form-data file uploads
would not work.

> So +1 for POST here, with body content as close to UDP message format
> as possible,

Yes.

> save that we should surely be able to junk a pile of UDP restrictions
> (e.g. we can surely mandate EDNS, assume 'packet' size can 2^32 bytes,
> etc.).

You can't increase the DNS message size beyond 64KB.

Tony.
-- 
f.anthony.n.finch  <dot@dotat.at>  http://dotat.at/
Portland, Plymouth: Southwest 4 or 5, increasing 6 at times. Moderate,
occasionally rough later in Plymouth. Occasional drizzle, fog patches for a
time. Moderate or good, occasionally very poor.

From alex@alex.org.uk  Tue Oct  4 04:37:56 2011
Return-Path: <alex@alex.org.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F41821F8562 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 04:37:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.574
X-Spam-Level: 
X-Spam-Status: No, score=-2.574 tagged_above=-999 required=5 tests=[AWL=0.025,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CKNwv3udfr8b for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 04:37:55 -0700 (PDT)
Received: from mail.avalus.com (mail.avalus.com [IPv6:2001:41c8:10:1dd::10]) by ietfa.amsl.com (Postfix) with ESMTP id 4FE6D21F84F5 for <dnsext@ietf.org>; Tue,  4 Oct 2011 04:37:50 -0700 (PDT)
Received: from [192.168.100.15] (87-194-71-186.bethere.co.uk [87.194.71.186]) by mail.avalus.com (Postfix) with ESMTPSA id BA34CC56102; Tue,  4 Oct 2011 12:40:51 +0100 (BST)
Date: Tue, 04 Oct 2011 12:40:50 +0100
From: Alex Bligh <alex@alex.org.uk>
To: Tony Finch <dot@dotat.at>
Message-ID: <0D33DC3D0533F844E21BE63E@Ximines.local>
In-Reply-To: <alpine.LSU.2.00.1110041159200.16577@hermes-2.csi.cam.ac.uk>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110031713.20103.vixie@isc.org> <58EB32F9-08D2-4579-BC56-1423C00FC371@verisign.com> <201110031816.32959.vixie@isc.org> <EA70785432657FDF8A31D31C@nimrod.local> <alpine.LSU.2.00.1110041159200.16577@hermes-2.csi.cam.ac.uk>
X-Mailer: Mulberry/4.0.8 (Mac OS X)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Cc: Paul Vixie <vixie@isc.org>, dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Alex Bligh <alex@alex.org.uk>
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 11:37:56 -0000

--On 4 October 2011 12:04:42 +0100 Tony Finch <dot@dotat.at> wrote:

> You can't increase the DNS message size beyond 64KB.

I was under the (mis) apprehension that was a UDP limitation, and that
large AFXRs could exceed 64KB. Live and learn.

-- 
Alex Bligh

From fanf2@hermes.cam.ac.uk  Tue Oct  4 04:46:58 2011
Return-Path: <fanf2@hermes.cam.ac.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96BEA21F8B07 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 04:46:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.586
X-Spam-Level: 
X-Spam-Status: No, score=-6.586 tagged_above=-999 required=5 tests=[AWL=0.013,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V-EB9xT11h1E for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 04:46:58 -0700 (PDT)
Received: from ppsw-51.csi.cam.ac.uk (ppsw-51.csi.cam.ac.uk [131.111.8.151]) by ietfa.amsl.com (Postfix) with ESMTP id E365421F848E for <dnsext@ietf.org>; Tue,  4 Oct 2011 04:46:57 -0700 (PDT)
X-Cam-AntiVirus: no malware found
X-Cam-SpamDetails: not scanned
X-Cam-ScannerInfo: http://www.cam.ac.uk/cs/email/scanner/
Received: from hermes-2.csi.cam.ac.uk ([131.111.8.54]:44980) by ppsw-51.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.158]:25) with esmtpa (EXTERNAL:fanf2) id 1RB3VT-0006V2-Y7 (Exim 4.72) (return-path <fanf2@hermes.cam.ac.uk>); Tue, 04 Oct 2011 12:49:55 +0100
Received: from fanf2 (helo=localhost) by hermes-2.csi.cam.ac.uk (hermes.cam.ac.uk) with local-esmtp id 1RB3VT-0001Ox-IE (Exim 4.67) (return-path <fanf2@hermes.cam.ac.uk>); Tue, 04 Oct 2011 12:49:55 +0100
Date: Tue, 4 Oct 2011 12:49:55 +0100
From: Tony Finch <dot@dotat.at>
X-X-Sender: fanf2@hermes-2.csi.cam.ac.uk
To: Alex Bligh <alex@alex.org.uk>
In-Reply-To: <0D33DC3D0533F844E21BE63E@Ximines.local>
Message-ID: <alpine.LSU.2.00.1110041248490.16577@hermes-2.csi.cam.ac.uk>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110031713.20103.vixie@isc.org> <58EB32F9-08D2-4579-BC56-1423C00FC371@verisign.com> <201110031816.32959.vixie@isc.org> <EA70785432657FDF8A31D31C@nimrod.local> <alpine.LSU.2.00.1110041159200.16577@hermes-2.csi.cam.ac.uk> <0D33DC3D0533F844E21BE63E@Ximines.local>
User-Agent: Alpine 2.00 (LSU 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: Tony Finch <fanf2@hermes.cam.ac.uk>
Cc: Paul Vixie <vixie@isc.org>, dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 11:46:58 -0000

Alex Bligh <alex@alex.org.uk> wrote:
> --On 4 October 2011 12:04:42 +0100 Tony Finch <dot@dotat.at> wrote:
>
> > You can't increase the DNS message size beyond 64KB.
>
> I was under the (mis) apprehension that was a UDP limitation, and that
> large AFXRs could exceed 64KB. Live and learn.

DNS over TCP has the same limit. If we want to maximise compatibility with
existing DNS code we shouldn't change it.

Tony.
-- 
f.anthony.n.finch  <dot@dotat.at>  http://dotat.at/
Rockall, Malin: Southwesterly 5 to 7, occasionally gale 8. Very rough or high.
Squally showers, rain later. Moderate or poor, occasionally good.

From mansaxel@besserwisser.org  Tue Oct  4 05:52:25 2011
Return-Path: <mansaxel@besserwisser.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DC7E21F8B8F for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 05:52:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.3
X-Spam-Level: 
X-Spam-Status: No, score=-2.3 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KBDIAYs5embG for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 05:52:24 -0700 (PDT)
Received: from jaja.besserwisser.org (jaja.besserwisser.org [IPv6:2a01:298:4:0:211:43ff:fe36:1299]) by ietfa.amsl.com (Postfix) with ESMTP id 94A0921F8B81 for <dnsext@ietf.org>; Tue,  4 Oct 2011 05:52:23 -0700 (PDT)
Received: by jaja.besserwisser.org (Postfix, from userid 1004) id B11B1A1EE; Tue,  4 Oct 2011 14:55:24 +0200 (CEST)
Date: Tue, 4 Oct 2011 14:55:24 +0200
From: =?utf-8?B?TcOlbnM=?= Nilsson <mansaxel@besserwisser.org>
To: Alex Bligh <alex@alex.org.uk>
Message-ID: <20111004125524.GI12306@besserwisser.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110031713.20103.vixie@isc.org> <58EB32F9-08D2-4579-BC56-1423C00FC371@verisign.com> <201110031816.32959.vixie@isc.org> <EA70785432657FDF8A31D31C@nimrod.local> <alpine.LSU.2.00.1110041159200.16577@hermes-2.csi.cam.ac.uk> <0D33DC3D0533F844E21BE63E@Ximines.local>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="6b3yLyRKT1M6kiA0"
Content-Disposition: inline
In-Reply-To: <0D33DC3D0533F844E21BE63E@Ximines.local>
X-URL: http://vvv.besserwisser.org
X-Purpose: More of everything NOW!
X-happyness: Life is good.
User-Agent: Mutt/1.5.20 (2009-06-14)
Cc: Paul Vixie <vixie@isc.org>, dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 12:52:25 -0000

--6b3yLyRKT1M6kiA0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt Date: Tue, Oct 04, 2=
011 at 12:40:50PM +0100 Quoting Alex Bligh (alex@alex.org.uk):
>=20
>=20
> --On 4 October 2011 12:04:42 +0100 Tony Finch <dot@dotat.at> wrote:
>=20
> >You can't increase the DNS message size beyond 64KB.
>=20
> I was under the (mis) apprehension that was a UDP limitation, and that
> large AFXRs could exceed 64KB. Live and learn.

I've done AXFRen of 1/2 GB zones. Not practical, but doable. The 64K
limit does not apply to AXFR, but, then again, AXFR is not like the
other children...

--=20
M=C3=A5ns Nilsson     primary/secondary/besserwisser/machina
MN-1334-RIPE                             +46 705 989668
Is it NOUVELLE CUISINE when 3 olives are struggling with a scallop in a
plate of SAUCE MORNAY?

--6b3yLyRKT1M6kiA0
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk6LAjwACgkQ02/pMZDM1cWDmgCdHd1L/1uUBeaptCzQeDH+jMg5
N9sAniE156hPeFArg8SGSMBZo1lEKQLN
=GSoA
-----END PGP SIGNATURE-----

--6b3yLyRKT1M6kiA0--

From marka@isc.org  Tue Oct  4 07:07:11 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3656921F8B6E for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 07:07:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.869
X-Spam-Level: 
X-Spam-Status: No, score=-1.869 tagged_above=-999 required=5 tests=[AWL=0.430,  BAYES_00=-2.599, MIME_8BIT_HEADER=0.3]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QldPuxGT2JqI for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 07:07:10 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id B3F6521F8AFB for <dnsext@ietf.org>; Tue,  4 Oct 2011 07:07:10 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 140155F988D; Tue,  4 Oct 2011 14:09:54 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id DBBB2216C33; Tue,  4 Oct 2011 14:09:51 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 78825149C52E; Wed,  5 Oct 2011 01:09:48 +1100 (EST)
To: =?utf-8?B?TcOlbnM=?= Nilsson <mansaxel@besserwisser.org>
From: Mark Andrews <marka@isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110031713.20103.vixie@isc.org> <58EB32F9-08D2-4579-BC56-1423C00FC371@verisign.com> <201110031816.32959.vixie@isc.org> <EA70785432657FDF8A31D31C@nimrod.local> <alpine.LSU.2.00.1110041159200.16577@hermes-2.csi.cam.ac.uk> <0D33DC3D0533F844E21BE63E@Ximines.local> <20111004125524.GI12306@besserwisser.org>
In-reply-to: Your message of "Tue, 04 Oct 2011 14:55:24 +0200." <20111004125524.GI12306@besserwisser.org>
Date: Wed, 05 Oct 2011 01:09:48 +1100
Message-Id: <20111004140948.78825149C52E@drugs.dv.isc.org>
Cc: Paul Vixie <vixie@isc.org>, dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 14:07:11 -0000

In message <20111004125524.GI12306@besserwisser.org>, =?utf-8?B?TcOlbnM=?= Nils
son writes:
> Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt Date: Tue, Oct 04, 2=
> 011 at 12:40:50PM +0100 Quoting Alex Bligh (alex@alex.org.uk):
> >=20
> >=20
> > --On 4 October 2011 12:04:42 +0100 Tony Finch <dot@dotat.at> wrote:
> >=20
> > >You can't increase the DNS message size beyond 64KB.
> >=20
> > I was under the (mis) apprehension that was a UDP limitation, and that
> > large AFXRs could exceed 64KB. Live and learn.
> 
> I've done AXFRen of 1/2 GB zones. Not practical, but doable. The 64K
> limit does not apply to AXFR, but, then again, AXFR is not like the
> other children...
> 
> --=20
> M=C3=A5ns Nilsson     primary/secondary/besserwisser/machina
> MN-1334-RIPE                             +46 705 989668
> Is it NOUVELLE CUISINE when 3 olives are struggling with a scallop in a
> plate of SAUCE MORNAY?

If we ever want to go greater than 64 K, tcp length limits 0..11
make good escape sequences, just encode the number of length bytes
with EDNS signaling to say we handle the longer length encodings.

00 03 XX XX XX
00 04 XX XX XX XX
00 05 XX XX XX XX XX
00 06 XX XX XX XX XX XX
00 07 XX XX XX XX XX XX XX
00 08 XX XX XX XX XX XX XX XX

Mark


-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From fanf2@hermes.cam.ac.uk  Tue Oct  4 08:05:59 2011
Return-Path: <fanf2@hermes.cam.ac.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2460621F8C4E for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 08:05:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.586
X-Spam-Level: 
X-Spam-Status: No, score=-6.586 tagged_above=-999 required=5 tests=[AWL=0.013,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jV3nzBcU0pVR for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 08:05:58 -0700 (PDT)
Received: from ppsw-51.csi.cam.ac.uk (ppsw-51.csi.cam.ac.uk [131.111.8.151]) by ietfa.amsl.com (Postfix) with ESMTP id 4D9CF21F8C49 for <dnsext@ietf.org>; Tue,  4 Oct 2011 08:05:58 -0700 (PDT)
X-Cam-AntiVirus: no malware found
X-Cam-SpamDetails: not scanned
X-Cam-ScannerInfo: http://www.cam.ac.uk/cs/email/scanner/
Received: from hermes-2.csi.cam.ac.uk ([131.111.8.54]:33953) by ppsw-51.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.158]:25) with esmtpa (EXTERNAL:fanf2) id 1RB6cA-0001N5-Y8 (Exim 4.72) (return-path <fanf2@hermes.cam.ac.uk>); Tue, 04 Oct 2011 16:09:02 +0100
Received: from fanf2 (helo=localhost) by hermes-2.csi.cam.ac.uk (hermes.cam.ac.uk) with local-esmtp id 1RB6cA-00036h-IL (Exim 4.67) (return-path <fanf2@hermes.cam.ac.uk>); Tue, 04 Oct 2011 16:09:02 +0100
Date: Tue, 4 Oct 2011 16:09:02 +0100
From: Tony Finch <dot@dotat.at>
X-X-Sender: fanf2@hermes-2.csi.cam.ac.uk
To: Mark Andrews <marka@isc.org>
In-Reply-To: <20111004140948.78825149C52E@drugs.dv.isc.org>
Message-ID: <alpine.LSU.2.00.1110041608240.30178@hermes-2.csi.cam.ac.uk>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110031713.20103.vixie@isc.org> <58EB32F9-08D2-4579-BC56-1423C00FC371@verisign.com> <201110031816.32959.vixie@isc.org> <EA70785432657FDF8A31D31C@nimrod.local> <alpine.LSU.2.00.1110041159200.16577@hermes-2.csi.cam.ac.uk> <0D33DC3D0533F844E21BE63E@Ximines.local> <20111004125524.GI12306@besserwisser.org> <20111004140948.78825149C52E@drugs.dv.isc.org>
User-Agent: Alpine 2.00 (LSU 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: Tony Finch <fanf2@hermes.cam.ac.uk>
Cc: Paul Vixie <vixie@isc.org>, dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 15:05:59 -0000

Mark Andrews <marka@isc.org> wrote:
>
> If we ever want to go greater than 64 K, tcp length limits 0..11
> make good escape sequences, just encode the number of length bytes
> with EDNS signaling to say we handle the longer length encodings.

That's OK for large responses but not large UPDATE requests.

Tony.
-- 
f.anthony.n.finch  <dot@dotat.at>  http://dotat.at/
Portland, Plymouth: Southwest 4 or 5, increasing 6 at times. Moderate,
occasionally rough later. Occasional drizzle, fog patches for a time. Moderate
or good, occasionally very poor.

From suruti94@gmail.com  Tue Oct  4 12:47:17 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 177AE21F8D94 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 12:47:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.566
X-Spam-Level: 
X-Spam-Status: No, score=-3.566 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t7sJqs6TZxt4 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 12:47:16 -0700 (PDT)
Received: from mail-pz0-f50.google.com (mail-pz0-f50.google.com [209.85.210.50]) by ietfa.amsl.com (Postfix) with ESMTP id C31F121F8D84 for <dnsext@ietf.org>; Tue,  4 Oct 2011 12:46:58 -0700 (PDT)
Received: by pzk37 with SMTP id 37so2249729pzk.9 for <dnsext@ietf.org>; Tue, 04 Oct 2011 12:50:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=M9r30ronDIY2ZqvhEaU8O4dEMz/ImN5HyJI+Q1fH9WI=; b=GKoyCI24QTg8nKxI36KykSB32KDPeuIiRFh4H6W6FiRiOnY5ur6jaO5DgHWAw5NI6d 46eXQhwJi0CuLEQaShJVKVkQX/2jM8ETBGY+bxfCX2H44lyLgkQQxZHN31HTxGxGfy9g I7WI079jRu6Oxs2UMdiWy90XpbdCvBvKkvilU=
MIME-Version: 1.0
Received: by 10.68.23.163 with SMTP id n3mr11805582pbf.89.1317757804591; Tue, 04 Oct 2011 12:50:04 -0700 (PDT)
Received: by 10.68.46.200 with HTTP; Tue, 4 Oct 2011 12:50:04 -0700 (PDT)
In-Reply-To: <20111004052409.D92451492DC2@drugs.dv.isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com> <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com> <20111004001547.7ED7C149063F@drugs.dv.isc.org> <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gmail.com> <20111004025502.504DD14924EC@drugs.dv.isc.org> <F168B690-446E-4BFD-82F9-5031FF12BE27@gmail.com> <20111004040259.324041492901@drugs.dv.isc.org> <CACU5sDnCB62cbBYW_E26fcmGuKU0+V_-BSeF=pjyvB2dyGw_Qw@mail.gmail.com> <20111004052409.D92451492DC2@drugs.dv.isc.org>
Date: Tue, 4 Oct 2011 12:50:04 -0700
Message-ID: <CACU5sDkQ44DJV7T+zQRSz3fW+22q8_=TfhXcUZhiOeF0F47OKw@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 19:47:17 -0000

<snip>
>
>> > asks for www.example.com/DO=3D1/CD=3D1. =A0The validating recurive ser=
ver
>> > get a answer from P (without DNSSEC records) and passes it on.
>> > Validation fails. =A0The stub resolver asks for www.example.com/DO=3D1=
/CD=3D
>> =3D1
>> > again and it gets the same answer (from thout DNSSEC records) the
>> > CD=3D1 cache and again fails. =A0Rince, lather, repeat.
>> >
>> > Now if the stub asks for www.example.com/DO=3D1/CD=3D0 the validating
>> > resolver will reject any answers from P and only pass on answers
>> > from D (with DNSSEC record) which should then validate.
>>
>> So, this is a validating resolver, sets CD=3D0 (ignoring what is said in
>> RFC 4035), gets the "proper" responses, ignores the AD bit,
>> validates the responses. Is this discussed in any document ?
>
> No, its not ignoring what is said in RFC 4035, CD=3D1 is a SHOULD
> (4.9.2). =A0In this case I'm recommending that defaulting to CD=3D0 as
> the default is what should be done and falling back to CD=3D1 in
> SERVFAIL is what should be done. =A0AD should be ignored by a validating
> stub resolver. =A0It's for stubs that trust the resolver, not stubs
> that validate.
>
> As for whether this is documented anywhere, apart from the archive
> of this list and dns/dnssec lists I doubt it. =A0I've definitely
> mentioned this before. =A0Mike St John's discussion of CD/DO setting
> is similar in nature if I'm remembering it correctly.
>
> Remember when RFC 4035 was written there was very little experience
> with validating stub resolvers. =A0There still isn't much but defaulting
> to CD=3D1 is clearly wrong. =A0Making stub validating resolvers work
> well may still require more work or what we have may be "good
> enough".
>
Why can't the recursive server fetch the "proper" response when it
sees DOK=3D1/CD=3D1 ? It knows that a validating resolver is asking for
DNSSEC records to validate itself. If it does not get from the first
server, it can ask the next server and get it. Why should the behavior
be different for CD=3D0/1 ? As long as DOK=3D1, it should do it.

>> > Now if the recursive server doesn't validate or it validates as
>> > insecure you are left with first senario hoping that you are getting
>> > answers from the DNSSEC aware authoritative server.
>> >
>> > What would help would be a EDNS option to send to the recursive
>> > server the closest trust anchor(s) and current time so that it can
>> > validate responses in a consistant manner to the stub resolver.
>>
>> This seems complex to me. Perhaps, the operational document should say
>> that a dnssec signed zone should be served only by dnssec aware
>> authoritative servers. If there is still an operational error, the
>> validating resolver should just give up. For example, if i set
>> DO=3D1/CD=3D1 and there are no RRSIGS, then abort and declare insecure.
>
> Except you can't do that most of the time because there could be a
> zone cut that makes that name insecure.
>
You should get a NSEC/NSEC3 in that case, right ?

-mohan

> Mark
>
>> -mohan
>>
>> > Mark
>> >
>> >> If there was spoofing or other problems, it can find out itself.
>> >> It is much easier to set CD=3D1 always.
>> >>
>> >> -mohan
>> > --
>> > Mark Andrews, ISC
>> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
>> > PHONE: +61 2 9871 4742 =A0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 I=
NTERNET: marka@is=3D
>> c.org
>> >
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
c.org
>

From wwwrun@rfc-editor.org  Tue Oct  4 13:35:54 2011
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE65F21F8C61 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 13:35:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.968
X-Spam-Level: 
X-Spam-Status: No, score=-99.968 tagged_above=-999 required=5 tests=[AWL=-2.368, BAYES_00=-2.599, GB_SUMOF=5, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zmkt9DM09AGq for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 13:35:54 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [IPv6:2001:1890:123a::1:2f]) by ietfa.amsl.com (Postfix) with ESMTP id 5C55321F8C57 for <dnsext@ietf.org>; Tue,  4 Oct 2011 13:35:54 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id 4016798C25F; Tue,  4 Oct 2011 13:39:00 -0700 (PDT)
To: arnt@troll.no, levone@microsoft.com, rdroms.ietf@gmail.com, jari.arkko@piuha.net, ogud@ogud.com, ajs@anvilwalrusden.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Message-Id: <20111004203900.4016798C25F@rfc-editor.org>
Date: Tue,  4 Oct 2011 13:39:00 -0700 (PDT)
Cc: Jordan.Brown@oracle.com, dnsext@ietf.org, rfc-editor@rfc-editor.org
Subject: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 20:35:54 -0000

The following errata report has been submitted for RFC2782,
"A DNS RR for specifying the location of services (DNS SRV)".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=2782&eid=2984

--------------------------------------
Type: Technical
Reported by: Jordan Brown <Jordan.Brown@oracle.com>

Section: Weight

Original Text
-------------
        To select a target to be contacted next, arrange all SRV RRs
        (that have not been ordered yet) in any order, except that all
        those with weight 0 are placed at the beginning of the list.

        Compute the sum of the weights of those RRs, and with each RR
        associate the running sum in the selected order. Then choose a
        uniform random number between 0 and the sum computed
        (inclusive), and select the RR whose running sum value is the
        first in the selected order which is greater than or equal to
        the random number selected. The target host specified in the
        selected SRV RR is the next one to be contacted by the client.
        Remove this SRV RR from the set of the unordered SRV RRs and
        apply the described algorithm to the unordered SRV RRs to select
        the next target host.  Continue the ordering process until there
        are no unordered SRV RRs.  This process is repeated for each
        Priority.

Corrected Text
--------------
Correcting the text requires agreement on what to do with entries with
weight=0, so I don't want to try to craft text until we have agreement there.

Notes
-----
The problem with this algorithm is that for a total weight T, it generates a random number 0..T and so allocates T+1 shares and gives the extra share to the first entry.  Thus with weights {1, 1}, the first entry is selected 2/3 of the time while the second entry is selected 1/3 of the time.

I suspect that this is an attempt to do *something* with entries with weight=0, but yields unobvious results there:  for {0, 1, 1}, the three entries are each selected 1/3 of the time.

I suggest:

- Ordering weight=0 entries to the end.
- Generating random numbers 0..(T-1).
- Using a "greater" test rather than "greater or equal".
- Selecting weight=0 entries in any order when all of the weight!=0 entries have been selected.

Instructions:
-------------
This errata is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party (IESG)
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC2782 (draft-ietf-dnsind-rfc2052bis-05)
--------------------------------------
Title               : A DNS RR for specifying the location of services (DNS SRV)
Publication Date    : February 2000
Author(s)           : A. Gulbrandsen, P. Vixie, L. Esibov
Category            : PROPOSED STANDARD
Source              : DNS Extensions
Area                : Internet
Stream              : IETF
Verifying Party     : IESG

From msheldon@godaddy.com  Tue Oct  4 14:36:44 2011
Return-Path: <msheldon@godaddy.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 05BE821F8EE0 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 14:36:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CtYuGgQrhczs for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 14:36:43 -0700 (PDT)
Received: from smtpoutwbe05.prod.mesa1.secureserver.net (smtpoutwbe05.prod.mesa1.secureserver.net [208.109.78.207]) by ietfa.amsl.com (Postfix) with SMTP id 3671621F8ED9 for <dnsext@ietf.org>; Tue,  4 Oct 2011 14:36:43 -0700 (PDT)
Received: (qmail 20595 invoked from network); 4 Oct 2011 21:39:48 -0000
Received: from unknown (HELO gem-wbe09.prod.mesa1.secureserver.net) (64.202.189.48) by smtpoutwbe05.prod.mesa1.secureserver.net with SMTP; 4 Oct 2011 21:39:48 -0000
Received: (qmail 18813 invoked by uid 99); 4 Oct 2011 21:39:48 -0000
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"
X-Originating-IP: 172.19.38.143
User-Agent: Web-Based Email 5.6.02
Message-Id: <20111004143947.205a61dff9fc1684c258b274662bb912.04bcda2f2f.wbe@email00.secureserver.net>
From: "Michael Sheldon" <msheldon@godaddy.com>
To: dnsext@ietf.org
Date: Tue, 04 Oct 2011 14:39:47 -0700
Mime-Version: 1.0
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 21:36:44 -0000

=0A=0A> -------- Original Message --------=0A> Subject: Re: [dnsext] draft-=
mohan-dns-query-xml-00.txt=0A> From: M=C3=A5ns Nilsson <mansaxel@besserwiss=
er.org>=0A>=0A> Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt Date=
: Tue, Oct 04, 2011 at 12:40:50PM +0100 Quoting Alex Bligh (alex@alex.org.u=
k):=0A> > =0A> > =0A> > --On 4 October 2011 12:04:42 +0100 Tony Finch <dot@=
dotat.at> wrote:=0A> > =0A> > >You can't increase the DNS message size beyo=
nd 64KB.=0A> > =0A> > I was under the (mis) apprehension that was a UDP lim=
itation, and that=0A> > large AFXRs could exceed 64KB. Live and learn.=0A> =
=0A> I've done AXFRen of 1/2 GB zones. Not practical, but doable. The 64K=
=0A> limit does not apply to AXFR, but, then again, AXFR is not like the=0A=
> other children...=0A> =0A=0AThe 64K DNS message limit applies to *all* TC=
P transactions. The TCP=0Alength field is the limiting factor at two bytes.=
 AXFR gets around this=0Aby using multiple DNS messages, but it is still li=
mited to 64K per=0Amessage.=0A=0A*IF* this proposal survives, I agree with =
the suggestion that we keep it=0Aas close to the current model as possible.=
=0A=0AThat said, I haven't seen any compelling reason to support a protocol=
=0Achange that seems solely for the purpose of fixing other people's=0Anetw=
ork mis-configurations.=0A=0AMichael Sheldon=0ADev-DNS Services=0AGoDaddy.c=
om=0A

From vixie@isc.org  Tue Oct  4 15:30:40 2011
Return-Path: <vixie@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5924621F8F2B for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 15:30:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fw2F4AB3qkCB for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 15:30:40 -0700 (PDT)
Received: from nsa.vix.com (nsa.vix.com [IPv6:2001:4f8:3:30::3]) by ietfa.amsl.com (Postfix) with ESMTP id E96F721F8E76 for <dnsext@ietf.org>; Tue,  4 Oct 2011 15:30:39 -0700 (PDT)
Received: from nsa.vix.com (localhost [127.0.0.1]) by nsa.vix.com (Postfix) with ESMTP id 8B397A1063 for <dnsext@ietf.org>; Tue,  4 Oct 2011 22:33:43 +0000 (UTC) (envelope-from vixie@isc.org)
Received: from six.localnet (six.vix.com [IPv6:2001:4f8:3:30::2]) by nsa.vix.com (Postfix) with ESMTP id 625CFA1049 for <dnsext@ietf.org>; Tue,  4 Oct 2011 22:33:43 +0000 (UTC) (envelope-from vixie@isc.org)
From: Paul Vixie <vixie@isc.org>
Organization: ISC
To: dnsext@ietf.org
Date: Tue, 4 Oct 2011 22:33:42 +0000
User-Agent: KMail/1.13.5 (FreeBSD/8.1-RELEASE; KDE/4.4.5; amd64; ; )
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0D33DC3D0533F844E21BE63E@Ximines.local> <20111004125524.GI12306@besserwisser.org>
In-Reply-To: <20111004125524.GI12306@besserwisser.org>
MIME-Version: 1.0
Content-Type: Text/Plain; charset="iso-8859-15"
Content-Transfer-Encoding: quoted-printable
Message-Id: <201110042233.43094.vixie@isc.org>
X-Virus-Scanned: ClamAV using ClamSMTP
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 22:30:40 -0000

On Tuesday, October 04, 2011 12:55:24 M=E5ns Nilsson wrote:

> > >You can't increase the DNS message size beyond 64KB.
> >=20
> > I was under the (mis) apprehension that was a UDP limitation, and that
> > large AFXRs could exceed 64KB. Live and learn.
>=20
> I've done AXFRen of 1/2 GB zones. Not practical, but doable. The 64K
> limit does not apply to AXFR, but, then again, AXFR is not like the
> other children...

an AXFR can have many messages, each will be 64KB or smaller, and no RRset =
is=20
allowed to span a message.  this means among other things that no RRset can=
 be=20
larger than ~64KB.  the fact that RRsets larger than 64KB could also not be=
=20
carried in a query (whether by TCP/53 or UDP/53) also enforces this=20
constraint.

From Ray.Bellis@nominet.org.uk  Tue Oct  4 15:33:13 2011
Return-Path: <Ray.Bellis@nominet.org.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1352721F8D3C for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 15:33:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.93
X-Spam-Level: 
X-Spam-Status: No, score=-8.93 tagged_above=-999 required=5 tests=[AWL=1.668,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t5-mJeaKcqU8 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 15:33:12 -0700 (PDT)
Received: from mx4.nominet.org.uk (mx4.nominet.org.uk [213.248.199.24]) by ietfa.amsl.com (Postfix) with ESMTP id 2CEA721F8D39 for <dnsext@ietf.org>; Tue,  4 Oct 2011 15:33:12 -0700 (PDT)
DomainKey-Signature: s=main.dk.nominet.selector; d=nominet.org.uk; c=nofws; q=dns;  h=X-IronPort-AV:Received:Received:From:To:CC:Subject: Thread-Topic:Thread-Index:Date:Message-ID:References: In-Reply-To:Accept-Language:Content-Language: X-MS-Has-Attach:X-MS-TNEF-Correlator:Content-Type: MIME-Version; b=YPIpGiTTJXCx6vWRWnkGNSD6j20b753bchcFLnmcC1Utv3wsZVPC6Iyx bYWMFlPgWhX2eA4B9+hPH7znS3LagOLLxQ8i9xkwdlp/7d2xf/WMguei7 a5IgB61xJ85Lj9/;
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nominet.org.uk; i=Ray.Bellis@nominet.org.uk; q=dns/txt; s=main.dkim.nominet.selector; t=1317767778; x=1349303778; h=from:sender:reply-to:subject:date:message-id:to:cc: mime-version:content-transfer-encoding:content-id: content-description:resent-date:resent-from:resent-sender: resent-to:resent-cc:resent-message-id:in-reply-to: references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:list-owner:list-archive; z=From:=20Ray=20Bellis=20<Ray.Bellis@nominet.org.uk> |Subject:=20Re:=20[dnsext]=20draft-mohan-dns-query-xml-00 .txt|Date:=20Tue,=204=20Oct=202011=2022:36:15=20+0000 |Message-ID:=20<772EA53B-2168-4226-8FAF-3D15CF265DA2@nomi net.org.uk>|To:=20Michael=20Sheldon=20<msheldon@godaddy.c om>|CC:=20"<dnsext@ietf.org>"=20<dnsext@ietf.org> |MIME-Version:=201.0|In-Reply-To:=20<20111004143947.205a6 1dff9fc1684c258b274662bb912.04bcda2f2f.wbe@email00.secure server.net>|References:=20<20111004143947.205a61dff9fc168 4c258b274662bb912.04bcda2f2f.wbe@email00.secureserver.net >; bh=vz2R4eXdqDyYSD7FQs0GhLlXUQHbOGBjmUXsiMORoB0=; b=iQ2DUuqw7ZS011KNaN/HD63UDb9KCPQ3uijPMg20Nozsa2WU9jOLNvN2 gGM/BMROsVgHaDCgK1AhKH+SDR/sIi2kdD7E1z1d3Javk3Ljxyltv8Yb/ ywL46FzLo3Df8sm;
X-IronPort-AV: E=Sophos;i="4.68,487,1312153200"; d="scan'208,217";a="28800085"
Received: from wds-exc2.okna.nominet.org.uk ([213.248.197.145]) by mx4.nominet.org.uk with ESMTP; 04 Oct 2011 23:36:17 +0100
Received: from WDS-EXC1.okna.nominet.org.uk ([fe80::1593:1394:a91f:8f5f]) by wds-exc2.okna.nominet.org.uk ([fe80::7577:eaca:5241:25d4%19]) with mapi; Tue, 4 Oct 2011 23:36:17 +0100
From: Ray Bellis <Ray.Bellis@nominet.org.uk>
To: Michael Sheldon <msheldon@godaddy.com>
Thread-Topic: [dnsext] draft-mohan-dns-query-xml-00.txt
Thread-Index: AQHMgt4jfCZxnQpglE20eO4CZeWVeZVstY2A
Date: Tue, 4 Oct 2011 22:36:15 +0000
Message-ID: <772EA53B-2168-4226-8FAF-3D15CF265DA2@nominet.org.uk>
References: <20111004143947.205a61dff9fc1684c258b274662bb912.04bcda2f2f.wbe@email00.secureserver.net>
In-Reply-To: <20111004143947.205a61dff9fc1684c258b274662bb912.04bcda2f2f.wbe@email00.secureserver.net>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_772EA53B216842268FAF3D15CF265DA2nominetorguk_"
MIME-Version: 1.0
Cc: "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 22:33:13 -0000

--_000_772EA53B216842268FAF3D15CF265DA2nominetorguk_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


On 4 Oct 2011, at 17:39, Michael Sheldon wrote:

The 64K DNS message limit applies to *all* TCP transactions. The TCP
length field is the limiting factor at two bytes. AXFR gets around this by =
using multiple DNS messages, but it is still limited to 64K per message.

And compression pointers are of course only 14 bits, so are constrained to =
point back only within the first 16K of any message.

Ray



--_000_772EA53B216842268FAF3D15CF265DA2nominetorguk_
Content-Type: text/html; charset="us-ascii"
Content-ID: <e49b0c05-fed6-4af5-9c6c-ee5111d7d80f>
Content-Transfer-Encoding: quoted-printable

<html><head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -we=
bkit-line-break: after-white-space; "><br><div><div>On 4 Oct 2011, at 17:39=
, Michael Sheldon wrote:</div><blockquote type=3D"cite"><div><font class=3D=
"Apple-style-span" color=3D"#000000"><br></font>The 64K DNS message limit a=
pplies to *all* TCP transactions. The TCP<br>length field is the limiting f=
actor at two bytes. AXFR gets around this&nbsp;by using multiple DNS messag=
es, but it is still limited to 64K per&nbsp;message.</div></blockquote><br>=
</div><div>And compression pointers are of course only 14 bits, so are cons=
trained to point back only within the first 16K of any message.</div><div><=
br></div><div>Ray</div><div><br></div><div><br></div></body></html>=

--_000_772EA53B216842268FAF3D15CF265DA2nominetorguk_--

From brian.peter.dickson@gmail.com  Tue Oct  4 15:51:25 2011
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2233721F8F08 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 15:51:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dbFLlaqkiU3C for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 15:51:24 -0700 (PDT)
Received: from mail-bw0-f44.google.com (mail-bw0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id 5851A21F8F00 for <dnsext@ietf.org>; Tue,  4 Oct 2011 15:51:24 -0700 (PDT)
Received: by bkaq10 with SMTP id q10so1514404bka.31 for <dnsext@ietf.org>; Tue, 04 Oct 2011 15:54:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=SzA9te0kjOug88/OY22BiCQuKu1mi7R9W7i8ntN8ODc=; b=jOTghdfNR6aqgagm1dyjb7dY4K9VqewbDrbYC/5i7TPZwa4JkM5ya5vdHntudbREfV Xk0t1nvrLn/s2ekzryWTppT47G7VXCrHkwclE1MWEypi65xCSNNfU8o73aJi27I+coFf bkwcq9wfWepPXeG2ErQeWy/lC/SRZxCX9I0q0=
MIME-Version: 1.0
Received: by 10.204.128.88 with SMTP id j24mr1127167bks.74.1317768869912; Tue, 04 Oct 2011 15:54:29 -0700 (PDT)
Received: by 10.204.157.27 with HTTP; Tue, 4 Oct 2011 15:54:29 -0700 (PDT)
In-Reply-To: <20111004143947.205a61dff9fc1684c258b274662bb912.04bcda2f2f.wbe@email00.secureserver.net>
References: <20111004143947.205a61dff9fc1684c258b274662bb912.04bcda2f2f.wbe@email00.secureserver.net>
Date: Tue, 4 Oct 2011 18:54:29 -0400
Message-ID: <CAH1iCir9T0kSL=_-f_FW1jcfN3D+z5tHc18ML0L9h5Znm45vZw@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Michael Sheldon <msheldon@godaddy.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 22:51:25 -0000

On Tue, Oct 4, 2011 at 5:39 PM, Michael Sheldon <msheldon@godaddy.com> wrote:
> That said, I haven't seen any compelling reason to support a protocol
> change that seems solely for the purpose of fixing other people's
> network mis-configurations.

There are subtleties in the unintended consequences of messing with DNS.

By "messing with", I refer to ISPs doing arbitrary stuff, including
but not limited to NXDOMAIN or other forms of DNS hijacking.

Blocking the DNSSEC portion of DNS responses, either deliberately or
by lack of support, is another form of "messing with", and may also be
used to hide the other (deliberate) activity.

When DNSSEC stuff is blocked, not only does it reduce the trust in the
answers, it re-opens the window of vulnerability that DNSSEC was meant
to close. Not good.

Widespread blocking of DNSSEC threatens the adoption and utility of DNSSEC.

However ugly it might be, DNSSEC is important enough to warrant
considering counter-counter-measures.

This proposal is a very lightweight and elegant (IMHO)
counter-counter-measure. It makes valid answers from either authority
servers (if client == recursive server) or resolvers (if client ==
stub) possible to (a) get directly, and (b) trust and/or verify. In
many use cases, there is no alternative, particularly when there is a
local market monopoly or duopoly of such "bad actors".

Even if you don't use DNSSEC, please don't stop others from using it
or from making it possible to achieve widespread usage.

And I gently encourage use of DNSSEC by any and all -- especially when
your domain is your primary (sole?) source of revenue. (BTW - I am a
happy customer, FWIW. But I'd be happier if you used DNSSEC.)

Brian

P.S. Note also, that mis-configurations are often deliberate,
especially when performed by the state. This proposal at least makes
feasible, the unblocking of state-sponsored censorship at the DNS
level.

From mohta@necom830.hpcl.titech.ac.jp  Tue Oct  4 15:57:49 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83B7F21F8BC4 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 15:57:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.037
X-Spam-Level: 
X-Spam-Status: No, score=-0.037 tagged_above=-999 required=5 tests=[AWL=0.053,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YReZ7Cu5a8kn for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 15:57:49 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id B0BC221F8D84 for <dnsext@ietf.org>; Tue,  4 Oct 2011 15:57:48 -0700 (PDT)
Received: (qmail 45072 invoked from network); 4 Oct 2011 23:16:01 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 4 Oct 2011 23:16:01 -0000
Message-ID: <4E8B9014.3060000@necom830.hpcl.titech.ac.jp>
Date: Wed, 05 Oct 2011 08:00:36 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: RFC Errata System <rfc-editor@rfc-editor.org>
References: <20111004203900.4016798C25F@rfc-editor.org>
In-Reply-To: <20111004203900.4016798C25F@rfc-editor.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: arnt@troll.no, Jordan.Brown@oracle.com, levone@microsoft.com, dnsext@ietf.org, jari.arkko@piuha.net, rdroms.ietf@gmail.com, ogud@ogud.com
Subject: Re: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 22:57:49 -0000

RFC Errata System wrote:

> Corrected Text
> --------------
> Correcting the text requires agreement on what to do with entries with
> weight=0, so I don't want to try to craft text until we have agreement there.

>From examples of the RFC:

      ; NO other services are supported
      *._tcp          SRV  0 0 0 .
      *._udp          SRV  0 0 0 .

it is obvious that weight=0 means that the RR must not be
selected.

> I suggest:
> 
> - Ordering weight=0 entries to the end.
> - Generating random numbers 0..(T-1).
> - Using a "greater" test rather than "greater or equal".
> - Selecting weight=0 entries in any order when all of the weight!=0 entries have been selected.

I suggest:

> - Generating random numbers 0..(T-1).
> - Using a "greater" test rather than "greater or equal".

							Masataka Ohta

From mohta@necom830.hpcl.titech.ac.jp  Tue Oct  4 17:19:49 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36A0221F8DB3 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 17:19:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.038
X-Spam-Level: 
X-Spam-Status: No, score=-0.038 tagged_above=-999 required=5 tests=[AWL=0.052,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3hJe3ah5CYNx for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 17:19:48 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 35E6621F8C0B for <dnsext@ietf.org>; Tue,  4 Oct 2011 17:19:47 -0700 (PDT)
Received: (qmail 45513 invoked from network); 5 Oct 2011 00:38:01 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 5 Oct 2011 00:38:01 -0000
Message-ID: <4E8BA347.7060208@necom830.hpcl.titech.ac.jp>
Date: Wed, 05 Oct 2011 09:22:31 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Jordan Brown <Jordan.Brown@oracle.com>
References: <20111004203900.4016798C25F@rfc-editor.org> <4E8B9014.3060000@necom830.hpcl.titech.ac.jp> <4E8B9515.3060503@oracle.com>
In-Reply-To: <4E8B9515.3060503@oracle.com>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: arnt@troll.no, levone@microsoft.com, dnsext@ietf.org, jari.arkko@piuha.net, rdroms.ietf@gmail.com, ogud@ogud.com, RFC Errata System <rfc-editor@rfc-editor.org>
Subject: Re: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 00:19:49 -0000

Jordan Brown wrote:

>> From examples of the RFC:
>>
>> ; NO other services are supported
>> *._tcp SRV 0 0 0 .
>> *._udp SRV 0 0 0 .
>>
>> it is obvious that weight=0 means that the RR must not be
>> selected.
> 
> Perhaps, but on the other hand it also says:
> 
> Domain
> administrators SHOULD use Weight 0 when there isn't any server
> selection to do, to make the RR easier to read for humans (less
> noisy). In the presence of records containing weights greater
> than 0, records with weight 0 should have a very small chance of
> being selected.

Hmmmm, as the RFC says:

	Domain
        administrators SHOULD use Weight 0 when there isn't any server
        selection to do, to make the RR easier to read for humans (less
        noisy).

        A Target of "." means that the service is decidedly not
        available at this domain.

weight=0 in the examples I showed should not be significant, sorry.

Then, I agree with you, except that

	- Selecting weight=0 entries in any order when all of
	the weight!=0 entries have been selected.

should be:

	- Selecting weight=0 entries in random order when all
	of the weight!=0 entries have been selected.

						Masataka Ohta

From marka@isc.org  Tue Oct  4 17:45:40 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD46421F8B1A for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 17:45:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.091
X-Spam-Level: 
X-Spam-Status: No, score=-2.091 tagged_above=-999 required=5 tests=[AWL=0.508,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aT0NB5Ug-3Fn for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 17:45:40 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id 2A59321F8B17 for <dnsext@ietf.org>; Tue,  4 Oct 2011 17:45:40 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 96E07C9424 for <dnsext@ietf.org>; Wed,  5 Oct 2011 00:48:33 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 326C8216C33; Wed,  5 Oct 2011 00:48:33 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id F2441149EED3; Wed,  5 Oct 2011 11:48:31 +1100 (EST)
To: Paul Vixie <vixie@isc.org>
From: Mark Andrews <marka@isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <0D33DC3D0533F844E21BE63E@Ximines.local> <20111004125524.GI12306@besserwisser.org> <201110042233.43094.vixie@isc.org>
In-reply-to: Your message of "Tue, 04 Oct 2011 22:33:42 -0000." <201110042233.43094.vixie@isc.org>
Date: Wed, 05 Oct 2011 11:48:31 +1100
Message-Id: <20111005004831.F2441149EED3@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 00:45:40 -0000

In message <201110042233.43094.vixie@isc.org>, Paul Vixie writes:
> On Tuesday, October 04, 2011 12:55:24 M=E5ns Nilsson wrote:
> 
> > > >You can't increase the DNS message size beyond 64KB.
> > > =
> 
> > > I was under the (mis) apprehension that was a UDP limitation, and that
> > > large AFXRs could exceed 64KB. Live and learn.
> > =
> 
> > I've done AXFRen of 1/2 GB zones. Not practical, but doable. The 64K
> > limit does not apply to AXFR, but, then again, AXFR is not like the
> > other children...
> 
> an AXFR can have many messages, each will be 64KB or smaller, and no RRset =
> is =
> 
> allowed to span a message.  this means among other things that no RRset can=
>  be =
> 
> larger than ~64KB.  the fact that RRsets larger than 64KB could also not be =
> 
> carried in a query (whether by TCP/53 or UDP/53) also enforces this =
> 
> constraint.
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext

RRsets are allowed to span messages in AXFR/IXFR.  BIND 4 used to
send one RR per message.  That said the current practical limit is
slightly less than 64K for a RRset without protocol extensions.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From dotis@mail-abuse.org  Tue Oct  4 18:18:17 2011
Return-Path: <dotis@mail-abuse.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 31B8321F8C51 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 18:18:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.383
X-Spam-Level: 
X-Spam-Status: No, score=-103.383 tagged_above=-999 required=5 tests=[AWL=-0.784, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mf9qSdsMHxLG for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 18:18:16 -0700 (PDT)
Received: from SJDC-SDIRelay2.sdi.trendmicro.com (sjdc-sdirelay2.sdi.trendmicro.com [150.70.68.59]) by ietfa.amsl.com (Postfix) with ESMTP id 8145421F8BF8 for <dnsext@ietf.org>; Tue,  4 Oct 2011 18:18:16 -0700 (PDT)
Received: from harry.mail-abuse.org (harry.mail-abuse.org [168.61.5.27]) by SJDC-SDIRelay2.sdi.trendmicro.com (Postfix) with ESMTP id 5705A308111 for <dnsext@ietf.org>; Wed,  5 Oct 2011 01:21:21 +0000 (UTC)
Received: from US-DOUGO-MAC.local (gateway1.sjc.mail-abuse.org [168.61.5.81]) by harry.mail-abuse.org (Postfix) with ESMTP id F0B5EA9443B for <dnsext@ietf.org>; Wed,  5 Oct 2011 01:21:21 +0000 (UTC)
Message-ID: <4E8BB111.5010004@mail-abuse.org>
Date: Tue, 04 Oct 2011 18:21:21 -0700
From: Douglas Otis <dotis@mail-abuse.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: dnsext@ietf.org
References: <20111004203900.4016798C25F@rfc-editor.org> <4E8B9014.3060000@necom830.hpcl.titech.ac.jp> <4E8B9515.3060503@oracle.com> <4E8BA347.7060208@necom830.hpcl.titech.ac.jp>
In-Reply-To: <4E8BA347.7060208@necom830.hpcl.titech.ac.jp>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 01:18:17 -0000

On 10/4/11 5:22 PM, Masataka Ohta wrote:
> Jordan Brown wrote:
>
>>>  From examples of the RFC:
>>>
>>> ; NO other services are supported
>>> *._tcp SRV 0 0 0 .
>>> *._udp SRV 0 0 0 .
>>>
>>> it is obvious that weight=0 means that the RR must not be
>>> selected.
>> Perhaps, but on the other hand it also says:
>>
>> Domain
>> administrators SHOULD use Weight 0 when there isn't any server
>> selection to do, to make the RR easier to read for humans (less
>> noisy). In the presence of records containing weights greater
>> than 0, records with weight 0 should have a very small chance of
>> being selected.
> Hmmmm, as the RFC says:
>
> 	Domain
>          administrators SHOULD use Weight 0 when there isn't any server
>          selection to do, to make the RR easier to read for humans (less
>          noisy).
>
>          A Target of "." means that the service is decidedly not
>          available at this domain.
>
> weight=0 in the examples I showed should not be significant, sorry.
>
> Then, I agree with you, except that
>
> 	- Selecting weight=0 entries in any order when all of
> 	the weight!=0 entries have been selected.
>
> should be:
>
> 	- Selecting weight=0 entries in random order when all
> 	of the weight!=0 entries have been selected.
Even use of "." as a null target is problematic when this convention is 
ignored.

What problem does a "." (null) service reference improve over simply not 
having an entry?  The use of wildcards for _label._label services seems 
rather limited.

-Doug


From mohta@necom830.hpcl.titech.ac.jp  Tue Oct  4 18:26:20 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B603C21F8D4A for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 18:26:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.039
X-Spam-Level: 
X-Spam-Status: No, score=-0.039 tagged_above=-999 required=5 tests=[AWL=0.051,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cJmRytavoLNz for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 18:26:20 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 3392721F8D46 for <dnsext@ietf.org>; Tue,  4 Oct 2011 18:26:15 -0700 (PDT)
Received: (qmail 45871 invoked from network); 5 Oct 2011 01:44:29 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 5 Oct 2011 01:44:29 -0000
Message-ID: <4E8BB2D9.10000@necom830.hpcl.titech.ac.jp>
Date: Wed, 05 Oct 2011 10:28:57 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: dnsext@ietf.org
References: <20111004203900.4016798C25F@rfc-editor.org> <4E8B9014.3060000@necom830.hpcl.titech.ac.jp> <4E8B9515.3060503@oracle.com> <4E8BA347.7060208@necom830.hpcl.titech.ac.jp> <4E8BB111.5010004@mail-abuse.org>
In-Reply-To: <4E8BB111.5010004@mail-abuse.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 01:26:20 -0000

Douglas Otis wrote:

> Even use of "." as a null target is problematic when this
> convention is ignored.

Agreed.

> What problem does a "." (null) service reference improve
> over simply not having an entry?

Not having an entry might mean Name is the Target.

At least, I specified so in draft-ohta-urlsrv-00.txt.

						Masataka Ohta

From mohta@necom830.hpcl.titech.ac.jp  Tue Oct  4 20:53:04 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BE7221F8B6C for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 20:53:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.04
X-Spam-Level: 
X-Spam-Status: No, score=-0.04 tagged_above=-999 required=5 tests=[AWL=0.050,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9yJN15pGD8A5 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 20:53:03 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 58BA321F8B68 for <dnsext@ietf.org>; Tue,  4 Oct 2011 20:53:03 -0700 (PDT)
Received: (qmail 46648 invoked from network); 5 Oct 2011 04:11:18 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 5 Oct 2011 04:11:18 -0000
Message-ID: <4E8BD559.3060502@necom830.hpcl.titech.ac.jp>
Date: Wed, 05 Oct 2011 12:56:09 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: dnsext@ietf.org
References: <20111004143947.205a61dff9fc1684c258b274662bb912.04bcda2f2f.wbe@email00.secureserver.net> <CAH1iCir9T0kSL=_-f_FW1jcfN3D+z5tHc18ML0L9h5Znm45vZw@mail.gmail.com>
In-Reply-To: <CAH1iCir9T0kSL=_-f_FW1jcfN3D+z5tHc18ML0L9h5Znm45vZw@mail.gmail.com>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 03:53:04 -0000

Brian Dickson wrote:

> Even if you don't use DNSSEC, please don't stop others from using it
> or from making it possible to achieve widespread usage.
> 
> And I gently encourage use of DNSSEC by any and all -- especially when
> your domain is your primary (sole?) source of revenue. (BTW - I am a
> happy customer, FWIW. But I'd be happier if you used DNSSEC.)

You seems to be using DNSSEC.

How do you make your clock securely synchronized with that of
the root?

						Masataka Ohta

From marka@isc.org  Tue Oct  4 21:24:40 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9031021F8B81 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 21:24:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.218
X-Spam-Level: 
X-Spam-Status: No, score=-2.218 tagged_above=-999 required=5 tests=[AWL=0.381,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g9WgRvmOBhSZ for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 21:24:40 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id 1CF2C21F8B4F for <dnsext@ietf.org>; Tue,  4 Oct 2011 21:24:40 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id EC9BFC9422; Wed,  5 Oct 2011 04:27:30 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 5BAE9216C36; Wed,  5 Oct 2011 04:27:30 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 4D8A514A46C1; Wed,  5 Oct 2011 15:27:28 +1100 (EST)
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
From: Mark Andrews <marka@isc.org>
References: <20111004143947.205a61dff9fc1684c258b274662bb912.04bcda2f2f.wbe@email00.secureserver.net> <CAH1iCir9T0kSL=_-f_FW1jcfN3D+z5tHc18ML0L9h5Znm45vZw@mail.gmail.com> <4E8BD559.3060502@necom830.hpcl.titech.ac.jp>
In-reply-to: Your message of "Wed, 05 Oct 2011 12:56:09 +0900." <4E8BD559.3060502@necom830.hpcl.titech.ac.jp>
Date: Wed, 05 Oct 2011 15:27:28 +1100
Message-Id: <20111005042728.4D8A514A46C1@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 04:24:40 -0000

In message <4E8BD559.3060502@necom830.hpcl.titech.ac.jp>, Masataka Ohta writes:
> Brian Dickson wrote:
> 
> > Even if you don't use DNSSEC, please don't stop others from using it
> > or from making it possible to achieve widespread usage.
> > 
> > And I gently encourage use of DNSSEC by any and all -- especially when
> > your domain is your primary (sole?) source of revenue. (BTW - I am a
> > happy customer, FWIW. But I'd be happier if you used DNSSEC.)
> 
> You seems to be using DNSSEC.
> 
> How do you make your clock securely synchronized with that of
> the root?

Personally, I look at my wristwatch.  DNSSEC only requires loose
time syncronization.  Most machines, provided they have a battery
backed up clock, could run their entire life on the time as set
by the manufacturer.
 
> 						Masataka Ohta
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From mohta@necom830.hpcl.titech.ac.jp  Tue Oct  4 22:07:53 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 651B521F858C for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 22:07:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.04
X-Spam-Level: 
X-Spam-Status: No, score=-0.04 tagged_above=-999 required=5 tests=[AWL=0.050,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E2l82xM5tigq for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 22:07:53 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 9092921F8569 for <dnsext@ietf.org>; Tue,  4 Oct 2011 22:07:51 -0700 (PDT)
Received: (qmail 47087 invoked from network); 5 Oct 2011 05:26:07 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 5 Oct 2011 05:26:07 -0000
Message-ID: <4E8BE6DF.5040201@necom830.hpcl.titech.ac.jp>
Date: Wed, 05 Oct 2011 14:10:55 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Mark Andrews <marka@isc.org>
References: <20111004143947.205a61dff9fc1684c258b274662bb912.04bcda2f2f.wbe@email00.secureserver.net> <CAH1iCir9T0kSL=_-f_FW1jcfN3D+z5tHc18ML0L9h5Znm45vZw@mail.gmail.com> <4E8BD559.3060502@necom830.hpcl.titech.ac.jp> <20111005042728.4D8A514A46C1@drugs.dv.isc.org>
In-Reply-To: <20111005042728.4D8A514A46C1@drugs.dv.isc.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 05:07:53 -0000

Mark Andrews wrote:

> Personally, I look at my wristwatch.

You may but your computers can not.

> DNSSEC only requires loose
> time syncronization.  Most machines, provided they have a battery
> backed up clock, could run their entire life on the time as set
> by the manufacturer.

A problem is that, even though an hour of error is not significant
to DNSSEC, it is significant to most other purposes, which
means the clock is synchronized to external source.

						Masataka Ohta

From lubos.slovak@nic.cz  Wed Oct  5 01:15:22 2011
Return-Path: <lubos.slovak@nic.cz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA24A21F8AB8 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 01:15:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CDRDQj1GYVKi for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 01:15:22 -0700 (PDT)
Received: from mail.nic.cz (mail.nic.cz [IPv6:2001:1488:800:400::400]) by ietfa.amsl.com (Postfix) with ESMTP id 55F7821F862F for <dnsext@ietf.org>; Wed,  5 Oct 2011 01:15:21 -0700 (PDT)
Received: from [IPv6:2001:1488:ac14:1400:222:19ff:fe31:432a] (unknown [IPv6:2001:1488:ac14:1400:222:19ff:fe31:432a]) by mail.nic.cz (Postfix) with ESMTPSA id 1C3FE2A2B62 for <dnsext@ietf.org>; Wed,  5 Oct 2011 10:18:21 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nic.cz; s=default; t=1317802701; bh=V5npl2nM5JDkrwp86sNqwVAH7i5/lTBe6x/lSib3OBo=; h=Message-ID:Date:From:MIME-Version:To:Subject:Content-Type: Content-Transfer-Encoding; b=TOoeGaLi1D/UhzbNdDHevMhSr5nSfl9vPXyGWfJu6EZ2511Ij5l7eYnsh+K3A41t5 AIXbYt5tLSk6OqICcIPBiTYcxaf1hqE8E8f6ObmJz5TXlNnMglyNhGaQW5B4SxTHPd tYAa6hf3/66LEH/fLFKBvSvLJq6xkQBNq72qFVrY=
Message-ID: <4E8C12CC.3090701@nic.cz>
Date: Wed, 05 Oct 2011 10:18:20 +0200
From: Lubos Slovak <lubos.slovak@nic.cz>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.21) Gecko/20110831 Thunderbird/3.1.13
MIME-Version: 1.0
To: dnsext@ietf.org
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: clamav-milter 0.96.5 at mail
X-Virus-Status: Clean
Subject: [dnsext] RETRY and EXPIRE clarification
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 08:15:23 -0000

Hi,

I find the definition of RETRY and EXPIRE intervals in RFC 1035 quite 
vague and did not find any other RFC clarifying it.

1) Should the RETRY interval start when the REFRESH event occurred (this 
is a bit more deterministic) or when it is clear that the transfer 
failed, i.e. on timeout or error during transfer (this is maybe closer 
to the definition of RETRY in RFC 1035, part 3.3.13)?

2) What should happen if the EXPIRE interval elapses before the transfer 
is finished (assume large zone, transfer lasts for several minutes and 
EXPIRE is set too low - i.e. 1 minute)? Should the server cease to serve 
the zone? If yes, should it serve the zone again after the transfer is 
finished?

Thanks a lot,
Lubos

From Ed.Lewis@neustar.biz  Wed Oct  5 05:42:32 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 923C921F8BEB for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 05:42:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.129
X-Spam-Level: 
X-Spam-Status: No, score=-105.129 tagged_above=-999 required=5 tests=[AWL=-0.944, BAYES_40=-0.185, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BaoWDlaw5UoJ for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 05:42:32 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id CD1BC21F8BE8 for <dnsext@ietf.org>; Wed,  5 Oct 2011 05:42:31 -0700 (PDT)
Received: from Work-Laptop-2.local (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p95CjVO4050189; Wed, 5 Oct 2011 08:45:38 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [10.31.203.207] by Work-Laptop-2.local (PGP Universal service); Wed, 05 Oct 2011 08:45:40 -0400
X-PGP-Universal: processed; by Work-Laptop-2.local on Wed, 05 Oct 2011 08:45:40 -0400
Mime-Version: 1.0
Message-Id: <a06240804cab200031f9c@[10.31.203.207]>
In-Reply-To: <4E8C12CC.3090701@nic.cz>
References: <4E8C12CC.3090701@nic.cz>
Date: Wed, 5 Oct 2011 08:45:30 -0400
To: Lubos Slovak <lubos.slovak@nic.cz>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.72 on 10.20.30.4
Cc: dnsext@ietf.org
Subject: Re: [dnsext] RETRY and EXPIRE clarification
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 12:42:32 -0000

At 10:18 +0200 10/5/11, Lubos Slovak wrote:
>Hi,
>
>I find the definition of RETRY and EXPIRE intervals in RFC 1035 
>quite vague and did not find any other RFC clarifying it.

First lesson in reading RFC 1034/1035 - don't take them that 
literally.  They were descriptions of the system, not specifications. 
This was explained to me by one of the folks involved in writing them.

>1) Should the RETRY interval start when the REFRESH event occurred (this
>is a bit more deterministic) or when it is clear that the transfer failed,
>i.e. on timeout or error during transfer (this is maybe closer to the
>definition of RETRY in RFC 1035, part 3.3.13)?

Doesn't really matter, I mean, how long does it take to fail a 
transfer?  Let's say it's 90 seconds - if the retry is 43200 (12 
hours), whether you try 1/2 a day later or 1/2 day plus 90 seconds 
later isn't going to change things.  It looks cooler in the logs if 
the retries happen at the stroke of 1/2 day intervals, but it doesn't 
matter in the long run.

>2) What should happen if the EXPIRE interval elapses before the transfer is
>finished (assume large zone, transfer lasts for several minutes and EXPIRE is
>set too low - i.e. 1 minute)? Should the server cease to serve the zone? If
>yes, should it serve the zone again after the transfer is finished?

Could and yeah.  I suspect that while you are transferring the zone 
you can suspend checking the timer if you want and no one would 
complain.

EXPIRE shouldn't be that low though.  DNS wasn't built to be real 
time, when you have a server-cache-client architecture you can expect 
it to be that fast.

(There's nothing wrong in trying to make DNS be real time.  But 
you'll have to realize it takes some work as that wasn't the design 
goal.  Kind of like trying to drag race pickup trucks.  You can do 
it, but it isn't as easy or efficient as drag racing speedsters.)
-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

Vote for the word of the day:
"Papa"razzi - father that constantly takes photos of the baby
Corpureaucracy - The institution of corporate "red tape"

From cet1@hermes.cam.ac.uk  Wed Oct  5 06:47:01 2011
Return-Path: <cet1@hermes.cam.ac.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AFE9C21F8B17 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 06:47:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.367
X-Spam-Level: 
X-Spam-Status: No, score=-6.367 tagged_above=-999 required=5 tests=[AWL=0.232,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jxCechzGkGzE for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 06:47:01 -0700 (PDT)
Received: from ppsw-52.csi.cam.ac.uk (ppsw-52.csi.cam.ac.uk [131.111.8.152]) by ietfa.amsl.com (Postfix) with ESMTP id 2179321F8AFD for <dnsext@ietf.org>; Wed,  5 Oct 2011 06:47:00 -0700 (PDT)
X-Cam-AntiVirus: no malware found
X-Cam-SpamDetails: not scanned
X-Cam-ScannerInfo: http://www.cam.ac.uk/cs/email/scanner/
Received: from hermes-2.csi.cam.ac.uk ([131.111.8.54]:43855) by ppsw-52.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.159]:25) with esmtpa (EXTERNAL:cet1) id 1RBRrK-0004oV-FA (Exim 4.72) (return-path <cet1@hermes.cam.ac.uk>); Wed, 05 Oct 2011 14:50:06 +0100
Received: from prayer by hermes-2.csi.cam.ac.uk (hermes.cam.ac.uk) with local (PRAYER:cet1) id 1RBRrK-0000L4-MG (Exim 4.67) (return-path <cet1@hermes.cam.ac.uk>); Wed, 05 Oct 2011 14:50:06 +0100
Received: from [131.111.11.47] by webmail.hermes.cam.ac.uk with HTTP (Prayer-1.3.4); 05 Oct 2011 14:50:06 +0100
Date: 05 Oct 2011 14:50:06 +0100
From: Chris Thompson <cet1@cam.ac.uk>
To: Edward Lewis <Ed.Lewis@neustar.biz>
Message-ID: <Prayer.1.3.4.1110051450060.28254@hermes-2.csi.cam.ac.uk>
In-Reply-To: <a06240804cab200031f9c@[10.31.203.207]>
References: <4E8C12CC.3090701@nic.cz> <a06240804cab200031f9c@[10.31.203.207]>
X-Mailer: Prayer v1.3.4
Mime-Version: 1.0
Content-Type: text/plain; format=flowed; charset=ISO-8859-1
Sender: Chris Thompson <cet1@hermes.cam.ac.uk>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] RETRY and EXPIRE clarification
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: cet1@cam.ac.uk
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 13:47:01 -0000

On Oct 5 2011, Edward Lewis wrote:

>At 10:18 +0200 10/5/11, Lubos Slovak wrote:
[..anip..]
>>1) Should the RETRY interval start when the REFRESH event occurred (this
>>is a bit more deterministic) or when it is clear that the transfer failed,
>>i.e. on timeout or error during transfer (this is maybe closer to the
>>definition of RETRY in RFC 1035, part 3.3.13)?
>
>Doesn't really matter, I mean, how long does it take to fail a 
>transfer?  Let's say it's 90 seconds - if the retry is 43200 (12 
>hours), whether you try 1/2 a day later or 1/2 day plus 90 seconds 
>later isn't going to change things.  It looks cooler in the logs if 
>the retries happen at the stroke of 1/2 day intervals, but it doesn't 
>matter in the long run.

That is in any case the sort of thing that leads to different processes
getting into lock step and generating load spikes. It is better to
dither the intervals a bit, as NIND has done for, lo, these many years:

 432.   [func]          Added refresh/retry jitter.  The actual refresh/
                        retry time is now a random value between 75% and
                        100% of the configured value.

[That was already in BIND 9.1, at least.]

-- 
Chris Thompson               University of Cambridge Computing Service,
Email: cet1@ucs.cam.ac.uk    New Museums Site, Cambridge CB2 3QH,
Phone: +44 1223 334715       United Kingdom.

From petithug@acm.org  Wed Oct  5 07:17:54 2011
Return-Path: <petithug@acm.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20C1F21F8D0C for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 07:17:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.158
X-Spam-Level: 
X-Spam-Status: No, score=-99.158 tagged_above=-999 required=5 tests=[AWL=-2.850, BAYES_00=-2.599, GB_SUMOF=5, MISSING_HEADERS=1.292,  NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t5S4AH9IBqLk for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 07:17:50 -0700 (PDT)
Received: from implementers.org (implementers.org [IPv6:2604:3400:dc1:41:216:3eff:fe5b:8240]) by ietfa.amsl.com (Postfix) with ESMTP id 0844721F8D00 for <dnsext@ietf.org>; Wed,  5 Oct 2011 07:17:50 -0700 (PDT)
Received: from [IPv6:2001:5c0:1111:4e00:213:d4ff:fe04:3e08] (unknown [IPv6:2001:5c0:1111:4e00:213:d4ff:fe04:3e08]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client CN "petithug", Issuer "implementers.org" (verified OK)) by implementers.org (Postfix) with ESMTPS id 47A8720878 for <dnsext@ietf.org>; Wed,  5 Oct 2011 14:13:58 +0000 (UTC)
Message-ID: <4E8C67C7.9050000@acm.org>
Date: Wed, 05 Oct 2011 07:20:55 -0700
From: Marc Petit-Huguenin <petithug@acm.org>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.21) Gecko/20110831 Iceowl/1.0b2 Icedove/3.1.13
MIME-Version: 1.0
CC: dnsext@ietf.org
References: <20111004203900.4016798C25F@rfc-editor.org>
In-Reply-To: <20111004203900.4016798C25F@rfc-editor.org>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 14:17:54 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The algorithm described in RFC 2782 is what it is, and people know how to
configure the values in an SRV RR to achieve what they want.  If some disagree
with this algorithm, they should work on a rfc2782bis document, but not try to
change the meaning of RFC 2782 in an errata.

On 10/04/2011 01:39 PM, RFC Errata System wrote:
>
> The following errata report has been submitted for RFC2782,
> "A DNS RR for specifying the location of services (DNS SRV)".
>
> --------------------------------------
> You may review the report below and at:
> http://www.rfc-editor.org/errata_search.php?rfc=2782&eid=2984
>
> --------------------------------------
> Type: Technical
> Reported by: Jordan Brown <Jordan.Brown@oracle.com>
>
> Section: Weight
>
> Original Text
> -------------
>         To select a target to be contacted next, arrange all SRV RRs
>         (that have not been ordered yet) in any order, except that all
>         those with weight 0 are placed at the beginning of the list.
>
>         Compute the sum of the weights of those RRs, and with each RR
>         associate the running sum in the selected order. Then choose a
>         uniform random number between 0 and the sum computed
>         (inclusive), and select the RR whose running sum value is the
>         first in the selected order which is greater than or equal to
>         the random number selected. The target host specified in the
>         selected SRV RR is the next one to be contacted by the client.
>         Remove this SRV RR from the set of the unordered SRV RRs and
>         apply the described algorithm to the unordered SRV RRs to select
>         the next target host.  Continue the ordering process until there
>         are no unordered SRV RRs.  This process is repeated for each
>         Priority.
>
> Corrected Text
> --------------
> Correcting the text requires agreement on what to do with entries with
> weight=0, so I don't want to try to craft text until we have agreement there.
>
> Notes
> -----
> The problem with this algorithm is that for a total weight T, it generates a random number 0..T and so allocates T+1 shares and gives the extra share to the first entry.  Thus with weights {1, 1}, the first entry is selected 2/3 of the time while the second entry is selected 1/3 of the time.
>
> I suspect that this is an attempt to do *something* with entries with weight=0, but yields unobvious results there:  for {0, 1, 1}, the three entries are each selected 1/3 of the time.
>
> I suggest:
>
> - Ordering weight=0 entries to the end.
> - Generating random numbers 0..(T-1).
> - Using a "greater" test rather than "greater or equal".
> - Selecting weight=0 entries in any order when all of the weight!=0 entries have been selected.
>
> Instructions:
> -------------
> This errata is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party (IESG)
> can log in to change the status and edit the report, if necessary.
>
> --------------------------------------
> RFC2782 (draft-ietf-dnsind-rfc2052bis-05)
> --------------------------------------
> Title               : A DNS RR for specifying the location of services (DNS SRV)
> Publication Date    : February 2000
> Author(s)           : A. Gulbrandsen, P. Vixie, L. Esibov
> Category            : PROPOSED STANDARD
> Source              : DNS Extensions
> Area                : Internet
> Stream              : IETF
> Verifying Party     : IESG
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>


- -- 
Marc Petit-Huguenin
Personal email: marc@petit-huguenin.org
Professional email: petithug@acm.org
Blog: http://blog.marc.petit-huguenin.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk6MZ8UACgkQ9RoMZyVa61dAXwCgnqxR0MkbR96ST1ZmAV6yScbT
o8sAoIy9T7BJVbl+uW6PWPIWH3n1EC2K
=adBX
-----END PGP SIGNATURE-----

From drc@virtualized.org  Wed Oct  5 07:22:39 2011
Return-Path: <drc@virtualized.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5FF5821F8C74 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 07:22:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.456
X-Spam-Level: 
X-Spam-Status: No, score=-2.456 tagged_above=-999 required=5 tests=[AWL=0.143,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7eaqmeRHmC0i for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 07:22:38 -0700 (PDT)
Received: from trantor.virtualized.org (trantor.virtualized.org [199.48.134.42]) by ietfa.amsl.com (Postfix) with ESMTP id 4FD9021F8D20 for <dnsext@ietf.org>; Wed,  5 Oct 2011 07:22:38 -0700 (PDT)
Received: from [192.168.1.101] (unknown [173.245.57.22]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: drc) by trantor.virtualized.org (Postfix) with ESMTPSA id BF2E61704E; Wed,  5 Oct 2011 14:25:39 +0000 (UTC)
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: text/plain; charset=us-ascii
From: David Conrad <drc@virtualized.org>
In-Reply-To: <CAH1iCir9T0kSL=_-f_FW1jcfN3D+z5tHc18ML0L9h5Znm45vZw@mail.gmail.com>
Date: Wed, 5 Oct 2011 07:25:39 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <24EEC86B-DE62-477E-8E77-1A8683803667@virtualized.org>
References: <20111004143947.205a61dff9fc1684c258b274662bb912.04bcda2f2f.wbe@email00.secureserver.net> <CAH1iCir9T0kSL=_-f_FW1jcfN3D+z5tHc18ML0L9h5Znm45vZw@mail.gmail.com>
To: Brian Dickson <brian.peter.dickson@gmail.com>
X-Mailer: Apple Mail (2.1244.3)
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 14:22:39 -0000

On Oct 4, 2011, at 3:54 PM, Brian Dickson wrote:
> This proposal is a very lightweight and elegant (IMHO) =
counter-counter-measure.

Not really. It is a hack that, if implemented, will ensure there is no =
pressure to actually fix broken infrastructures.  Realistically:

- states-sponsored censorship will continue to occur: states have a =
tendency to insist on that sort of thing, with guns if necessary;
- folks intentionally blocking working DNS to force the use of their =
name servers will figure out a way to continue blocking DNS: I have =
sufficient faith in the tenacity of such folks that all this will do is =
result in a cat-and-mouse game (e.g., it won't be that hard to figure =
out which HTTP{,S} server IP addresses to blacklist);
- middlebox vendors and lazy DNS operators won't need to fix their DNS =
implementations because there is now a HTTP{,S} bypass for the folks =
that whine about such things; and
- we now have to saddle DNSSEC server implementations (auth and =
recursive) with yet more complexity.  Permanently.

This feels like the wrong way to solve this problem.

Regards,
-drc


From petithug@acm.org  Wed Oct  5 08:43:39 2011
Return-Path: <petithug@acm.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CF051F0C38 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 08:43:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.233
X-Spam-Level: 
X-Spam-Status: No, score=-102.233 tagged_above=-999 required=5 tests=[AWL=0.367, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VHSNM16ver2C for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 08:43:38 -0700 (PDT)
Received: from implementers.org (implementers.org [IPv6:2604:3400:dc1:41:216:3eff:fe5b:8240]) by ietfa.amsl.com (Postfix) with ESMTP id 76E911F0C35 for <dnsext@ietf.org>; Wed,  5 Oct 2011 08:43:38 -0700 (PDT)
Received: from [IPv6:2001:5c0:1111:4e00:213:d4ff:fe04:3e08] (unknown [IPv6:2001:5c0:1111:4e00:213:d4ff:fe04:3e08]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client CN "petithug", Issuer "implementers.org" (verified OK)) by implementers.org (Postfix) with ESMTPS id 6D70020878; Wed,  5 Oct 2011 15:39:45 +0000 (UTC)
Message-ID: <4E8C7BE2.7080107@acm.org>
Date: Wed, 05 Oct 2011 08:46:42 -0700
From: Marc Petit-Huguenin <petithug@acm.org>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.21) Gecko/20110831 Iceowl/1.0b2 Icedove/3.1.13
MIME-Version: 1.0
To: Jordan Brown <Jordan.Brown@oracle.com>
References: <20111004203900.4016798C25F@rfc-editor.org> <4E8C55BC.2080203@petit-huguenin.org> <4E8C7A6E.9040206@oracle.com>
In-Reply-To: <4E8C7A6E.9040206@oracle.com>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Cc: arnt@troll.no, levone@microsoft.com, dnsext@ietf.org, jari.arkko@piuha.net, rdroms.ietf@gmail.com, ogud@ogud.com, RFC Errata System <rfc-editor@rfc-editor.org>
Subject: Re: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 15:43:39 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/05/2011 08:40 AM, Jordan Brown wrote:
> On 10/05/11 06:03, Marc Petit-Huguenin wrote:
> The algorithm described in RFC 2782 is what it is, and people know how to
> configure the values in an SRV RR to achieve what they want.  If some disagree
> with this algorithm, they should work on a rfc2782bis document, but not try to
> change the meaning of RFC 2782 in an errata.
> 
>> Could be.  I just wanted to point out the inconsistency in the specification;
>> some parts say to choose proportionally (note the example that says that {1,3}
>> yields {1/4, 3/4}, when it actually yields either {2/5, 3/5} or {1/5, 4/5}
>> depending on the order reported) but the algorithm doesn't quite do that.
> 
>> For small weights the difference is significant.  For large weights it's not.

Yes, so perhaps the errata should be to say something like "Try to use weights
as high as possible, unless you use the value 0".

- -- 
Marc Petit-Huguenin
Personal email: marc@petit-huguenin.org
Professional email: petithug@acm.org
Blog: http://blog.marc.petit-huguenin.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk6Me94ACgkQ9RoMZyVa61cInQCfVYNTxTdipk5c9h7+lrtvojKH
o64An1gURA5d1ekuLM4on480BANJCXxA
=wTD8
-----END PGP SIGNATURE-----

From bmanning@karoshi.com  Wed Oct  5 08:43:42 2011
Return-Path: <bmanning@karoshi.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D36681F0C38 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 08:43:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.225
X-Spam-Level: 
X-Spam-Status: No, score=-6.225 tagged_above=-999 required=5 tests=[AWL=0.374,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wnbEVJ06lfq9 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 08:43:42 -0700 (PDT)
Received: from vacation.karoshi.com (vacation.karoshi.com [198.32.6.68]) by ietfa.amsl.com (Postfix) with ESMTP id E269D1F0C35 for <dnsext@ietf.org>; Wed,  5 Oct 2011 08:43:41 -0700 (PDT)
Received: from karoshi.com (localhost.localdomain [127.0.0.1]) by vacation.karoshi.com (8.12.8/8.12.8) with ESMTP id p95FjCEE004853; Wed, 5 Oct 2011 15:45:32 GMT
Received: (from bmanning@localhost) by karoshi.com (8.12.8/8.12.8/Submit) id p95Fipoc004852; Wed, 5 Oct 2011 15:44:51 GMT
Date: Wed, 5 Oct 2011 15:44:41 +0000
From: bmanning@vacation.karoshi.com
To: David Conrad <drc@virtualized.org>
Message-ID: <20111005154441.GB3823@vacation.karoshi.com.>
References: <20111004143947.205a61dff9fc1684c258b274662bb912.04bcda2f2f.wbe@email00.secureserver.net> <CAH1iCir9T0kSL=_-f_FW1jcfN3D+z5tHc18ML0L9h5Znm45vZw@mail.gmail.com> <24EEC86B-DE62-477E-8E77-1A8683803667@virtualized.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <24EEC86B-DE62-477E-8E77-1A8683803667@virtualized.org>
User-Agent: Mutt/1.4.1i
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 15:43:42 -0000

On Wed, Oct 05, 2011 at 07:25:39AM -0700, David Conrad wrote:
> On Oct 4, 2011, at 3:54 PM, Brian Dickson wrote:
> > This proposal is a very lightweight and elegant (IMHO) counter-counter-measure.
> 
> Not really. It is a hack that, if implemented, will ensure there is no pressure to actually fix broken infrastructures.  Realistically:
> 
> - states-sponsored censorship will continue to occur: states have a tendency to insist on that sort of thing, with guns if necessary;
> - folks intentionally blocking working DNS to force the use of their name servers will figure out a way to continue blocking DNS: I have sufficient faith in the tenacity of such folks that all this will do is result in a cat-and-mouse game (e.g., it won't be that hard to figure out which HTTP{,S} server IP addresses to blacklist);
> - middlebox vendors and lazy DNS operators won't need to fix their DNS implementations because there is now a HTTP{,S} bypass for the folks that whine about such things; and
> - we now have to saddle DNSSEC server implementations (auth and recursive) with yet more complexity.  Permanently.

	complexity is a serious problem for maintaining a secure and auditable system.
	there is no clear, crisp engineering reason to persue this tactic... it is, as
	stated, a counter-counter measure... looks like an arms race to me, not useful
	engineering.

> This feels like the wrong way to solve this problem.

	amen.  (sorry - too religious -  +1)

/bill

> 
> Regards,
> -drc
> 
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext

From Ed.Lewis@neustar.biz  Wed Oct  5 08:45:34 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 305A81F0C38 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 08:45:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.301
X-Spam-Level: 
X-Spam-Status: No, score=-106.301 tagged_above=-999 required=5 tests=[AWL=0.298, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9-EHbsm6uqk4 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 08:45:33 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 899A41F0C36 for <dnsext@ietf.org>; Wed,  5 Oct 2011 08:45:33 -0700 (PDT)
Received: from Work-Laptop-2.local (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p95Fmabo051575; Wed, 5 Oct 2011 11:48:37 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [10.31.203.207] by Work-Laptop-2.local (PGP Universal service); Wed, 05 Oct 2011 11:48:37 -0400
X-PGP-Universal: processed; by Work-Laptop-2.local on Wed, 05 Oct 2011 11:48:37 -0400
Mime-Version: 1.0
Message-Id: <a06240800cab22aa31db5@[10.31.203.207]>
In-Reply-To: <Prayer.1.3.4.1110051450060.28254@hermes-2.csi.cam.ac.uk>
References: <4E8C12CC.3090701@nic.cz> <a06240804cab200031f9c@[10.31.203.207]> <Prayer.1.3.4.1110051450060.28254@hermes-2.csi.cam.ac.uk>
Date: Wed, 5 Oct 2011 11:46:24 -0400
To: <cet1@cam.ac.uk>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.72 on 10.20.30.4
Cc: Edward Lewis <Ed.Lewis@neustar.biz>, dnsext@ietf.org
Subject: Re: [dnsext] RETRY and EXPIRE clarification
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 15:45:34 -0000

At 14:50 +0100 10/5/11, Chris Thompson wrote:

>That is in any case the sort of thing that leads to different processes
>getting into lock step and generating load spikes. It is better to
>dither the intervals a bit, as NIND has done for, lo, these many years:

Unless a customer wants it to be precisely when they expect it to be.

There's a lot to be said for predictability (and against dithering 
intervals in this case).  If it results in spikes, you know why and 
you can take verifiable steps avoid it.  OTOH, predictability isn't 
always desirable and dithering intervals is the answer.  A lot 
depends on the problem domain's characteristics.

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

Vote for the word of the day:
"Papa"razzi - father that constantly takes photos of the baby
Corpureaucracy - The institution of corporate "red tape"

From petithug@acm.org  Wed Oct  5 09:08:17 2011
Return-Path: <petithug@acm.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7983B21F8C0A for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 09:08:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.242
X-Spam-Level: 
X-Spam-Status: No, score=-102.242 tagged_above=-999 required=5 tests=[AWL=0.358, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6g+yHNLqduM3 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 09:08:15 -0700 (PDT)
Received: from implementers.org (implementers.org [IPv6:2604:3400:dc1:41:216:3eff:fe5b:8240]) by ietfa.amsl.com (Postfix) with ESMTP id 73E4721F8B9C for <dnsext@ietf.org>; Wed,  5 Oct 2011 09:08:15 -0700 (PDT)
Received: from [IPv6:2001:5c0:1111:4e00:213:d4ff:fe04:3e08] (unknown [IPv6:2001:5c0:1111:4e00:213:d4ff:fe04:3e08]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client CN "petithug", Issuer "implementers.org" (verified OK)) by implementers.org (Postfix) with ESMTPS id 09F2A20878; Wed,  5 Oct 2011 16:04:22 +0000 (UTC)
Message-ID: <4E8C81A9.9030401@acm.org>
Date: Wed, 05 Oct 2011 09:11:21 -0700
From: Marc Petit-Huguenin <petithug@acm.org>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.21) Gecko/20110831 Iceowl/1.0b2 Icedove/3.1.13
MIME-Version: 1.0
To: Jordan Brown <Jordan.Brown@oracle.com>
References: <20111004203900.4016798C25F@rfc-editor.org> <4E8C55BC.2080203@petit-huguenin.org> <4E8C7A6E.9040206@oracle.com>
In-Reply-To: <4E8C7A6E.9040206@oracle.com>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Cc: levone@microsoft.com, dnsext@ietf.org, jari.arkko@piuha.net, rdroms.ietf@gmail.com, ogud@ogud.com, RFC Errata System <rfc-editor@rfc-editor.org>
Subject: Re: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 16:08:17 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/05/2011 08:40 AM, Jordan Brown wrote:
> On 10/05/11 06:03, Marc Petit-Huguenin wrote:
> The algorithm described in RFC 2782 is what it is, and people know how to
> configure the values in an SRV RR to achieve what they want.  If some disagree
> with this algorithm, they should work on a rfc2782bis document, but not try to
> change the meaning of RFC 2782 in an errata.
> 
>> Could be.  I just wanted to point out the inconsistency in the specification;
>> some parts say to choose proportionally (note the example that says that {1,3}
>> yields {1/4, 3/4}, when it actually yields either {2/5, 3/5} or {1/5, 4/5}
>> depending on the order reported) but the algorithm doesn't quite do that.

Well, { 3/10, 7/10 } if each client randomizes the order each time and restarts
with a new list after each successful connection (which is another
underspecification in RFC 2782 that IMO would justify an rfc2782bis).

> 
>> For small weights the difference is significant.  For large weights it's not.
> 
> 

- -- 
Marc Petit-Huguenin
Personal email: marc@petit-huguenin.org
Professional email: petithug@acm.org
Blog: http://blog.marc.petit-huguenin.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk6MgacACgkQ9RoMZyVa61d76gCdHCXl4t/j3G74A5IdwxLyfJlV
aDIAoJ64nHnpz2CxxPwk8vFgM/NS18zB
=58Dx
-----END PGP SIGNATURE-----

From Jordan.Brown@oracle.com  Tue Oct  4 16:19:08 2011
Return-Path: <Jordan.Brown@oracle.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ACC0E21F8F03 for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 16:19:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ol-GuVbPvqtC for <dnsext@ietfa.amsl.com>; Tue,  4 Oct 2011 16:19:08 -0700 (PDT)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by ietfa.amsl.com (Postfix) with ESMTP id 0F40921F8EFD for <dnsext@ietf.org>; Tue,  4 Oct 2011 16:19:07 -0700 (PDT)
Received: from ucsinet23.oracle.com (ucsinet23.oracle.com [156.151.31.71]) by rcsinet15.oracle.com (Switch-3.4.4/Switch-3.4.4) with ESMTP id p94NM8LS020138 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Tue, 4 Oct 2011 23:22:11 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by ucsinet23.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id p94NM7ZS004911 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 4 Oct 2011 23:22:07 GMT
Received: from abhmt119.oracle.com (abhmt119.oracle.com [141.146.116.71]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p94NLxJl012221; Tue, 4 Oct 2011 18:21:59 -0500
Received: from [10.195.1.81] (/10.195.1.81) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 04 Oct 2011 16:21:58 -0700
Message-ID: <4E8B9515.3060503@oracle.com>
Date: Tue, 04 Oct 2011 16:21:57 -0700
From: Jordan Brown <Jordan.Brown@oracle.com>
User-Agent: Mozilla/5.0 (X11; U; SunOS i86pc; en-US; rv:1.9.2.15) Gecko/20110304 Thunderbird/3.1.9
MIME-Version: 1.0
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
References: <20111004203900.4016798C25F@rfc-editor.org> <4E8B9014.3060000@necom830.hpcl.titech.ac.jp>
In-Reply-To: <4E8B9014.3060000@necom830.hpcl.titech.ac.jp>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Source-IP: ucsinet23.oracle.com [156.151.31.71]
X-CT-RefId: str=0001.0A090208.4E8B9524.0020,ss=1,re=0.000,fgs=0
X-Mailman-Approved-At: Wed, 05 Oct 2011 10:01:23 -0700
Cc: arnt@troll.no, levone@microsoft.com, dnsext@ietf.org, jari.arkko@piuha.net, rdroms.ietf@gmail.com, ogud@ogud.com, RFC Errata System <rfc-editor@rfc-editor.org>
Subject: Re: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 23:19:08 -0000

On 10/04/11 16:00, Masataka Ohta wrote:
> RFC Errata System wrote:
>
>> Corrected Text
>> --------------
>> Correcting the text requires agreement on what to do with entries with
>> weight=0, so I don't want to try to craft text until we have agreement there.
>
>  From examples of the RFC:
>
>        ; NO other services are supported
>        *._tcp          SRV  0 0 0 .
>        *._udp          SRV  0 0 0 .
>
> it is obvious that weight=0 means that the RR must not be
> selected.

Perhaps, but on the other hand it also says:

	Domain
         administrators SHOULD use Weight 0 when there isn't any server
         selection to do, to make the RR easier to read for humans (less
         noisy).  In the presence of records containing weights greater
         than 0, records with weight 0 should have a very small chance of
         being selected.

>
>> I suggest:
>>
>> - Ordering weight=0 entries to the end.
>> - Generating random numbers 0..(T-1).
>> - Using a "greater" test rather than "greater or equal".
>> - Selecting weight=0 entries in any order when all of the weight!=0 entries have been selected.
>
> I suggest:
>
>> - Generating random numbers 0..(T-1).
>> - Using a "greater" test rather than "greater or equal".
>
> 							Masataka Ohta


From Jordan.Brown@oracle.com  Wed Oct  5 08:37:39 2011
Return-Path: <Jordan.Brown@oracle.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7215621F8C46 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 08:37:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.099
X-Spam-Level: 
X-Spam-Status: No, score=-4.099 tagged_above=-999 required=5 tests=[AWL=-2.500, BAYES_00=-2.599, GB_SUMOF=5, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BiuL3j01hJwZ for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 08:37:38 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by ietfa.amsl.com (Postfix) with ESMTP id 7261621F8B7B for <dnsext@ietf.org>; Wed,  5 Oct 2011 08:37:38 -0700 (PDT)
Received: from acsinet21.oracle.com (acsinet21.oracle.com [141.146.126.237]) by acsinet15.oracle.com (Switch-3.4.4/Switch-3.4.4) with ESMTP id p95FefSp008576 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 5 Oct 2011 15:40:43 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet21.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id p95Fecf4018757 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 5 Oct 2011 15:40:39 GMT
Received: from abhmt119.oracle.com (abhmt119.oracle.com [141.146.116.71]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p95FeWN8001107; Wed, 5 Oct 2011 10:40:32 -0500
Received: from [10.195.1.81] (/10.195.1.81) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 05 Oct 2011 08:40:32 -0700
Message-ID: <4E8C7A6E.9040206@oracle.com>
Date: Wed, 05 Oct 2011 08:40:30 -0700
From: Jordan Brown <Jordan.Brown@oracle.com>
User-Agent: Mozilla/5.0 (X11; U; SunOS i86pc; en-US; rv:1.9.2.15) Gecko/20110304 Thunderbird/3.1.9
MIME-Version: 1.0
To: Marc Petit-Huguenin <marc@petit-huguenin.org>
References: <20111004203900.4016798C25F@rfc-editor.org> <4E8C55BC.2080203@petit-huguenin.org>
In-Reply-To: <4E8C55BC.2080203@petit-huguenin.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Source-IP: acsinet21.oracle.com [141.146.126.237]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090208.4E8C7A7C.008C:SCFMA922111,ss=1,re=-4.000,fgs=0
X-Mailman-Approved-At: Wed, 05 Oct 2011 10:01:23 -0700
Cc: arnt@troll.no, levone@microsoft.com, dnsext@ietf.org, jari.arkko@piuha.net, rdroms.ietf@gmail.com, ogud@ogud.com, RFC Errata System <rfc-editor@rfc-editor.org>
Subject: Re: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 15:37:39 -0000

On 10/05/11 06:03, Marc Petit-Huguenin wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> The algorithm described in RFC 2782 is what it is, and people know how to
> configure the values in an SRV RR to achieve what they want.  If some disagree
> with this algorithm, they should work on a rfc2782bis document, but not try to
> change the meaning of RFC 2782 in an errata.

Could be.  I just wanted to point out the inconsistency in the 
specification; some parts say to choose proportionally (note the example 
that says that {1,3} yields {1/4, 3/4}, when it actually yields either 
{2/5, 3/5} or {1/5, 4/5} depending on the order reported) but the algorithm 
doesn't quite do that.

For small weights the difference is significant.  For large weights it's not.

>
> On 10/04/2011 01:39 PM, RFC Errata System wrote:
>>
>> The following errata report has been submitted for RFC2782,
>> "A DNS RR for specifying the location of services (DNS SRV)".
>>
>> --------------------------------------
>> You may review the report below and at:
>> http://www.rfc-editor.org/errata_search.php?rfc=2782&eid=2984
>>
>> --------------------------------------
>> Type: Technical
>> Reported by: Jordan Brown<Jordan.Brown@oracle.com>
>>
>> Section: Weight
>>
>> Original Text
>> -------------
>>          To select a target to be contacted next, arrange all SRV RRs
>>          (that have not been ordered yet) in any order, except that all
>>          those with weight 0 are placed at the beginning of the list.
>>
>>          Compute the sum of the weights of those RRs, and with each RR
>>          associate the running sum in the selected order. Then choose a
>>          uniform random number between 0 and the sum computed
>>          (inclusive), and select the RR whose running sum value is the
>>          first in the selected order which is greater than or equal to
>>          the random number selected. The target host specified in the
>>          selected SRV RR is the next one to be contacted by the client.
>>          Remove this SRV RR from the set of the unordered SRV RRs and
>>          apply the described algorithm to the unordered SRV RRs to select
>>          the next target host.  Continue the ordering process until there
>>          are no unordered SRV RRs.  This process is repeated for each
>>          Priority.
>>
>> Corrected Text
>> --------------
>> Correcting the text requires agreement on what to do with entries with
>> weight=0, so I don't want to try to craft text until we have agreement there.
>>
>> Notes
>> -----
>> The problem with this algorithm is that for a total weight T, it generates a random number 0..T and so allocates T+1 shares and gives the extra share to the first entry.  Thus with weights {1, 1}, the first entry is selected 2/3 of the time while the second entry is selected 1/3 of the time.
>>
>> I suspect that this is an attempt to do *something* with entries with weight=0, but yields unobvious results there:  for {0, 1, 1}, the three entries are each selected 1/3 of the time.
>>
>> I suggest:
>>
>> - Ordering weight=0 entries to the end.
>> - Generating random numbers 0..(T-1).
>> - Using a "greater" test rather than "greater or equal".
>> - Selecting weight=0 entries in any order when all of the weight!=0 entries have been selected.
>>
>> Instructions:
>> -------------
>> This errata is currently posted as "Reported". If necessary, please
>> use "Reply All" to discuss whether it should be verified or
>> rejected. When a decision is reached, the verifying party (IESG)
>> can log in to change the status and edit the report, if necessary.
>>
>> --------------------------------------
>> RFC2782 (draft-ietf-dnsind-rfc2052bis-05)
>> --------------------------------------
>> Title               : A DNS RR for specifying the location of services (DNS SRV)
>> Publication Date    : February 2000
>> Author(s)           : A. Gulbrandsen, P. Vixie, L. Esibov
>> Category            : PROPOSED STANDARD
>> Source              : DNS Extensions
>> Area                : Internet
>> Stream              : IETF
>> Verifying Party     : IESG
>> _______________________________________________
>> dnsext mailing list
>> dnsext@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsext
>>
>
>
> - --
> Marc Petit-Huguenin
> Personal email: marc@petit-huguenin.org
> Professional email: petithug@acm.org
> Blog: http://blog.marc.petit-huguenin.org
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.11 (GNU/Linux)
>
> iEYEARECAAYFAk6MVboACgkQ9RoMZyVa61fVRwCeKycrXn6Ceqfq9fczvT4jzRBb
> grAAmwdkJqmDrBTOdEZ1hS0O7IyMd9bR
> =cOUW
> -----END PGP SIGNATURE-----


From Jordan.Brown@oracle.com  Wed Oct  5 08:45:27 2011
Return-Path: <Jordan.Brown@oracle.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ABAAA1F0C35 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 08:45:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.349
X-Spam-Level: 
X-Spam-Status: No, score=-5.349 tagged_above=-999 required=5 tests=[AWL=1.250,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rhq3-4Zy6+M2 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 08:45:26 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by ietfa.amsl.com (Postfix) with ESMTP id AC45911E8083 for <dnsext@ietf.org>; Wed,  5 Oct 2011 08:45:26 -0700 (PDT)
Received: from rtcsinet21.oracle.com (rtcsinet21.oracle.com [66.248.204.29]) by acsinet15.oracle.com (Switch-3.4.4/Switch-3.4.4) with ESMTP id p95FmTnm019129 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 5 Oct 2011 15:48:31 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by rtcsinet21.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id p95FmQfi001726 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 5 Oct 2011 15:48:26 GMT
Received: from abhmt116.oracle.com (abhmt116.oracle.com [141.146.116.68]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p95FmKcs028821; Wed, 5 Oct 2011 10:48:20 -0500
Received: from [10.195.1.81] (/10.195.1.81) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 05 Oct 2011 08:48:20 -0700
Message-ID: <4E8C7C43.7030106@oracle.com>
Date: Wed, 05 Oct 2011 08:48:19 -0700
From: Jordan Brown <Jordan.Brown@oracle.com>
User-Agent: Mozilla/5.0 (X11; U; SunOS i86pc; en-US; rv:1.9.2.15) Gecko/20110304 Thunderbird/3.1.9
MIME-Version: 1.0
To: Marc Petit-Huguenin <petithug@acm.org>
References: <20111004203900.4016798C25F@rfc-editor.org> <4E8C55BC.2080203@petit-huguenin.org> <4E8C7A6E.9040206@oracle.com> <4E8C7BE2.7080107@acm.org>
In-Reply-To: <4E8C7BE2.7080107@acm.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Source-IP: rtcsinet21.oracle.com [66.248.204.29]
X-CT-RefId: str=0001.0A090208.4E8C7C50.002C,ss=1,re=0.000,fgs=0
X-Mailman-Approved-At: Wed, 05 Oct 2011 10:01:23 -0700
Cc: arnt@troll.no, levone@microsoft.com, dnsext@ietf.org, jari.arkko@piuha.net, rdroms.ietf@gmail.com, ogud@ogud.com, RFC Errata System <rfc-editor@rfc-editor.org>
Subject: Re: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 15:45:27 -0000

On 10/05/11 08:46, Marc Petit-Huguenin wrote:
> Yes, so perhaps the errata should be to say something like "Try to use weights
> as high as possible, unless you use the value 0".

Yes, that would be a reasonable response.

From mohta@necom830.hpcl.titech.ac.jp  Wed Oct  5 16:56:12 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DF7221F8D56 for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 16:56:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.042
X-Spam-Level: 
X-Spam-Status: No, score=-0.042 tagged_above=-999 required=5 tests=[AWL=0.048,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iBZxjvQ3zJzf for <dnsext@ietfa.amsl.com>; Wed,  5 Oct 2011 16:56:11 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 7D86521F8D4F for <dnsext@ietf.org>; Wed,  5 Oct 2011 16:56:11 -0700 (PDT)
Received: (qmail 57453 invoked from network); 6 Oct 2011 00:14:41 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 6 Oct 2011 00:14:41 -0000
Message-ID: <4E8CEF3A.1020708@necom830.hpcl.titech.ac.jp>
Date: Thu, 06 Oct 2011 08:58:50 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Marc Petit-Huguenin <petithug@acm.org>
References: <20111004203900.4016798C25F@rfc-editor.org> <4E8C67C7.9050000@acm.org>
In-Reply-To: <4E8C67C7.9050000@acm.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] [Technical Errata Reported] RFC2782 (2984)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2011 23:56:12 -0000

Marc Petit-Huguenin wrote:

> The algorithm described in RFC 2782 is what it is, and people know how to
> configure the values in an SRV RR to achieve what they want.

Not at all.

As the specification is on implementation details, logically
inconsistent to the rest of the RFC, people should have no
idea how to use weight=0.

> If some disagree
> with this algorithm, they should work on a rfc2782bis document, but not try to
> change the meaning of RFC 2782 in an errata.

The problem is that RFC2782 has internal inconsistency because
of overspecification on implementation details.

						Masataka Ohta

From marka@isc.org  Thu Oct  6 15:59:35 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4857111E808A for <dnsext@ietfa.amsl.com>; Thu,  6 Oct 2011 15:59:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.26
X-Spam-Level: 
X-Spam-Status: No, score=-2.26 tagged_above=-999 required=5 tests=[AWL=0.339,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9Mj5cRlhENkK for <dnsext@ietfa.amsl.com>; Thu,  6 Oct 2011 15:59:34 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id B727811E8073 for <dnsext@ietf.org>; Thu,  6 Oct 2011 15:59:34 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 431685F98BF for <dnsext@ietf.org>; Thu,  6 Oct 2011 23:02:34 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 2C188216C33 for <dnsext@ietf.org>; Thu,  6 Oct 2011 23:02:32 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 4633714C8E52 for <dnsext@ietf.org>; Fri,  7 Oct 2011 10:02:30 +1100 (EST)
To: dnsext@ietf.org
From: Mark Andrews <marka@isc.org>
Date: Fri, 07 Oct 2011 10:02:30 +1100
Message-Id: <20111006230230.4633714C8E52@drugs.dv.isc.org>
Subject: [dnsext] Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Oct 2011 22:59:35 -0000

Old: 4.9.2.  Handling of the CD Bit

   A non-validating security-aware stub resolver SHOULD NOT set the CD
   bit when sending queries unless it is requested by the application
   layer, as by definition, a non-validating stub resolver depends on
   the security-aware recursive name server to perform validation on its
   behalf.

   A validating security-aware stub resolver SHOULD set the CD bit,
   because otherwise the security-aware recursive name server will
   answer the query using the name server's local policy, which may
   prevent the stub resolver from receiving data that would be
   acceptable to the stub resolver's local policy.


New: 4.9.2.  Handling of the CD Bit

   A non-validating security-aware stub resolver SHOULD NOT set the CD
   bit when sending queries unless it is requested by the application
   layer, as by definition, a non-validating stub resolver depends on
   the security-aware recursive name server to perform validation on its
   behalf.

   A validating security-aware stub resolver SHOULD NOT set the CD
   bit on initial queries as this will allow upstream validating
   resolvers to reject answer which fail to validate and to try
   other sources.  If the validating security-aware stub resolver
   receives a SERVFAIL response to the initial query it should
   requery with CD bit set in case the SERVFAIL was due to a bad
   clock or stale trust anchors in a upstream validating resolver.

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE:	+61 2 9871 4742		         INTERNET: marka@isc.org

From suruti94@gmail.com  Thu Oct  6 19:12:33 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64BD321F8A58 for <dnsext@ietfa.amsl.com>; Thu,  6 Oct 2011 19:12:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.569
X-Spam-Level: 
X-Spam-Status: No, score=-3.569 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ucp7wIYZNqWa for <dnsext@ietfa.amsl.com>; Thu,  6 Oct 2011 19:12:32 -0700 (PDT)
Received: from mail-gx0-f172.google.com (mail-gx0-f172.google.com [209.85.161.172]) by ietfa.amsl.com (Postfix) with ESMTP id 7322D21F8753 for <dnsext@ietf.org>; Thu,  6 Oct 2011 19:12:32 -0700 (PDT)
Received: by ggnk3 with SMTP id k3so2851186ggn.31 for <dnsext@ietf.org>; Thu, 06 Oct 2011 19:15:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=WwyMcW9W0wzMcZQ+nCNntWfnSTIjiHW0FGdWSQqnNUg=; b=CjC4CqHkda0pTlCZhiBDhGtkFvCMSHIkBBbKdKJczXV2eEzXXpjQYlydt0WJ+ovjc+ //f23do/ZpOoZ1iVaFAPOdVlRI5y7ohxRE6Mosnb0DZFSGGPTUbZ0pJoq1IuBqO+hy3M kxRhmrbc2zZlYfHxKxuJpSN4qzuXN/lWUs0Pc=
MIME-Version: 1.0
Received: by 10.68.23.163 with SMTP id n3mr9964248pbf.89.1317953744330; Thu, 06 Oct 2011 19:15:44 -0700 (PDT)
Received: by 10.68.46.200 with HTTP; Thu, 6 Oct 2011 19:15:44 -0700 (PDT)
In-Reply-To: <20111006230230.4633714C8E52@drugs.dv.isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org>
Date: Thu, 6 Oct 2011 19:15:44 -0700
Message-ID: <CACU5sD=eHDyArtrSOWgPtQnLX6kD_+-mPrP8XQtTnZ8R0qky8A@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Oct 2011 02:12:33 -0000

Mark,

Thanks for bringing this up on a separate thread.

On Thu, Oct 6, 2011 at 4:02 PM, Mark Andrews <marka@isc.org> wrote:
>
> Old: 4.9.2. =A0Handling of the CD Bit
>
> =A0 A non-validating security-aware stub resolver SHOULD NOT set the CD
> =A0 bit when sending queries unless it is requested by the application
> =A0 layer, as by definition, a non-validating stub resolver depends on
> =A0 the security-aware recursive name server to perform validation on its
> =A0 behalf.
>
> =A0 A validating security-aware stub resolver SHOULD set the CD bit,
> =A0 because otherwise the security-aware recursive name server will
> =A0 answer the query using the name server's local policy, which may
> =A0 prevent the stub resolver from receiving data that would be
> =A0 acceptable to the stub resolver's local policy.
>
>
> New: 4.9.2. =A0Handling of the CD Bit
>
> =A0 A non-validating security-aware stub resolver SHOULD NOT set the CD
> =A0 bit when sending queries unless it is requested by the application
> =A0 layer, as by definition, a non-validating stub resolver depends on
> =A0 the security-aware recursive name server to perform validation on its
> =A0 behalf.
>
> =A0 A validating security-aware stub resolver SHOULD NOT set the CD

There are two problems with this:

1) Validation happens in two places which is really a waste of resources

2) CD bit is being overloaded (see below). As noted in the other
thread, it is a misconfiguration. I guess you need a different bit or
perhaps clarify the DO bit to mean that "I understand DNSSEC records,
don't stop when the first authoritative server does not return the
signature, try hard till no servers return any signatures".

> =A0 bit on initial queries as this will allow upstream validating
> =A0 resolvers to reject answer which fail to validate and to try
> =A0 other sources.

Why does setting/not-setting the CD bit influence the recursive server
to not-try/try other sources ? Why can't the DO bit be used for that
as explained above ?

-mohan

>=A0If the validating security-aware stub resolver
> =A0 receives a SERVFAIL response to the initial query it should
> =A0 requery with CD bit set in case the SERVFAIL was due to a bad
> =A0 clock or stale trust anchors in a upstream validating resolver.
>
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: =A0+61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0=
 INTERNET: marka@isc.org
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>

From marka@isc.org  Thu Oct  6 20:46:11 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80F0D21F8B90 for <dnsext@ietfa.amsl.com>; Thu,  6 Oct 2011 20:46:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.294
X-Spam-Level: 
X-Spam-Status: No, score=-2.294 tagged_above=-999 required=5 tests=[AWL=0.305,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5Qa2F7pkdhQL for <dnsext@ietfa.amsl.com>; Thu,  6 Oct 2011 20:46:10 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id 8AF6D21F8B8B for <dnsext@ietf.org>; Thu,  6 Oct 2011 20:46:10 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 2451BC941E; Fri,  7 Oct 2011 03:49:04 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 59F8B216C6B; Fri,  7 Oct 2011 03:49:03 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id DAC6D14D2096; Fri,  7 Oct 2011 14:48:58 +1100 (EST)
To: Mohan Parthasarathy <suruti94@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <CACU5sD=eHDyArtrSOWgPtQnLX6kD_+-mPrP8XQtTnZ8R0qky8A@mail.gmail.com>
In-reply-to: Your message of "Thu, 06 Oct 2011 19:15:44 PDT." <CACU5sD=eHDyArtrSOWgPtQnLX6kD_+-mPrP8XQtTnZ8R0qky8A@mail.gmail.com>
Date: Fri, 07 Oct 2011 14:48:58 +1100
Message-Id: <20111007034858.DAC6D14D2096@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Oct 2011 03:46:11 -0000

In message <CACU5sD=eHDyArtrSOWgPtQnLX6kD_+-mPrP8XQtTnZ8R0qky8A@mail.gmail.com>
, Mohan Parthasarathy writes:
> Mark,
> 
> Thanks for bringing this up on a separate thread.
> 
> On Thu, Oct 6, 2011 at 4:02 PM, Mark Andrews <marka@isc.org> wrote:
> >
> > Old: 4.9.2. =A0Handling of the CD Bit
> >
> > =A0 A non-validating security-aware stub resolver SHOULD NOT set the CD
> > =A0 bit when sending queries unless it is requested by the application
> > =A0 layer, as by definition, a non-validating stub resolver depends on
> > =A0 the security-aware recursive name server to perform validation on its
> > =A0 behalf.
> >
> > =A0 A validating security-aware stub resolver SHOULD set the CD bit,
> > =A0 because otherwise the security-aware recursive name server will
> > =A0 answer the query using the name server's local policy, which may
> > =A0 prevent the stub resolver from receiving data that would be
> > =A0 acceptable to the stub resolver's local policy.
> >
> >
> > New: 4.9.2. =A0Handling of the CD Bit
> >
> > =A0 A non-validating security-aware stub resolver SHOULD NOT set the CD
> > =A0 bit when sending queries unless it is requested by the application
> > =A0 layer, as by definition, a non-validating stub resolver depends on
> > =A0 the security-aware recursive name server to perform validation on its
> > =A0 behalf.
> >
> > =A0 A validating security-aware stub resolver SHOULD NOT set the CD
> 
> There are two problems with this:
> 
> 1) Validation happens in two places which is really a waste of resources

It is unavoidable unless you want to back and forwards lists of
upstream servers that have been tried.  Also a validating recursive
server will most probably validate CD=1 queries anyway as part of
adding the answers to its own cache.  All this does is move when
that validation occurs.

You seem to be under the impression that caches don't need to
validate if the end systems validate.  This is a fallacy.  For a
cache to not be a DoS source it needs to protect itself from bad
data.

> 2) CD bit is being overloaded (see below).

No it isn't.  CD=0 already requires the recursive server to retry
if it is validating.  If you want to force validation from a
non-validating recursive server we need to be able to pass trust
anchors to it.

> As noted in the other
> thread, it is a misconfiguration. I guess you need a different bit or
> perhaps clarify the DO bit to mean that "I understand DNSSEC records,
> don't stop when the first authoritative server does not return the
> signature, try hard till no servers return any signatures".

Which just generates lots of unnecessary queries.  Crypto is still
much quicker than asking more upstream queries.  99.999% of the
time the answer you get back does validate.

> > =A0 bit on initial queries as this will allow upstream validating
> > =A0 resolvers to reject answer which fail to validate and to try
> > =A0 other sources.
> 
> Why does setting/not-setting the CD bit influence the recursive server
> to not-try/try other sources?

CD=0 tells the upstream to only pass what it believe is good.  A
recursive server is supposed to treat any answer that doesn't
validate as if it had never arrived.  You then have a lost transaction
and the resolver will retry the query.

CD=1 tells the upstream to pass through what it got.  Repeated CD=1
queries are not required to ask different authoritative servers.

> Why can't the DO bit be used for that as explained above ?
> 
> -mohan
> 
> >=A0If the validating security-aware stub resolver
> > =A0 receives a SERVFAIL response to the initial query it should
> > =A0 requery with CD bit set in case the SERVFAIL was due to a bad
> > =A0 clock or stale trust anchors in a upstream validating resolver.
> >
> > --
> > Mark Andrews, ISC
> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > PHONE: =A0+61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0=
>  INTERNET: marka@isc.org
> > _______________________________________________
> > dnsext mailing list
> > dnsext@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsext
> >
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From Ed.Lewis@neustar.biz  Fri Oct  7 07:03:15 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3118921F8BBB for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 07:03:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.312
X-Spam-Level: 
X-Spam-Status: No, score=-106.312 tagged_above=-999 required=5 tests=[AWL=0.287, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DY7C4VlXHhcp for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 07:03:14 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 6A36821F84E5 for <dnsext@ietf.org>; Fri,  7 Oct 2011 07:03:14 -0700 (PDT)
Received: from mzab-lt510.cis.neustar.com (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p97E6QA4020264; Fri, 7 Oct 2011 10:06:26 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [192.168.128.72] by mzab-lt510.cis.neustar.com (PGP Universal service); Fri, 07 Oct 2011 10:06:27 -0400
X-PGP-Universal: processed; by mzab-lt510.cis.neustar.com on Fri, 07 Oct 2011 10:06:27 -0400
Mime-Version: 1.0
Message-Id: <a06240801cab4b6febee6@[10.31.203.207]>
In-Reply-To: <a06240800cab22aa31db5@[10.31.203.207]>
References: <4E8C12CC.3090701@nic.cz> <a06240804cab200031f9c@[10.31.203.207]> <Prayer.1.3.4.1110051450060.28254@hermes-2.csi.cam.ac.uk> <a06240800cab22aa31db5@[10.31.203.207]>
Date: Fri, 7 Oct 2011 10:06:24 -0400
To: <dnsext@ietf.org>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.72 on 10.20.30.4
Cc: Edward Lewis <Ed.Lewis@neustar.biz>
Subject: [dnsext] New ID submitted
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Oct 2011 14:03:15 -0000

http://www.ietf.org/mail-archive/web/i-d-announce/current/msg40107.html

Out of frustration trying to locate information on the more obscure 
RR type registrations at IANA, I drew up this draft.  Comments?

Yes, there are spelling errors...in the abstract.  From the announcement:

     Title         : IANA Allocated DNS RRtyp Codes without Documentation
     Author(s)     : E. Lewis
     Filename      : draft-lewis-dns-undocumented-types-00.txt
     Pages         : 3
     Date          : 2011-10-06
    
In the IANA registry of Resource Record (RR) TYPEs, as of October 1,
2011, there are 10 type code values allocated with references that
are individual email boxes and not stable documents.  Some of the
registrations represent works in progress and such a reference is
viable.  Some registrations are dormant or dead efforts.  In all
cases it would be helpful to have some refernce to material
describing the type.

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis             
NeuStar                    You can leave a voice message at +1-571-434-5468

Vote for the word of the day:
"Papa"razzi - father that constantly takes photos of the baby
Corpureaucracy - The institution of corporate "red tape"

From ajs@anvilwalrusden.com  Fri Oct  7 07:11:38 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EDD6D21F8696 for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 07:11:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.569
X-Spam-Level: 
X-Spam-Status: No, score=-2.569 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e+S2qvemNqJk for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 07:11:38 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 3FBE921F85A4 for <dnsext@ietf.org>; Fri,  7 Oct 2011 07:11:38 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 6A8F21ECB41C for <dnsext@ietf.org>; Fri,  7 Oct 2011 14:14:44 +0000 (UTC)
Date: Fri, 7 Oct 2011 10:14:50 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsext@ietf.org
Message-ID: <20111007141449.GA73072@shinkuro.com>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20111006230230.4633714C8E52@drugs.dv.isc.org>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Oct 2011 14:11:39 -0000

Dear colleagues,

This is a procedural matter about decisions we have already made.

On Fri, Oct 07, 2011 at 10:02:30AM +1100, Mark Andrews wrote:
> 
> New: 4.9.2.  Handling of the CD Bit
> 
>    A non-validating security-aware stub resolver SHOULD NOT set the CD
>    bit when sending queries unless it is requested by the application
>    layer

We had a huge discussion about this some time ago, and even had a
design team meeting about it.  We came to a conclusion which was
confirmed in face to face meetings and on the list.  Despite the fact
that dnssec-bis-updates has not made it out the door yet, I condiser
this issue closed unless someone has some new argument to make about
why the decision was the wrong one.  I urge anyone who wants to make
those arguments to refer to the previous discussions on this topic.
If you raise something that was already addressed, I will point that
out.

Best regards,

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com

From ajs@anvilwalrusden.com  Fri Oct  7 12:24:36 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38B6921F8C32 for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 12:24:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.571
X-Spam-Level: 
X-Spam-Status: No, score=-2.571 tagged_above=-999 required=5 tests=[AWL=0.029,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mlbGp9Xq2gFn for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 12:24:35 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 8BF0B21F8C2F for <dnsext@ietf.org>; Fri,  7 Oct 2011 12:24:35 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 6F4BB1ECB41C for <dnsext@ietf.org>; Fri,  7 Oct 2011 19:27:42 +0000 (UTC)
Date: Fri, 7 Oct 2011 15:27:52 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsext@ietf.org
Message-ID: <20111007192752.GO73072@shinkuro.com>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20111007141449.GA73072@shinkuro.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Oct 2011 19:24:36 -0000

Dear colleagues,

On Fri, Oct 07, 2011 at 10:14:50AM -0400, Andrew Sullivan wrote:
> 
> We had a huge discussion about this some time ago, and even had a
> design team meeting about it.

A kind participant whom I shall call 'Dew Isle' pointed out to me that
it's not very friendly to say "read the previous discussion" without
even pointing out where that discussion was.  Dew Isle is right, and
apologies to all.  Here's the beginning of the thread in the archive:

http://www.ietf.org/mail-archive/web/dnsext/current/msg08864.html

Note that while the discussion was on the namedroppers list, it
appears that the old-time archives have been removed, so you'll have
to use the IETF archive.

Best regards,

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com


From marka@isc.org  Fri Oct  7 15:46:44 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D300521F8B5F for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 15:46:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.322
X-Spam-Level: 
X-Spam-Status: No, score=-2.322 tagged_above=-999 required=5 tests=[AWL=0.277,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P++hp2z0tEzp for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 15:46:44 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id 0440821F86EE for <dnsext@ietf.org>; Fri,  7 Oct 2011 15:46:44 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id C7AE25F98B6; Fri,  7 Oct 2011 22:49:44 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 84EDC216C6B; Fri,  7 Oct 2011 22:49:42 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 6E9BD14DB73A; Sat,  8 Oct 2011 09:49:37 +1100 (EST)
To: Andrew Sullivan <ajs@anvilwalrusden.com>
From: Mark Andrews <marka@isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com>
In-reply-to: Your message of "Fri, 07 Oct 2011 15:27:52 EDT." <20111007192752.GO73072@shinkuro.com>
Date: Sat, 08 Oct 2011 09:49:37 +1100
Message-Id: <20111007224937.6E9BD14DB73A@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Oct 2011 22:46:44 -0000

In message <20111007192752.GO73072@shinkuro.com>, Andrew Sullivan writes:
> Dear colleagues,
> 
> On Fri, Oct 07, 2011 at 10:14:50AM -0400, Andrew Sullivan wrote:
> > 
> > We had a huge discussion about this some time ago, and even had a
> > design team meeting about it.

I know that.

A non-stub validating resolver has access to multiple athoritative
data sources.  A validating stub resolver does NOT have *direct*
access to multiple authoritative data sources.  This can lead to
accidental denials of service if the upstream learns data from a
bad source and passes it on to the stub.

Setting CD=0 on the initial query lets to upstream filter out what
it believes to be bad then the stub resolver validates what is
passed through.  This may or may not validate but has a much higher
probability of doing so.  If the upstream doesn't pass through a
answer that is possible to validate because it can't find one itself
the stub then asks with CD=1 to avoid the upstreams validator.

This is still not perfect as there may be cases where the stub
resolver has TA to a island of trust that the upstream doesn't so
the upstream can't help the stub by filtering out obviously bogus
responses.

The way to fix that is to have the stub pass the TA set it intends
to use to the recursive server and have it use that TA set when it
filters responses on the stub's behalf.  Note this is still CD=0
as the upstream is validating.

> A kind participant whom I shall call 'Dew Isle' pointed out to me that
> it's not very friendly to say "read the previous discussion" without
> even pointing out where that discussion was.  Dew Isle is right, and
> apologies to all.  Here's the beginning of the thread in the archive:
> 
> http://www.ietf.org/mail-archive/web/dnsext/current/msg08864.html
> 
> Note that while the discussion was on the namedroppers list, it
> appears that the old-time archives have been removed, so you'll have
> to use the IETF archive.
> 
> Best regards,
> 
> A
> 
> -- 
> Andrew Sullivan
> ajs@anvilwalrusden.com
> 
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From weiler@tislabs.com  Fri Oct  7 15:48:42 2011
Return-Path: <weiler@tislabs.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4267821F8C0A for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 15:48:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LHIOXidE0WKj for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 15:48:41 -0700 (PDT)
Received: from walnut.tislabs.com (walnut.tislabs.com [192.94.214.200]) by ietfa.amsl.com (Postfix) with ESMTP id C3F0A21F8C07 for <dnsext@ietf.org>; Fri,  7 Oct 2011 15:48:41 -0700 (PDT)
Received: from nova.tislabs.com (unknown [10.66.1.77]) by walnut.tislabs.com (Postfix) with ESMTP id 551DA28B0040; Fri,  7 Oct 2011 18:51:56 -0400 (EDT)
Received: from nova.tislabs.com (nova.tislabs.com [10.66.1.77]) by nova.tislabs.com (Postfix) with ESMTP id 3B2961F8032; Fri,  7 Oct 2011 18:51:56 -0400 (EDT)
Date: Fri, 7 Oct 2011 18:51:56 -0400 (EDT)
From: weiler@tislabs.com
To: Edward Lewis <Ed.Lewis@neustar.biz>
In-Reply-To: <a06240801cab4b6febee6@[10.31.203.207]>
Message-ID: <alpine.LRH.2.00.1110071842010.22780@nova.tislabs.com>
References: <4E8C12CC.3090701@nic.cz> <a06240804cab200031f9c@[10.31.203.207]> <Prayer.1.3.4.1110051450060.28254@hermes-2.csi.cam.ac.uk> <a06240800cab22aa31db5@[10.31.203.207]> <a06240801cab4b6febee6@[10.31.203.207]>
User-Agent: Alpine 2.00 (LRH 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Cc: dnsext@ietf.org
Subject: Re: [dnsext] New ID submitted
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Oct 2011 22:48:42 -0000

On Fri, 7 Oct 2011, Edward Lewis wrote:

> In all cases it would be helpful to have some refernce to material 
> describing the type.

I agree, but a new draft may not be the right way to do it.

Several of these assignments were made under the RFC5395/6195 rules, and 
those RFCs say "IANA shall maintain a public archive of approved 
templates."  The registry should point at that archive, not the names of 
people.  And the archive should include static copies of documents cited 
(e.g. i-d's).  I don't know if IANA is actually maintaining that archive 
or, if so, where.

> ... there are 10 type code values allocated with references that
> are individual email boxes and not stable documents.

The TA RR is a slightly different beast, since the citation in the 
registry is to a stable doc.  (You can get it in hardcopy through 
inter-library loan if you're desperate.)

I think the TA RR (32768) is one of only two type codes allocated under 
the RFC2929 "Specification Required" rules, and the only one with a 
non-RFC reference.  For ease of reference, I'd suggest that IANA just 
archive the specification document in the same place as the docs 
describing RRs assigned under 5395/6195.

-- Sam


From drc@virtualized.org  Fri Oct  7 16:06:48 2011
Return-Path: <drc@virtualized.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38DC321F8BEC for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 16:06:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.474
X-Spam-Level: 
X-Spam-Status: No, score=-2.474 tagged_above=-999 required=5 tests=[AWL=0.125,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D7qKVZ9XZpSg for <dnsext@ietfa.amsl.com>; Fri,  7 Oct 2011 16:06:47 -0700 (PDT)
Received: from trantor.virtualized.org (trantor.virtualized.org [199.48.134.42]) by ietfa.amsl.com (Postfix) with ESMTP id 184CE21F8BF0 for <dnsext@ietf.org>; Fri,  7 Oct 2011 16:06:47 -0700 (PDT)
Received: from [192.168.1.101] (unknown [173.245.57.22]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: drc) by trantor.virtualized.org (Postfix) with ESMTPSA id AA8861704E; Fri,  7 Oct 2011 23:10:00 +0000 (UTC)
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: text/plain; charset=us-ascii
From: David Conrad <drc@virtualized.org>
In-Reply-To: <20111007224937.6E9BD14DB73A@drugs.dv.isc.org>
Date: Fri, 7 Oct 2011 16:09:58 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org>
To: Mark Andrews <marka@isc.org>
X-Mailer: Apple Mail (2.1244.3)
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Oct 2011 23:06:48 -0000

Mark,

On Oct 7, 2011, at 3:49 PM, Mark Andrews wrote:
> In message <20111007192752.GO73072@shinkuro.com>, Andrew Sullivan =
writes:
>>> We had a huge discussion about this some time ago, and even had a
>>> design team meeting about it.
>=20
> I know that.

For those of us not finely attuned to the CD bit, can you summarize what =
has changed since the huge discussion and the design team meeting to =
cause you to raise the issue?

Thanks,
-drc


From marka@isc.org  Sat Oct  8 05:24:05 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C70A621F8A95 for <dnsext@ietfa.amsl.com>; Sat,  8 Oct 2011 05:24:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.345
X-Spam-Level: 
X-Spam-Status: No, score=-2.345 tagged_above=-999 required=5 tests=[AWL=0.254,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ygq9SV1bBisO for <dnsext@ietfa.amsl.com>; Sat,  8 Oct 2011 05:24:05 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id A245321F8663 for <dnsext@ietf.org>; Sat,  8 Oct 2011 05:23:57 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 19850C9423; Sat,  8 Oct 2011 12:26:58 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id A0297216C6A; Sat,  8 Oct 2011 12:26:57 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id EB10314DDC76; Sat,  8 Oct 2011 23:26:53 +1100 (EST)
To: David Conrad <drc@virtualized.org>
From: Mark Andrews <marka@isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org>
In-reply-to: Your message of "Fri, 07 Oct 2011 16:09:58 PDT." <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org>
Date: Sat, 08 Oct 2011 23:26:53 +1100
Message-Id: <20111008122653.EB10314DDC76@drugs.dv.isc.org>
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Oct 2011 12:24:05 -0000

In message <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org>, David Conrad
 writes:
> Mark,
> 
> On Oct 7, 2011, at 3:49 PM, Mark Andrews wrote:
> > In message <20111007192752.GO73072@shinkuro.com>, Andrew Sullivan =
> writes:
> >>> We had a huge discussion about this some time ago, and even had a
> >>> design team meeting about it.
> >=20
> > I know that.
> 
> For those of us not finely attuned to the CD bit, can you summarize what =
> has changed since the huge discussion and the design team meeting to =
> cause you to raise the issue?

More correctly I know there was a huge discussion about forwarder
behaviour and CD and whether there is a covering trust anchor or
not.  No where in that discussion was there any discussion of the
best behaviour for a stub resolver.

Nor has there every been any discussion of the denial of service
risks of just sending CD=1 queries to the recursive server from a
stub resolver.  Sending CD=0 is documented in RFC 4035.

Now if you can find any real discussion anywhere of how a validating
stub resolvers should set CD and the risks related to both setting
please point it out.  My recollections is we have only ever really
thought about setting CD=1 and no proper analysis has ever been done.

There are risks with both CD=0 and CD=1 for a stub resolver which
is why I am recommending CD=0, then CD=1, as it provides the best
mitigation strategy.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From Ed.Lewis@neustar.biz  Sat Oct  8 13:42:57 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55BC721F893C for <dnsext@ietfa.amsl.com>; Sat,  8 Oct 2011 13:42:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.114
X-Spam-Level: 
X-Spam-Status: No, score=-105.114 tagged_above=-999 required=5 tests=[AWL=-0.930, BAYES_40=-0.185, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9JWLEfuqgp07 for <dnsext@ietfa.amsl.com>; Sat,  8 Oct 2011 13:42:56 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id B5EFC21F87E2 for <dnsext@ietf.org>; Sat,  8 Oct 2011 13:42:55 -0700 (PDT)
Received: from Work-Laptop-2.local (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p98Kjv1l006959; Sat, 8 Oct 2011 16:45:59 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [192.168.1.100] by Work-Laptop-2.local (PGP Universal service); Sat, 08 Oct 2011 16:46:05 -0400
X-PGP-Universal: processed; by Work-Laptop-2.local on Sat, 08 Oct 2011 16:46:05 -0400
Mime-Version: 1.0
Message-Id: <a06240800cab662b5694c@[192.168.128.72]>
In-Reply-To: <alpine.LRH.2.00.1110071842010.22780@nova.tislabs.com>
References: <4E8C12CC.3090701@nic.cz> <a06240804cab200031f9c@[10.31.203.207]> <Prayer.1.3.4.1110051450060.28254@hermes-2.csi.cam.ac.uk> <a06240800cab22aa31db5@[10.31.203.207]> <a06240801cab4b6febee6@[10.31.203.207]> <alpine.LRH.2.00.1110071842010.22780@nova.tislabs.com>
Date: Sat, 8 Oct 2011 16:39:11 -0400
To: <weiler@tislabs.com>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: multipart/alternative; boundary="============_-894015731==_ma============"
X-Scanned-By: MIMEDefang 2.72 on 10.20.30.4
Cc: Edward Lewis <Ed.Lewis@neustar.biz>, dnsext@ietf.org
Subject: Re: [dnsext] New ID submitted
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Oct 2011 20:42:57 -0000

--============_-894015731==_ma============
Content-Type: text/plain; charset="us-ascii" ; format="flowed"

At 18:51 -0400 10/7/11, <weiler@tislabs.com> wrote:
>On Fri, 7 Oct 2011, Edward Lewis wrote:
>
>>  In all cases it would be helpful to have some refernce to material 
>>describing the type.
>
>I agree, but a new draft may not be the right way to do it.

The reason I submitted this draft was that I feel "something is 
better than nothing."  All I said above is "it would helpful."

>
>Several of these assignments were made under the RFC5395/6195 rules, 
>and those RFCs say "IANA shall maintain a public archive of approved 
>templates."  The registry should point at that archive, not the 
>names of people.  And the archive should include static copies of 
>documents cited (e.g. i-d's).  I don't know if IANA is actually 
>maintaining that archive or, if so, where.
>
>>  ... there are 10 type code values allocated with references that
>>  are individual email boxes and not stable documents.
>
>The TA RR is a slightly different beast, since the citation in the 
>registry is to a stable doc.  (You can get it in hardcopy through 
>inter-library loan if you're desperate.)
>
>I think the TA RR (32768) is one of only two type codes allocated 
>under the RFC2929 "Specification Required" rules, and the only one 
>with a non-RFC reference.  For ease of reference, I'd suggest that 
>IANA just archive the specification document in the same place as 
>the docs describing RRs assigned under 5395/6195.

Ok, there's more frustration in me than I put into the draft.  I've 
been trying to get IANA to clean up the citations for DNS parameters 
longer than I've had my current job, which means it's been at least 7 
years.

The ATMA record took quite a while to iron out (and it was).  That 
record was defined in a document owned by the ATM Association and 
available on that website.  (I discovered the document by doing a web 
search and hitting a Microsoft page with the reference.)  I tried to 
get the document listed at IANA.  But then the ATM association 
website disappeared, "bought up" by the MPLS association.  I began to 
try to get IANA to escrow the document.  Later on the MPLS website 
went away too, replaced by another.  Finally, IANA got "permission" 
from the owners of the document (whomever bought the MPLS-A that 
bought the ATM=A) to escrow the document.  That is why you now see 
this:

[ATMDOC]   ATM Forum Technical Committee, "ATM Name System, V2.0",
            Doc ID: AF-DANS-0152.000, July 2000. Available from
 
http://broadband-forum.org/ftp/pub/approved-specs/af-saa-0069.000.pdf
            and held in escrow by IANA.

So, now, in this draft I'm just putting in some data (names of 
documents, brief syntax descriptions) and dropping the hint that it 
would be good to have better references in the registry.

As far as trying to request IANA do this - I have and, well, life's 
too short.  So I'm just trying to chip in, as a volunteer, and say to 
anyone coming along later, if you want to find these types, try these 
documents and these locations.  No guarantees, no promises, and I'm 
not trying to change the world.

This was the second or third time in my career I've had to track 
these down.  I did this writing prototype code for RFC 2065 and 2535 
versions of DNSSEC.  I did it for my previous job for some reason. 
I'm doing it now for bookkeeping purposes.  I figure if I had written 
this down the first time, I would have saved me some time.

I'm just dropping bread crumbs.

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis             
NeuStar                    You can leave a voice message at +1-571-434-5468

Vote for the word of the day:
"Papa"razzi - father that constantly takes photos of the baby
Corpureaucracy - The institution of corporate "red tape"
--============_-894015731==_ma============
Content-Type: text/html; charset="us-ascii"

<!doctype html public "-//W3C//DTD W3 HTML//EN">
<html><head><style type="text/css"><!--
blockquote, dl, ul, ol, li { padding-top: 0 ; padding-bottom: 0 }
 --></style><title>Re: [dnsext] New ID submitted</title></head><body>
<div>At 18:51 -0400 10/7/11, &lt;weiler@tislabs.com&gt; wrote:</div>
<div>&gt;On Fri, 7 Oct 2011, Edward Lewis wrote:<br>
&gt;<br>
&gt;&gt; In all cases it would be helpful to have some refernce to
material describing the type.<br>
&gt;</div>
<div>&gt;I agree, but a new draft may not be the right way to do
it.<br>
</div>
<div>The reason I submitted this draft was that I feel &quot;something
is better than nothing.&quot;&nbsp; All I said above is &quot;it would
helpful.&quot;</div>
<div><br></div>
<div>&gt;<br>
&gt;Several of these assignments were made under the RFC5395/6195
rules, and those RFCs say &quot;IANA shall maintain a public archive
of approved templates.&quot;&nbsp; The registry should point at that
archive, not the names of people.&nbsp; And the archive should include
static copies of documents cited (e.g. i-d's).&nbsp; I don't know if
IANA is actually maintaining that archive or, if so, where.<br>
&gt;<br>
&gt;&gt; ... there are 10 type code values allocated with references
that<br>
&gt;&gt; are individual email boxes and not stable documents.<br>
&gt;<br>
&gt;The TA RR is a slightly different beast, since the citation in the
registry is to a stable doc.&nbsp; (You can get it in hardcopy through
inter-library loan if you're desperate.)<br>
&gt;</div>
<div>&gt;I think the TA RR (32768) is one of only two type codes
allocated under the RFC2929 &quot;Specification Required&quot; rules,
and the only one with a non-RFC reference.&nbsp; For ease of
reference, I'd suggest that IANA just archive the specification
document in the same place as the docs describing RRs assigned under
5395/6195.</div>
<div><br></div>
<div>Ok, there's more frustration in me than I put into the draft.&nbsp;
I've been trying to get IANA to clean up the citations for DNS
parameters longer than I've had my current job, which means it's been
at least 7 years.</div>
<div><br></div>
<div>The ATMA record took quite a while to iron out (and it was).&nbsp;
That record was defined in a document owned by the ATM Association and
available on that website.&nbsp; (I discovered the document by doing a
web search and hitting a Microsoft page with the reference.)&nbsp; I
tried to get the document listed at IANA.&nbsp; But then the ATM
association website disappeared, &quot;bought up&quot; by the MPLS
association.&nbsp; I began to try to get IANA to escrow the document.&nbsp;
Later on the MPLS website went away too, replaced by another.&nbsp;
Finally, IANA got &quot;permission&quot; from the owners of the
document (whomever bought the MPLS-A that bought the ATM=A) to escrow
the document.&nbsp; That is why you now see this:</div>
<div><br></div>
<div>[ATMDOC]&nbsp;&nbsp; ATM Forum Technical Committee, &quot;ATM
Name System, V2.0&quot;,<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Doc ID:
AF-DANS-0152.000, July 2000. Available from<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
http://broadband-forum.org/ftp/pub/approved-specs/af-saa-0069.000.pdf<br
>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and held
in escrow by IANA.<br>
</div>
<div>So, now, in this draft I'm just putting in some data (names of
documents, brief syntax descriptions) and dropping the hint that it
would be good to have better references in the registry.</div>
<div><br></div>
<div>As far as trying to request IANA do this - I have and, well,
life's too short.&nbsp; So I'm just trying to chip in, as a volunteer,
and say to anyone coming along later, if you want to find these types,
try these documents and these locations.&nbsp; No guarantees, no
promises, and I'm not trying to change the world.</div>
<div><br></div>
<div>This was the second or third time in my career I've had to track
these down.&nbsp; I did this writing prototype code for RFC 2065 and
2535 versions of DNSSEC.&nbsp; I did it for my previous job for some
reason.&nbsp; I'm doing it now for bookkeeping purposes.&nbsp; I
figure if I had written this down the first time, I would have saved
me some time.</div>
<div><br></div>
<div>I'm just dropping bread crumbs.</div>
<div><br></div>
<x-sigsep><pre>-- 
</pre></x-sigsep>
<div
>-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=<span
></span>-=-=-=-<br>
Edward
Lewis&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span
></span>&nbsp;&nbsp;&nbsp;<br>
NeuStar&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span
></span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; You can
leave a voice message at +1-571-434-5468<br>
<br>
Vote for the word of the day:<br>
&quot;Papa&quot;razzi - father that constantly takes photos of the
baby<br>
Corpureaucracy - The institution of corporate &quot;red
tape&quot;</div>
</body>
</html>
--============_-894015731==_ma============--

From ajs@anvilwalrusden.com  Sat Oct  8 14:21:18 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E64E21F8B5B for <dnsext@ietfa.amsl.com>; Sat,  8 Oct 2011 14:21:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.571
X-Spam-Level: 
X-Spam-Status: No, score=-2.571 tagged_above=-999 required=5 tests=[AWL=0.028,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iaOJeIx4p1gi for <dnsext@ietfa.amsl.com>; Sat,  8 Oct 2011 14:21:18 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id DEB9121F8B53 for <dnsext@ietf.org>; Sat,  8 Oct 2011 14:21:17 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id AF5561ECB420 for <dnsext@ietf.org>; Sat,  8 Oct 2011 21:24:27 +0000 (UTC)
Date: Sat, 8 Oct 2011 17:24:32 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsext@ietf.org
Message-ID: <20111008212432.GB82710@shinkuro.com>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20111008122653.EB10314DDC76@drugs.dv.isc.org>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Oct 2011 21:21:18 -0000

No hat.

On Sat, Oct 08, 2011 at 11:26:53PM +1100, Mark Andrews wrote:

> Nor has there every been any discussion of the denial of service
> risks of just sending CD=1 queries to the recursive server from a
> stub resolver.  Sending CD=0 is documented in RFC 4035.

[. . .]
 
> There are risks with both CD=0 and CD=1 for a stub resolver which
> is why I am recommending CD=0, then CD=1, as it provides the best
> mitigation strategy.

That seems to me like an operational or policy decision, and not a
protocol matter.  That is, your SHOULD NOT in your paragraph 2 is not
the SHOULD NOT of RFC 2119, but a SHOULD NOT that means "I think this
is the best idea."  RFC 2119 SHOULD NOT is about interoperability,
which is why it has the unusual meaning as defined in that RFC.  There
are different possible policies here, and I don't believe one of them
ought to be enshrined as the protocol, because I can think of reasons
why one might prefer the DoS risk (like, for instance, that you don't
have a secure connection to upstream and you know it isn't validating
anyway).

I can see reasons to write a document (perhaps for DNSOP) on how to
operate your validating (stub) resolver.

Best regards,

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com

From marka@isc.org  Sat Oct  8 15:35:28 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2A4921F8AA8 for <dnsext@ietfa.amsl.com>; Sat,  8 Oct 2011 15:35:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.364
X-Spam-Level: 
X-Spam-Status: No, score=-2.364 tagged_above=-999 required=5 tests=[AWL=0.235,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IjU09hp2TeKc for <dnsext@ietfa.amsl.com>; Sat,  8 Oct 2011 15:35:27 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id 0B93E21F8A96 for <dnsext@ietf.org>; Sat,  8 Oct 2011 15:35:27 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 4BC91C941E; Sat,  8 Oct 2011 22:38:24 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id B5BBE216C6A; Sat,  8 Oct 2011 22:38:23 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id F09F314DF5E1; Sun,  9 Oct 2011 09:38:20 +1100 (EST)
To: Andrew Sullivan <ajs@anvilwalrusden.com>
From: Mark Andrews <marka@isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com>
In-reply-to: Your message of "Sat, 08 Oct 2011 17:24:32 EDT." <20111008212432.GB82710@shinkuro.com>
Date: Sun, 09 Oct 2011 09:38:20 +1100
Message-Id: <20111008223820.F09F314DF5E1@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Oct 2011 22:35:28 -0000

In message <20111008212432.GB82710@shinkuro.com>, Andrew Sullivan writes:
> No hat.
> 
> On Sat, Oct 08, 2011 at 11:26:53PM +1100, Mark Andrews wrote:
> 
> > Nor has there every been any discussion of the denial of service
> > risks of just sending CD=1 queries to the recursive server from a
> > stub resolver.  Sending CD=0 is documented in RFC 4035.
> 
> [. . .]
>  
> > There are risks with both CD=0 and CD=1 for a stub resolver which
> > is why I am recommending CD=0, then CD=1, as it provides the best
> > mitigation strategy.
> 
> That seems to me like an operational or policy decision, and not a
> protocol matter.  That is, your SHOULD NOT in your paragraph 2 is not
> the SHOULD NOT of RFC 2119, but a SHOULD NOT that means "I think this
> is the best idea."  RFC 2119 SHOULD NOT is about interoperability,
> which is why it has the unusual meaning as defined in that RFC.  There
> are different possible policies here, and I don't believe one of them
> ought to be enshrined as the protocol, because I can think of reasons
> why one might prefer the DoS risk (like, for instance, that you don't
> have a secure connection to upstream and you know it isn't validating
> anyway).

By that logic we should strike paragraph 2 of 4.9.2 (Handling of the CD Bit)

   A validating security-aware stub resolver SHOULD set the CD bit,
   because otherwise the security-aware recursive name server will
   answer the query using the name server's local policy, which may
   prevent the stub resolver from receiving data that would be
   acceptable to the stub resolver's local policy.

That SHOULD is not required for interoperability.

Now do we give good advice or do we give no advice?

> I can see reasons to write a document (perhaps for DNSOP) on how to
> operate your validating (stub) resolver.


> Best regards,
> 
> A
> 
> -- 
> Andrew Sullivan
> ajs@anvilwalrusden.com
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From ajs@anvilwalrusden.com  Sun Oct  9 07:04:10 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C2A4F21F8AD9 for <dnsext@ietfa.amsl.com>; Sun,  9 Oct 2011 07:04:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.001
X-Spam-Level: 
X-Spam-Status: No, score=0.001 tagged_above=-999 required=5 tests=[BAYES_50=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cgK-vmQXTctl for <dnsext@ietfa.amsl.com>; Sun,  9 Oct 2011 07:04:10 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 53D4B21F8A97 for <dnsext@ietf.org>; Sun,  9 Oct 2011 07:04:07 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 2F2B61ECB41C for <dnsext@ietf.org>; Sun,  9 Oct 2011 14:03:59 +0000 (UTC)
Date: Sun, 9 Oct 2011 10:04:04 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsext@ietf.org
Message-ID: <20111009135505.GA85221@shinkuro.com>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20111008223820.F09F314DF5E1@drugs.dv.isc.org>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Oct 2011 14:04:10 -0000

No hat.

On Sun, Oct 09, 2011 at 09:38:20AM +1100, Mark Andrews wrote:

> By that logic we should strike paragraph 2 of 4.9.2 (Handling of the CD Bit)
> 
>    A validating security-aware stub resolver SHOULD set the CD bit,
>    because otherwise the security-aware recursive name server will
>    answer the query using the name server's local policy, which may
>    prevent the stub resolver from receiving data that would be
>    acceptable to the stub resolver's local policy.
> 
> That SHOULD is not required for interoperability.

True, although it appears to me to be a consequence of the definition
of validating security-aware stub resolver.  But anyway,

> Now do we give good advice or do we give no advice?

as I argued before, the advice you are proposing is not in fact always
good advice.  It's a trade-off.


-- 
Andrew Sullivan
ajs@anvilwalrusden.com

From marka@isc.org  Sun Oct  9 16:01:30 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0BC8D21F87FA for <dnsext@ietfa.amsl.com>; Sun,  9 Oct 2011 16:01:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rQVx34BLDTot for <dnsext@ietfa.amsl.com>; Sun,  9 Oct 2011 16:01:29 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id 7649121F87F0 for <dnsext@ietf.org>; Sun,  9 Oct 2011 16:01:29 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id B37435F98E6; Sun,  9 Oct 2011 23:01:12 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 4B995216C6A; Sun,  9 Oct 2011 23:01:10 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 4756314E0BDE; Mon, 10 Oct 2011 08:34:31 +1100 (EST)
To: Andrew Sullivan <ajs@anvilwalrusden.com>
From: Mark Andrews <marka@isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com>
In-reply-to: Your message of "Sun, 09 Oct 2011 10:04:04 EDT." <20111009135505.GA85221@shinkuro.com>
Date: Mon, 10 Oct 2011 08:34:31 +1100
Message-Id: <20111009213431.4756314E0BDE@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Oct 2011 23:01:30 -0000

In message <20111009135505.GA85221@shinkuro.com>, Andrew Sullivan writes:
> No hat.
> 
> On Sun, Oct 09, 2011 at 09:38:20AM +1100, Mark Andrews wrote:
> 
> > By that logic we should strike paragraph 2 of 4.9.2 (Handling of the CD Bit
> )
> > 
> >    A validating security-aware stub resolver SHOULD set the CD bit,
> >    because otherwise the security-aware recursive name server will
> >    answer the query using the name server's local policy, which may
> >    prevent the stub resolver from receiving data that would be
> >    acceptable to the stub resolver's local policy.
> > 
> > That SHOULD is not required for interoperability.
> 
> True, although it appears to me to be a consequence of the definition
> of validating security-aware stub resolver.  But anyway,
> 
> > Now do we give good advice or do we give no advice?
> 
> as I argued before, the advice you are proposing is not in fact always
> good advice.  It's a trade-off.

It's *never* bad advice as it get you to do both CD=0 and then CD=1.
Advising to do *just* CD=0 or CD=1 is bad advice.  If the upstream
doesn't have trust anchors then CD=0 or CD=1 is a moot question.
If the upstream has trust anchors using just CD=1 is leaving the
stub resolver open to a denial of service due to spoofing /
misconfiguration of the parent especially if there is CD=1 cache.
Similarly just CD=0 is leaving you exposed to bad clocks / stale
trust anchors in the recursive server.  With CD=0 then CD=1 you
mitigate both failure modes.

> -- 
> Andrew Sullivan
> ajs@anvilwalrusden.com
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From suruti94@gmail.com  Sun Oct  9 18:41:41 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 158D121F8B19 for <dnsext@ietfa.amsl.com>; Sun,  9 Oct 2011 18:41:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zDyji3ywE0ZP for <dnsext@ietfa.amsl.com>; Sun,  9 Oct 2011 18:41:40 -0700 (PDT)
Received: from mail-yw0-f44.google.com (mail-yw0-f44.google.com [209.85.213.44]) by ietfa.amsl.com (Postfix) with ESMTP id 7996421F85A4 for <dnsext@ietf.org>; Sun,  9 Oct 2011 18:41:40 -0700 (PDT)
Received: by ywm3 with SMTP id 3so6131566ywm.31 for <dnsext@ietf.org>; Sun, 09 Oct 2011 18:41:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=mGQfhlqGeDmlMJO9ya4ZzznSpJrgr1L5JieNAh32xdw=; b=KT9KuxsTKg5yOZ6ujsLYt8eJClwcAy2e+x5xCqJ68RsyNT4Iq4a/Kcwv4N/24Px66e z/GN04DDvQjt7gyngl53J0IwHxAyu86ZP6Q6RRk12IaVVQPaxCHZUeb2WUn0C3vVJxCQ FyoNZLTAtnUJkOFB3zr9GicRTspEXMvtve9lM=
MIME-Version: 1.0
Received: by 10.68.36.166 with SMTP id r6mr33166014pbj.77.1318210899805; Sun, 09 Oct 2011 18:41:39 -0700 (PDT)
Received: by 10.68.43.37 with HTTP; Sun, 9 Oct 2011 18:41:39 -0700 (PDT)
In-Reply-To: <20111009213431.4756314E0BDE@drugs.dv.isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org>
Date: Sun, 9 Oct 2011 18:41:39 -0700
Message-ID: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Oct 2011 01:41:41 -0000

On Sun, Oct 9, 2011 at 2:34 PM, Mark Andrews <marka@isc.org> wrote:
>
> In message <20111009135505.GA85221@shinkuro.com>, Andrew Sullivan writes:
>> No hat.
>>
>> On Sun, Oct 09, 2011 at 09:38:20AM +1100, Mark Andrews wrote:
>>
>> > By that logic we should strike paragraph 2 of 4.9.2 (Handling of the C=
D Bit
>> )
>> >
>> > =A0 =A0A validating security-aware stub resolver SHOULD set the CD bit=
,
>> > =A0 =A0because otherwise the security-aware recursive name server will
>> > =A0 =A0answer the query using the name server's local policy, which ma=
y
>> > =A0 =A0prevent the stub resolver from receiving data that would be
>> > =A0 =A0acceptable to the stub resolver's local policy.
>> >
>> > That SHOULD is not required for interoperability.
>>
>> True, although it appears to me to be a consequence of the definition
>> of validating security-aware stub resolver. =A0But anyway,
>>
>> > Now do we give good advice or do we give no advice?
>>
>> as I argued before, the advice you are proposing is not in fact always
>> good advice. =A0It's a trade-off.
>
> It's *never* bad advice as it get you to do both CD=3D0 and then CD=3D1.

It would be a bad advice if it increases the complexity without real benefi=
ts.

> Advising to do *just* CD=3D0 or CD=3D1 is bad advice. =A0If the upstream
> doesn't have trust anchors then CD=3D0 or CD=3D1 is a moot question.
> If the upstream has trust anchors using just CD=3D1 is leaving the
> stub resolver open to a denial of service due to spoofing /
> misconfiguration of the parent especially if there is CD=3D1 cache.

You seem to be implying a "CD=3D1 cache" and "CD=3D0 cache" i.e, a cache
maintained differently for CD =3D1 or CD =3D 0. If the recursive sever
populates the cache in the same way for both CD=3D0 and CD=3D1, then this
issue does not arise. This seems to be much simpler to me rather than
treating it differently.

-mohan

> Similarly just CD=3D0 is leaving you exposed to bad clocks / stale
> trust anchors in the recursive server. =A0With CD=3D0 then CD=3D1 you
> mitigate both failure modes.
>
>> --
>> Andrew Sullivan
>> ajs@anvilwalrusden.com
>> _______________________________________________
>> dnsext mailing list
>> dnsext@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsext
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
c.org
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>

From marka@isc.org  Sun Oct  9 22:17:51 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D54521F8783 for <dnsext@ietfa.amsl.com>; Sun,  9 Oct 2011 22:17:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m-Tj3raqtkuh for <dnsext@ietfa.amsl.com>; Sun,  9 Oct 2011 22:17:50 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id 67D9521F8713 for <dnsext@ietf.org>; Sun,  9 Oct 2011 22:17:50 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 9D92F5F98B6; Mon, 10 Oct 2011 05:17:30 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 41DBE216C6A; Mon, 10 Oct 2011 05:17:28 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 3A95214E5206; Mon, 10 Oct 2011 16:17:25 +1100 (EST)
To: Mohan Parthasarathy <suruti94@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com>
In-reply-to: Your message of "Sun, 09 Oct 2011 18:41:39 PDT." <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com>
Date: Mon, 10 Oct 2011 16:17:25 +1100
Message-Id: <20111010051725.3A95214E5206@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Oct 2011 05:17:51 -0000

In message <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com>
, Mohan Parthasarathy writes:
> On Sun, Oct 9, 2011 at 2:34 PM, Mark Andrews <marka@isc.org> wrote:
> >
> > In message <20111009135505.GA85221@shinkuro.com>, Andrew Sullivan writes:
> >> No hat.
> >>
> >> On Sun, Oct 09, 2011 at 09:38:20AM +1100, Mark Andrews wrote:
> >>
> >> > By that logic we should strike paragraph 2 of 4.9.2 (Handling of the C=
> D Bit
> >> )
> >> >
> >> > =A0 =A0A validating security-aware stub resolver SHOULD set the CD bit=
> ,
> >> > =A0 =A0because otherwise the security-aware recursive name server will
> >> > =A0 =A0answer the query using the name server's local policy, which ma=
> y
> >> > =A0 =A0prevent the stub resolver from receiving data that would be
> >> > =A0 =A0acceptable to the stub resolver's local policy.
> >> >
> >> > That SHOULD is not required for interoperability.
> >>
> >> True, although it appears to me to be a consequence of the definition
> >> of validating security-aware stub resolver. =A0But anyway,
> >>
> >> > Now do we give good advice or do we give no advice?
> >>
> >> as I argued before, the advice you are proposing is not in fact always
> >> good advice. =A0It's a trade-off.
> >
> > It's *never* bad advice as it get you to do both CD=0 and then CD=1.
> 
> It would be a bad advice if it increases the complexity without real benefi=
> ts.

The complexity of checking for SERVFAIL and reissuing the query
with CD=1 is trivial compared to the complexity of validating a
answer.  This is no more complex that existing TC=1 checks and
retrying with TCP.

> > Advising to do *just* CD=0 or CD=1 is bad advice. =A0If the upstream
> > doesn't have trust anchors then CD=0 or CD=1 is a moot question.
> > If the upstream has trust anchors using just CD=1 is leaving the
> > stub resolver open to a denial of service due to spoofing /
> > misconfiguration of the parent especially if there is CD=1 cache.
> 
> You seem to be implying a "CD=1 cache" and "CD=0 cache" i.e, a cache
> maintained differently for CD =1 or CD = 0. If the recursive sever
> populates the cache in the same way for both CD=0 and CD=1, then this
> issue does not arise. This seems to be much simpler to me rather than
> treating it differently.

Even if server doesn't have a CD=1 cache there is no guarantee that
a second query (with CD=1) will talk to a different authoritative
server.  CD=0 queries are guarantee to talk to multiple authoritative
servers provided there is a trusted path from the servers TA if the
first authoritative server tried is broken.

Given I've seen signed zone configured with servers that don't speak
DNSSEC and I've also seen repeated CD=1 queries fail to get answers
with signature from such a configuration this is not idle speculation
that avoidable validation failures will occur with CD=1 only queries.

I'd argue that misconfigured authoritative servers are more common
than misconfigured TAs as the latter affects ordinary queries and
will result in complaints leading to the TA being fixed where as
the former is hidden as validating recursive servers reject the
answers from the bad server and only return those from the good
servers.

Mark

> -mohan
> 
> > Similarly just CD=0 is leaving you exposed to bad clocks / stale
> > trust anchors in the recursive server. =A0With CD=0 then CD=1 you
> > mitigate both failure modes.
> >
> >> --
> >> Andrew Sullivan
> >> ajs@anvilwalrusden.com
> >> _______________________________________________
> >> dnsext mailing list
> >> dnsext@ietf.org
> >> https://www.ietf.org/mailman/listinfo/dnsext
> > --
> > Mark Andrews, ISC
> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
> c.org
> > _______________________________________________
> > dnsext mailing list
> > dnsext@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsext
> >
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From shane@isc.org  Mon Oct 10 01:58:27 2011
Return-Path: <shane@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B21D921F8B46 for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 01:58:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.741
X-Spam-Level: 
X-Spam-Status: No, score=-0.741 tagged_above=-999 required=5 tests=[BAYES_20=-0.74, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sug8XlpHdVvs for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 01:58:27 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id EA46C21F8B31 for <dnsext@ietf.org>; Mon, 10 Oct 2011 01:58:26 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 784A3C941E; Mon, 10 Oct 2011 08:58:06 +0000 (UTC) (envelope-from shane@isc.org)
Received: from [IPv6:2001:610:719:1:beae:c5ff:fe43:aa00] (unknown [IPv6:2001:610:719:1:beae:c5ff:fe43:aa00]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 72776216C6A; Mon, 10 Oct 2011 08:58:05 +0000 (UTC) (envelope-from shane@isc.org)
From: Shane Kerr <shane@isc.org>
To: Edward Lewis <Ed.Lewis@neustar.biz>
Date: Mon, 10 Oct 2011 10:58:02 +0200
In-Reply-To: <a06240801cab4b6febee6@[10.31.203.207]>
References: <4E8C12CC.3090701@nic.cz> <a06240804cab200031f9c@[10.31.203.207]> <Prayer.1.3.4.1110051450060.28254@hermes-2.csi.cam.ac.uk> <a06240800cab22aa31db5@[10.31.203.207]> <a06240801cab4b6febee6@[10.31.203.207]>
Organization: ISC
Content-Type: text/plain; charset="UTF-8"
X-Mailer: Evolution 3.0.3 (3.0.3-1.fc15) 
Content-Transfer-Encoding: 7bit
Message-ID: <1318237086.2457.13.camel@shane-desktop>
Mime-Version: 1.0
Cc: dnsext@ietf.org
Subject: Re: [dnsext] New ID submitted
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Oct 2011 08:58:27 -0000

Ed,

I think this document is useful, and support it going forward.

On Fri, 2011-10-07 at 10:06 -0400, Edward Lewis wrote:
> http://www.ietf.org/mail-archive/web/i-d-announce/current/msg40107.html
> 
> Out of frustration trying to locate information on the more obscure 
> RR type registrations at IANA, I drew up this draft.  Comments?
> 
> Yes, there are spelling errors...in the abstract.  From the announcement:
> 
>      Title         : IANA Allocated DNS RRtyp Codes without Documentation

s/RRtyp/RRtype/

>      Author(s)     : E. Lewis
>      Filename      : draft-lewis-dns-undocumented-types-00.txt
>      Pages         : 3
>      Date          : 2011-10-06

We did some digging recently when documenting RRTypes for BIND 10.

For EID and NIMLOC, there is this document:

http://ana-3.lcs.mit.edu/~jnc/nimrod/dns.txt

Which seems to be a -01 version of the draft listed in your document.
There are some differences in the text (for example it says "protocol
spec [[[ref to be supplied]]]" rather than "protocol [[[ref to be
supplied]]]"), but I don't know if these are meaningful. (Surely not for
such a vintage routing architecture.)

For the rest, you came up with the same references we did.

FWIW, our list of lower-priority RR types is here:

http://bind10.isc.org/wiki/RRTypes

We don't have all the ones you list, because I considered many of them
to be works in progress (CDS, URI, CAA, ...).

--
Shane


From suruti94@gmail.com  Mon Oct 10 11:10:55 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BFB621F84B1 for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 11:10:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m6Xe9JU3DesU for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 11:10:54 -0700 (PDT)
Received: from mail-qy0-f172.google.com (mail-qy0-f172.google.com [209.85.216.172]) by ietfa.amsl.com (Postfix) with ESMTP id 6206821F8A55 for <dnsext@ietf.org>; Mon, 10 Oct 2011 11:10:54 -0700 (PDT)
Received: by qyk32 with SMTP id 32so2163581qyk.10 for <dnsext@ietf.org>; Mon, 10 Oct 2011 11:10:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=0z2t2e4Rb4INoY/Jmu2T0+csB8hPFU+jvFO+v+CqRCQ=; b=CZ+Kf1IO1krxfTvc40ml9DTs/FLX39N+Sdl+kgc+Vl9YJbSdQ8JdE3qKjUHdN34ukQ SoZ+25jq4EgfdAoMk/P3B2uLV/BDrmRqfvlTI/HN42eqk9wN0Obo66VmCeiDk4NKhwDb 55zmpGAeQQHgzRALNBoNJACOnK9gGfYerRHhk=
MIME-Version: 1.0
Received: by 10.68.9.7 with SMTP id v7mr38621722pba.94.1318270253493; Mon, 10 Oct 2011 11:10:53 -0700 (PDT)
Received: by 10.68.43.37 with HTTP; Mon, 10 Oct 2011 11:10:53 -0700 (PDT)
In-Reply-To: <20111010051725.3A95214E5206@drugs.dv.isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org>
Date: Mon, 10 Oct 2011 11:10:53 -0700
Message-ID: <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Oct 2011 18:10:55 -0000

On Sun, Oct 9, 2011 at 10:17 PM, Mark Andrews <marka@isc.org> wrote:
>
> In message <CACU5sD=3D-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=3Dx7+Juw@mail.=
gmail.com>
> , Mohan Parthasarathy writes:
>> On Sun, Oct 9, 2011 at 2:34 PM, Mark Andrews <marka@isc.org> wrote:
>> >
>> > In message <20111009135505.GA85221@shinkuro.com>, Andrew Sullivan writ=
es:
>> >> No hat.
>> >>
>> >> On Sun, Oct 09, 2011 at 09:38:20AM +1100, Mark Andrews wrote:
>> >>
>> >> > By that logic we should strike paragraph 2 of 4.9.2 (Handling of th=
e C=3D
>> D Bit
>> >> )
>> >> >
>> >> > =3DA0 =3DA0A validating security-aware stub resolver SHOULD set the=
 CD bit=3D
>> ,
>> >> > =3DA0 =3DA0because otherwise the security-aware recursive name serv=
er will
>> >> > =3DA0 =3DA0answer the query using the name server's local policy, w=
hich ma=3D
>> y
>> >> > =3DA0 =3DA0prevent the stub resolver from receiving data that would=
 be
>> >> > =3DA0 =3DA0acceptable to the stub resolver's local policy.
>> >> >
>> >> > That SHOULD is not required for interoperability.
>> >>
>> >> True, although it appears to me to be a consequence of the definition
>> >> of validating security-aware stub resolver. =3DA0But anyway,
>> >>
>> >> > Now do we give good advice or do we give no advice?
>> >>
>> >> as I argued before, the advice you are proposing is not in fact alway=
s
>> >> good advice. =3DA0It's a trade-off.
>> >
>> > It's *never* bad advice as it get you to do both CD=3D0 and then CD=3D=
1.
>>
>> It would be a bad advice if it increases the complexity without real ben=
efi=3D
>> ts.
>
> The complexity of checking for SERVFAIL and reissuing the query
> with CD=3D1 is trivial compared to the complexity of validating a
> answer. =A0This is no more complex that existing TC=3D1 checks and
> retrying with TCP.
>
I agree that for the sub itself, this is very similar to TC=3D1 retry
with TCP. But I was not speaking with respect to the stub alone. See
below.


>> > Advising to do *just* CD=3D0 or CD=3D1 is bad advice. =3DA0If the upst=
ream
>> > doesn't have trust anchors then CD=3D0 or CD=3D1 is a moot question.
>> > If the upstream has trust anchors using just CD=3D1 is leaving the
>> > stub resolver open to a denial of service due to spoofing /
>> > misconfiguration of the parent especially if there is CD=3D1 cache.
>>
>> You seem to be implying a "CD=3D1 cache" and "CD=3D0 cache" i.e, a cache
>> maintained differently for CD =3D1 or CD =3D 0. If the recursive sever
>> populates the cache in the same way for both CD=3D0 and CD=3D1, then thi=
s
>> issue does not arise. This seems to be much simpler to me rather than
>> treating it differently.
>
> Even if server doesn't have a CD=3D1 cache there is no guarantee that
> a second query (with CD=3D1) will talk to a different authoritative
> server. =A0CD=3D0 queries are guarantee to talk to multiple authoritative
> servers provided there is a trusted path from the servers TA if the
> first authoritative server tried is broken.
>
As per dnssec-bis updates section 5.9, the validating resolver always
sets the CD bit irrespective of what is in the incoming query. It
means that there is just one cache. Do implementation really have a
separate cache ? If it always sets CD=3D1 (which does not alter with
your proposal), then it needs to handle this case because there could
be a bunch of queries (with CD=3D1 or CD=3D0) blocked on waiting for this
resolution to complete ?

Isn't the case you are talking about "no" signatures rather than
invalid signatures ? Why is "CD=3D0" query making it talk to a different
authoritative server and not "CD=3D1" query in this case ? Let us say
that there are two authoritative servers G (Good) and the B (Bad) for
some signed zone. G speaks DNSSEC whereas B does not. I have two stubs
one of which sets the CD bit.

1) A recursive server receives a query with CD =3D 0/DOK =3D 1. It talks
to B first and as it cannot validate without signatures, it talks to
G, validates the result and inserts into the cache.

2) A recursive server receives a query with CD =3D 1/DOK =3D 1. Assuming
that there is a single cache, then it returns the response from the
cache.

Now if (2) happens first i.e., it receives a query with CD=3D1/DOK=3D1,
you are arguing that it would talk to B first, it does not receive any
signatures and it would just return without trying G. And on receiving
query with CD=3D0, it would retry with G ? Is there anything in RFC 4035
that describes this behavior explicitly ?

=10I would expect that setting DO=3D1 (which might have happened because
the stub might have a priori knowledge that a given zone is signed)
means that it relies on the recursive server to return "some"
signature at least.

So, the concern is that if someone spoofs an answer, the recursive
server returns the response without any signatures while there was
valid signatures. This spoof did not make the stub accept the answer,
just "discard" it. It is a DoS, but it happens due to misconfiguration
which should not be that common.

>
> Given I've seen signed zone configured with servers that don't speak
> DNSSEC and I've also seen repeated CD=3D1 queries fail to get answers
> with signature from such a configuration this is not idle speculation
> that avoidable validation failures will occur with CD=3D1 only queries.
>

Do we know how often this happens ? I know it is hard to predict the
future, but if this is very common, does it not make sense  for the
recursive servers handle this case ?

-mohan

> I'd argue that misconfigured authoritative servers are more common
> than misconfigured TAs as the latter affects ordinary queries and
> will result in complaints leading to the TA being fixed where as
> the former is hidden as validating recursive servers reject the
> answers from the bad server and only return those from the good
> servers.
>
> Mark
>
>> -mohan
>>
>> > Similarly just CD=3D0 is leaving you exposed to bad clocks / stale
>> > trust anchors in the recursive server. =3DA0With CD=3D0 then CD=3D1 yo=
u
>> > mitigate both failure modes.
>> >
>> >> --
>> >> Andrew Sullivan
>> >> ajs@anvilwalrusden.com
>> >> _______________________________________________
>> >> dnsext mailing list
>> >> dnsext@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/dnsext
>> > --
>> > Mark Andrews, ISC
>> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
>> > PHONE: +61 2 9871 4742 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0=
 INTERNET: marka@is=3D
>> c.org
>> > _______________________________________________
>> > dnsext mailing list
>> > dnsext@ietf.org
>> > https://www.ietf.org/mailman/listinfo/dnsext
>> >
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
c.org
>

From mohta@necom830.hpcl.titech.ac.jp  Mon Oct 10 13:52:51 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDFE521F8CAB for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 13:52:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w0yXrIOYEfb4 for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 13:52:51 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 0C1C321F8CAA for <dnsext@ietf.org>; Mon, 10 Oct 2011 13:52:50 -0700 (PDT)
Received: (qmail 14787 invoked from network); 10 Oct 2011 21:02:57 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 10 Oct 2011 21:02:57 -0000
Message-ID: <4E93593E.2010304@necom830.hpcl.titech.ac.jp>
Date: Tue, 11 Oct 2011 05:44:46 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: dnsext@ietf.org
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org>
In-Reply-To: <20111009213431.4756314E0BDE@drugs.dv.isc.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Oct 2011 20:52:51 -0000

Mark Andrews wrote:

> It's *never* bad advice as it get you to do both CD=0 and then CD=1.
> Advising to do *just* CD=0 or CD=1 is bad advice.  If the upstream
> doesn't have trust anchors then CD=0 or CD=1 is a moot question.
> If the upstream has trust anchors using just CD=1 is leaving the
> stub resolver open to a denial of service due to spoofing /
> misconfiguration of the parent especially if there is CD=1 cache.
> Similarly just CD=0 is leaving you exposed to bad clocks / stale
> trust anchors in the recursive server.  With CD=0 then CD=1 you
> mitigate both failure modes.

Such arguments are meaningful, only if clients are forced to
broken servers.

So, my question has been:

	How can a client know an address of an HTTP server?

Along with another unanswered question:

	How can a client know secure time?

I can't see any realistic use case defined in enough details.

						Masataka Ohta

From marka@isc.org  Mon Oct 10 15:00:51 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E3E121F8C0A for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 15:00:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nfmG9u+J7irj for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 15:00:50 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id E8F4221F8C09 for <dnsext@ietf.org>; Mon, 10 Oct 2011 15:00:49 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 5182B5F98A2; Mon, 10 Oct 2011 22:00:34 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id CA37F216C6C; Mon, 10 Oct 2011 22:00:31 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id F1E2614EB649; Tue, 11 Oct 2011 09:00:27 +1100 (EST)
To: Mohan Parthasarathy <suruti94@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com>
In-reply-to: Your message of "Mon, 10 Oct 2011 11:10:53 PDT." <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com>
Date: Tue, 11 Oct 2011 09:00:27 +1100
Message-Id: <20111010220027.F1E2614EB649@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Oct 2011 22:00:51 -0000

In message <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com>
, Mohan Parthasarathy writes:
> On Sun, Oct 9, 2011 at 10:17 PM, Mark Andrews <marka@isc.org> wrote:
> >
> > In message <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.=
> gmail.com>
> > , Mohan Parthasarathy writes:
> >> On Sun, Oct 9, 2011 at 2:34 PM, Mark Andrews <marka@isc.org> wrote:
> >> >
> >> > In message <20111009135505.GA85221@shinkuro.com>, Andrew Sullivan writ=
> es:
> >> >> No hat.
> >> >>
> >> >> On Sun, Oct 09, 2011 at 09:38:20AM +1100, Mark Andrews wrote:
> >> >>
> >> >> > By that logic we should strike paragraph 2 of 4.9.2 (Handling of th=
> e C=
> >> D Bit
> >> >> )
> >> >> >
> >> >> > =A0 =A0A validating security-aware stub resolver SHOULD set the=
>  CD bit=
> >> ,
> >> >> > =A0 =A0because otherwise the security-aware recursive name serv=
> er will
> >> >> > =A0 =A0answer the query using the name server's local policy, w=
> hich ma=
> >> y
> >> >> > =A0 =A0prevent the stub resolver from receiving data that would=
>  be
> >> >> > =A0 =A0acceptable to the stub resolver's local policy.
> >> >> >
> >> >> > That SHOULD is not required for interoperability.
> >> >>
> >> >> True, although it appears to me to be a consequence of the definition
> >> >> of validating security-aware stub resolver. =A0But anyway,
> >> >>
> >> >> > Now do we give good advice or do we give no advice?
> >> >>
> >> >> as I argued before, the advice you are proposing is not in fact alway=
> s
> >> >> good advice. =A0It's a trade-off.
> >> >
> >> > It's *never* bad advice as it get you to do both CD=0 and then CD==
> 1.
> >>
> >> It would be a bad advice if it increases the complexity without real ben=
> efi=
> >> ts.
> >
> > The complexity of checking for SERVFAIL and reissuing the query
> > with CD=1 is trivial compared to the complexity of validating a
> > answer. =A0This is no more complex that existing TC=1 checks and
> > retrying with TCP.
> >
> I agree that for the sub itself, this is very similar to TC=1 retry
> with TCP. But I was not speaking with respect to the stub alone. See
> below.
> 
> 
> >> > Advising to do *just* CD=0 or CD=1 is bad advice. =A0If the upst=
> ream
> >> > doesn't have trust anchors then CD=0 or CD=1 is a moot question.
> >> > If the upstream has trust anchors using just CD=1 is leaving the
> >> > stub resolver open to a denial of service due to spoofing /
> >> > misconfiguration of the parent especially if there is CD=1 cache.
> >>
> >> You seem to be implying a "CD=1 cache" and "CD=0 cache" i.e, a cache
> >> maintained differently for CD =1 or CD = 0. If the recursive sever
> >> populates the cache in the same way for both CD=0 and CD=1, then thi=
> s
> >> issue does not arise. This seems to be much simpler to me rather than
> >> treating it differently.
> >
> > Even if server doesn't have a CD=1 cache there is no guarantee that
> > a second query (with CD=1) will talk to a different authoritative
> > server. =A0CD=0 queries are guarantee to talk to multiple authoritative
> > servers provided there is a trusted path from the servers TA if the
> > first authoritative server tried is broken.
> >
> As per dnssec-bis updates section 5.9, the validating resolver always
> sets the CD bit irrespective of what is in the incoming query. It
> means that there is just one cache. Do implementation really have a
> separate cache ? If it always sets CD=1 (which does not alter with
> your proposal), then it needs to handle this case because there could
> be a bunch of queries (with CD=1 or CD=0) blocked on waiting for this
> resolution to complete ?

Validating recusive servers are NOT required to cache the responses
to CD=1 queries.  The MAY validate them and cache them.  If they
don't cache them then the next query for the same tuple may go to
the same authoritative server creating a effectively unvalidatd
cache.  There is no requirement to randomise authoritative server
selection and even if there was there is no guarantee that same
server will not be reselected.

> Isn't the case you are talking about "no" signatures rather than
> invalid signatures ?

No.  It's anything which causes a validation failure.  No signatures
is just one example.

> Why is "CD=0" query making it talk to a different authoritative server
> and not "CD=1" query in this case ?

CD=0 responses are validated *before* being returned and if they
fail validation are treated as if they didn't occur (the response
was lost) and the recursive server moves on to the next server for
that zone and tries again.

CD=1 responses, to queries that are not in the cache, are passed back
UNVALIDATED.

> Let us say
> that there are two authoritative servers G (Good) and the B (Bad) for
> some signed zone. G speaks DNSSEC whereas B does not. I have two stubs
> one of which sets the CD bit.
  
> 1) A recursive server receives a query with CD = 0/DOK = 1. It talks
> to B first and as it cannot validate without signatures, it talks to
> G, validates the result and inserts into the cache.
> 
> 2) A recursive server receives a query with CD = 1/DOK = 1. Assuming
> that there is a single cache, then it returns the response from the
> cache.
> 
> Now if (2) happens first i.e., it receives a query with CD=1/DOK=1,
> you are arguing that it would talk to B first, it does not receive any
> signatures and it would just return without trying G.

Yes.

> And on receiving query with CD=0, it would retry with G ?

Yes. 

> Is there anything in RFC 4035 that describes this behavior explicitly ?

Explicity to retry multiple servers, no.  Which is yet another thing
that has been overlooked in RFC 4035.  That said you will find the
validating recursive servers do try multiple authoritative sources
on validation failures.  If you don't you will get bug reports about
unnessary SERVFAILs being returned.  RFC 4035 mainly deals with how
to validate individual response and how react to individual queries.
It says nothing about how to recover from validation failures.  The
word "retry" does not appear.

> I would expect that setting DO=1 (which might have happened because
> the stub might have a priori knowledge that a given zone is signed)
> means that it relies on the recursive server to return "some"
> signature at least.

No.  That is not required.  The a priori knowledge is that there
is a trust anchor at or above the zone that contains the answer.
There may or may not be a insecure delegation between the trust
anchor and the zone that contains the answer.

> So, the concern is that if someone spoofs an answer, the recursive
> server returns the response without any signatures while there was
> valid signatures. This spoof did not make the stub accept the answer,
> just "discard" it. It is a DoS, but it happens due to misconfiguration
> which should not be that common.

We have plenty of evidence that DNSSEC misconfigurations happen.  Some
of these are recoverable by trying multiple upstream services.

> > Given I've seen signed zone configured with servers that don't speak
> > DNSSEC and I've also seen repeated CD=1 queries fail to get answers
> > with signature from such a configuration this is not idle speculation
> > that avoidable validation failures will occur with CD=1 only queries.
> >
> 
> Do we know how often this happens ? I know it is hard to predict the
> future, but if this is very common, does it not make sense  for the
> recursive servers handle this case ?
> 
> -mohan
> 
> > I'd argue that misconfigured authoritative servers are more common
> > than misconfigured TAs as the latter affects ordinary queries and
> > will result in complaints leading to the TA being fixed where as
> > the former is hidden as validating recursive servers reject the
> > answers from the bad server and only return those from the good
> > servers.
> >
> > Mark
> >
> >> -mohan
> >>
> >> > Similarly just CD=0 is leaving you exposed to bad clocks / stale
> >> > trust anchors in the recursive server. =A0With CD=0 then CD=1 yo=
> u
> >> > mitigate both failure modes.
> >> >
> >> >> --
> >> >> Andrew Sullivan
> >> >> ajs@anvilwalrusden.com
> >> >> _______________________________________________
> >> >> dnsext mailing list
> >> >> dnsext@ietf.org
> >> >> https://www.ietf.org/mailman/listinfo/dnsext
> >> > --
> >> > Mark Andrews, ISC
> >> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> >> > PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0=
>  INTERNET: marka@is=
> >> c.org
> >> > _______________________________________________
> >> > dnsext mailing list
> >> > dnsext@ietf.org
> >> > https://www.ietf.org/mailman/listinfo/dnsext
> >> >
> > --
> > Mark Andrews, ISC
> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
> c.org
> >
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From suruti94@gmail.com  Mon Oct 10 18:59:19 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EA7C21F8CB3 for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 18:59:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9xKWqgqGvY-5 for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 18:59:18 -0700 (PDT)
Received: from mail-pz0-f50.google.com (mail-pz0-f50.google.com [209.85.210.50]) by ietfa.amsl.com (Postfix) with ESMTP id 6060721F8CB0 for <dnsext@ietf.org>; Mon, 10 Oct 2011 18:59:18 -0700 (PDT)
Received: by pzk37 with SMTP id 37so18516101pzk.9 for <dnsext@ietf.org>; Mon, 10 Oct 2011 18:59:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=B7utToq5B7BbuM+RfrYkvKEPh4xPNuzoXjea270bpcA=; b=VOQsm5Y2gw6jToNr3WTqPrPRbiREsA92Tnnr2+f2Yn7LG71FRu2BFlPPdkm9cz1Mok UO4YVx441F0y+MUvd2PCDzOp6lOVYnvauHahshQo0Vt6LBID2ea9OdyV4gpq11SSoDVt PhuvdBzWuJVZLt5/TNmt6XXcWBSC4ePHORwMw=
MIME-Version: 1.0
Received: by 10.68.19.34 with SMTP id b2mr41143528pbe.60.1318298357962; Mon, 10 Oct 2011 18:59:17 -0700 (PDT)
Received: by 10.68.43.37 with HTTP; Mon, 10 Oct 2011 18:59:17 -0700 (PDT)
In-Reply-To: <20111010220027.F1E2614EB649@drugs.dv.isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org>
Date: Mon, 10 Oct 2011 18:59:17 -0700
Message-ID: <CACU5sD=jfD-mahyNQDZC+usdrnvhG8gD=htLsNgT_fyL3rrZvQ@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Oct 2011 01:59:19 -0000

<snip>
>> >> > Advising to do *just* CD=3D0 or CD=3D1 is bad advice. =3DA0If the u=
pst=3D
>> ream
>> >> > doesn't have trust anchors then CD=3D0 or CD=3D1 is a moot question=
.
>> >> > If the upstream has trust anchors using just CD=3D1 is leaving the
>> >> > stub resolver open to a denial of service due to spoofing /
>> >> > misconfiguration of the parent especially if there is CD=3D1 cache.
>> >>
>> >> You seem to be implying a "CD=3D1 cache" and "CD=3D0 cache" i.e, a ca=
che
>> >> maintained differently for CD =3D1 or CD =3D 0. If the recursive seve=
r
>> >> populates the cache in the same way for both CD=3D0 and CD=3D1, then =
thi=3D
>> s
>> >> issue does not arise. This seems to be much simpler to me rather than
>> >> treating it differently.
>> >
>> > Even if server doesn't have a CD=3D1 cache there is no guarantee that
>> > a second query (with CD=3D1) will talk to a different authoritative
>> > server. =3DA0CD=3D0 queries are guarantee to talk to multiple authorit=
ative
>> > servers provided there is a trusted path from the servers TA if the
>> > first authoritative server tried is broken.
>> >
>> As per dnssec-bis updates section 5.9, the validating resolver always
>> sets the CD bit irrespective of what is in the incoming query. It
>> means that there is just one cache. Do implementation really have a
>> separate cache ? If it always sets CD=3D1 (which does not alter with
>> your proposal), then it needs to handle this case because there could
>> be a bunch of queries (with CD=3D1 or CD=3D0) blocked on waiting for thi=
s
>> resolution to complete ?
>
> Validating recusive servers are NOT required to cache the responses
> to CD=3D1 queries. =A0The MAY validate them and cache them. =A0If they

Again this is not mentioned anywhere in RFC 4035. It does have
references to BAD cache and it is a SHOULD now. It would be odd to
have a BAD cache and not a GOOD cache.

> don't cache them then the next query for the same tuple may go to
> the same authoritative server creating a effectively unvalidatd
> cache. =A0There is no requirement to randomise authoritative server
> selection and even if there was there is no guarantee that same
> server will not be reselected.
>

Validating resolver always sets CD=3D1 as per dnssec-bis updates
document and any reasonable recursive server would implement caching.
If so, how can it work if it does not try multiple auth servers ?

The design meeting notes "Always set" policy applied to all validating
resolvers but you are only requiring change for stub resolvers. But
based on your argument, don't you require that this applies to any
validating resolver as it is possible to have multiple recursive
resolvers between the stub and the authoritative server ?

>> Isn't the case you are talking about "no" signatures rather than
>> invalid signatures ?
>
> No. =A0It's anything which causes a validation failure. =A0No signatures
> is just one example.
>
Ok.

>
>> Why is "CD=3D0" query making it talk to a different authoritative server
>> and not "CD=3D1" query in this case ?
>
> CD=3D0 responses are validated *before* being returned and if they
> fail validation are treated as if they didn't occur (the response
> was lost) and the recursive server moves on to the next server for
> that zone and tries again.
>
> CD=3D1 responses, to queries that are not in the cache, are passed back
> UNVALIDATED.
>

This is also under specified in RFC 4035.

>> Let us say
>> that there are two authoritative servers G (Good) and the B (Bad) for
>> some signed zone. G speaks DNSSEC whereas B does not. I have two stubs
>> one of which sets the CD bit.
>
>> 1) A recursive server receives a query with CD =3D 0/DOK =3D 1. It talks
>> to B first and as it cannot validate without signatures, it talks to
>> G, validates the result and inserts into the cache.
>>
>> 2) A recursive server receives a query with CD =3D 1/DOK =3D 1. Assuming
>> that there is a single cache, then it returns the response from the
>> cache.
>>
>> Now if (2) happens first i.e., it receives a query with CD=3D1/DOK=3D1,
>> you are arguing that it would talk to B first, it does not receive any
>> signatures and it would just return without trying G.
>
> Yes.
>
>> And on receiving query with CD=3D0, it would retry with G ?
>
> Yes.
>
>> Is there anything in RFC 4035 that describes this behavior explicitly ?
>
> Explicity to retry multiple servers, no. =A0Which is yet another thing
> that has been overlooked in RFC 4035. =A0That said you will find the
> validating recursive servers do try multiple authoritative sources
> on validation failures. =A0If you don't you will get bug reports about
> unnessary SERVFAILs being returned. =A0RFC 4035 mainly deals with how
> to validate individual response and how react to individual queries.
> It says nothing about how to recover from validation failures. =A0The
> word "retry" does not appear.
>

Yes.

>> I would expect that setting DO=3D1 (which might have happened because
>> the stub might have a priori knowledge that a given zone is signed)
>> means that it relies on the recursive server to return "some"
>> signature at least.
>
> No. =A0That is not required. =A0The a priori knowledge is that there
> is a trust anchor at or above the zone that contains the answer.
> There may or may not be a insecure delegation between the trust
> anchor and the zone that contains the answer.
>
>> So, the concern is that if someone spoofs an answer, the recursive
>> server returns the response without any signatures while there was
>> valid signatures. This spoof did not make the stub accept the answer,
>> just "discard" it. It is a DoS, but it happens due to misconfiguration
>> which should not be that common.
>
> We have plenty of evidence that DNSSEC misconfigurations happen. =A0Some
> of these are recoverable by trying multiple upstream services.
>

We are not disagreeing about this itself. But what triggers this in
the recursive server ?

-mohan

>> > Given I've seen signed zone configured with servers that don't speak
>> > DNSSEC and I've also seen repeated CD=3D1 queries fail to get answers
>> > with signature from such a configuration this is not idle speculation
>> > that avoidable validation failures will occur with CD=3D1 only queries=
.
>> >
>>
>> Do we know how often this happens ? I know it is hard to predict the
>> future, but if this is very common, does it not make sense =A0for the
>> recursive servers handle this case ?
>>
>> -mohan
>>
>> > I'd argue that misconfigured authoritative servers are more common
>> > than misconfigured TAs as the latter affects ordinary queries and
>> > will result in complaints leading to the TA being fixed where as
>> > the former is hidden as validating recursive servers reject the
>> > answers from the bad server and only return those from the good
>> > servers.
>> >
>> > Mark
>> >
>> >> -mohan
>> >>
>> >> > Similarly just CD=3D0 is leaving you exposed to bad clocks / stale
>> >> > trust anchors in the recursive server. =3DA0With CD=3D0 then CD=3D1=
 yo=3D
>> u
>> >> > mitigate both failure modes.
>> >> >
>> >> >> --
>> >> >> Andrew Sullivan
>> >> >> ajs@anvilwalrusden.com
>> >> >> _______________________________________________
>> >> >> dnsext mailing list
>> >> >> dnsext@ietf.org
>> >> >> https://www.ietf.org/mailman/listinfo/dnsext
>> >> > --
>> >> > Mark Andrews, ISC
>> >> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
>> >> > PHONE: +61 2 9871 4742 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =
=3DA0=3D
>> =A0INTERNET: marka@is=3D
>> >> c.org
>> >> > _______________________________________________
>> >> > dnsext mailing list
>> >> > dnsext@ietf.org
>> >> > https://www.ietf.org/mailman/listinfo/dnsext
>> >> >
>> > --
>> > Mark Andrews, ISC
>> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
>> > PHONE: +61 2 9871 4742 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0 =3DA0=
 INTERNET: marka@is=3D
>> c.org
>> >
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
c.org
>

From marka@isc.org  Mon Oct 10 19:31:51 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C54521F8C8A for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 19:31:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XhZtvT2msSoP for <dnsext@ietfa.amsl.com>; Mon, 10 Oct 2011 19:31:50 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id EDED721F8C89 for <dnsext@ietf.org>; Mon, 10 Oct 2011 19:31:49 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 7B7805F98D3; Tue, 11 Oct 2011 02:31:27 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 72752216C6A; Tue, 11 Oct 2011 02:31:15 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 1525914F1754; Tue, 11 Oct 2011 13:31:12 +1100 (EST)
To: Mohan Parthasarathy <suruti94@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <CACU5sD=jfD-mahyNQDZC+usdrnvhG8gD=htLsNgT_fyL3rrZvQ@mail.gmail.com>
In-reply-to: Your message of "Mon, 10 Oct 2011 18:59:17 PDT." <CACU5sD=jfD-mahyNQDZC+usdrnvhG8gD=htLsNgT_fyL3rrZvQ@mail.gmail.com>
Date: Tue, 11 Oct 2011 13:31:12 +1100
Message-Id: <20111011023112.1525914F1754@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Oct 2011 02:31:51 -0000

In message <CACU5sD=jfD-mahyNQDZC+usdrnvhG8gD=htLsNgT_fyL3rrZvQ@mail.gmail.com>
, Mohan Parthasarathy writes:
> <snip>
> >> >> > Advising to do *just* CD=0 or CD=1 is bad advice.  If the u=
> pst=
> >> ream
> >> >> > doesn't have trust anchors then CD=0 or CD=1 is a moot question=
> .
> >> >> > If the upstream has trust anchors using just CD=1 is leaving the
> >> >> > stub resolver open to a denial of service due to spoofing /
> >> >> > misconfiguration of the parent especially if there is CD=1 cache.
> >> >>
> >> >> You seem to be implying a "CD=1 cache" and "CD=0 cache" i.e, a ca=
> che
> >> >> maintained differently for CD =1 or CD = 0. If the recursive seve=
> r
> >> >> populates the cache in the same way for both CD=0 and CD=1, then =
> thi=
> >> s
> >> >> issue does not arise. This seems to be much simpler to me rather than
> >> >> treating it differently.
> >> >
> >> > Even if server doesn't have a CD=1 cache there is no guarantee that
> >> > a second query (with CD=1) will talk to a different authoritative
> >> > server.  CD=0 queries are guarantee to talk to multiple authorit=
> ative
> >> > servers provided there is a trusted path from the servers TA if the
> >> > first authoritative server tried is broken.
> >> >
> >> As per dnssec-bis updates section 5.9, the validating resolver always
> >> sets the CD bit irrespective of what is in the incoming query. It
> >> means that there is just one cache. Do implementation really have a
> >> separate cache ? If it always sets CD=1 (which does not alter with
> >> your proposal), then it needs to handle this case because there could
> >> be a bunch of queries (with CD=1 or CD=0) blocked on waiting for thi=
> s
> >> resolution to complete ?
> >
> > Validating recusive servers are NOT required to cache the responses
> > to CD=1 queries.  The MAY validate them and cache them.  If they
> 
> Again this is not mentioned anywhere in RFC 4035. It does have
> references to BAD cache and it is a SHOULD now. It would be odd to
> have a BAD cache and not a GOOD cache.
> 
> > don't cache them then the next query for the same tuple may go to
> > the same authoritative server creating a effectively unvalidatd
> > cache.  There is no requirement to randomise authoritative server
> > selection and even if there was there is no guarantee that same
> > server will not be reselected.
> 
> Validating resolver always sets CD=1 as per dnssec-bis updates
> document and any reasonable recursive server would implement caching.
> If so, how can it work if it does not try multiple auth servers ?
> 
> The design meeting notes "Always set" policy applied to all validating
> resolvers but you are only requiring change for stub resolvers. But
> based on your argument, don't you require that this applies to any
> validating resolver as it is possible to have multiple recursive
> resolvers between the stub and the authoritative server ?

It may well be useful but that would be re-opening the topic.

At the moment I'm talking about stub behaviour and I'm looking to
make "validating stub" <-> "validating recursive server" <->
"authoritative server" work reliably in the face of common errors.

> >> Isn't the case you are talking about "no" signatures rather than
> >> invalid signatures ?
> >
> > No.  It's anything which causes a validation failure.  No signatures
> > is just one example.
> >
> Ok.
> 
> >
> >> Why is "CD=0" query making it talk to a different authoritative server
> >> and not "CD=1" query in this case ?
> >
> > CD=0 responses are validated *before* being returned and if they
> > fail validation are treated as if they didn't occur (the response
> > was lost) and the recursive server moves on to the next server for
> > that zone and tries again.
> >
> > CD=1 responses, to queries that are not in the cache, are passed back
> > UNVALIDATED.
> 
> This is also under specified in RFC 4035.
>
> >> Let us say
> >> that there are two authoritative servers G (Good) and the B (Bad) for
> >> some signed zone. G speaks DNSSEC whereas B does not. I have two stubs
> >> one of which sets the CD bit.
> >
> >> 1) A recursive server receives a query with CD = 0/DOK = 1. It talks
> >> to B first and as it cannot validate without signatures, it talks to
> >> G, validates the result and inserts into the cache.
> >>
> >> 2) A recursive server receives a query with CD = 1/DOK = 1. Assuming
> >> that there is a single cache, then it returns the response from the
> >> cache.
> >>
> >> Now if (2) happens first i.e., it receives a query with CD=1/DOK=1,
> >> you are arguing that it would talk to B first, it does not receive any
> >> signatures and it would just return without trying G.
> >
> > Yes.
> >
> >> And on receiving query with CD=0, it would retry with G ?
> >
> > Yes.
> >
> >> Is there anything in RFC 4035 that describes this behavior explicitly ?
> >
> > Explicity to retry multiple servers, no.  Which is yet another thing
> > that has been overlooked in RFC 4035.  That said you will find the
> > validating recursive servers do try multiple authoritative sources
> > on validation failures.  If you don't you will get bug reports about
> > unnessary SERVFAILs being returned.  RFC 4035 mainly deals with how
> > to validate individual response and how react to individual queries.
> > It says nothing about how to recover from validation failures.  The
> > word "retry" does not appear.
> 
> Yes.
> 
> >> I would expect that setting DO=1 (which might have happened because
> >> the stub might have a priori knowledge that a given zone is signed)
> >> means that it relies on the recursive server to return "some"
> >> signature at least.
> >
> > No.  That is not required.  The a priori knowledge is that there
> > is a trust anchor at or above the zone that contains the answer.
> > There may or may not be a insecure delegation between the trust
> > anchor and the zone that contains the answer.
> >
> >> So, the concern is that if someone spoofs an answer, the recursive
> >> server returns the response without any signatures while there was
> >> valid signatures. This spoof did not make the stub accept the answer,
> >> just "discard" it. It is a DoS, but it happens due to misconfiguration
> >> which should not be that common.
> >
> > We have plenty of evidence that DNSSEC misconfigurations happen.  Some
> > of these are recoverable by trying multiple upstream services.
> 
> We are not disagreeing about this itself. But what triggers this in
> the recursive server ?

Please re-read my comments above.  RFC 4035 does not specify how
to recover from validation failures.  It expects developers to
something "sensible". 

Mark

> -mohan
> 
> >> > Given I've seen signed zone configured with servers that don't speak
> >> > DNSSEC and I've also seen repeated CD=1 queries fail to get answers
> >> > with signature from such a configuration this is not idle speculation
> >> > that avoidable validation failures will occur with CD=1 only queries=
> .
> >> >
> >>
> >> Do we know how often this happens ? I know it is hard to predict the
> >> future, but if this is very common, does it not make sense  for the
> >> recursive servers handle this case ?
> >>
> >> -mohan
> >>
> >> > I'd argue that misconfigured authoritative servers are more common
> >> > than misconfigured TAs as the latter affects ordinary queries and
> >> > will result in complaints leading to the TA being fixed where as
> >> > the former is hidden as validating recursive servers reject the
> >> > answers from the bad server and only return those from the good
> >> > servers.
> >> >
> >> > Mark
> >> >
> >> >> -mohan
> >> >>
> >> >> > Similarly just CD=0 is leaving you exposed to bad clocks / stale
> >> >> > trust anchors in the recursive server.  With CD=0 then CD=1=
>  yo=
> >> u
> >> >> > mitigate both failure modes.
> >> >> >
> >> >> >> --
> >> >> >> Andrew Sullivan
> >> >> >> ajs@anvilwalrusden.com
> >> >> >> _______________________________________________
> >> >> >> dnsext mailing list
> >> >> >> dnsext@ietf.org
> >> >> >> https://www.ietf.org/mailman/listinfo/dnsext
> >> >> > --
> >> >> > Mark Andrews, ISC
> >> >> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> >> >> > PHONE: +61 2 9871 4742               =
>  =
> >>  INTERNET: marka@is=
> >> >> c.org
> >> >> > _______________________________________________
> >> >> > dnsext mailing list
> >> >> > dnsext@ietf.org
> >> >> > https://www.ietf.org/mailman/listinfo/dnsext
> >> >> >
> >> > --
> >> > Mark Andrews, ISC
> >> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> >> > PHONE: +61 2 9871 4742                =
>  INTERNET: marka@is=
> >> c.org
> >> >
> > --
> > Mark Andrews, ISC
> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > PHONE: +61 2 9871 4742                 INTERNET: marka@is=
> c.org
> >
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From ajs@anvilwalrusden.com  Tue Oct 11 08:04:03 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38A1821F8E29 for <dnsext@ietfa.amsl.com>; Tue, 11 Oct 2011 08:04:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.299
X-Spam-Level: 
X-Spam-Status: No, score=-1.299 tagged_above=-999 required=5 tests=[AWL=1.300,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id up+gm+pPYzAP for <dnsext@ietfa.amsl.com>; Tue, 11 Oct 2011 08:04:02 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 4DB3A21F8E20 for <dnsext@ietf.org>; Tue, 11 Oct 2011 08:04:02 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id E7B261ECB41C for <dnsext@ietf.org>; Tue, 11 Oct 2011 15:03:53 +0000 (UTC)
Date: Tue, 11 Oct 2011 11:03:59 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsext@ietf.org
Message-ID: <20111011150359.GD97086@shinkuro.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: [dnsext] ICANN Variant Issues Project case study reports
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Oct 2011 15:04:03 -0000

No hat.

Dear colleagues,

I'm going to send related messages to four IETF lists where I suspect
there might be people who are interested: dnsext, dnsop, apps-discuss,
and idnabis.  My apologies to those of you who get it more than once.

For those of you who have been following or otherwise interested in
the ICANN Variant Issues Project, the case study reports are up.  The
public comment period is open until 14 November.  The Project is aimed
at sorting out, for some scripts, what people mean when they talk
about "variant names" in the DNS.

For this WG, it seems to me that there might be useful fodder in these
reports to help with the WG item of the (currently expired)
draft-ietf-dnsext-aliasing-requirements.

As a matter of full disclosure, I point out that I have been involved
with these reports, providing some observations about the (technical)
feasibility of various things people wanted to do.  I provided advice,
but of course the teams actually responsible for the reports were free
to do as they wished with my advice (including ignore it).

I encourage those of you who are interested in the topic to read the
reports and make any comments you think are useful in the public
comment forum, or (for that matter) by discussing things on the open
ICANN list devoted to the project
(https://mm.icann.org/mailman/listinfo/vip).  Note that the usual
ICANN processes don't include the discussion on the mailing list as
public comments, so if you want your comments to be considered
formally, you'll need to post them in the appropriate area.

Best regards,

Andrew

-- 
Andrew Sullivan
ajs@anvilwalrusden.com

From ajs@anvilwalrusden.com  Tue Oct 11 08:21:13 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD96321F8BE8 for <dnsext@ietfa.amsl.com>; Tue, 11 Oct 2011 08:21:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JIeQvolb1fyv for <dnsext@ietfa.amsl.com>; Tue, 11 Oct 2011 08:21:13 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 70EA421F8BD3 for <dnsext@ietf.org>; Tue, 11 Oct 2011 08:21:13 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 892F01ECB41C for <dnsext@ietf.org>; Tue, 11 Oct 2011 15:21:05 +0000 (UTC)
Date: Tue, 11 Oct 2011 11:21:03 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsext@ietf.org
Message-ID: <20111011152102.GA98234@crankycanuck.ca>
References: <20111011150359.GD97086@shinkuro.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20111011150359.GD97086@shinkuro.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dnsext] ICANN Variant Issues Project case study reports
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Oct 2011 15:21:13 -0000

And because I am a moron, I forgot to post the links to the reports
themselves.  Here they are.

Arabic: <http://www.icann.org/en/announcements/announcement-3-07oct11-en.htm>   
Chinese: <http://www.icann.org/en/announcements/announcement-03oct11-en.htm>    
Cyrillic: <http://www.icann.org/en/announcements/announcement-06oct11-en.htm>   
Devanagari: <http://www.icann.org/en/announcements/announcement-2-03oct11-en.htm>          
Greek: <http://www.icann.org/en/announcements/announcement-07oct11-en.htm>
Latin: <http://www.icann.org/en/announcements/announcement-2-07oct11-en.htm>   

On Tue, Oct 11, 2011 at 11:03:59AM -0400, Andrew Sullivan wrote:
> No hat.
> 
> Dear colleagues,
> 
> I'm going to send related messages to four IETF lists where I suspect
> there might be people who are interested: dnsext, dnsop, apps-discuss,
> and idnabis.  My apologies to those of you who get it more than once.
> 
> For those of you who have been following or otherwise interested in
> the ICANN Variant Issues Project, the case study reports are up.  The
> public comment period is open until 14 November.  The Project is aimed
> at sorting out, for some scripts, what people mean when they talk
> about "variant names" in the DNS.
> 
> For this WG, it seems to me that there might be useful fodder in these
> reports to help with the WG item of the (currently expired)
> draft-ietf-dnsext-aliasing-requirements.
> 
> As a matter of full disclosure, I point out that I have been involved
> with these reports, providing some observations about the (technical)
> feasibility of various things people wanted to do.  I provided advice,
> but of course the teams actually responsible for the reports were free
> to do as they wished with my advice (including ignore it).
> 
> I encourage those of you who are interested in the topic to read the
> reports and make any comments you think are useful in the public
> comment forum, or (for that matter) by discussing things on the open
> ICANN list devoted to the project
> (https://mm.icann.org/mailman/listinfo/vip).  Note that the usual
> ICANN processes don't include the discussion on the mailing list as
> public comments, so if you want your comments to be considered
> formally, you'll need to post them in the appropriate area.
> 
> Best regards,
> 
> Andrew
> 
> -- 
> Andrew Sullivan
> ajs@anvilwalrusden.com
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext

-- 
Andrew Sullivan
ajs@crankycanuck.ca

From Ed.Lewis@neustar.biz  Tue Oct 11 11:15:53 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1736621F8A7D for <dnsext@ietfa.amsl.com>; Tue, 11 Oct 2011 11:15:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gmeVWJIsUU6H for <dnsext@ietfa.amsl.com>; Tue, 11 Oct 2011 11:15:51 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 6540A21F8C95 for <dnsext@ietf.org>; Tue, 11 Oct 2011 11:15:51 -0700 (PDT)
Received: from work-laptop-2 (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p9BIFmwk032667; Tue, 11 Oct 2011 14:15:48 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [10.31.200.234] by work-laptop-2 (PGP Universal service); Tue, 11 Oct 2011 14:15:49 -0400
X-PGP-Universal: processed; by work-laptop-2 on Tue, 11 Oct 2011 14:15:49 -0400
Mime-Version: 1.0
Message-Id: <a06240800caba38110a26@[10.31.200.234]>
In-Reply-To: <1318237086.2457.13.camel@shane-desktop>
References: <4E8C12CC.3090701@nic.cz>	 <a06240804cab200031f9c@[10.31.203.207]>	 <Prayer.1.3.4.1110051450060.28254@hermes-2.csi.cam.ac.uk>	 <a06240800cab22aa31db5@[10.31.203.207]>	 <a06240801cab4b6febee6@[10.31.203.207]> <1318237086.2457.13.camel@shane-desktop>
Date: Tue, 11 Oct 2011 14:15:46 -0400
To: Shane Kerr <shane@isc.org>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.72 on 10.20.30.4
Cc: Edward Lewis <Ed.Lewis@neustar.biz>, dnsext@ietf.org
Subject: Re: [dnsext] New ID submitted
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Oct 2011 18:15:53 -0000

Thanks for the update.  Note that I'm not calling these 
"unimportant", just "undocumented." ;)

At 10:58 +0200 10/10/11, Shane Kerr wrote:
>Ed,
>
>I think this document is useful, and support it going forward.
>
>On Fri, 2011-10-07 at 10:06 -0400, Edward Lewis wrote:
>>  http://www.ietf.org/mail-archive/web/i-d-announce/current/msg40107.html
>>
>>  Out of frustration trying to locate information on the more obscure
>>  RR type registrations at IANA, I drew up this draft.  Comments?
>>
>>  Yes, there are spelling errors...in the abstract.  From the announcement:
>>
>>       Title         : IANA Allocated DNS RRtyp Codes without Documentation
>
>s/RRtyp/RRtype/
>
>>       Author(s)     : E. Lewis
>>       Filename      : draft-lewis-dns-undocumented-types-00.txt
>>       Pages         : 3
>>       Date          : 2011-10-06
>
>We did some digging recently when documenting RRTypes for BIND 10.
>
>For EID and NIMLOC, there is this document:
>
>http://ana-3.lcs.mit.edu/~jnc/nimrod/dns.txt
>
>Which seems to be a -01 version of the draft listed in your document.
>There are some differences in the text (for example it says "protocol
>spec [[[ref to be supplied]]]" rather than "protocol [[[ref to be
>supplied]]]"), but I don't know if these are meaningful. (Surely not for
>such a vintage routing architecture.)
>
>For the rest, you came up with the same references we did.
>
>FWIW, our list of lower-priority RR types is here:
>
>http://bind10.isc.org/wiki/RRTypes
>
>We don't have all the ones you list, because I considered many of them
>to be works in progress (CDS, URI, CAA, ...).
>
>--
>Shane

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

Vote for the word of the day:
"Papa"razzi - father that constantly takes photos of the baby
Corpureaucracy - The institution of corporate "red tape"

From msheldon@godaddy.com  Wed Oct 12 14:41:07 2011
Return-Path: <msheldon@godaddy.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90DD121F8A96 for <dnsext@ietfa.amsl.com>; Wed, 12 Oct 2011 14:41:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.74
X-Spam-Level: 
X-Spam-Status: No, score=-100.74 tagged_above=-999 required=5 tests=[BAYES_20=-0.74, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J37mJtqWO8GV for <dnsext@ietfa.amsl.com>; Wed, 12 Oct 2011 14:41:07 -0700 (PDT)
Received: from smtpoutwbe08.prod.mesa1.secureserver.net (smtpoutwbe08.prod.mesa1.secureserver.net [208.109.78.210]) by ietfa.amsl.com (Postfix) with SMTP id F217621F8726 for <dnsext@ietf.org>; Wed, 12 Oct 2011 14:41:06 -0700 (PDT)
Received: (qmail 30331 invoked from network); 12 Oct 2011 21:41:02 -0000
Received: from unknown (HELO gem-wbe09.prod.mesa1.secureserver.net) (64.202.189.48) by smtpoutwbe08.prod.mesa1.secureserver.net with SMTP; 12 Oct 2011 21:41:02 -0000
Received: (qmail 16757 invoked by uid 99); 12 Oct 2011 21:41:02 -0000
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"
X-Originating-IP: 172.19.38.143
User-Agent: Web-Based Email 5.6.03
Message-Id: <20111012144101.205a61dff9fc1684c258b274662bb912.3f5e55ecf1.wbe@email00.secureserver.net>
From: "Michael Sheldon" <msheldon@godaddy.com>
To: dnsext@ietf.org
Date: Wed, 12 Oct 2011 14:41:01 -0700
Mime-Version: 1.0
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Oct 2011 21:41:07 -0000

=0A=0A> -------- Original Message --------=0A> Subject: Re: [dnsext] draft-=
mohan-dns-query-xml-00.txt=0A> From: Brian Dickson <brian.peter.dickson@gma=
il.com>=0A=0A> This proposal is a very lightweight and elegant (IMHO)=0A=0A=
I consider it to be neither of those things. Compared to standard DNS=0Apro=
tocols it is very heavyweight, and is as elegant as a dancing bear.=0A=0AIn=
 my opinion, it's just a new avenue for denial of service attacks.=0A=0AAnd=
 for any entity who is intentionally blocking, it is less than=0Atrivial to=
 block this, since they are probably already filtering http=0Atraffic.=0A=
=0AMichael Sheldon=0ADev-DNS Services=0AGoDaddy.com=0A

From Ed.Lewis@neustar.biz  Thu Oct 13 08:16:25 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D403421F8ADC for <dnsext@ietfa.amsl.com>; Thu, 13 Oct 2011 08:16:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.948
X-Spam-Level: 
X-Spam-Status: No, score=-105.948 tagged_above=-999 required=5 tests=[AWL=0.649, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O7YjyvB9XsA6 for <dnsext@ietfa.amsl.com>; Thu, 13 Oct 2011 08:16:25 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 0EEBF21F8AB8 for <dnsext@ietf.org>; Thu, 13 Oct 2011 08:16:16 -0700 (PDT)
Received: from ccur-lt61.cis.neustar.com (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p9DFGEAI049857; Thu, 13 Oct 2011 11:16:15 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [192.168.129.103] by ccur-lt61.cis.neustar.com (PGP Universal service); Thu, 13 Oct 2011 11:16:15 -0400
X-PGP-Universal: processed; by ccur-lt61.cis.neustar.com on Thu, 13 Oct 2011 11:16:15 -0400
Mime-Version: 1.0
Message-Id: <a06240801cabc9d0de24d@[192.168.129.103]>
In-Reply-To: <20111012144101.205a61dff9fc1684c258b274662bb912.3f5e55ecf1.wbe@email00.se cureserver.net>
References: <20111012144101.205a61dff9fc1684c258b274662bb912.3f5e55ecf1.wbe@email00.se cureserver.net>
Date: Thu, 13 Oct 2011 11:16:12 -0400
To: <dnsext@ietf.org>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: multipart/alternative; boundary="============_-893603521==_ma============"
X-Scanned-By: MIMEDefang 2.72 on 10.20.30.4
Cc: ed.lewis@neustar.biz
Subject: [dnsext] Related to section 5.1 of dnssec-bis-updates (-14)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Oct 2011 15:16:25 -0000

--============_-893603521==_ma============
Content-Type: text/plain; charset="us-ascii" ; format="flowed"

In this section of the still-a-draft update to the DNSSEC definition 
of RFC 4033-4035 an issue has arisen that needs to be addressed.

# http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-bis-updates-14
#
#5.1.  Errors in Canonical Form Type Code List
#
#   When canonicalizing DNS names, DNS names in the RDATA section of NSEC
#   and RRSIG resource records are not downcased.
#
#   [RFC4034] Section 6.2 item 3 has a list of resource record types for
#   which DNS names in the RDATA are downcased for purposes of DNSSEC
#   canonical form (for both ordering and signing).  That list
#   erroneously contains NSEC and RRSIG.  According to [RFC3755], DNS
#   names in the RDATA of NSEC and RRSIG should not be downcased.
#
#   The same section also erroneously lists HINFO, and twice at that.
#   Since HINFO records contain no domain names, they are not subject to
#   downcasing.

For the purposes of this email a "major implementation" refers to a 
widely distributed general purpose implementation of DNS.  It's 
become apparent that two major implementations of validators have 
differed on downcaseing the RRSIG.

We've been trying to determine why this problem hasn't surfaced in a 
real-world outage.  It seems that all major implementations of 
signers down case the RRSIG before signing.

Treat this as a suggestion.  Unexcuse RRSIG from the list of names 
that avoid downcasing.  (NSEC is not a problem.)  Any thoughts?
-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis             
NeuStar                    You can leave a voice message at +1-571-434-5468

Vote for the word of the day:
"Papa"razzi - father that constantly takes photos of the baby
Corpureaucracy - The institution of corporate "red tape"
--============_-893603521==_ma============
Content-Type: text/html; charset="us-ascii"

<!doctype html public "-//W3C//DTD W3 HTML//EN">
<html><head><style type="text/css"><!--
blockquote, dl, ul, ol, li { padding-top: 0 ; padding-bottom: 0 }
 --></style><title>Related to section 5.1 of dnssec-bis-updates
(-14)</title></head><body>
<div>In this section of the still-a-draft update to the DNSSEC
definition of RFC 4033-4035 an issue has arisen that needs to be
addressed.</div>
<div><br></div>
<div>#
http://tools.ietf.org/html/draft-ietf-dnsext-dnssec-bis-updates-14</div
>
<div>#</div>
<div>#5.1.&nbsp; Errors in Canonical Form Type Code List<br>
#<br>
#&nbsp;&nbsp; When canonicalizing DNS names, DNS names in the RDATA
section of NSEC<br>
#&nbsp;&nbsp; and RRSIG resource records are not downcased.<br>
#<br>
#&nbsp;&nbsp; [RFC4034] Section 6.2 item 3 has a list of resource
record types for<br>
#&nbsp;&nbsp; which DNS names in the RDATA are downcased for purposes
of DNSSEC<br>
#&nbsp;&nbsp; canonical form (for both ordering and signing).&nbsp;
That list<br>
#&nbsp;&nbsp; erroneously contains NSEC and RRSIG.&nbsp; According to
[RFC3755], DNS<br>
#&nbsp;&nbsp; names in the RDATA of NSEC and RRSIG should not be
downcased.<br>
#<br>
#&nbsp;&nbsp; The same section also erroneously lists HINFO, and twice
at that.<br>
#&nbsp;&nbsp; Since HINFO records contain no domain names, they are
not subject to</div>
<div>#&nbsp;&nbsp; downcasing.</div>
<div><br></div>
<div>For the purposes of this email a &quot;major implementation&quot;
refers to a widely distributed general purpose implementation of DNS.&nbsp;
It's become apparent that two major implementations of validators have
differed on downcaseing the RRSIG.</div>
<div><br></div>
<div>We've been trying to determine why this problem hasn't surfaced
in a real-world outage.&nbsp; It seems that all major implementations
of signers down case the RRSIG before signing.</div>
<div><br></div>
<div>Treat this as a suggestion.&nbsp; Unexcuse RRSIG from the list of
names that avoid downcasing.&nbsp; (NSEC is not a problem.)&nbsp; Any
thoughts?</div>
<x-sigsep><pre>-- 
</pre></x-sigsep>
<div
>-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=<span
></span>-=-=-=-<br>
Edward
Lewis&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span
></span>&nbsp;&nbsp;&nbsp;<br>
NeuStar&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span
></span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; You can
leave a voice message at +1-571-434-5468<br>
<br>
Vote for the word of the day:<br>
&quot;Papa&quot;razzi - father that constantly takes photos of the
baby<br>
Corpureaucracy - The institution of corporate &quot;red
tape&quot;</div>
</body>
</html>
--============_-893603521==_ma============--

From Ed.Lewis@neustar.biz  Fri Oct 14 05:20:59 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96A2E21F85A4 for <dnsext@ietfa.amsl.com>; Fri, 14 Oct 2011 05:20:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.166
X-Spam-Level: 
X-Spam-Status: No, score=-106.166 tagged_above=-999 required=5 tests=[AWL=0.433, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PKB2kyh6mew7 for <dnsext@ietfa.amsl.com>; Fri, 14 Oct 2011 05:20:58 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 84A8621F84D5 for <dnsext@ietf.org>; Fri, 14 Oct 2011 05:20:58 -0700 (PDT)
Received: from Work-Laptop-2.local (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p9ECKsiK057541; Fri, 14 Oct 2011 08:20:54 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [10.31.200.142] by Work-Laptop-2.local (PGP Universal service); Fri, 14 Oct 2011 08:20:56 -0400
X-PGP-Universal: processed; by Work-Laptop-2.local on Fri, 14 Oct 2011 08:20:56 -0400
Mime-Version: 1.0
Message-Id: <a06240800cabdd870ba7d@[192.168.129.103]>
Date: Fri, 14 Oct 2011 08:20:51 -0400
To: dnsext@ietf.org
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.72 on 10.20.30.4
Cc: ed.lewis@neustar.biz
Subject: [dnsext] Fwd: I-D ACTION:draft-lewis-dns-undocumented-types-01.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Oct 2011 12:20:59 -0000

Updated with comments from three folks.

I would submit this as an individual submission, but I guess an AD 
might drop it at the foot of this WG.  To get ahead of the curve, do 
the chairs want to consider this for adoption or would this pass into 
the hopper without WG consideration?

>From: <Internet-Drafts@ietf.org>
>To: <i-d-announce@ietf.org>
>Subject: I-D ACTION:draft-lewis-dns-undocumented-types-01.txt
>Date: Thu, 13 Oct 2011 14:15:07 -0700
>
>A new Internet-Draft is available from the on-line Internet-Drafts 
>directories.
>
>
>     Title         : IANA Allocated DNS RRtype Codes Without Documentation
>     Author(s)     : E. Lewis
>     Filename      : draft-lewis-dns-undocumented-types-01.txt
>     Pages         : 3
>     Date          : 2011-10-13
>
>In the IANA registry of Resource Record (RR) TYPEs, as of October 1,
>2011, there are 10 type code values allocated with references that
>are individual email boxes and not stable documents.  Some of the
>registrations represent works in progress and such a reference is
>viable.  Some registrations are dormant or dead efforts.  In all
>cases it would be helpful to have some reference to material
>describing the type.
>
>A URL for this Internet-Draft is:
>http://www.ietf.org/internet-drafts/draft-lewis-dns-undocumented-types-01.txt
>
>Internet-Drafts are also available by anonymous FTP at:
>ftp://ftp.ietf.org/internet-drafts/

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

Vote for the word of the day:
"Papa"razzi - father that constantly takes photos of the baby
Corpureaucracy - The institution of corporate "red tape"

From wouter@nlnetlabs.nl  Mon Oct 17 05:48:22 2011
Return-Path: <wouter@nlnetlabs.nl>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4880821F8B9E for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 05:48:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.39
X-Spam-Level: 
X-Spam-Status: No, score=-2.39 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001, SARE_RMML_Stock1=0.21]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EcSr4jQMIAuS for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 05:48:21 -0700 (PDT)
Received: from open.nlnetlabs.nl (open.nlnetlabs.nl [IPv6:2001:7b8:206:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8510421F8B95 for <dnsext@ietf.org>; Mon, 17 Oct 2011 05:48:21 -0700 (PDT)
Received: from gary.nlnetlabs.nl (gary.nlnetlabs.nl [IPv6:2001:7b8:206:1:216:76ff:feb8:1853]) (authenticated bits=0) by open.nlnetlabs.nl (8.14.4/8.14.4) with ESMTP id p9HCmJTw030087 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <dnsext@ietf.org>; Mon, 17 Oct 2011 14:48:20 +0200 (CEST) (envelope-from wouter@nlnetlabs.nl)
Message-ID: <4E9C2413.3030000@nlnetlabs.nl>
Date: Mon, 17 Oct 2011 14:48:19 +0200
From: "W.C.A. Wijngaards" <wouter@NLnetLabs.nl>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.23) Gecko/20110928 Fedora/3.1.15-1.fc14 Lightning/1.0b3pre Thunderbird/3.1.15
MIME-Version: 1.0
To: dnsext@ietf.org
References: <20111006230230.4633714C8E52@drugs.dv.isc.org>	<20111007141449.GA73072@shinkuro.com>	<20111007192752.GO73072@shinkuro.com>	<20111007224937.6E9BD14DB73A@drugs.dv.isc.org>	<0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org>	<20111008122653.EB10314DDC76@drugs.dv.isc.org>	<20111008212432.GB82710@shinkuro.com>	<20111008223820.F09F314DF5E1@drugs.dv.isc.org>	<20111009135505.GA85221@shinkuro.com>	<20111009213431.4756314E0BDE@drugs.dv.isc.org>	<CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com>	<20111010051725.3A95214E5206@drugs.dv.isc.org>	<CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org>
In-Reply-To: <20111010220027.F1E2614EB649@drugs.dv.isc.org>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.7 (open.nlnetlabs.nl [IPv6:2001:7b8:206:1::1]); Mon, 17 Oct 2011 14:48:20 +0200 (CEST)
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested	update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Oct 2011 12:48:22 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Mark, Mohan,

On 10/11/2011 12:00 AM, Mark Andrews wrote:
> CD=0 responses are validated *before* being returned and if they
> fail validation are treated as if they didn't occur (the response
> was lost) and the recursive server moves on to the next server for
> that zone and tries again.
> 
> CD=1 responses, to queries that are not in the cache, are passed back
> UNVALIDATED.

No, CD=1 responses are "not withheld" if they fail validation.

Thus you can cache it, you can validate it and retry.

Best regards,
   Wouter
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/
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=NfTi
-----END PGP SIGNATURE-----

From marka@isc.org  Mon Oct 17 06:47:11 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D40DC21F8B79 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 06:47:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.464
X-Spam-Level: 
X-Spam-Status: No, score=-2.464 tagged_above=-999 required=5 tests=[AWL=-0.075, BAYES_00=-2.599, SARE_RMML_Stock1=0.21]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9dXao8vM-ODp for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 06:47:11 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id 2A51A21F8B72 for <dnsext@ietf.org>; Mon, 17 Oct 2011 06:47:11 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 94C635F984C; Mon, 17 Oct 2011 13:46:55 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 6C631216C6D; Mon, 17 Oct 2011 13:46:53 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 816981569E8F; Tue, 18 Oct 2011 00:46:50 +1100 (EST)
To: "W.C.A. Wijngaards" <wouter@NLnetLabs.nl>
From: Mark Andrews <marka@isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl>
In-reply-to: Your message of "Mon, 17 Oct 2011 14:48:19 +0200." <4E9C2413.3030000@nlnetlabs.nl>
Date: Tue, 18 Oct 2011 00:46:50 +1100
Message-Id: <20111017134650.816981569E8F@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Oct 2011 13:47:11 -0000

In message <4E9C2413.3030000@nlnetlabs.nl>, "W.C.A. Wijngaards" writes:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi Mark, Mohan,
> 
> On 10/11/2011 12:00 AM, Mark Andrews wrote:
> > CD=0 responses are validated *before* being returned and if they
> > fail validation are treated as if they didn't occur (the response
> > was lost) and the recursive server moves on to the next server for
> > that zone and tries again.
> > 
> > CD=1 responses, to queries that are not in the cache, are passed back
> > UNVALIDATED.
> 
> No, CD=1 responses are "not withheld" if they fail validation.
> 
> Thus you can cache it, you can validate it and retry.

And when the stub retries there is no state to prevent the recursive
server asking the same broken upstream again and again and again
....

There is no requirement for a recursive server to attempt to validate
a response to a CD=1 query from downstream or if it attempts to
validate the response to retry a different upstream if the validation
fails.

> Best regards,
>    Wouter
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.11 (GNU/Linux)
> Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/
> 
> iQIcBAEBAgAGBQJOnCQTAAoJEJ9vHC1+BF+NT4EQAIiflA8jI4jrWBdWfV+rDtkc
> yLfU+fy5XOHCyRWlViL13nXilav66AJX50r2mbWxxaZ7ouSJnpabcwa5srHPET1+
> ZK3cQQliX3ypLXzAiTFUi78apwLKSeELEvMOKX9qii9GVk/ewnnV096ykCcB8iyf
> yWii2mLtRFcABApSgA8dJfAwB306GMnCZFOnfluEyB+Gltzc5aruhm2/RhaNyO0d
> sRKwuJn5YR/E3tyzvY+kZgcrpqdzokrbGgbtIlvZhaF8ZASLDVBXG/1/kwW/BKGy
> 9BnBy+M487Yz2Lewu31fp9V61V4C/pcnkY+1zewAyJF/G/jayzo/vT0lZV5dRyxq
> 0if2dKjVVU962A/xDHKD59ERDVfyDd1LBT9pZNctxva6Dnjx21Ma+0cT10Y+BXb+
> 2mPz94GIUSyg8iosL2hezBtQz27tL4Qndq/0DHE63SKD1Gi29kMGeSqAQRtXpqYU
> PRavs6sQeLkHPx22G4Q66K9zzhEBsLaG/GTuRTxxn0KNzWx1YoKvDTZmzUM8OBtC
> ts6VA9ZKHcOTE0tCM/12jjlPkQRlTBAQfl7lSJL/K1q1dNiclKVl4lX1I9GfXMRm
> RR/rMi1H/hTB8loh3+ZBCydzCFeRIRi3NSyVFk3oHYzHXOAg37nbizbYXExtz1LP
> jHpwm3oOPzSETtEHmzNC
> =NfTi
> -----END PGP SIGNATURE-----
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From ajs@anvilwalrusden.com  Mon Oct 17 07:04:44 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E32A621F87F0 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 07:04:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.37
X-Spam-Level: 
X-Spam-Status: No, score=-2.37 tagged_above=-999 required=5 tests=[AWL=0.229,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6GPVHOw-Ee7M for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 07:04:44 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 64ACD21F8B72 for <dnsext@ietf.org>; Mon, 17 Oct 2011 07:04:44 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 21A2F1ECB41D for <dnsext@ietf.org>; Mon, 17 Oct 2011 14:04:35 +0000 (UTC)
Date: Mon, 17 Oct 2011 10:04:38 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsext@ietf.org
Message-ID: <20111017140437.GA7743@shinkuro.com>
References: <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20111017134650.816981569E8F@drugs.dv.isc.org>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Oct 2011 14:04:45 -0000

No hat

On Tue, Oct 18, 2011 at 12:46:50AM +1100, Mark Andrews wrote:
> 
> And when the stub retries there is no state to prevent the recursive
> server asking the same broken upstream again and again and again

This is true of any breakage.  If the authoritative servers are under
DoS, you have the same problem, no?  DoS on authoritative servers is
at least as common as DNSSEC misconfiguration.

The plain fact is that DNSSEC makes the DNS more fragile.  Why is this
news, and why do you think that your recommendation is the only
sensible response to this?  I still don't understand that.
 
> There is no requirement for a recursive server to attempt to validate
> a response to a CD=1 query from downstream or if it attempts to
> validate the response to retry a different upstream if the validation
> fails.

Of course not. 

Best,

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com


From wouter@nlnetlabs.nl  Mon Oct 17 07:07:10 2011
Return-Path: <wouter@nlnetlabs.nl>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6751221F8B73 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 07:07:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.495
X-Spam-Level: 
X-Spam-Status: No, score=-2.495 tagged_above=-999 required=5 tests=[AWL=0.105,  BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jdsyHYt9aFB2 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 07:07:09 -0700 (PDT)
Received: from open.nlnetlabs.nl (open.nlnetlabs.nl [IPv6:2001:7b8:206:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id 70E3621F8B71 for <dnsext@ietf.org>; Mon, 17 Oct 2011 07:07:09 -0700 (PDT)
Received: from gary.nlnetlabs.nl (gary.nlnetlabs.nl [IPv6:2001:7b8:206:1:216:76ff:feb8:1853]) (authenticated bits=0) by open.nlnetlabs.nl (8.14.4/8.14.4) with ESMTP id p9HE77dp041869 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO); Mon, 17 Oct 2011 16:07:08 +0200 (CEST) (envelope-from wouter@nlnetlabs.nl)
Message-ID: <4E9C368B.3050208@nlnetlabs.nl>
Date: Mon, 17 Oct 2011 16:07:07 +0200
From: "W.C.A. Wijngaards" <wouter@NLnetLabs.nl>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.23) Gecko/20110928 Fedora/3.1.15-1.fc14 Lightning/1.0b3pre Thunderbird/3.1.15
MIME-Version: 1.0
To: Mark Andrews <marka@isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org>
In-Reply-To: <20111017134650.816981569E8F@drugs.dv.isc.org>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.7 (open.nlnetlabs.nl [IPv6:2001:7b8:206:1::1]); Mon, 17 Oct 2011 16:07:08 +0200 (CEST)
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Oct 2011 14:07:10 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Mark,

Mohan failed to tell you and I seem to fail, but I'll give it a retry.

>> On 10/17/2011 03:46 PM, Mark Andrews wrote:
> In message <4E9C2413.3030000@nlnetlabs.nl>, "W.C.A. Wijngaards" writes:
> No, CD=1 responses are "not withheld" if they fail validation.
> 
> Thus you can cache it, you can validate it and retry.
> 
>> And when the stub retries there is no state to prevent the recursive
>> server asking the same broken upstream again and again and again
>> ....

Well there is, because you can cache the final answer?  Of course.

>> There is no requirement for a recursive server to attempt to validate
>> a response to a CD=1 query from downstream or if it attempts to
>> validate the response to retry a different upstream if the validation
>> fails.

There is no requirement, but you seem to want to protect your cache from
unwanted dos due to configuration mistakes so that downstream validators
get signatures?  Then, you can validate it anyway, even though /this/
requestor is not interested in blocking bogus, it is interested in the
validation retries, because DO=1 (it wants signatures).

Best regards,
   Wouter
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iQIcBAEBAgAGBQJOnDaLAAoJEJ9vHC1+BF+NBK4P/20NgUhLGjCv1ngPeFpe6+EK
oDEUbyZ8O4MmGJd+PsTaRrtgSgMtglXVvTp6FbevNYYbha/tiLxdr9FJi3oHBtJR
rV8oxoOmw0lyfiubO3S46OC+2GcE/mm4FIIvA1A3cd7YditSp9zFRAWV0pITdbSd
TMHvRiCFp6Z8b4s7OzNg23WJ182YWoFQWuWYRl0Xomja+vr+bKNHYvNaTo9urIoj
1ZOftl/fPNNsDq5v1/LMTYONamy0b9y1PAQr9t3teB30NZ0thJaEuK+G++OnYqlF
OS8ImpsMqFGIugZLEvV7bM2wGAYlF1nlII5GcQRBIYhZyxvPDiSX8tvgNkAsB/Xn
QhE4Zp2JPAOTEHbKXuEKw8SKfhWHDOb3NXrKzN7SLVur7v/fHSW2nWldksUqUHs3
TuFFCfWQIZ6rHJZSarKStZbzESJUo6dAWapw5yqeU7aHrG2+hLMtTqLdn87hzoR5
JOzzr9cPRdiZWKbEs3+7fZKRE/caD/0HPNLH8hIpueNudhsvkiHUp9lp6tRftQSC
bMYKdnNg+N0XugLdTq35FZwkbP+GjqEhZzspF6tlLggF8/u3O021yU+jlaK1QTft
Cp2wXK3lTPnjcu16gb9oRQd+tbwOOjVYkgtO6u9h+0Ho9kBli0qWqqNiC88k9MmB
RKjSOby2ojhWQvafFb9S
=ikYp
-----END PGP SIGNATURE-----

From richard@highwayman.com  Mon Oct 17 10:36:18 2011
Return-Path: <richard@highwayman.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E4CC21F8B81 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 10:36:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_93=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 05KcS0LIkjyz for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 10:36:18 -0700 (PDT)
Received: from anchor-post-3.mail.demon.net (anchor-post-3.mail.demon.net [195.173.77.134]) by ietfa.amsl.com (Postfix) with ESMTP id B6E2B21F8B54 for <dnsext@ietf.org>; Mon, 17 Oct 2011 10:36:17 -0700 (PDT)
Received: from happyday.demon.co.uk ([80.177.121.10] helo=happyday.al.cl.cam.ac.uk) by anchor-post-3.mail.demon.net with esmtp (Exim 4.69) id 1RFr6Y-0002B3-oG for dnsext@ietf.org; Mon, 17 Oct 2011 17:36:02 +0000
Message-ID: <ICNRmkKGdGnOFALJ@highwayman.com>
Date: Mon, 17 Oct 2011 18:35:02 +0100
To: dnsext@ietf.org
From: Richard Clayton <richard@highwayman.com>
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable
X-Mailer: Turnpike Integrated Version 5.03 M <nJ1$+zWL77$tuOKL7+a+dOqF9C>
Subject: [dnsext] Call for Papers: Securing and Trusting Internet Names, SATIN 2012
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Richard Clayton <richard@cl.cam.ac.uk>
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Oct 2011 17:36:18 -0000

The usual apologies if you see multiple copies of this CFP, but the
inhabitants of this mailing list are more likely than most to wish to
submit papers!


Call for Papers:  Securing and Trusting Internet Names, SATIN 2012
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

When:       Thursday 22 & Friday 23 March 2012
            Note that IETF 83 is in Paris, CZ the following week

Where:      National Physical Laboratory (NPL)
            Teddington, London, UK

Timetable:  Submissions due:            Sun 22 Jan 2012, 11:59 PST
            Notification of Acceptance: Wed 22 Feb 2012
            Final Papers Due:           Mon 13 Mar 2012

Overview
=3D=3D=3D=3D=3D=3D=3D=3D

The domain name system, on which the Internet entirely relies, has
always been inherently insecure. Spoofing of IP source addresses means
that any wide area UDP protocol (such as DNS) can be forged. Cache
poisoning attacks can be made less likely but not prevented altogether.

ISPs, or others who can intercept traffic, can redirect end users to
sites of their choosing. Users can choose (or have forced upon them) DNS
services that suppress access to sites for policy reasons.

DNSSEC, which addresses some of these issues, has been under development
for years - but is finally ready for use; although some of the finer
details are still being worked out.

However, even at the current scale of deployment, implementation issues
are creating unexpected levels of traffic, and that is before the bad
guys make any contribution. Meanwhile DNSCURVE is being promoted as a
lightweight method of securing the links to and between name servers,
which addresses some, but by no means all, of the security issues.

DNSSEC is also being seen by some as a distributed, secure, key
distribution system, which could support new applications, or replace
existing mechanisms for establishing trust in the identity of endpoints.
The IETF's DANE working group is already addressing these issues.

Others merely see DNSSEC as a way of defeating marketers who want to
inject targeted advertising into browser sessions. But how effective
will these ideas be if we continue with our existing APIs and stub
resolvers?

There are significant issues with DNS besides just its integrity. DNS
services can be used to amplify denial-of-service attacks to create very
substantial traffic flows. Malware has also been using the DNS for
rendezvous arrangements, and has avoided countermeasures by exploiting
the DNS system through "fluxing" and other techniques.

There are also signs of a "tragedy of the commons" as legitimate
companies fill the DNS with large numbers of names, or set low TTLs, to
give a performance "edge". Meanwhile, some applications pre-fetch DNS
answers, with little heed to the impact on the infrastructure.

This latter technique raises privacy issues, as indeed does the proposal
to 'leak' partial identities of requestors who contact recursive
resolvers, with the aim of providing different answers to machines in
different blocks of address space.

All of this makes DNS, once amongst the most boring of topics, into one
of the more exciting. The first running of this workshop in April 2011
was a big success, and this second event will be equally significant.

Topics
=3D=3D=3D=3D=3D=3D

SATIN aims to provide a forum for academic work on the security of the
DNS alongside industry presentations on practical experiences in
providing name services.

This workshop will expose the academics to the real problems that
industry is encountering, and show industry what academia has to offer
them. To improve the flow of information (and as was most successful at
the first SATIN workshop) presentations will be restricted to 15 minutes
with 15 minutes of general discussion to follow.

Submissions must be made under either an "academic" or "industry" label
(relating entirely to the content rather than the affiliations of any
author), because the two types will be judged by different standards.

Academic work will be viewed as an "extended abstract" and should aim to
meet the general standard for acceptance into normal conferences in the
field. However, since this is a workshop, early results and initial
ideas are welcomed.

Industry submissions should be relevant, insightful, and technical, and
should provide information that cannot be gleaned from reading sales
brochures or manuals.

In all cases, real-world operational, implementation, and experimental
results will be preferred, and these results should inform the DNS
protocol development process wherever relevant or possible.

Topics of interest include but are not limited to:
        Attacks on naming services
        DNSSEC
        DNSCURVE
        Alternative methods of securing name services
        APIs for DNS resolvers
        Using DNS as a platform for other applications
        Denial of service and the DNS
        Malware and the DNS
        DNS caching on the modern Internet
        Privacy and the DNS
        Application behaviour and the DNS
        Security economics of naming services
        Passive DNS
        Operational experience
        Measurement studies
        New threats and challenges

Questions regarding whether a topic would be suitable are welcome and=20
should be sent to the programme chair, richard.clayton AT npl.co.uk

Workshop Organizers
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Programme Chair:

        Richard Clayton             NPL and University of Cambridge

Programme Committee:

        Nevil Brownlee,             University of Auckland
        Ben Laurie                  Google
        Anne-Marie Eklund L=F6winder  .SE (The Internet Infrastructure
                                         Foundation)
        Dan Massey                  Colorado State University
        Douglas Maughan             Department of Homeland Security
        Andrew W Moore              University of Cambridge
        Jose Nazario                Arbor Networks
        Roberto Perdisci            University of Georgia
        Dave Piscitello             ICANN
        Paul Vixie                  ISC
        Nicholas Weaver             ICSI & UC Berkeley
        Jonathan Williams           NPL

Submissions
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

All submissions must be in IEEE two column format and no longer than
eight (8) 8.5'' x 11'' pages, including figures, tables, and references.

That means that the text must be set in two columns in 10 point type on
12 point (single-spaced) leading, with the text block being no more than
7.2'' wide by 9.6'' deep. Author names and affiliations should appear on
the title page. The use of LaTeX and the IEEEtrans.cls file to create
submissions is very strongly encouraged:
     http://conferences.npl.co.uk/satin/format.html

Submissions must be submitted in PDF format via the SATIN 2012 website:
     http://conferences.npl.co.uk/satin/submit.html

Simultaneous submission of the same work to multiple venues, submission
of previously published work, or plagiarism, is dishonest and/or
fraudulent and action may be taken if this occurs. Note, however, that
we expect that many papers accepted for SATIN will eventually be
extended as full papers suitable for presentation at other conferences.

About the National Physical Laboratory
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

The National Physical Laboratory (NPL) is one of the UK's leading
science and research facilities. It is a world-leading centre of
excellence in developing and applying the most accurate standards,
science and technology available. NPL occupies a unique position as the
UK's National Measurement Institute and sits at the intersection between
scientific discovery and real world application. Its expertise and
original research have underpinned quality of life, innovation and
competitiveness for UK citizens and business for more than a century.

NPL is collaborating with the University of Cambridge in a three year
programme to develop robust and accurate measurements of Internet
security mechanisms. Measuring and understanding the deployment of
DNSSEC and other trust mechanisms for Internet names is a key part of
this ongoing programme.

More at: http://conferences.npl.co.uk/satin/

--=20
Dr Richard Clayton                      <richard.clayton AT cl.cam.ac.uk>
                                           <richard.clayton AT npl.co.uk>
                            tel: +44 1223 763570, mobile: +44 7887 794090
                    Computer Laboratory, University of Cambridge, CB3 0FD
         National Physical Laboratory, Hampton Road, Teddington, TW11 0LW

From mansaxel@besserwisser.org  Mon Oct 17 15:35:34 2011
Return-Path: <mansaxel@besserwisser.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C985111E8095 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 15:35:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.811
X-Spam-Level: 
X-Spam-Status: No, score=-0.811 tagged_above=-999 required=5 tests=[BAYES_05=-1.11, MIME_8BIT_HEADER=0.3, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vxPSCbVzorOy for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 15:35:34 -0700 (PDT)
Received: from jaja.besserwisser.org (jaja.besserwisser.org [IPv6:2a01:298:4:0:211:43ff:fe36:1299]) by ietfa.amsl.com (Postfix) with ESMTP id 4AA5B11E8082 for <dnsext@ietf.org>; Mon, 17 Oct 2011 15:35:33 -0700 (PDT)
Received: by jaja.besserwisser.org (Postfix, from userid 1004) id 8A1869F3A; Tue, 18 Oct 2011 00:35:30 +0200 (CEST)
Date: Tue, 18 Oct 2011 00:35:30 +0200
From: =?utf-8?B?TcOlbnM=?= Nilsson <mansaxel@besserwisser.org>
To: Richard Clayton <richard@cl.cam.ac.uk>
Message-ID: <20111017223530.GE13774@besserwisser.org>
References: <ICNRmkKGdGnOFALJ@highwayman.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="ZInfyf7laFu/Kiw7"
Content-Disposition: inline
In-Reply-To: <ICNRmkKGdGnOFALJ@highwayman.com>
X-URL: http://vvv.besserwisser.org
X-Purpose: More of everything NOW!
X-happyness: Life is good.
User-Agent: Mutt/1.5.20 (2009-06-14)
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Call for Papers: Securing and Trusting Internet Names, SATIN 2012
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Oct 2011 22:35:34 -0000

--ZInfyf7laFu/Kiw7
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Subject: [dnsext] Call for Papers: Securing and Trusting Internet Names, SA=
TIN 2012 Date: Mon, Oct 17, 2011 at 06:35:02PM +0100 Quoting Richard Clayto=
n (richard@highwayman.com):
>=20
> Call for Papers:  Securing and Trusting Internet Names, SATIN 2012
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>=20
> When:       Thursday 22 & Friday 23 March 2012
>             Note that IETF 83 is in Paris, CZ the following week
                                      ^^^^^^^^^

Ok?

--=20
M=C3=A5ns Nilsson     primary/secondary/besserwisser/machina
MN-1334-RIPE                             +46 705 989668
But they went to MARS around 1953!!

--ZInfyf7laFu/Kiw7
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk6crbIACgkQ02/pMZDM1cUt9gCeOwdz0x1pwr/ByGZ6OkaTc0Qx
oSAAoJHrj7sJesn+Kli1gU2Vg+uz+A0+
=4cOg
-----END PGP SIGNATURE-----

--ZInfyf7laFu/Kiw7--

From johnl@iecc.com  Mon Oct 17 16:27:16 2011
Return-Path: <johnl@iecc.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CB1A11E8096 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 16:27:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -109.094
X-Spam-Level: 
X-Spam-Status: No, score=-109.094 tagged_above=-999 required=5 tests=[AWL=0.616, BAYES_05=-1.11, HABEAS_ACCREDITED_SOI=-4.3, RCVD_IN_BSP_TRUSTED=-4.3, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id so70iBEgdqDN for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 16:27:15 -0700 (PDT)
Received: from leila.iecc.com (leila6.iecc.com [IPv6:2001:470:1f07:1126:0:4c:6569:6c61]) by ietfa.amsl.com (Postfix) with ESMTP id 8F92C11E8095 for <dnsext@ietf.org>; Mon, 17 Oct 2011 16:27:15 -0700 (PDT)
Received: (qmail 47712 invoked from network); 17 Oct 2011 23:27:14 -0000
Received: from gal.iecc.com (64.57.183.53) by mail2.iecc.com with SMTP; 17 Oct 2011 23:27:14 -0000
Received: (qmail 8260 invoked from network); 17 Oct 2011 23:27:14 -0000
Received: from leila.iecc.com (64.57.183.34) by mail1.iecc.com with QMQP; 17 Oct 2011 23:27:14 -0000
Date: 17 Oct 2011 23:26:52 -0000
Message-ID: <20111017232652.13942.qmail@joyce.lan>
From: "John Levine" <johnl@iecc.com>
To: dnsext@ietf.org
In-Reply-To: <20111017223530.GE13774@besserwisser.org>
Organization: 
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 7bit
Subject: Re: [dnsext] Call for Papers: Securing and Trusting Internet Names, SATIN 2012
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Oct 2011 23:27:16 -0000

>>             Note that IETF 83 is in Paris, CZ the following week
>
>Ok?

Prague is the Paris of central Europe, or something like that.

R's,
John

From marka@isc.org  Mon Oct 17 18:32:12 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58E4311E80AF for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 18:32:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.562
X-Spam-Level: 
X-Spam-Status: No, score=-2.562 tagged_above=-999 required=5 tests=[AWL=0.037,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AM2hLB8S6khR for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 18:32:11 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id D97AD11E80BC for <dnsext@ietf.org>; Mon, 17 Oct 2011 18:32:09 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id B7553C941E; Tue, 18 Oct 2011 01:31:57 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 64F5B216C6B; Tue, 18 Oct 2011 01:31:55 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 504451578BF9; Tue, 18 Oct 2011 12:31:44 +1100 (EST)
To: "W.C.A. Wijngaards" <wouter@NLnetLabs.nl>
From: Mark Andrews <marka@isc.org>
References: <20111006230230.4633714C8E52@drugs.dv.isc.org> <20111007141449.GA73072@shinkuro.com> <20111007192752.GO73072@shinkuro.com> <20111007224937.6E9BD14DB73A@drugs.dv.isc.org> <0AB03978-C546-466B-9BA4-0C0F0194EAD1@virtualized.org> <20111008122653.EB10314DDC76@drugs.dv.isc.org> <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <4E9C368B.3050208@nlnetlabs.nl>
In-reply-to: Your message of "Mon, 17 Oct 2011 16:07:07 +0200." <4E9C368B.3050208@nlnetlabs.nl>
Date: Tue, 18 Oct 2011 12:31:44 +1100
Message-Id: <20111018013144.504451578BF9@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 01:32:12 -0000

In message <4E9C368B.3050208@nlnetlabs.nl>, "W.C.A. Wijngaards" writes:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi Mark,
> 
> Mohan failed to tell you and I seem to fail, but I'll give it a retry.
> 
> >> On 10/17/2011 03:46 PM, Mark Andrews wrote:
> > In message <4E9C2413.3030000@nlnetlabs.nl>, "W.C.A. Wijngaards" writes:
> > No, CD=1 responses are "not withheld" if they fail validation.
> > 
> > Thus you can cache it, you can validate it and retry.
> > 
> >> And when the stub retries there is no state to prevent the recursive
> >> server asking the same broken upstream again and again and again
> >> ....
> 
> Well there is, because you can cache the final answer?  Of course.
> 
> >> There is no requirement for a recursive server to attempt to validate
> >> a response to a CD=1 query from downstream or if it attempts to
> >> validate the response to retry a different upstream if the validation
> >> fails.
> 
> There is no requirement, but you seem to want to protect your cache from
> unwanted dos due to configuration mistakes so that downstream validators
> get signatures?  Then, you can validate it anyway, even though /this/
> requestor is not interested in blocking bogus, it is interested in the
> validation retries, because DO=1 (it wants signatures).

No. I want to protect the stub from DoS and misconconfigurations.
The stub is one step removed from the source of the bad data so it
can't take *effective* corrective measures itself as it is required
to talk to the world through the recursive server.  It needs to get
the recursive server to take the corrective measures on its behalf,
by setting CD=1, then validate the answer returned to detect any
attacks on the reply packets from the recursive server.

Setup 10 servers for a zone with ameservers in a different zone to
stop the recursive server validating answers from the zone as a
side effect.  Make 9 of them have out of date signatures (old key).
The ask a validating recursive server for a answers using CD=1 and
see how many responses have a signatures with the correct key tag.

Repeat with CD=0.


> Best regards,
>    Wouter
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.11 (GNU/Linux)
> Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/
> 
> iQIcBAEBAgAGBQJOnDaLAAoJEJ9vHC1+BF+NBK4P/20NgUhLGjCv1ngPeFpe6+EK
> oDEUbyZ8O4MmGJd+PsTaRrtgSgMtglXVvTp6FbevNYYbha/tiLxdr9FJi3oHBtJR
> rV8oxoOmw0lyfiubO3S46OC+2GcE/mm4FIIvA1A3cd7YditSp9zFRAWV0pITdbSd
> TMHvRiCFp6Z8b4s7OzNg23WJ182YWoFQWuWYRl0Xomja+vr+bKNHYvNaTo9urIoj
> 1ZOftl/fPNNsDq5v1/LMTYONamy0b9y1PAQr9t3teB30NZ0thJaEuK+G++OnYqlF
> OS8ImpsMqFGIugZLEvV7bM2wGAYlF1nlII5GcQRBIYhZyxvPDiSX8tvgNkAsB/Xn
> QhE4Zp2JPAOTEHbKXuEKw8SKfhWHDOb3NXrKzN7SLVur7v/fHSW2nWldksUqUHs3
> TuFFCfWQIZ6rHJZSarKStZbzESJUo6dAWapw5yqeU7aHrG2+hLMtTqLdn87hzoR5
> JOzzr9cPRdiZWKbEs3+7fZKRE/caD/0HPNLH8hIpueNudhsvkiHUp9lp6tRftQSC
> bMYKdnNg+N0XugLdTq35FZwkbP+GjqEhZzspF6tlLggF8/u3O021yU+jlaK1QTft
> Cp2wXK3lTPnjcu16gb9oRQd+tbwOOjVYkgtO6u9h+0Ho9kBli0qWqqNiC88k9MmB
> RKjSOby2ojhWQvafFb9S
> =ikYp
> -----END PGP SIGNATURE-----
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From marka@isc.org  Mon Oct 17 18:42:54 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23BA511E80BA for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 18:42:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.565
X-Spam-Level: 
X-Spam-Status: No, score=-2.565 tagged_above=-999 required=5 tests=[AWL=0.034,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DJk2vya65ySX for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 18:42:53 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id 70CFB11E80AF for <dnsext@ietf.org>; Mon, 17 Oct 2011 18:42:53 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id EFFD4C941E; Tue, 18 Oct 2011 01:42:24 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 4B2BE216C6A; Tue, 18 Oct 2011 01:42:24 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id C0E871578C86; Tue, 18 Oct 2011 12:42:21 +1100 (EST)
To: Andrew Sullivan <ajs@anvilwalrusden.com>
From: Mark Andrews <marka@isc.org>
References: <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com>
In-reply-to: Your message of "Mon, 17 Oct 2011 10:04:38 EDT." <20111017140437.GA7743@shinkuro.com>
Date: Tue, 18 Oct 2011 12:42:21 +1100
Message-Id: <20111018014221.C0E871578C86@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 01:42:54 -0000

In message <20111017140437.GA7743@shinkuro.com>, Andrew Sullivan writes:
> No hat
> 
> On Tue, Oct 18, 2011 at 12:46:50AM +1100, Mark Andrews wrote:
> > 
> > And when the stub retries there is no state to prevent the recursive
> > server asking the same broken upstream again and again and again
> 
> This is true of any breakage.  If the authoritative servers are under
> DoS, you have the same problem, no?  DoS on authoritative servers is
> at least as common as DNSSEC misconfiguration.
> 
> The plain fact is that DNSSEC makes the DNS more fragile.  Why is this
> news, and why do you think that your recommendation is the only
> sensible response to this?  I still don't understand that.

  10 server A0-A8 out of date, A9 up to date.

  Auth Servers <- breakage ->  Recusive Server <- clean -> Stub
					<- example/a/cd=1,do=1
  	<- example/a/cd=1,do=1
  A0
  	example/a/cd=1,do=1(bad) ->
				example/a/cd=1,do=1(bad) ->
					<- example/a/cd=1,do=1
	<- example/a/cd=1,do=1
  A1
  	example/a/cd=1,do=1(bad) ->
				example/a/cd=1,do=1(bad) ->
					<- example/a/cd=1,do=1
	<- example/a/cd=1,do=1
  A2
  	example/a/cd=1,do=1(bad) ->
				example/a/cd=1,do=1(bad) ->

		Give up.
	
	
  Auth Servers <- breakage ->  Recusive Server <- clean -> Stub
					<- example/a/cd=0,do=1
  	<- example/a/cd=1,do=1
  A0
  	example/a/cd=1,do=1(bad) ->
	<- example/a/cd=1,do=1
  A1
  	example/a/cd=1,do=1(bad) ->
	<- example/a/cd=1,do=1
  A2
  	example/a/cd=1,do=1(bad) ->
	
	...

  A9
  	example/a/cd=0,do=1(good) ->
				example/a/cd=0,do=1(good) ->

		Succeed.


 
> > There is no requirement for a recursive server to attempt to validate
> > a response to a CD=1 query from downstream or if it attempts to
> > validate the response to retry a different upstream if the validation
> > fails.
> 
> Of course not. 
> 
> Best,
> 
> A
> 
> -- 
> Andrew Sullivan
> ajs@anvilwalrusden.com
> 
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From suruti94@gmail.com  Mon Oct 17 19:35:33 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE0A31F0C4B for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 19:35:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lpIt7wTsPTo2 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 19:35:33 -0700 (PDT)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by ietfa.amsl.com (Postfix) with ESMTP id 15AD11F0C43 for <dnsext@ietf.org>; Mon, 17 Oct 2011 19:35:33 -0700 (PDT)
Received: by yxj19 with SMTP id 19so159076yxj.31 for <dnsext@ietf.org>; Mon, 17 Oct 2011 19:35:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=9/xbOuApkZO+Tdwvn7HNTPt4DHNcS9W8EuO2Xba7EVE=; b=sC6kaM8c60orrf0/KzA9scWPj3Gu9XX4bcF6rKD1kNoUo4ePQaNwyIvvLAKza7QwwA qTLCFcRXxhBDc2KAUABTvtFuumgLKJuskaxt2ctFyUS9HTOjX9VjfUIK2BEwYEeUWNrI jqlfM0vahh/n/w3i7m/PSILeZnRUqIXXkt2ug=
MIME-Version: 1.0
Received: by 10.182.147.4 with SMTP id tg4mr153685obb.60.1318905331420; Mon, 17 Oct 2011 19:35:31 -0700 (PDT)
Received: by 10.182.75.9 with HTTP; Mon, 17 Oct 2011 19:35:31 -0700 (PDT)
In-Reply-To: <20111018014221.C0E871578C86@drugs.dv.isc.org>
References: <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org>
Date: Mon, 17 Oct 2011 19:35:31 -0700
Message-ID: <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 02:35:33 -0000

On Mon, Oct 17, 2011 at 6:42 PM, Mark Andrews <marka@isc.org> wrote:
>
> In message <20111017140437.GA7743@shinkuro.com>, Andrew Sullivan writes:
>> No hat
>>
>> On Tue, Oct 18, 2011 at 12:46:50AM +1100, Mark Andrews wrote:
>> >
>> > And when the stub retries there is no state to prevent the recursive
>> > server asking the same broken upstream again and again and again
>>
>> This is true of any breakage. =A0If the authoritative servers are under
>> DoS, you have the same problem, no? =A0DoS on authoritative servers is
>> at least as common as DNSSEC misconfiguration.
>>
>> The plain fact is that DNSSEC makes the DNS more fragile. =A0Why is this
>> news, and why do you think that your recommendation is the only
>> sensible response to this? =A0I still don't understand that.
>
> =A010 server A0-A8 out of date, A9 up to date.
>
> =A0Auth Servers <- breakage -> =A0Recusive Server <- clean -> Stub
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =A0<- example/a/cd=3D1,do=3D1
> =A0 =A0 =A0 =A0<- example/a/cd=3D1,do=3D1
> =A0A0
> =A0 =A0 =A0 =A0example/a/cd=3D1,do=3D1(bad) ->
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0example/a/=
cd=3D1,do=3D1(bad) ->
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =A0<- example/a/cd=3D1,do=3D1
> =A0 =A0 =A0 =A0<- example/a/cd=3D1,do=3D1
> =A0A1
> =A0 =A0 =A0 =A0example/a/cd=3D1,do=3D1(bad) ->
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0example/a/=
cd=3D1,do=3D1(bad) ->
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =A0<- example/a/cd=3D1,do=3D1
> =A0 =A0 =A0 =A0<- example/a/cd=3D1,do=3D1
> =A0A2
> =A0 =A0 =A0 =A0example/a/cd=3D1,do=3D1(bad) ->
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0example/a/=
cd=3D1,do=3D1(bad) ->
>
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Give up.

This is confusing. Why did it stop at A2 ? Why didn't it return after
trying A0 or A5 ? If this is arbitrary then the recursive server is
broken. If the recursive server wants to cache the response and avoid
DoS, then stopping here seems broken to me.

-mohan
>
>
> =A0Auth Servers <- breakage -> =A0Recusive Server <- clean -> Stub
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =A0<- example/a/cd=3D0,do=3D1
> =A0 =A0 =A0 =A0<- example/a/cd=3D1,do=3D1
> =A0A0
> =A0 =A0 =A0 =A0example/a/cd=3D1,do=3D1(bad) ->
> =A0 =A0 =A0 =A0<- example/a/cd=3D1,do=3D1
> =A0A1
> =A0 =A0 =A0 =A0example/a/cd=3D1,do=3D1(bad) ->
> =A0 =A0 =A0 =A0<- example/a/cd=3D1,do=3D1
> =A0A2
> =A0 =A0 =A0 =A0example/a/cd=3D1,do=3D1(bad) ->
>
> =A0 =A0 =A0 =A0...
>
> =A0A9
> =A0 =A0 =A0 =A0example/a/cd=3D0,do=3D1(good) ->
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0example/a/=
cd=3D0,do=3D1(good) ->
>
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Succeed.
>
>
>
>> > There is no requirement for a recursive server to attempt to validate
>> > a response to a CD=3D1 query from downstream or if it attempts to
>> > validate the response to retry a different upstream if the validation
>> > fails.
>>
>> Of course not.
>>
>> Best,
>>
>> A
>>
>> --
>> Andrew Sullivan
>> ajs@anvilwalrusden.com
>>
>> _______________________________________________
>> dnsext mailing list
>> dnsext@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsext
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
c.org
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>

From marka@isc.org  Mon Oct 17 19:53:16 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CB121F0C62 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 19:53:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.568
X-Spam-Level: 
X-Spam-Status: No, score=-2.568 tagged_above=-999 required=5 tests=[AWL=0.031,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D3YhSNvrModK for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 19:53:16 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id B929C1F0C5F for <dnsext@ietf.org>; Mon, 17 Oct 2011 19:53:15 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 9E49AC9422; Tue, 18 Oct 2011 02:53:01 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id CF57D216C6A; Tue, 18 Oct 2011 02:53:00 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 9B41A157C571; Tue, 18 Oct 2011 13:52:57 +1100 (EST)
To: Mohan Parthasarathy <suruti94@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com>
In-reply-to: Your message of "Mon, 17 Oct 2011 19:35:31 PDT." <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com>
Date: Tue, 18 Oct 2011 13:52:57 +1100
Message-Id: <20111018025257.9B41A157C571@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 02:53:16 -0000

In message <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com>, Mohan Parthasarathy writes:
> On Mon, Oct 17, 2011 at 6:42 PM, Mark Andrews <marka@isc.org> wrote:
> >
> > In message <20111017140437.GA7743@shinkuro.com>, Andrew Sullivan writes:
> >> No hat
> >>
> >> On Tue, Oct 18, 2011 at 12:46:50AM +1100, Mark Andrews wrote:
> >> >
> >> > And when the stub retries there is no state to prevent the recursive
> >> > server asking the same broken upstream again and again and again
> >>
> >> This is true of any breakage.  If the authoritative servers are under
> >> DoS, you have the same problem, no?  DoS on authoritative servers is
> >> at least as common as DNSSEC misconfiguration.
> >>
> >> The plain fact is that DNSSEC makes the DNS more fragile.  Why is this
> >> news, and why do you think that your recommendation is the only
> >> sensible response to this?  I still don't understand that.
> >
> >  10 server A0-A8 out of date, A9 up to date.
> >
> >  Auth Servers <- breakage ->  Recusive Server <- clean -> Stub
> >                                     =
>    <- example/a/cd=3D1,do=3D1
> >        <- example/a/cd=3D1,do=3D1
> >  A0
> >        example/a/cd=3D1,do=3D1(bad) ->
> >                                example/a/=
> cd=3D1,do=3D1(bad) ->
> >                                     =
>    <- example/a/cd=3D1,do=3D1
> >        <- example/a/cd=3D1,do=3D1
> >  A1
> >        example/a/cd=3D1,do=3D1(bad) ->
> >                                example/a/=
> cd=3D1,do=3D1(bad) ->
> >                                     =
>    <- example/a/cd=3D1,do=3D1
> >        <- example/a/cd=3D1,do=3D1
> >  A2
> >        example/a/cd=3D1,do=3D1(bad) ->
> >                                example/a/=
> cd=3D1,do=3D1(bad) ->
> >
> >                Give up.
> 
> This is confusing. Why did it stop at A2 ? Why didn't it return after
> trying A0 or A5 ? If this is arbitrary then the recursive server is
> broken. If the recursive server wants to cache the response and avoid
> DoS, then stopping here seems broken to me.

At some stage the stub has to give up.  Remember the recursive server
doesn't have to cycle through the authoritative servers.  It can
just ask A0 forever with CD=1 queries and *never* talk to A9.

With CD=0 queries the recursive server knows which authoritative
servers it has tried and which ones it hasn't.

CD=1 has stateless retries.
CD=0 has stateful retries.

Mark

> -mohan
>
> >  Auth Servers <- breakage ->  Recusive Server <- clean -> Stub
> >                                     =
>    <- example/a/cd=3D0,do=3D1
> >        <- example/a/cd=3D1,do=3D1
> >  A0
> >        example/a/cd=3D1,do=3D1(bad) ->
> >        <- example/a/cd=3D1,do=3D1
> >  A1
> >        example/a/cd=3D1,do=3D1(bad) ->
> >        <- example/a/cd=3D1,do=3D1
> >  A2
> >        example/a/cd=3D1,do=3D1(bad) ->
> >
> >        ...
> >
> >  A9
> >        example/a/cd=3D0,do=3D1(good) ->
> >                                example/a/=
> cd=3D0,do=3D1(good) ->
> >
> >                Succeed.
> >
> >
> >
> >> > There is no requirement for a recursive server to attempt to validate
> >> > a response to a CD=3D1 query from downstream or if it attempts to
> >> > validate the response to retry a different upstream if the validation
> >> > fails.
> >>
> >> Of course not.
> >>
> >> Best,
> >>
> >> A
> >>
> >> --
> >> Andrew Sullivan
> >> ajs@anvilwalrusden.com
> >>
> >> _______________________________________________
> >> dnsext mailing list
> >> dnsext@ietf.org
> >> https://www.ietf.org/mailman/listinfo/dnsext
> > --
> > Mark Andrews, ISC
> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > PHONE: +61 2 9871 4742                 INTERNET: marka@is=
> c.org
> > _______________________________________________
> > dnsext mailing list
> > dnsext@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsext
> >
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From suruti94@gmail.com  Mon Oct 17 20:16:30 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F4C911E80AF for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 20:16:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FaV6mQLDYpyx for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 20:16:29 -0700 (PDT)
Received: from mail-gy0-f172.google.com (mail-gy0-f172.google.com [209.85.160.172]) by ietfa.amsl.com (Postfix) with ESMTP id 4264811E8085 for <dnsext@ietf.org>; Mon, 17 Oct 2011 20:16:29 -0700 (PDT)
Received: by gyh20 with SMTP id 20so182740gyh.31 for <dnsext@ietf.org>; Mon, 17 Oct 2011 20:16:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=WIcVUE2ZCqdcM7E0JYFnwqC8SNE1NMYmqlsGtx8T14g=; b=qJ2Ws3SL8rP/yGRTUyfBTmnMBpZT1Qx7t4fD2q6NPk1c32C+IAPyXbZIWL8rfcRC6p 75q/SM38u9Jmsk4Pbj/Uffu3h1ewaxfzJe6ZN+nHaeum/Ykau6d27V5I5jJiTRzcsSu5 HyDBGNyAnMS+5iWyPb1dyZrGH6unSqHsRg19o=
MIME-Version: 1.0
Received: by 10.182.227.7 with SMTP id rw7mr199262obc.70.1318907788884; Mon, 17 Oct 2011 20:16:28 -0700 (PDT)
Received: by 10.182.75.9 with HTTP; Mon, 17 Oct 2011 20:16:28 -0700 (PDT)
In-Reply-To: <20111018025257.9B41A157C571@drugs.dv.isc.org>
References: <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org>
Date: Mon, 17 Oct 2011 20:16:28 -0700
Message-ID: <CACU5sD=x0d-_+j-eb4TuojdkqZsy+LR=hmdLjVk4RQg-ccRfHQ@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 03:16:30 -0000

On Mon, Oct 17, 2011 at 7:52 PM, Mark Andrews <marka@isc.org> wrote:
>
> In message <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmai=
l.com>, Mohan Parthasarathy writes:
>> On Mon, Oct 17, 2011 at 6:42 PM, Mark Andrews <marka@isc.org> wrote:
>> >
>> > In message <20111017140437.GA7743@shinkuro.com>, Andrew Sullivan write=
s:
>> >> No hat
>> >>
>> >> On Tue, Oct 18, 2011 at 12:46:50AM +1100, Mark Andrews wrote:
>> >> >
>> >> > And when the stub retries there is no state to prevent the recursiv=
e
>> >> > server asking the same broken upstream again and again and again
>> >>
>> >> This is true of any breakage. =A0If the authoritative servers are und=
er
>> >> DoS, you have the same problem, no? =A0DoS on authoritative servers i=
s
>> >> at least as common as DNSSEC misconfiguration.
>> >>
>> >> The plain fact is that DNSSEC makes the DNS more fragile. =A0Why is t=
his
>> >> news, and why do you think that your recommendation is the only
>> >> sensible response to this? =A0I still don't understand that.
>> >
>> > =A010 server A0-A8 out of date, A9 up to date.
>> >
>> > =A0Auth Servers <- breakage -> =A0Recusive Server <- clean -> Stub
>> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =3D
>> =A0 =A0<- example/a/cd=3D3D1,do=3D3D1
>> > =A0 =A0 =A0 =A0<- example/a/cd=3D3D1,do=3D3D1
>> > =A0A0
>> > =A0 =A0 =A0 =A0example/a/cd=3D3D1,do=3D3D1(bad) ->
>> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0example=
/a/=3D
>> cd=3D3D1,do=3D3D1(bad) ->
>> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =3D
>> =A0 =A0<- example/a/cd=3D3D1,do=3D3D1
>> > =A0 =A0 =A0 =A0<- example/a/cd=3D3D1,do=3D3D1
>> > =A0A1
>> > =A0 =A0 =A0 =A0example/a/cd=3D3D1,do=3D3D1(bad) ->
>> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0example=
/a/=3D
>> cd=3D3D1,do=3D3D1(bad) ->
>> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =3D
>> =A0 =A0<- example/a/cd=3D3D1,do=3D3D1
>> > =A0 =A0 =A0 =A0<- example/a/cd=3D3D1,do=3D3D1
>> > =A0A2
>> > =A0 =A0 =A0 =A0example/a/cd=3D3D1,do=3D3D1(bad) ->
>> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0example=
/a/=3D
>> cd=3D3D1,do=3D3D1(bad) ->
>> >
>> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Give up.
>>
>> This is confusing. Why did it stop at A2 ? Why didn't it return after
>> trying A0 or A5 ? If this is arbitrary then the recursive server is
>> broken. If the recursive server wants to cache the response and avoid
>> DoS, then stopping here seems broken to me.
>
> At some stage the stub has to give up. =A0Remember the recursive server
> doesn't have to cycle through the authoritative servers. =A0It can
> just ask A0 forever with CD=3D1 queries and *never* talk to A9.
>
> With CD=3D0 queries the recursive server knows which authoritative
> servers it has tried and which ones it hasn't.
>
> CD=3D1 has stateless retries.
> CD=3D0 has stateful retries.
>

See "5.9.  Always set the CD bit on Queries" in dnssec-bis updates.
Recursive server setting the CD bit on upstream queries is not
dependent on the incoming query.

-mohan

> Mark
>
>> -mohan
>>
>> > =A0Auth Servers <- breakage -> =A0Recusive Server <- clean -> Stub
>> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =3D
>> =A0 =A0<- example/a/cd=3D3D0,do=3D3D1
>> > =A0 =A0 =A0 =A0<- example/a/cd=3D3D1,do=3D3D1
>> > =A0A0
>> > =A0 =A0 =A0 =A0example/a/cd=3D3D1,do=3D3D1(bad) ->
>> > =A0 =A0 =A0 =A0<- example/a/cd=3D3D1,do=3D3D1
>> > =A0A1
>> > =A0 =A0 =A0 =A0example/a/cd=3D3D1,do=3D3D1(bad) ->
>> > =A0 =A0 =A0 =A0<- example/a/cd=3D3D1,do=3D3D1
>> > =A0A2
>> > =A0 =A0 =A0 =A0example/a/cd=3D3D1,do=3D3D1(bad) ->
>> >
>> > =A0 =A0 =A0 =A0...
>> >
>> > =A0A9
>> > =A0 =A0 =A0 =A0example/a/cd=3D3D0,do=3D3D1(good) ->
>> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0example=
/a/=3D
>> cd=3D3D0,do=3D3D1(good) ->
>> >
>> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Succeed.
>> >
>> >
>> >
>> >> > There is no requirement for a recursive server to attempt to valida=
te
>> >> > a response to a CD=3D3D1 query from downstream or if it attempts to
>> >> > validate the response to retry a different upstream if the validati=
on
>> >> > fails.
>> >>
>> >> Of course not.
>> >>
>> >> Best,
>> >>
>> >> A
>> >>
>> >> --
>> >> Andrew Sullivan
>> >> ajs@anvilwalrusden.com
>> >>
>> >> _______________________________________________
>> >> dnsext mailing list
>> >> dnsext@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/dnsext
>> > --
>> > Mark Andrews, ISC
>> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
>> > PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka=
@is=3D
>> c.org
>> > _______________________________________________
>> > dnsext mailing list
>> > dnsext@ietf.org
>> > https://www.ietf.org/mailman/listinfo/dnsext
>> >
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
c.org
>

From marka@isc.org  Mon Oct 17 20:43:26 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CD4D11E8083 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 20:43:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.57
X-Spam-Level: 
X-Spam-Status: No, score=-2.57 tagged_above=-999 required=5 tests=[AWL=0.029,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wUaq2UfEXpfc for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 20:43:25 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id A220411E8080 for <dnsext@ietf.org>; Mon, 17 Oct 2011 20:43:25 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 002D6C941E; Tue, 18 Oct 2011 03:43:09 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 0BFE1216C6A; Tue, 18 Oct 2011 03:43:09 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id A727A157CB88; Tue, 18 Oct 2011 14:43:06 +1100 (EST)
To: Mohan Parthasarathy <suruti94@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <CACU5sD=x0d-_+j-eb4TuojdkqZsy+LR=hmdLjVk4RQg-ccRfHQ@mail.gmail.com>
In-reply-to: Your message of "Mon, 17 Oct 2011 20:16:28 PDT." <CACU5sD=x0d-_+j-eb4TuojdkqZsy+LR=hmdLjVk4RQg-ccRfHQ@mail.gmail.com>
Date: Tue, 18 Oct 2011 14:43:06 +1100
Message-Id: <20111018034306.A727A157CB88@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 03:43:26 -0000

In message <CACU5sD=x0d-_+j-eb4TuojdkqZsy+LR=hmdLjVk4RQg-ccRfHQ@mail.gmail.com>, Mohan Parthasarathy writes:
> On Mon, Oct 17, 2011 at 7:52 PM, Mark Andrews <marka@isc.org> wrote:
> >
> > In message <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmai=
> l.com>, Mohan Parthasarathy writes:
> >> On Mon, Oct 17, 2011 at 6:42 PM, Mark Andrews <marka@isc.org> wrote:
> >> >
> >> > In message <20111017140437.GA7743@shinkuro.com>, Andrew Sullivan write=
> s:
> >> >> No hat
> >> >>
> >> >> On Tue, Oct 18, 2011 at 12:46:50AM +1100, Mark Andrews wrote:
> >> >> >
> >> >> > And when the stub retries there is no state to prevent the recursiv=
> e
> >> >> > server asking the same broken upstream again and again and again
> >> >>
> >> >> This is true of any breakage.  If the authoritative servers are und=
> er
> >> >> DoS, you have the same problem, no?  DoS on authoritative servers i=
> s
> >> >> at least as common as DNSSEC misconfiguration.
> >> >>
> >> >> The plain fact is that DNSSEC makes the DNS more fragile.  Why is t=
> his
> >> >> news, and why do you think that your recommendation is the only
> >> >> sensible response to this?  I still don't understand that.
> >> >
> >> >  10 server A0-A8 out of date, A9 up to date.
> >> >
> >> >  Auth Servers <- breakage ->  Recusive Server <- clean -> Stub
> >> >                                   =
>   =
> >>    <- example/a/cd=1,do=1
> >> >        <- example/a/cd=1,do=1
> >> >  A0
> >> >        example/a/cd=1,do=1(bad) ->
> >> >                                example=
> /a/=
> >> cd=1,do=1(bad) ->
> >> >                                   =
>   =
> >>    <- example/a/cd=1,do=1
> >> >        <- example/a/cd=1,do=1
> >> >  A1
> >> >        example/a/cd=1,do=1(bad) ->
> >> >                                example=
> /a/=
> >> cd=1,do=1(bad) ->
> >> >                                   =
>   =
> >>    <- example/a/cd=1,do=1
> >> >        <- example/a/cd=1,do=1
> >> >  A2
> >> >        example/a/cd=1,do=1(bad) ->
> >> >                                example=
> /a/=
> >> cd=1,do=1(bad) ->
> >> >
> >> >                Give up.
> >>
> >> This is confusing. Why did it stop at A2 ? Why didn't it return after
> >> trying A0 or A5 ? If this is arbitrary then the recursive server is
> >> broken. If the recursive server wants to cache the response and avoid
> >> DoS, then stopping here seems broken to me.
> >
> > At some stage the stub has to give up.  Remember the recursive server
> > doesn't have to cycle through the authoritative servers.  It can
> > just ask A0 forever with CD=1 queries and *never* talk to A9.
> >
> > With CD=0 queries the recursive server knows which authoritative
> > servers it has tried and which ones it hasn't.
> >
> > CD=1 has stateless retries.
> > CD=0 has stateful retries.
> 
> See "5.9.  Always set the CD bit on Queries" in dnssec-bis updates.
> Recursive server setting the CD bit on upstream queries is not
> dependent on the incoming query.
 
And what does that have to do with my statements?  The examples
*had* CD=1 upstream queries.

CD=1 queries, from the stub, has stateless retries.
CD=0 queries, from the stub, has stateful retries.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From suruti94@gmail.com  Mon Oct 17 21:02:53 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38D9A11E8083 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 21:02:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ll23gZBaZhwH for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 21:02:52 -0700 (PDT)
Received: from mail-gx0-f172.google.com (mail-gx0-f172.google.com [209.85.161.172]) by ietfa.amsl.com (Postfix) with ESMTP id 7CA1C11E8080 for <dnsext@ietf.org>; Mon, 17 Oct 2011 21:02:52 -0700 (PDT)
Received: by ggnv1 with SMTP id v1so212852ggn.31 for <dnsext@ietf.org>; Mon, 17 Oct 2011 21:02:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=THbH0Hq+eflBWhYJ81449DekOPAZDY9o8MhJQQNQTwk=; b=OoF9HRK+iqg4723na2kO31Z5DGDiaKbAAP7tXtxypTmqBgfvSch99w6DPWm2w3YSnp LpojcVedZuMVWQzBlFNiDCUXjaUsTtiG3mUXWEZ8+fEKOgW5yVqUU3JblR6YVU4Rz4XR QP6ChiZ2ri+u3ZTqRz7X/L7IlW7ET9WRJdQSk=
MIME-Version: 1.0
Received: by 10.182.11.9 with SMTP id m9mr312181obb.0.1318910571807; Mon, 17 Oct 2011 21:02:51 -0700 (PDT)
Received: by 10.182.75.9 with HTTP; Mon, 17 Oct 2011 21:02:51 -0700 (PDT)
In-Reply-To: <20111018034306.A727A157CB88@drugs.dv.isc.org>
References: <20111008212432.GB82710@shinkuro.com> <20111008223820.F09F314DF5E1@drugs.dv.isc.org> <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <CACU5sD=x0d-_+j-eb4TuojdkqZsy+LR=hmdLjVk4RQg-ccRfHQ@mail.gmail.com> <20111018034306.A727A157CB88@drugs.dv.isc.org>
Date: Mon, 17 Oct 2011 21:02:51 -0700
Message-ID: <CACU5sDkq=itVTRdSLkMZmHgrvP66QTZTorYaByo9tCGoStkoxw@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 04:02:53 -0000

On Mon, Oct 17, 2011 at 8:43 PM, Mark Andrews <marka@isc.org> wrote:
>
> In message <CACU5sD=3Dx0d-_+j-eb4TuojdkqZsy+LR=3DhmdLjVk4RQg-ccRfHQ@mail.=
gmail.com>, Mohan Parthasarathy writes:
>> On Mon, Oct 17, 2011 at 7:52 PM, Mark Andrews <marka@isc.org> wrote:
>> >
>> > In message <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.g=
mai=3D
>> l.com>, Mohan Parthasarathy writes:
>> >> On Mon, Oct 17, 2011 at 6:42 PM, Mark Andrews <marka@isc.org> wrote:
>> >> >
>> >> > In message <20111017140437.GA7743@shinkuro.com>, Andrew Sullivan wr=
ite=3D
>> s:
>> >> >> No hat
>> >> >>
>> >> >> On Tue, Oct 18, 2011 at 12:46:50AM +1100, Mark Andrews wrote:
>> >> >> >
>> >> >> > And when the stub retries there is no state to prevent the recur=
siv=3D
>> e
>> >> >> > server asking the same broken upstream again and again and again
>> >> >>
>> >> >> This is true of any breakage. =A0If the authoritative servers are =
und=3D
>> er
>> >> >> DoS, you have the same problem, no? =A0DoS on authoritative server=
s i=3D
>> s
>> >> >> at least as common as DNSSEC misconfiguration.
>> >> >>
>> >> >> The plain fact is that DNSSEC makes the DNS more fragile. =A0Why i=
s t=3D
>> his
>> >> >> news, and why do you think that your recommendation is the only
>> >> >> sensible response to this? =A0I still don't understand that.
>> >> >
>> >> > =A010 server A0-A8 out of date, A9 up to date.
>> >> >
>> >> > =A0Auth Servers <- breakage -> =A0Recusive Server <- clean -> Stub
>> >> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0=
 =3D
>> =A0 =3D
>> >> =A0 =A0<- example/a/cd=3D1,do=3D1
>> >> > =A0 =A0 =A0 =A0<- example/a/cd=3D1,do=3D1
>> >> > =A0A0
>> >> > =A0 =A0 =A0 =A0example/a/cd=3D1,do=3D1(bad) ->
>> >> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0exam=
ple=3D
>> /a/=3D
>> >> cd=3D1,do=3D1(bad) ->
>> >> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0=
 =3D
>> =A0 =3D
>> >> =A0 =A0<- example/a/cd=3D1,do=3D1
>> >> > =A0 =A0 =A0 =A0<- example/a/cd=3D1,do=3D1
>> >> > =A0A1
>> >> > =A0 =A0 =A0 =A0example/a/cd=3D1,do=3D1(bad) ->
>> >> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0exam=
ple=3D
>> /a/=3D
>> >> cd=3D1,do=3D1(bad) ->
>> >> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0=
 =3D
>> =A0 =3D
>> >> =A0 =A0<- example/a/cd=3D1,do=3D1
>> >> > =A0 =A0 =A0 =A0<- example/a/cd=3D1,do=3D1
>> >> > =A0A2
>> >> > =A0 =A0 =A0 =A0example/a/cd=3D1,do=3D1(bad) ->
>> >> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0exam=
ple=3D
>> /a/=3D
>> >> cd=3D1,do=3D1(bad) ->
>> >> >
>> >> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Give up.
>> >>
>> >> This is confusing. Why did it stop at A2 ? Why didn't it return after
>> >> trying A0 or A5 ? If this is arbitrary then the recursive server is
>> >> broken. If the recursive server wants to cache the response and avoid
>> >> DoS, then stopping here seems broken to me.
>> >
>> > At some stage the stub has to give up. =A0Remember the recursive serve=
r
>> > doesn't have to cycle through the authoritative servers. =A0It can
>> > just ask A0 forever with CD=3D1 queries and *never* talk to A9.
>> >
>> > With CD=3D0 queries the recursive server knows which authoritative
>> > servers it has tried and which ones it hasn't.
>> >
>> > CD=3D1 has stateless retries.
>> > CD=3D0 has stateful retries.
>>
>> See "5.9. =A0Always set the CD bit on Queries" in dnssec-bis updates.
>> Recursive server setting the CD bit on upstream queries is not
>> dependent on the incoming query.
>
> And what does that have to do with my statements? =A0The examples
> *had* CD=3D1 upstream queries.
>
> CD=3D1 queries, from the stub, has stateless retries.
> CD=3D0 queries, from the stub, has stateful retries.
>
If the recursive always sets CD=3D1 on its upstream queries irrespective
of what the stub set in its query, then it is much easier, less
complex to just implement one behavior i.e try the authoritative
servers, validate the signatures, cache the response. Why should it be
stateless in one case and stateful in another case ? Nothing in the
spec talks about stateful vs stateless.

-mohan

>
> Mark
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
c.org
>

From ajs@anvilwalrusden.com  Mon Oct 17 21:04:33 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6FC21F0C5E for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 21:04:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.399
X-Spam-Level: 
X-Spam-Status: No, score=-2.399 tagged_above=-999 required=5 tests=[AWL=0.200,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i99N96T+awW4 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 21:04:33 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 0C45A1F0C5D for <dnsext@ietf.org>; Mon, 17 Oct 2011 21:04:32 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id EE2731ECB41D for <dnsext@ietf.org>; Tue, 18 Oct 2011 04:04:22 +0000 (UTC)
Date: Tue, 18 Oct 2011 00:04:29 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsext@ietf.org
Message-ID: <20111018040429.GM7743@shinkuro.com>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20111018014221.C0E871578C86@drugs.dv.isc.org>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 04:04:34 -0000

Hi,

This is a hat-doffing post.  With my hat on, I say that this thread in
no way seems to be an argument about the previously-closed issues; so
they remain closed.  With my hat partway off, I have to say that I'm
ever less convinced that there's something new here, but I'm open to
argument (possibly from someone who can make the argument I think
might be underlying Mark's view, but that hasn't been made yet).  With
my hat fully off, see below.

On Tue, Oct 18, 2011 at 12:42:21PM +1100, Mark Andrews wrote:
> 
> In message <20111017140437.GA7743@shinkuro.com>, Andrew Sullivan writes:
 
>   10 server A0-A8 out of date, A9 up to date.
> 
>   Auth Servers <- breakage ->  Recusive Server <- clean -> Stub
> 					<- example/a/cd=1,do=1
>   	<- example/a/cd=1,do=1

. . .

>   A2
>   	example/a/cd=1,do=1(bad) ->
> 				example/a/cd=1,do=1(bad) ->
> 
> 		Give up.

Ok.  So what?  Why is this wrong?  I get it that the client didn't get
an answer.  Well, tough.  Don't mess up your zone maintenance.  But
moreover,


>   Auth Servers <- breakage ->  Recusive Server <- clean -> Stub
> 					<- example/a/cd=0,do=1
>   	<- example/a/cd=1,do=1

. . .your answer here is that the stub sends with cd=0 and therefore
blindly assumes the upstream is safe.  Either that, or it sends
everything _twice_: once with CD=0 and the second time with CD=1 in
order to see whether it's in contact with a "safe" upstream.  I can't
see how this is the only obvious right policy.

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com

From ajs@anvilwalrusden.com  Mon Oct 17 21:18:37 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8418311E8080 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 21:18:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.421
X-Spam-Level: 
X-Spam-Status: No, score=-2.421 tagged_above=-999 required=5 tests=[AWL=0.178,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Zy66xSwKUk9 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 21:18:37 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id B336011E80AF for <dnsext@ietf.org>; Mon, 17 Oct 2011 21:18:36 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 8BFE91ECB41D for <dnsext@ietf.org>; Tue, 18 Oct 2011 04:18:27 +0000 (UTC)
Date: Tue, 18 Oct 2011 00:18:34 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsext@ietf.org
Message-ID: <20111018041833.GN7743@shinkuro.com>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20111018025257.9B41A157C571@drugs.dv.isc.org>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 04:18:37 -0000

Dear colleagues,

On Tue, Oct 18, 2011 at 01:52:57PM +1100, Mark Andrews wrote:
> 
> CD=1 has stateless retries.
> CD=0 has stateful retries.

Because I have a feeble (not to say febrile) brain, I fail to
understand the argument implicit above.  As near as I can tell, Mark
is arguing from the position that a particular implementation choice
is what the protocol demands.  I'm not seeing this demand -- neither
in the original RFCs nor in the existing dnssec-bis-updates draft; but
I'm fully prepared to admit that I'm missing something, since I'm
usually missing something.  

As co-chair, I hereby ask others to weigh in on this discussion if
they have a view.  If I don't hear anything from others than those who
have participated, I will take that (as shepherd of
dnssec-bis-updates) to be evidence that people do not think the
proposed additions to the dnssec-bis-updates draft should be added,
and will direct the editors of that draft to ignore this discussion
for their purposes.

Best,

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com

From brian.peter.dickson@gmail.com  Mon Oct 17 22:35:30 2011
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B33511E8091 for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 22:35:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ywQUVFbcfhcy for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 22:35:29 -0700 (PDT)
Received: from mail-bw0-f44.google.com (mail-bw0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id 0FD3E11E808E for <dnsext@ietf.org>; Mon, 17 Oct 2011 22:35:28 -0700 (PDT)
Received: by bkas6 with SMTP id s6so403597bka.31 for <dnsext@ietf.org>; Mon, 17 Oct 2011 22:35:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=mnpiBpY3uTWRa073vB2uS9jKT3vp5H9pnGyWXMUJQps=; b=cjiK3MBk911ImuFPh3dnGLvJqNFamXD4t9j6fmFRc0Fe4bMiTZROnQl6LC5w9CNWJ6 lzEagHUStPNrByjGb1rJh5h0G0MTuz/ymvOg7PKeKd2h6yC/EoITa6xd/ZBtE7fMjcpy ROoZcTQOshxDaKCw8hJEZV1ewRG5ehbngv4LA=
MIME-Version: 1.0
Received: by 10.223.61.211 with SMTP id u19mr1733129fah.29.1318916128075; Mon, 17 Oct 2011 22:35:28 -0700 (PDT)
Received: by 10.223.16.78 with HTTP; Mon, 17 Oct 2011 22:35:27 -0700 (PDT)
In-Reply-To: <20111018041833.GN7743@shinkuro.com>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <20111018041833.GN7743@shinkuro.com>
Date: Tue, 18 Oct 2011 01:35:27 -0400
Message-ID: <CAH1iCipJsKQ59nW27vOAK=ctsgn9r+OBJ8KFCFE4omDYsrhG3A@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Andrew Sullivan <ajs@anvilwalrusden.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 05:35:30 -0000

Okay, glad to comment without previously being active in the conversation..=
.

On Tue, Oct 18, 2011 at 12:18 AM, Andrew Sullivan
<ajs@anvilwalrusden.com> wrote:
> Dear colleagues,
>
> On Tue, Oct 18, 2011 at 01:52:57PM +1100, Mark Andrews wrote:
>>
>> CD=3D1 has stateless retries.
>> CD=3D0 has stateful retries.
>
> Because I have a feeble (not to say febrile) brain, I fail to
> understand the argument implicit above. =A0As near as I can tell, Mark
> is arguing from the position that a particular implementation choice
> is what the protocol demands. =A0I'm not seeing this demand -- neither
> in the original RFCs nor in the existing dnssec-bis-updates draft; but
> I'm fully prepared to admit that I'm missing something, since I'm
> usually missing something.

I'll try to summarize, not what Mark has said, or what anyone else has
said, but what needs to be said. Kind of.

Basically, what CD=3D0 says, and what CD=3D1 says, are unfortunately
neither diametrically opposed, nor orthogonal, at least when combined
with the following other bits:
RD=3D1 (I'm a stub)
DO=3D1 (I'm asking for DNSSEC too)

If the combo was (CD=3D0, validate for me, and DO=3D0, I'm not
validating), the behavior requested is well-defined, IMHO.
Or, if RD=3D0, well, why are we talking to a recursive server?

So, the problem is, that the desired behavior doesn't appear to be
signaled or signal-able, by use of the CD bit. Or rather, the use of
the CD bit is somewhat ambiguous.

And this appears to be the case only when RD=3D1 and DO=3D1.

Mark's logic is correct. I looked through 4035, and followed the
various branches (3.2, et al) to see if anything is contradicted or
contraindicated.

He is also correct that the current 4035 use of RFC2119 language, in
respect to stubs and CD bit, is off the mark. The proscribed behavior
is not based on interoperability, and based on presumptions about the
uniformity of validation succeeding.

The choice of CD=3D0 first should only fail to return good data
(i.e.return data to the stub, which will pass the stub's validation)
if there is a discrepancy between TAs, or if the recursive resolver
has failed to validate all responses or has no responses.
Following this up with CD=3D1 will disambiguate the reasons if CD=3D0 does
not give good data, at which point the stub should have reliable
success-or-failure - which does not depend on the implementation
choices on the recursive server.

Doing CD=3D1 first may lead the stub down the wrong path, and whether it
does is dependent on implementation choices.
CD=3D0 is much more well-defined, and thus unlikely to be
mis-implemented or in any way dependent on implementers' choices.
IMHO.

So, I'd suggest finding suitable language to encode what Mark says,
and adding it to -bis.

> As co-chair, I hereby ask others to weigh in on this discussion if
> they have a view. =A0If I don't hear anything from others than those who
> have participated, I will take that (as shepherd of
> dnssec-bis-updates) to be evidence that people do not think the
> proposed additions to the dnssec-bis-updates draft should be added,
> and will direct the editors of that draft to ignore this discussion
> for their purposes.
>
> Best,
>
> A

Okay, hopefully I have been able to provide useful input into this.

My strong preference is to find places where DNS (or DNSSEC) have need
for improvement, and improving them.
IMHO, this is one such place, and a low-hanging fruit at that.

Sincerely,
Brian

From marka@isc.org  Mon Oct 17 22:43:13 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E45A11E808E for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 22:43:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.572
X-Spam-Level: 
X-Spam-Status: No, score=-2.572 tagged_above=-999 required=5 tests=[AWL=0.027,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZvmhtwjPZ9Ia for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 22:43:12 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id 4AF6F11E8089 for <dnsext@ietf.org>; Mon, 17 Oct 2011 22:43:12 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id EB745C9422; Tue, 18 Oct 2011 05:42:55 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 3960E216C6B; Tue, 18 Oct 2011 05:42:55 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 1EF21157D5EB; Tue, 18 Oct 2011 16:42:52 +1100 (EST)
To: Andrew Sullivan <ajs@anvilwalrusden.com>
From: Mark Andrews <marka@isc.org>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com>
In-reply-to: Your message of "Tue, 18 Oct 2011 00:04:29 EDT." <20111018040429.GM7743@shinkuro.com>
Date: Tue, 18 Oct 2011 16:42:52 +1100
Message-Id: <20111018054252.1EF21157D5EB@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 05:43:13 -0000

In message <20111018040429.GM7743@shinkuro.com>, Andrew Sullivan writes:
> Hi,
> 
> This is a hat-doffing post.  With my hat on, I say that this thread in
> no way seems to be an argument about the previously-closed issues; so
> they remain closed.  With my hat partway off, I have to say that I'm
> ever less convinced that there's something new here, but I'm open to
> argument (possibly from someone who can make the argument I think
> might be underlying Mark's view, but that hasn't been made yet).  With
> my hat fully off, see below.
> 
> On Tue, Oct 18, 2011 at 12:42:21PM +1100, Mark Andrews wrote:
> > 
> > In message <20111017140437.GA7743@shinkuro.com>, Andrew Sullivan writes:
>  
> >   10 server A0-A8 out of date, A9 up to date.
> > 
> >   Auth Servers <- breakage ->  Recusive Server <- clean -> Stub
> > 					<- example/a/cd=1,do=1
> >   	<- example/a/cd=1,do=1
> 
> . . .
> 
> >   A2
> >   	example/a/cd=1,do=1(bad) ->
> > 				example/a/cd=1,do=1(bad) ->
> > 
> > 		Give up.
> 
> Ok.  So what?  Why is this wrong?  I get it that the client didn't get
> an answer.  Well, tough.  Don't mess up your zone maintenance.  But
> moreover,

The current spec only works reliably if *all* the answers the
recursive server gets are *good*.  I'm trying to make it work with
real world senarios.

> >   Auth Servers <- breakage ->  Recusive Server <- clean -> Stub
> > 					<- example/a/cd=0,do=1
> >   	<- example/a/cd=1,do=1
> 
> . . .your answer here is that the stub sends with cd=0 and therefore
> blindly assumes the upstream is safe.

No.  CD=0 says nothing, nada, diddly squat about whether the client
is going to validate or not.  All that is required for the client
to validate is that DO=1 so that it will get the signature in the
response.

You keep making this logic error that because CD=1 indicates that
the client intends to validate, that CD=0 indicates that it doesn't
intend to validate.  This is incorrect logic.  DNS64 has this logic
error in it.

	A => B does not mean that !A => !B.

The only assumption I am making is that the recursive server has
some trust anchors.  If it doesn't then CD=0 is no different to
CD=1.

If we want to solve the case where the recursive server has no trust
anchors, I have a solution (below) but that is a whole new RFC and
possibly a bump in EDNS version numbers.  It also solves the different
trust achors problem and different time problem, that the current
CD=1 query is trying to solve, and you never send CD=1 queries
unless the recursive server doesn't understand the extension.  If
the recursive server doesn't undertand the extension (detectably
with a EDNS version bump) the stub would fallback to the behaviour
I am recommending here so this exercise is not a waste of time but
it maybe not enough.

The stub selects its closest trust anchors (as DS's) and sends it
in a EDNS1 messager to the recursive server along with its idea of
the current time.

   <CODE><LEN><NAME><TIME><DS-RDATA-LEN><DS-RDATA>[<DS-RDATA-LEN><DS-RDATA>]*

The recursive server then uses this to validate responses on behalf
of the stub.  The recursive server would cache or not based on its
own trust policy.

Mark

>  Either that, or it sends
> everything _twice_: once with CD=0 and the second time with CD=1 in
> order to see whether it's in contact with a "safe" upstream.  I can't
> see how this is the only obvious right policy.
>
> A
> 
> -- 
> Andrew Sullivan
> ajs@anvilwalrusden.com
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From mohta@necom830.hpcl.titech.ac.jp  Mon Oct 17 23:42:27 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B90E41F0C6F for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 23:42:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EUWFl3l0crdP for <dnsext@ietfa.amsl.com>; Mon, 17 Oct 2011 23:42:27 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id DED5E1F0C6D for <dnsext@ietf.org>; Mon, 17 Oct 2011 23:42:25 -0700 (PDT)
Received: (qmail 99021 invoked from network); 18 Oct 2011 07:01:09 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 18 Oct 2011 07:01:09 -0000
Message-ID: <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp>
Date: Tue, 18 Oct 2011 15:41:38 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: dnsext@ietf.org
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org>
In-Reply-To: <20111018054252.1EF21157D5EB@drugs.dv.isc.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 06:42:27 -0000

Mark Andrews wrote:

> The current spec only works reliably if *all* the answers the
> recursive server gets are *good*.  I'm trying to make it work with
> real world senarios.

As for the real world scenarios, how can you make client time
securely synchronized to that of the root?

						Masataka Ohta

From mayer@gis.net  Tue Oct 18 05:06:19 2011
Return-Path: <mayer@gis.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C27221F8B83 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 05:06:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Tc6LqT9H0ZV for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 05:06:18 -0700 (PDT)
Received: from mail1.ntp.org (mail1.ntp.org [IPv6:2001:4f8:fff7:1::5]) by ietfa.amsl.com (Postfix) with ESMTP id A3E3E21F8B64 for <dnsext@ietf.org>; Tue, 18 Oct 2011 05:06:17 -0700 (PDT)
Received: from [198.22.153.9] (helo=[10.60.111.27]) by mail1.ntp.org with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76 (FreeBSD)) (envelope-from <mayer@gis.net>) id 1RG8Qu-000Itx-Vy; Tue, 18 Oct 2011 12:06:13 +0000
Message-ID: <4E9D6BAC.7000100@gis.net>
Date: Tue, 18 Oct 2011 08:06:04 -0400
From: Danny Mayer <mayer@gis.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:5.0) Gecko/20110624 Thunderbird/5.0
MIME-Version: 1.0
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp>
In-Reply-To: <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-SA-Exim-Connect-IP: 198.22.153.9
X-SA-Exim-Rcpt-To: mohta@necom830.hpcl.titech.ac.jp, dnsext@ietf.org
X-SA-Exim-Mail-From: mayer@gis.net
X-SA-Exim-Version: 4.2
X-SA-Exim-Scanned: Yes (on mail1.ntp.org)
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: mayer@gis.net
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 12:06:19 -0000

On 10/18/2011 2:41 AM, Masataka Ohta wrote:
> Mark Andrews wrote:
> 
>> The current spec only works reliably if *all* the answers the
>> recursive server gets are *good*.  I'm trying to make it work with
>> real world senarios.
> 
> As for the real world scenarios, how can you make client time
> securely synchronized to that of the root?

You can't. The best you can do is to run NTP with autokey from a bunch
of NTP Servers or use a refclock on all involved servers and even that's
not guaranteed. Clocks don't need to be that precise for dnssec but it's
always good to keep good time for other reasons.

Danny

From mohta@necom830.hpcl.titech.ac.jp  Tue Oct 18 06:52:05 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54BA721F888A for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 06:52:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e5gyz+sthsnB for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 06:52:05 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 7D72921F84FA for <dnsext@ietf.org>; Tue, 18 Oct 2011 06:51:58 -0700 (PDT)
Received: (qmail 2094 invoked from network); 18 Oct 2011 14:10:50 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 18 Oct 2011 14:10:50 -0000
Message-ID: <4E9D8459.1030707@necom830.hpcl.titech.ac.jp>
Date: Tue, 18 Oct 2011 22:51:21 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: mayer@gis.net
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net>
In-Reply-To: <4E9D6BAC.7000100@gis.net>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 13:52:05 -0000

Danny Mayer wrote:

>> As for the real world scenarios, how can you make client time
>> securely synchronized to that of the root?
> 
> You can't.

OK.

> The best you can do is to run NTP with autokey from a bunch
> of NTP Servers or use a refclock on all involved servers and even that's
> not guaranteed.

With the assumption that DNS traffic is, often intentionally,
blocked, you can't expect NTP work.

That is, there is little use cases, among which, the largest
use cases of the proposal should to retrieve clients' location
privacy from proxy information in HTTP headers.

> Clocks don't need to be that precise for dnssec but it's
> always good to keep good time for other reasons.

The problem is that a host, almost always, has just a clock, not
clocks, one of which is dedicated to secure DNS, which means the
only clock needs to be a lot more precise than required by secure
DNS, which is the real world scenarios.

						Masataka Ohta

From derek@ihtfp.com  Tue Oct 18 07:16:31 2011
Return-Path: <derek@ihtfp.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB7A421F8B44 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 07:16:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.388
X-Spam-Level: 
X-Spam-Status: No, score=-101.388 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_MISMATCH_ORG=0.611, J_CHICKENPOX_13=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JmRGBtMzTHZ3 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 07:16:31 -0700 (PDT)
Received: from mail2.ihtfp.org (MAIL2.IHTFP.ORG [204.107.200.7]) by ietfa.amsl.com (Postfix) with ESMTP id 751F621F8B43 for <dnsext@ietf.org>; Tue, 18 Oct 2011 07:16:31 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id 4BCF32602A6; Tue, 18 Oct 2011 10:16:30 -0400 (EDT)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 14789-03; Tue, 18 Oct 2011 10:16:29 -0400 (EDT)
Received: from mocana.ihtfp.org (IHTFP-DHCP-158.IHTFP.ORG [192.168.248.158]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "cliodev.ihtfp.com", Issuer "IHTFP Consulting Certification Authority" (not verified)) by mail2.ihtfp.org (Postfix) with ESMTPS id 901D9260268; Tue, 18 Oct 2011 10:16:28 -0400 (EDT)
Received: (from warlord@localhost) by mocana.ihtfp.org (8.14.5/8.14.5/Submit) id p9IEGQrg017103; Tue, 18 Oct 2011 10:16:26 -0400
From: Derek Atkins <warlord@MIT.EDU>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp>
Date: Tue, 18 Oct 2011 10:16:24 -0400
In-Reply-To: <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> (Masataka Ohta's message of "Tue, 18 Oct 2011 22:51:21 +0900")
Message-ID: <sjm7h42z8p3.fsf@mocana.ihtfp.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/23.2 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Virus-Scanned: Maia Mailguard 1.0.2a
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 14:16:32 -0000

Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp> writes:

> The problem is that a host, almost always, has just a clock, not
> clocks, one of which is dedicated to secure DNS, which means the
> only clock needs to be a lot more precise than required by secure
> DNS, which is the real world scenarios.

My laptop clock is pretty accurate, even after I've been offline for
several days.  It would certainly be accurate enough to test DNS for
long enough to get myself online and then contact either HTTP or NTP
hosts.

You don't need sub-second synchronization here.

The only times there would be an issue is at first startup at
manufacturing time, or if you have a bad clock or bad CMOS battery.
However in the latter case you have much more to worry about than just
your clock.

> 						Masataka Ohta

-derek
-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
       warlord@MIT.EDU                        PGP key available

From Ed.Lewis@neustar.biz  Tue Oct 18 07:21:57 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A4E2D21F8B50 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 07:21:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.274
X-Spam-Level: 
X-Spam-Status: No, score=-106.274 tagged_above=-999 required=5 tests=[AWL=0.325, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6LkogbvRMRlP for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 07:21:55 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 7203421F8A7A for <dnsext@ietf.org>; Tue, 18 Oct 2011 07:21:50 -0700 (PDT)
Received: from Work-Laptop-2.local (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p9IELheM091527; Tue, 18 Oct 2011 10:21:44 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [10.31.204.5] by Work-Laptop-2.local (PGP Universal service); Tue, 18 Oct 2011 10:21:46 -0400
X-PGP-Universal: processed; by Work-Laptop-2.local on Tue, 18 Oct 2011 10:21:46 -0400
Mime-Version: 1.0
Message-Id: <a06240801cac332be5a2c@[192.168.129.94]>
In-Reply-To: <CAH1iCipJsKQ59nW27vOAK=ctsgn9r+OBJ8KFCFE4omDYsrhG3A@mail.gmail.com>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <20111018041833.GN7743@shinkuro.com> <CAH1iCipJsKQ59nW27vOAK=ctsgn9r+OBJ8KFCFE4omDYsrhG3A@mail.gmail.com>
Date: Tue, 18 Oct 2011 10:19:46 -0400
To: Brian Dickson <brian.peter.dickson@gmail.com>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.72 on 10.20.30.4
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 14:21:57 -0000

I haven't been reading, but responding to Brian's message, if this is 
really about the CD/RD/DO bit setting, let's try to find the 
troublesome combination and state the goal.

CD = 0 => I want good data; CD = 1 => I want unchecked data
RD = 0 => I want what's in memory; RD=1 => I want recursion
DO = 0 => Don't want DNSSEC records; DO=1 => send any DNSSEC records

(DO = 0 includes no EDNS0...)

Eight possibilities
CD RD DO
  0  0  0 - legacy without recursion, give what's good
  0  0  1 - give what's good locally and send DNSSEC records
  0  1  0 - legacy with recursion, give what's good from the world
  0  1  1 - usual DNSSEC recursive query
  1  0  0 - local inspection of whatever is available
  1  0  1 - local inspection of whatever is available plus DNSSEC records
  1  1  0 - find for me but don't try to check
  1  1  1 - find for me but don't check and send DNSSEC records

The goal is to avoid a recursive server asking the same question in 
less than the TTL (of the answer, the zone minimum, and some other 
TTL for a validation failure).

Is the sticking point that a failed response has no reliable TTL? 
Any TTL guessed by the recursive server would be a WAG and could be 
higher than the true TTL.  IMHO, a rugged validator would pick some 
TTL for this situation, maybe an hour or so (or base this timer on 
the average length of attacks) meanwhile still listening for the true 
response - if it is forthcoming.

If the problem (a stub repeatedly asking for data that fails checks 
repeatedly) is due to a configuration error somewhere, the TTL choice 
isn't the problem.  If the problem is due to a DOS taking out the 
authoritative servers, the TTL isn't the primary issue.  If the 
problem is die to message insertion, then the real answer might also 
arrive later on.

I haven't read the specs on this, it's not what I'm working on at the moment.

At 1:35 -0400 10/18/11, Brian Dickson wrote:
>Okay, glad to comment without previously being active in the conversation...
>
>On Tue, Oct 18, 2011 at 12:18 AM, Andrew Sullivan
><ajs@anvilwalrusden.com> wrote:
>>  Dear colleagues,
>>
>>  On Tue, Oct 18, 2011 at 01:52:57PM +1100, Mark Andrews wrote:
>>>
>>>  CD=1 has stateless retries.
>>>  CD=0 has stateful retries.
>>
>>  Because I have a feeble (not to say febrile) brain, I fail to
>>  understand the argument implicit above.  As near as I can tell, Mark
>>  is arguing from the position that a particular implementation choice
>>  is what the protocol demands.  I'm not seeing this demand -- neither
>>  in the original RFCs nor in the existing dnssec-bis-updates draft; but
>>  I'm fully prepared to admit that I'm missing something, since I'm
>>  usually missing something.
>
>I'll try to summarize, not what Mark has said, or what anyone else has
>said, but what needs to be said. Kind of.
>
>Basically, what CD=0 says, and what CD=1 says, are unfortunately
>neither diametrically opposed, nor orthogonal, at least when combined
>with the following other bits:
>RD=1 (I'm a stub)
>DO=1 (I'm asking for DNSSEC too)
>
>If the combo was (CD=0, validate for me, and DO=0, I'm not
>validating), the behavior requested is well-defined, IMHO.
>Or, if RD=0, well, why are we talking to a recursive server?
>
>So, the problem is, that the desired behavior doesn't appear to be
>signaled or signal-able, by use of the CD bit. Or rather, the use of
>the CD bit is somewhat ambiguous.
>
>And this appears to be the case only when RD=1 and DO=1.
>
>Mark's logic is correct. I looked through 4035, and followed the
>various branches (3.2, et al) to see if anything is contradicted or
>contraindicated.
>
>He is also correct that the current 4035 use of RFC2119 language, in
>respect to stubs and CD bit, is off the mark. The proscribed behavior
>is not based on interoperability, and based on presumptions about the
>uniformity of validation succeeding.
>
>The choice of CD=0 first should only fail to return good data
>(i.e.return data to the stub, which will pass the stub's validation)
>if there is a discrepancy between TAs, or if the recursive resolver
>has failed to validate all responses or has no responses.
>Following this up with CD=1 will disambiguate the reasons if CD=0 does
>not give good data, at which point the stub should have reliable
>success-or-failure - which does not depend on the implementation
>choices on the recursive server.
>
>Doing CD=1 first may lead the stub down the wrong path, and whether it
>does is dependent on implementation choices.
>CD=0 is much more well-defined, and thus unlikely to be
>mis-implemented or in any way dependent on implementers' choices.
>IMHO.
>
>So, I'd suggest finding suitable language to encode what Mark says,
>and adding it to -bis.
>
>>  As co-chair, I hereby ask others to weigh in on this discussion if
>>  they have a view.  If I don't hear anything from others than those who
>>  have participated, I will take that (as shepherd of
>>  dnssec-bis-updates) to be evidence that people do not think the
>>  proposed additions to the dnssec-bis-updates draft should be added,
>>  and will direct the editors of that draft to ignore this discussion
>>  for their purposes.
>>
>>  Best,
>>
>>  A
>
>Okay, hopefully I have been able to provide useful input into this.
>
>My strong preference is to find places where DNS (or DNSSEC) have need
>for improvement, and improving them.
>IMHO, this is one such place, and a low-hanging fruit at that.
>
>Sincerely,
>Brian
>_______________________________________________
>dnsext mailing list
>dnsext@ietf.org
>https://www.ietf.org/mailman/listinfo/dnsext

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

Vote for the word of the day:
"Papa"razzi - father that constantly takes photos of the baby
Corpureaucracy - The institution of corporate "red tape"

From ajs@anvilwalrusden.com  Tue Oct 18 07:46:30 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 315A621F8B2B for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 07:46:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.819
X-Spam-Level: 
X-Spam-Status: No, score=-1.819 tagged_above=-999 required=5 tests=[AWL=-0.460, BAYES_00=-2.599, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 15HpEwwXVKje for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 07:46:29 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 8E8A521F8B1E for <dnsext@ietf.org>; Tue, 18 Oct 2011 07:46:29 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id D11D61ECB41D for <dnsext@ietf.org>; Tue, 18 Oct 2011 14:46:16 +0000 (UTC)
Date: Tue, 18 Oct 2011 10:45:24 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dnsext@ietf.org
Message-ID: <20111018144524.GA13166@shinkuro.com>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20111018054252.1EF21157D5EB@drugs.dv.isc.org>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 14:46:30 -0000

No hat.  I think we're no longer moving ahead on this topic, so this
is my last no-hat remark on it.

On Tue, Oct 18, 2011 at 04:42:52PM +1100, Mark Andrews wrote:
> 
> The current spec only works reliably if *all* the answers the
> recursive server gets are *good*.  I'm trying to make it work with
> real world senarios.

I get what you're trying to do (Brian Dickson's summary also agreed
with my interpretation of what I thought you were saying).  I have no
difficulty saying, "This might be a good policy for a stub resolver to
adopt."  But what you are trying to do is require this behaviour as
part of the protocol.  I don't see why that's the right answer, since
you are thereby going to require more lookups.  Given that some people
today aren't willing to wait for DNS responses -- i.e. they want
either a positive or negative answer more than they want the right
answer -- I do not believe that doubling the number of queries at
initial lookup is a realistic plan.

You haven't answered the question of why this ought to be protocol
rather than a resolver policy recommendation.  You say you think it's
making things work in "real world scenarios".  I think it might work
with some real world scenarios, and not work in others (like impatient
eyeballs), and therefore I don't see the argument for a protocol
change.  It's certainly true that at least in the short term, zone
operators are going to mess up their signatures and cause breakage.
But you are arguing that every stub resolver will, for all time, have
to send two queries instead of one in order to protect people from
zone operators who screw up their zone operation.  I'm not convinced
your trade-off is obviously the only right one, and your only argument
so far is to say "real world scenarios" over and over again.
 
> > >   Auth Servers <- breakage ->  Recusive Server <- clean -> Stub
> > > 					<- example/a/cd=0,do=1
> > >   	<- example/a/cd=1,do=1
> > 
> > . . .your answer here is that the stub sends with cd=0 and therefore
> > blindly assumes the upstream is safe.
> 
> No.  CD=0 says nothing, nada, diddly squat about whether the client
> is going to validate or not.

Right, but you cannot rely on every answer you get so you have to
re-send your query with CD=1 also.

RFC 4035 effectively tells you this in section 4.9.2:

   A validating security-aware stub resolver SHOULD set the CD bit,
   because otherwise the security-aware recursive name server will
   answer the query using the name server's local policy, which may
   prevent the stub resolver from receiving data that would be
   acceptable to the stub resolver's local policy.

> You keep making this logic error that because CD=1 indicates that
> the client intends to validate, that CD=0 indicates that it doesn't
> intend to validate.  This is incorrect logic.  DNS64 has this logic
> error in it.
> 
> 	A => B does not mean that !A => !B.

Gee, I didn't know the rules of entailment before.  Thanks.  I note
that you cut out of the quote you replied to the part of the message
where I discussed the other open course of action, and which
contradicts your claim that I'm denying the antecedent.  That is, I
didn't say "CD=0 and blindly trust the response", but "CD=0 and
blindly trust or send another query".

It is clearly true that "if CD=1 then client will validate" does not
mean anything about what CD=0 means.  We don't have a bit that says
what the querier's policy about validation is.  But because server
policy gets to determine, at least to some extent, what happens with
CD=0, CD=1 is effectively required to signal the state "will valiate".
Apart from that, all bets are off.  DNS64 doesn't have the logic error
you ascribe to it; instead, it's a hack that has to make do with the
bits available to it in the already-deployed world (remember, the
whole point of DNS64 was that you could deploy a NAT64/DNS64 without
touching any clients.  The CD-based signalling was as close as we
could get).

> If we want to solve the case where the recursive server has no trust
> anchors, I have a solution (below) 

Feel free to write the draft.  I don't find that case especially
compelling, but others might.

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com

From brian.peter.dickson@gmail.com  Tue Oct 18 08:45:14 2011
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1500521F8BE9 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 08:45:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.979
X-Spam-Level: 
X-Spam-Status: No, score=-2.979 tagged_above=-999 required=5 tests=[AWL=-0.620, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A6QZuUR6siWD for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 08:45:13 -0700 (PDT)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by ietfa.amsl.com (Postfix) with ESMTP id 4C37F21F8BE4 for <dnsext@ietf.org>; Tue, 18 Oct 2011 08:45:13 -0700 (PDT)
Received: by yxj19 with SMTP id 19so892204yxj.31 for <dnsext@ietf.org>; Tue, 18 Oct 2011 08:45:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=8LSmAqTLhiENIpBx+JrjXSiIsf6/KBn6tuMw2wTqPLs=; b=f3Ple5362YH+CiQoSuqK1IeIEAJUNEFiMitn03Qqr//6+fyD7KUfYBsXO6c4/NAJgI WoFZKRUxiaIGqZlr/O6kHJjrHwgHXciYIPX06MK5U9TLODAwkNy0ZFs3jHQzwkk+m6x0 dNGETqqymvxXpM9EqtZXzRPPPFfKK6ya1cSDQ=
MIME-Version: 1.0
Received: by 10.223.57.139 with SMTP id c11mr4717964fah.24.1318952712623; Tue, 18 Oct 2011 08:45:12 -0700 (PDT)
Received: by 10.223.16.78 with HTTP; Tue, 18 Oct 2011 08:45:12 -0700 (PDT)
In-Reply-To: <20111018144524.GA13166@shinkuro.com>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <20111018144524.GA13166@shinkuro.com>
Date: Tue, 18 Oct 2011 11:45:12 -0400
Message-ID: <CAH1iCiqAZ46onzkJSPaSzLzMNkC4WwJ1q2ecvySJfaMMY0vAMQ@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Andrew Sullivan <ajs@anvilwalrusden.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 15:45:14 -0000

I will quote here what Mark's original statement was:

> Setting CD=3D0 on the initial query lets to upstream filter out what
> it believes to be bad then the stub resolver validates what is
> passed through.  This may or may not validate but has a much higher
> probability of doing so.  If the upstream doesn't pass through a
> answer that is possible to validate because it can't find one itself
> the stub then asks with CD=3D1 to avoid the upstreams validator.

So, to paraphrase, the CD=3D1 query is subsequently sent, ONLY IF there
is a problem with the response when CD=3D0.

The does not normally result in more than one query.

And only if CD=3D0 fails, does a second query get sent - and necessarily so=
.

In both cases, if an answer is received, it is also processed to see
if the answer is DNSSEC-valid.

On Tue, Oct 18, 2011 at 10:45 AM, Andrew Sullivan
<ajs@anvilwalrusden.com> wrote:
> No hat. =A0I think we're no longer moving ahead on this topic, so this
> is my last no-hat remark on it.
>
> On Tue, Oct 18, 2011 at 04:42:52PM +1100, Mark Andrews wrote:
>>
>> The current spec only works reliably if *all* the answers the
>> recursive server gets are *good*. =A0I'm trying to make it work with
>> real world senarios.
>
> I get what you're trying to do (Brian Dickson's summary also agreed
> with my interpretation of what I thought you were saying). =A0I have no
> difficulty saying, "This might be a good policy for a stub resolver to
> adopt." =A0But what you are trying to do is require this behaviour as
> part of the protocol. =A0I don't see why that's the right answer, since
> you are thereby going to require more lookups. =A0Given that some people
> today aren't willing to wait for DNS responses -- i.e. they want
> either a positive or negative answer more than they want the right
> answer -- I do not believe that doubling the number of queries at
> initial lookup is a realistic plan.

Please see above - Mark's recommendations do not double the number of
queries, or at least not most of the time.

> You haven't answered the question of why this ought to be protocol
> rather than a resolver policy recommendation. =A0You say you think it's
> making things work in "real world scenarios". =A0I think it might work
> with some real world scenarios, and not work in others (like impatient
> eyeballs), and therefore I don't see the argument for a protocol
> change. =A0It's certainly true that at least in the short term, zone
> operators are going to mess up their signatures and cause breakage.
> But you are arguing that every stub resolver will, for all time, have
> to send two queries instead of one in order to protect people from
> zone operators who screw up their zone operation. =A0I'm not convinced
> your trade-off is obviously the only right one, and your only argument
> so far is to say "real world scenarios" over and over again.

See above - no double queries.

I agree that improving DNS resolution time is something we should address.
I hope to be able to provide some suggestions along those lines in the
near future.
Unfortunately, doing so is dependent on the "aliasing requirements"
draft, and until
that shows up again, I'm "blocked"...

>> > > =A0 Auth Servers <- breakage -> =A0Recusive Server <- clean -> Stub
>> > > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =
<- example/a/cd=3D0,do=3D1
>> > > =A0 =A0 =A0 =A0 =A0 <- example/a/cd=3D1,do=3D1
>> >
>> > . . .your answer here is that the stub sends with cd=3D0 and therefore
>> > blindly assumes the upstream is safe.
>>
>> No. =A0CD=3D0 says nothing, nada, diddly squat about whether the client
>> is going to validate or not.
>
> Right, but you cannot rely on every answer you get so you have to
> re-send your query with CD=3D1 also.
>
> RFC 4035 effectively tells you this in section 4.9.2:
>
> =A0 A validating security-aware stub resolver SHOULD set the CD bit,
> =A0 because otherwise the security-aware recursive name server will
> =A0 answer the query using the name server's local policy, which may
> =A0 prevent the stub resolver from receiving data that would be
> =A0 acceptable to the stub resolver's local policy.

It is important to understand *how* that can happen.

As far as I can determine, there are two situations.
The name server's policy validates the answer, but the stub's does not.
The name server's policy does not validate an answer which the stub's
would, and thus the stub never gets the answer.

In the first case, repeating with CD=3D1 won't change the outcome.

In the second case, repeating with CD=3D1 might change the outcome, but
only if the name server gets the same answer itself (or has cached the
"BAD" answer).

However, when CD=3D1, it is also the case that the name server could
receive answer(s) that neither the name server nor the stub will
succeed in validating.

I think perhaps a better way of breaking the problem down might be,
instead, to recommend the following:

"The same 'local policy' SHOULD be applied on a validating
security-aware stub resolver as on its recursive resolver. If a
different policy is required, a different recursive resolver should be
used which uses that other policy. If neither of these is feasible,
implementing a conditional 'CD=3D0' followed, if needed by 'CD=3D1'
re-query, SHOULD be done by the stub resolver."

>> You keep making this logic error that because CD=3D1 indicates that
>> the client intends to validate, that CD=3D0 indicates that it doesn't
>> intend to validate.

I don't think it is necessarily the case that anything can be inferred
about the validation intent of a stub, from what it sets CD and/or DO
to.
While it may be silly to do so, there is nothing to stop a stub from
asking for DNSSEC records it will ignore.

On the other hand, the idea of a stub asking a recursive resolver to
send DNSSEC records without validating them seems... unreliable.
Probably to be recommended against. See the above recommendation.

Brian

From mstjohns@comcast.net  Tue Oct 18 09:30:06 2011
Return-Path: <mstjohns@comcast.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A15A21F8AE1 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 09:30:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.901
X-Spam-Level: 
X-Spam-Status: No, score=-101.901 tagged_above=-999 required=5 tests=[AWL=0.698, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pSQ7-cXMWqPH for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 09:30:05 -0700 (PDT)
Received: from qmta01.westchester.pa.mail.comcast.net (qmta01.westchester.pa.mail.comcast.net [76.96.62.16]) by ietfa.amsl.com (Postfix) with ESMTP id 71F8221F89B8 for <dnsext@ietf.org>; Tue, 18 Oct 2011 09:30:05 -0700 (PDT)
Received: from omta02.westchester.pa.mail.comcast.net ([76.96.62.19]) by qmta01.westchester.pa.mail.comcast.net with comcast id mGGD1h00D0QuhwU51GW5bB; Tue, 18 Oct 2011 16:30:05 +0000
Received: from Mike-PC3.comcast.net ([68.83.220.41]) by omta02.westchester.pa.mail.comcast.net with comcast id mGW41h00n0uBQks3NGW5h4; Tue, 18 Oct 2011 16:30:05 +0000
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Tue, 18 Oct 2011 12:29:55 -0400
To: Andrew Sullivan <ajs@anvilwalrusden.com>,dnsext@ietf.org
From: Michael StJohns <mstjohns@comcast.net>
In-Reply-To: <20111018041833.GN7743@shinkuro.com>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <20111018041833.GN7743@shinkuro.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Message-Id: <20111018163005.71F8221F89B8@ietfa.amsl.com>
Subject: Re: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 16:30:06 -0000

This is just plain strange.   

If I have a configured trust anchor, I generally want to do my own validation (CD=1, D0=1, RD=1) - why should I trust anyone else?  (and more importantly, why should I contribute to the load on the recursive resolver by requiring them to validate stuff I'm going to also validate?)  (And if one more person utters "suspenders and belt" ...)

If I don't have a configured trust anchor, I either want no security (CD=1, D0=0, RD=1) or I want my local recursive server to be secure on my behalf (CD=0, D0=0, RD=1).   

As I understand it, the first and the last of these three are the way most stub resolvers get configured.

(Ed's table is useful, but the other 5 possibilities are pretty much only used by geeks and operators :-) and special cases where the local resolver isn't really just a stub )

This is a policy configuration issue - period.  There is no need for Mark's somewhat convoluted "tell me twice" scheme.

If you want to configure your own personal local resolver to do a tell-me-twice, have at it.  But this should (MUST?) not be the required default. I agree with Andrew that there is no protocol issue here. I see no problem with the current language in the document and recommend no change.

Mike



At 12:18 AM 10/18/2011, Andrew Sullivan wrote:
>Dear colleagues,
>
>On Tue, Oct 18, 2011 at 01:52:57PM +1100, Mark Andrews wrote:
>> 
>> CD=1 has stateless retries.
>> CD=0 has stateful retries.
>
>Because I have a feeble (not to say febrile) brain, I fail to
>understand the argument implicit above.  As near as I can tell, Mark
>is arguing from the position that a particular implementation choice
>is what the protocol demands.  I'm not seeing this demand -- neither
>in the original RFCs nor in the existing dnssec-bis-updates draft; but
>I'm fully prepared to admit that I'm missing something, since I'm
>usually missing something.  
>
>As co-chair, I hereby ask others to weigh in on this discussion if
>they have a view.  If I don't hear anything from others than those who
>have participated, I will take that (as shepherd of
>dnssec-bis-updates) to be evidence that people do not think the
>proposed additions to the dnssec-bis-updates draft should be added,
>and will direct the editors of that draft to ignore this discussion
>for their purposes.
>
>Best,
>
>A
>
>-- 
>Andrew Sullivan
>ajs@anvilwalrusden.com
>_______________________________________________
>dnsext mailing list
>dnsext@ietf.org
>https://www.ietf.org/mailman/listinfo/dnsext



From nweaver@icsi.berkeley.edu  Tue Oct 18 09:47:21 2011
Return-Path: <nweaver@icsi.berkeley.edu>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D24E21F8C3E for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 09:47:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HznqzfwXgIzi for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 09:47:20 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id C7A8221F8C39 for <dnsext@ietf.org>; Tue, 18 Oct 2011 09:47:20 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id A87FF2C400D; Tue, 18 Oct 2011 09:47:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id Af7igG6xyull; Tue, 18 Oct 2011 09:47:20 -0700 (PDT)
Received: from gala.icir.org (gala [192.150.187.49]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 276BD2C4003; Tue, 18 Oct 2011 09:47:20 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=windows-1252
From: Nicholas Weaver <nweaver@icsi.berkeley.edu>
In-Reply-To: <20111018163005.71F8221F89B8@ietfa.amsl.com>
Date: Tue, 18 Oct 2011 09:47:20 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <A88D998B-4663-41CC-98DF-95E35E399928@icsi.berkeley.edu>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <20111018041833.GN7743@shinkuro.com> <20111018163005.71F8221F89B8@ietfa.amsl.com>
To: Michael StJohns <mstjohns@comcast.net>
X-Mailer: Apple Mail (2.1251.1)
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 16:47:21 -0000

On Oct 18, 2011, at 9:29 AM, Michael StJohns wrote:

> This is just plain strange.  =20
>=20
> If I have a configured trust anchor, I generally want to do my own =
validation (CD=3D1, D0=3D1, RD=3D1) - why should I trust anyone else?  =
(and more importantly, why should I contribute to the load on the =
recursive resolver by requiring them to validate stuff I'm going to also =
validate?)  (And if one more person utters "suspenders and belt" =85)

The recursive resolver still needs to validate if anything is going to =
get into the cache. [1]

So you aren't reducing load on the recursive resolver by always sending =
with CD=3D1.


> If you want to configure your own personal local resolver to do a =
tell-me-twice, have at it.  But this should (MUST?) not be the required =
default. I agree with Andrew that there is no protocol issue here. I see =
no problem with the current language in the document and recommend no =
change.

However, I do agree with this:  Tell me twice vs tell me once with CD=3D1 =
is pretty much a non-issue:  Under almost all cases, the load will be =
the same on the resolver, and the load on the network will be the same.


[1]  I now stand corrected due to some other issues, and now believe =
that having the recursive resolver validate does have some value.  I =
still believe it should be the client that validates, as the recursive =
resolver itself is a threat, but there is actual benefit in the =
recursive resolver always validating.


From mstjohns@comcast.net  Tue Oct 18 10:10:06 2011
Return-Path: <mstjohns@comcast.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0265421F8BD3 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 10:10:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.552
X-Spam-Level: 
X-Spam-Status: No, score=-101.552 tagged_above=-999 required=5 tests=[AWL=-0.349, BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1CkqgrTfH2SY for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 10:10:05 -0700 (PDT)
Received: from qmta08.emeryville.ca.mail.comcast.net (qmta08.emeryville.ca.mail.comcast.net [76.96.30.80]) by ietfa.amsl.com (Postfix) with ESMTP id 0873E21F8BA8 for <dnsext@ietf.org>; Tue, 18 Oct 2011 10:09:22 -0700 (PDT)
Received: from omta17.emeryville.ca.mail.comcast.net ([76.96.30.73]) by qmta08.emeryville.ca.mail.comcast.net with comcast id mGTt1h0051afHeLA8H9FoR; Tue, 18 Oct 2011 17:09:15 +0000
Received: from Mike-PC3.comcast.net ([68.83.220.41]) by omta17.emeryville.ca.mail.comcast.net with comcast id mGrw1h01M0uBQks8dGrxfk; Tue, 18 Oct 2011 16:51:59 +0000
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Tue, 18 Oct 2011 13:09:12 -0400
To: Nicholas Weaver <nweaver@icsi.berkeley.edu>
From: Michael StJohns <mstjohns@comcast.net>
In-Reply-To: <A88D998B-4663-41CC-98DF-95E35E399928@icsi.berkeley.edu>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <20111018041833.GN7743@shinkuro.com> <20111018163005.71F8221F89B8@ietfa.amsl.com> <A88D998B-4663-41CC-98DF-95E35E399928@icsi.berkeley.edu>
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Message-Id: <20111018170923.0873E21F8BA8@ietfa.amsl.com>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 17:10:06 -0000

At 12:47 PM 10/18/2011, Nicholas Weaver wrote:

>On Oct 18, 2011, at 9:29 AM, Michael StJohns wrote:
>
>> This is just plain strange.  =20
>>=20
>> If I have a configured trust anchor, I generally want to do my own=
 validation (CD=3D1, D0=3D1, RD=3D1) - why should I trust anyone else?  (and=
 more importantly, why should I contribute to the load on the recursive=
 resolver by requiring them to validate stuff I'm going to also validate?) =
 (And if one more person utters "suspenders and belt" =85)
>
>The recursive resolver still needs to validate if anything is going to get=
 into the cache. [1]

Not quite.  It can defer validation until (and if) someone asks for the=
 validated data (CD=3D0 query).    In an "ideal" (well, my ideal) world, =
 ALL validation is done ONLY by the stubs and this validation in the middle=
 hack goes away.


>So you aren't reducing load on the recursive resolver by always sending=
 with CD=3D1.

Implementation decision.  Not part of the protocol.  The last time=
 (admittedly this was 5+ years ago) I tried this, at least a few versions of=
 recursive resolvers did not validate CD=3D1 response data so the load *was*=
 lower.



>> If you want to configure your own personal local resolver to do a=
 tell-me-twice, have at it.  But this should (MUST?) not be the required=
 default. I agree with Andrew that there is no protocol issue here. I see no=
 problem with the current language in the document and recommend no change.
>
>However, I do agree with this:  Tell me twice vs tell me once with CD=3D1=
 is pretty much a non-issue:  Under almost all cases, the load will be the=
 same on the resolver, and the load on the network will be the same.
>
>
>[1]  I now stand corrected due to some other issues, and now believe that=
 having the recursive resolver validate does have some value.  I still=
 believe it should be the client that validates, as the recursive resolver=
 itself is a threat, but there is actual benefit in the recursive resolver=
 always validating.



From brian.peter.dickson@gmail.com  Tue Oct 18 10:13:45 2011
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB44321F8B56 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 10:13:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.475
X-Spam-Level: 
X-Spam-Status: No, score=-3.475 tagged_above=-999 required=5 tests=[AWL=0.124,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 76h14SaU4JGi for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 10:13:45 -0700 (PDT)
Received: from mail-ey0-f172.google.com (mail-ey0-f172.google.com [209.85.215.172]) by ietfa.amsl.com (Postfix) with ESMTP id 42C7D21F8B3B for <dnsext@ietf.org>; Tue, 18 Oct 2011 10:13:43 -0700 (PDT)
Received: by eyg24 with SMTP id 24so845226eyg.31 for <dnsext@ietf.org>; Tue, 18 Oct 2011 10:13:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=8f9kVQAggchbw5pnyhDW8WII9Vb5FK00nbOEYB9W0eQ=; b=Xya3vDV1SOSWdQ3jkH513nD1itsF55QOr0Lb+NOi3s5QgeBMMHLPmRelVWFOm9SYtK Mgb7GhUiGL7gnEAn/T1aHkkjCQDgYq5wyG+FHsPUMgD3un68Zlurbytk+8NlQNtudQMN IVgfSCjm2FYZZoRwxKwMGNSLGNC437Ki+bpEs=
MIME-Version: 1.0
Received: by 10.223.61.211 with SMTP id u19mr5148638fah.29.1318958022234; Tue, 18 Oct 2011 10:13:42 -0700 (PDT)
Received: by 10.223.16.78 with HTTP; Tue, 18 Oct 2011 10:13:42 -0700 (PDT)
In-Reply-To: <20111018163005.71F8221F89B8@ietfa.amsl.com>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <20111018041833.GN7743@shinkuro.com> <20111018163005.71F8221F89B8@ietfa.amsl.com>
Date: Tue, 18 Oct 2011 13:13:42 -0400
Message-ID: <CAH1iCiptc5HeEXyH1z0Q3EJ3ki3eRcqneLKYrDK+_AtVcNog3Q@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Michael StJohns <mstjohns@comcast.net>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 17:13:45 -0000

On Tue, Oct 18, 2011 at 12:29 PM, Michael StJohns <mstjohns@comcast.net> wr=
ote:
> This is just plain strange.
>
> If I have a configured trust anchor, I generally want to do my own valida=
tion (CD=3D1, D0=3D1, RD=3D1) - why should I trust anyone else? =A0(and mor=
e importantly, why should I contribute to the load on the recursive resolve=
r by requiring them to validate stuff I'm going to also validate?) =A0(And =
if one more person utters "suspenders and belt" ...)

If you have DO=3D1, you are doing validation.

That is constant, regardless of the state of CD.

When CD=3D0, you want the recursive resolver to validate. Put another
way, you are asking the recursive resolver to do what it would do if
it were looking up the same query for itself, instead of on behalf of
you.

If you were to operate your own recursive resolver (internally on the
"stub" machine), it would behave exactly as if CD=3D0. It validates
using local policy (trivially true). It does not terminate when it
gets an answer, it terminates when it gets an answer that validates,
or when it exhausts all possible paths for trying to find an answer.

BTW - You (the stub) are validating the response, so you aren't
"trusting" the response.

The only dependency between stub and recursive resolver when CD=3D0, is
that the stub's policy must be a stricter policy that the resolver's.

This means that the resolver must have a superset of the stub's TAs,
or an identical set.

If this is not the case, then the recursive resolver might block
answers that the stub would otherwise validate.

The recursive resolver (with a superset of TAs) might validate and
return some answers that might fail the stub's validation.

However, in that corner case, having CD=3D1 would not change the outcome.


> This is a policy configuration issue - period. =A0There is no need for Ma=
rk's somewhat convoluted "tell me twice" scheme.

Please read my response in the other thread. It is not "tell me twice".

OTOH, CD=3D1 is much more fragile, with no clear benefit *to the stub*.

As  Nicholas Weaver observes, the resolver will generally want to
validate anyway, so there is no extra cost to doing CD=3D0.

Brian

From nweaver@ICSI.Berkeley.EDU  Tue Oct 18 10:15:43 2011
Return-Path: <nweaver@ICSI.Berkeley.EDU>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9620721F84B8 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 10:15:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3S7orLpp-qox for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 10:15:43 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id 27DA821F858C for <dnsext@ietf.org>; Tue, 18 Oct 2011 10:15:43 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 134172C400D; Tue, 18 Oct 2011 10:15:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id l2mm3dXCh3ng; Tue, 18 Oct 2011 10:15:42 -0700 (PDT)
Received: from gala.icir.org (gala [192.150.187.49]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id C14A52C4003; Tue, 18 Oct 2011 10:15:42 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=iso-8859-1
From: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
In-Reply-To: <201110181709.p9IH9Meq012059@fruitcake.ICSI.Berkeley.EDU>
Date: Tue, 18 Oct 2011 10:15:42 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <4B780371-89BE-4E51-B008-4B8B6CF629C7@ICSI.Berkeley.EDU>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <20111018041833.GN7743@shinkuro.com> <20111018163005.71F8221F89B8@ietfa.amsl.com> <A88D998B-4663-41CC-98DF-95E35E399928@icsi.berkeley.edu> <201110181709.p9IH9Meq012059@fruitcake.ICSI.Berkeley.EDU>
To: Michael StJohns <mstjohns@comcast.net>
X-Mailer: Apple Mail (2.1251.1)
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 17:15:43 -0000

On Oct 18, 2011, at 10:09 AM, Michael StJohns wrote:

> At 12:47 PM 10/18/2011, Nicholas Weaver wrote:
>>=20
>> The recursive resolver still needs to validate if anything is going =
to get into the cache. [1]
>=20
> Not quite.  It can defer validation until (and if) someone asks for =
the validated data (CD=3D0 query).    In an "ideal" (well, my ideal) =
world,  ALL validation is done ONLY by the stubs and this validation in =
the middle hack goes away.

True, but I have a bad feeling the ideal world will never happen, so in =
practice, almost everything that gets cached will need to be validated =
by the recursive resolver.

>> So you aren't reducing load on the recursive resolver by always =
sending with CD=3D1.
>=20
> Implementation decision.  Not part of the protocol.  The last time =
(admittedly this was 5+ years ago) I tried this, at least a few versions =
of recursive resolvers did not validate CD=3D1 response data so the load =
*was* lower.

It seems the ONLY reason this debate is coming up is about performance =
and load:

CD=3D0 then CD=3D1 MAY load the recursive resolver more and WILL result =
in a extra query IFF the recursive resolver does not have a valid root =
of trust for the name but the client does.

Otherwise, its identical semantics.

Which means, frankly, I don' think it matters either way, since I don't =
see it, in practice, either reducing the load on the recursive resolver =
nor commonly causing clients to have to retry.


From mohta@necom830.hpcl.titech.ac.jp  Tue Oct 18 17:05:32 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C1AC21F8A95 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 17:05:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[AWL=-0.000,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VjvR0jjte-Li for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 17:05:31 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 4F7F121F8A70 for <dnsext@ietf.org>; Tue, 18 Oct 2011 17:05:30 -0700 (PDT)
Received: (qmail 5633 invoked from network); 19 Oct 2011 00:24:31 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 19 Oct 2011 00:24:31 -0000
Message-ID: <4E9E140D.8040803@necom830.hpcl.titech.ac.jp>
Date: Wed, 19 Oct 2011 09:04:29 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Derek Atkins <warlord@MIT.EDU>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org>
In-Reply-To: <sjm7h42z8p3.fsf@mocana.ihtfp.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 00:05:32 -0000

Derek Atkins wrote:

> My laptop clock is pretty accurate,

You miss the point.

The problem is that there will be devices which synchronize
its clock to external sources insecurely, regardless of
whether the devices have accurate clock or not.

> You don't need sub-second synchronization here.

Most people mind clocks of their devices have minutes of
errors.

Most people do not mind clocks of their devices are synchronized
to external sources insecurely.

> The only times there would be an issue is at first startup at
> manufacturing time, or if you have a bad clock or bad CMOS battery.

No devices have two clocks, one of which is dedicated to
secure DNS.

						Masataka Ohta

From marka@isc.org  Tue Oct 18 18:54:32 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A8E521F84D2 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 18:54:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.574
X-Spam-Level: 
X-Spam-Status: No, score=-2.574 tagged_above=-999 required=5 tests=[AWL=0.025,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u3yixKdZMG02 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 18:54:32 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id E255921F84CE for <dnsext@ietf.org>; Tue, 18 Oct 2011 18:54:31 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 6F4F35F98BF; Wed, 19 Oct 2011 01:54:15 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 8A80C216C6A; Wed, 19 Oct 2011 01:54:13 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 5AA45158826F; Wed, 19 Oct 2011 12:54:10 +1100 (EST)
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
From: Mark Andrews <marka@isc.org>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp>
In-reply-to: Your message of "Wed, 19 Oct 2011 09:04:29 +0900." <4E9E140D.8040803@necom830.hpcl.titech.ac.jp>
Date: Wed, 19 Oct 2011 12:54:10 +1100
Message-Id: <20111019015410.5AA45158826F@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 01:54:32 -0000

Getting secure time is not a protocol issue for DNSSEC.  It is
a operations issue.

Apple, for example, sets ntp.conf to "server time.asia.apple.com"
with MacOS based on the default location for this machine.  They
could set autokey and distribute public keys for their timeservers
if they wish.  They may already do so in Lion. 

Other OS vendors could do similar.

Note for many machines mis-set clocks will get noticed as they are
looked at every day and ntp take ages to slew a clock enough to be
a security issue for DNSSEC.

Similarly Kerberos fails with a 5 minute drift.  When that happens
you work out which clocks are wrong and correct them.

Note time is only significant for DNSSEC to protect against replay
attacks or to stop someone continuing to use a compromised key.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From sra@hactrn.net  Tue Oct 18 15:40:47 2011
Return-Path: <sra@hactrn.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86CFE21F8ACE for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 15:40:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.6
X-Spam-Level: 
X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G1t2SCR2NHn1 for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 15:40:47 -0700 (PDT)
Received: from cyteen.hactrn.net (cyteen.hactrn.net [IPv6:2002:425c:4242:0:210:5aff:fe86:1f54]) by ietfa.amsl.com (Postfix) with ESMTP id C7BFE21F8ACC for <dnsext@ietf.org>; Tue, 18 Oct 2011 15:40:46 -0700 (PDT)
Received: from thrintun.hactrn.net (thrintun.hactrn.net [IPv6:2002:425c:4242:0:219:d1ff:fe12:5d30]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "thrintun.hactrn.net", Issuer "Grunchweather Associates" (verified OK)) by cyteen.hactrn.net (Postfix) with ESMTPS id 1262D2845C for <dnsext@ietf.org>; Tue, 18 Oct 2011 22:40:41 +0000 (UTC)
Received: from thrintun.hactrn.net (localhost [IPv6:::1]) by thrintun.hactrn.net (Postfix) with ESMTP id DA7C017072 for <dnsext@ietf.org>; Tue, 18 Oct 2011 18:40:40 -0400 (EDT)
Date: Tue, 18 Oct 2011 18:40:40 -0400
From: Rob Austein <sra@hactrn.net>
To: dnsext@ietf.org
In-Reply-To: <20111018163005.71F8221F89B8@ietfa.amsl.com>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <20111018041833.GN7743@shinkuro.com> <20111018163005.71F8221F89B8@ietfa.amsl.com>
User-Agent: Wanderlust/2.14.0 (Africa) Emacs/23.3 Mule/6.0 (HANACHIRUSATO)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Content-Type: text/plain; charset=US-ASCII
Message-Id: <20111018224040.DA7C017072@thrintun.hactrn.net>
X-Mailman-Approved-At: Tue, 18 Oct 2011 19:13:07 -0700
Subject: Re: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: dnsext@ietf.org
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 22:40:47 -0000

At Tue, 18 Oct 2011 12:29:55 -0400, Michael StJohns wrote:
> 
> If I have a configured trust anchor, I generally want to do my own
> validation (CD=1, D0=1, RD=1) - why should I trust anyone else?
> (and more importantly, why should I contribute to the load on the
> recursive resolver by requiring them to validate stuff I'm going to
> also validate?)  (And if one more person utters "suspenders and
> belt" ...)
> 
> If I don't have a configured trust anchor, I either want no security
> (CD=1, D0=0, RD=1) or I want my local recursive server to be secure
> on my behalf (CD=0, D0=0, RD=1).
> 
> As I understand it, the first and the last of these three are the
> way most stub resolvers get configured.
> 
> (Ed's table is useful, but the other 5 possibilities are pretty much
> only used by geeks and operators :-) and special cases where the
> local resolver isn't really just a stub )

I have not really been following this thread, both because I'm working
on other things these days and also because, as one of the primary
authors of the text Mark is unhappy about, I pretty much have to
recuse on whether the text is clear.

With that said, though: I think Mike has nailed it here.  The
recursive name server's implementation issues and efficiency
considerations are not the stub resolver's problem.  When the stub
resolver sets <CD=1, DO=1, RD=1> it is saying "give me the freaking
DNSSEC data and stay the [bleep] out of my way"; at least, that was my
intent back when we were writing the DNSSECbis specifications, and
that was the point about which I made a stinking nuisance of myself
when other WG participants tried to deprecate the CD bit.

I suspect that at least some of the differences of opinion on this
list stem from whether one is looking at all this from the point of
view of the stub resolver or the point of view of the recursive name
server.

From marka@isc.org  Tue Oct 18 20:08:46 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B40621F85FF for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 20:08:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.575
X-Spam-Level: 
X-Spam-Status: No, score=-2.575 tagged_above=-999 required=5 tests=[AWL=0.024,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yg1JSgWetQ4W for <dnsext@ietfa.amsl.com>; Tue, 18 Oct 2011 20:08:45 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id 0AB5A21F85F7 for <dnsext@ietf.org>; Tue, 18 Oct 2011 20:08:45 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 30A4D5F98E6 for <dnsext@ietf.org>; Wed, 19 Oct 2011 03:08:19 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 6EBDC216C6A for <dnsext@ietf.org>; Wed, 19 Oct 2011 03:08:17 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id B208E1588445 for <dnsext@ietf.org>; Wed, 19 Oct 2011 14:08:14 +1100 (EST)
To: dnsext@ietf.org
From: Mark Andrews <marka@isc.org>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <20111018041833.GN7743@shinkuro.com> <20111018163005.71F8221F89B8@ietfa.amsl.com> <20111018224040.DA7C017072@thrintun.hactrn.net>
In-reply-to: Your message of "Tue, 18 Oct 2011 18:40:40 EDT." <20111018224040.DA7C017072@thrintun.hactrn.net>
Date: Wed, 19 Oct 2011 14:08:14 +1100
Message-Id: <20111019030814.B208E1588445@drugs.dv.isc.org>
Subject: Re: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 03:08:46 -0000

In message <20111018224040.DA7C017072@thrintun.hactrn.net>, Rob Austein writes:
> At Tue, 18 Oct 2011 12:29:55 -0400, Michael StJohns wrote:
> > 
> > If I have a configured trust anchor, I generally want to do my own
> > validation (CD=1, D0=1, RD=1) - why should I trust anyone else?
> > (and more importantly, why should I contribute to the load on the
> > recursive resolver by requiring them to validate stuff I'm going to
> > also validate?)  (And if one more person utters "suspenders and
> > belt" ...)
> > 
> > If I don't have a configured trust anchor, I either want no security
> > (CD=1, D0=0, RD=1) or I want my local recursive server to be secure
> > on my behalf (CD=0, D0=0, RD=1).
> > 
> > As I understand it, the first and the last of these three are the
> > way most stub resolvers get configured.
> > 
> > (Ed's table is useful, but the other 5 possibilities are pretty much
> > only used by geeks and operators :-) and special cases where the
> > local resolver isn't really just a stub )
> 
> I have not really been following this thread, both because I'm working
> on other things these days and also because, as one of the primary
> authors of the text Mark is unhappy about, I pretty much have to
> recuse on whether the text is clear.

The text is clear.  The requested behaviour however is BAD as it
leaves the stub resolver open to accidental denial of service caused
by the resolver as a direct result of the way CD is being set.

The working group did not explore all the failure modes inherent
with a stub/recursive server/authoritative server configuration.
The text highlights one of those failure modes (incorrect validation
failures in the recursive server) but fails to address the other
failure modes that result from the stub not being in direct
communication with the authoritative servers.

> With that said, though: I think Mike has nailed it here.  The
> recursive name server's implementation issues and efficiency
> considerations are not the stub resolver's problem.  When the stub
> resolver sets <CD=1, DO=1, RD=1> it is saying "give me the freaking
> DNSSEC data and stay the [bleep] out of my way"; at least, that was my
> intent back when we were writing the DNSSECbis specifications, and
> that was the point about which I made a stinking nuisance of myself
> when other WG participants tried to deprecate the CD bit.

Nobody is arguing that.  In fact the suggested revised text still
depends on that behaviour.

The argument is "Can a stub validator, reliably, get a successfully
answer in the presence of common, partial, misconfigurations of the
authoritative servers if it only makes CD=1 queries?" as per the
current spec.  I contend the answer to that question is "no" and
suggested revised behaviour which addresses some of the failures
that can happen with the current spec.

All CD=0 queries from the stub is BAD.
All CD=1 queries from the stub is BAD.

For the system to work reliably there needs to be a mixture of CD=0
and CD=1 queries with the stub retrying with the other type when
the first type fails.

Now one can argue about "CD=0 then CD=1" or "CD=1 then CD=0" but a
stub which doesn't switch is broken.

> I suspect that at least some of the differences of opinion on this
> list stem from whether one is looking at all this from the point of
> view of the stub resolver or the point of view of the recursive name
> server.
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From teemu.savolainen@nokia.com  Tue Oct 18 23:43:07 2011
Return-Path: <teemu.savolainen@nokia.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F06AA11E8090; Tue, 18 Oct 2011 23:43:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.57
X-Spam-Level: 
X-Spam-Status: No, score=-1.57 tagged_above=-999 required=5 tests=[AWL=-1.422,  BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_CHARSET_FARAWAY=2.45]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ofBKIgqDODaI; Tue, 18 Oct 2011 23:43:06 -0700 (PDT)
Received: from mgw-sa02.nokia.com (smtp.nokia.com [147.243.1.48]) by ietfa.amsl.com (Postfix) with ESMTP id 742A811E8073; Tue, 18 Oct 2011 23:43:04 -0700 (PDT)
Received: from vaebh106.NOE.Nokia.com (vaebh106.europe.nokia.com [10.160.244.32]) by mgw-sa02.nokia.com (Switch-3.4.4/Switch-3.4.3) with ESMTP id p9J6ghAa026319; Wed, 19 Oct 2011 09:42:58 +0300
Received: from smtp.mgd.nokia.com ([65.54.30.5]) by vaebh106.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675);  Wed, 19 Oct 2011 09:42:49 +0300
Received: from 008-AM1MMR1-006.mgdnok.nokia.com (65.54.30.61) by NOK-am1MHUB-01.mgdnok.nokia.com (65.54.30.5) with Microsoft SMTP Server (TLS) id 8.2.255.0; Wed, 19 Oct 2011 08:42:48 +0200
Received: from 008-AM1MPN1-037.mgdnok.nokia.com ([169.254.7.8]) by 008-AM1MMR1-006.mgdnok.nokia.com ([65.54.30.61]) with mapi id 14.01.0339.002; Wed, 19 Oct 2011 08:42:47 +0200
From: <teemu.savolainen@nokia.com>
To: <denghui02@hotmail.com>, <mif@ietf.org>, <dnsext@ietf.org>, <dnsop@ietf.org>, <dhcwg@ietf.org>
Thread-Topic: [mif] 2nd Last Call for MIF DNS server selection document
Thread-Index: AQHMf4YJc1OWueh3WEqDYlN2BZxXYpWDUwvA
Date: Wed, 19 Oct 2011 06:42:46 +0000
Message-ID: <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl>
In-Reply-To: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-tituslabs-classifications-30: TLPropertyRoot=Nokia;Confidentiality=Company Confidential;Project=None;
x-titus-version: 3.3.8.1
x-headerinfofordlp: None
x-tituslabs-classificationhash-30: VgNFIFU9Hx+/nZJb9Kg7IplYcKbXY4PV0ei3gFpNObHe+lTM1U1xbihCwzQd/31+Vpsv1JI/CghilcM/oudMLL/ZE5yjuV1btDJGeMSb+omF450JciYLYU6qxQQ8Xaa1p2Xz8pU5JtexlfPCe2LbkrEsd18wN+6h+QJs60yrUp8zy2fyngKs2jNCwrbSbF3kVd3WmTuyR23nTH2VpieUXQIilkTpcKD2+yW1jpOLBqNLbcidN3Qq8iOyoJwvL7FOJmRcjJdjp9CW/t54mdvKEg==
x-originating-ip: [10.162.59.225]
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0245_01CC8E43.73EFA520"
MIME-Version: 1.0
X-OriginalArrivalTime: 19 Oct 2011 06:42:49.0594 (UTC) FILETIME=[519D5DA0:01CC8E2A]
X-Nokia-AV: Clean
Cc: pk@isoc.de, john_brzozowski@cable.comcast.com
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 06:43:07 -0000

------=_NextPart_000_0245_01CC8E43.73EFA520
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0246_01CC8E43.73EFA520"


------=_NextPart_001_0246_01CC8E43.73EFA520
Content-Type: text/plain;
	charset="gb2312"
Content-Transfer-Encoding: quoted-printable

Hi all,

=20

This second WGLC resulted in very few comments. In the DHC WG we =
discussed
about DHCPv4 option structure and in MIF there was a comment about
document-internal reference bug.

=20

I have now uploaded a version six that contains:

-          Fixes to the DHCPv4 option structure

-          Highlighting stricter length limitation in case of DHCPv4 =
option

-          Fix to the reference bug

-          Small fixes to missing DHCPv4 considerations in sections 4.5 =
and
4.6.

=20

Please see diff:
http://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-mif-dns-server-selection-=
06

=20

If no further comments, I think this document is ready to go to the =
IESG.

=20

Thank you,

=20

                Teemu

=20

=20

From: mif-bounces@ietf.org [mailto:mif-bounces@ietf.org] On Behalf Of =
ext
Hui Deng
Sent: 30. syyskuuta 2011 18:29
To: mif@ietf.org; dnsext@ietf.org; dnsop@ietf.org; dhcwg@ietf.org
Cc: pk@isoc.de; john_brzozowski@cable.comcast.com; =
sa.morris7@googlemail.com
Subject: [mif] 2nd Last Call for MIF DNS server selection document

=20

Dear all
=20
Based on 1st round WG LC, the authors have received significant advice =
about
revision and submited a new version accordingly:
http://www.ietf.org/internet-drafts/draft-ietf-mif-dns-server-selection-0=
5.t
xt
=20
And we plan to issue a second round WG LC, and cc to DHCWG, DNSEXT, =
DNSOP
related working groups, please DNSEXT/DNSOP chairs help to forward to =
the
MLs since I may not subscribe to them.
=20
This is a 2 weeks with little extension LC, it will finish on October =
17,
Please send substantive review and editorial comments to mif@ietf.org
=20
Thanks a lot for youre view
Best regards,
=20
Margaret and Hui
=20
=20
=20
Below are Teemu's writeup about the revision:
=20
I uploaded -05 update so that next comments would take into account =
changes
I already did based on discussions with Murray (as was copied to this =
list).
The biggest clarifications related to how DNS queries are sent to =
different
servers and when all servers are waited for answers (if reply is not
validated) and when not. I.e. this text:
--
  A node SHALL send requests to DNS servers in the order defined by the
  priority list until an acceptable reply is received, all replies are
  received, or a time out occurs.  In the case of a requested name
  matching to a specific domain or network rule accepted from any
  interface, a DNSSEC-aware resolver MUST NOT proceed with a reply that
  cannot be validated using DNSSEC until all DNS servers on the
  priority list have been contacted or timed out.  This protects
  against possible redirection attacks.  In the case of the requested
  name not matching to any specific domain or network, first received
  response from any DNS server MAY be considered acceptable.  A DNSSEC-
  aware node MAY always contact all DNS server in an attempt to receive
  a response that can be validated, but contacting all DNS servers is
  not mandated for the default case as in some deployments that would
  consume excess resources.
--
       Teemu
> -----Original Message-----
> From: mif-bounces@ietf.org [mailto:mif-bounces@ietf.org] On Behalf Of
> ext internet-drafts@ietf.org
> Sent: 20. syyskuuta 2011 22:10
> To: i-d-announce@ietf.org
> Cc: mif@ietf.org
> Subject: [mif] I-D Action: draft-ietf-mif-dns-server-selection-05.txt
- =CF=D4=CA=BE=D2=FD=D3=C3=CE=C4=D7=D6 -
>
> A New Internet-Draft is available from the on-line Internet-Drafts
directories.
> This draft is a work item of the Multiple Interfaces Working Group of =
the
> IETF.
>
>       Title           : Improved DNS Server Selection for =
Multi-Interfaced
> Nodes
>       Author(s)       : Teemu Savolainen
>                           Jun-ya Kato
>                           Ted Lemon
>       Filename        : draft-ietf-mif-dns-server-selection-0 5.txt
>       Pages           : 26
>       Date            : 2011-09-20
>
>    A multi-interfaced node is connected to multiple networks, some of
>    which may be utilizing private DNS namespaces.  A node commonly
>    receives DNS server configuration information from all connected
>    networks.  Some of the DNS servers may have information about
>    namespaces other servers do not have.  When a multi-interfaced node
>    needs to utilize DNS, the node has to choose which of the servers =
to
>    contact to.  This document describes DHCPv4 and DHCPv6 option that
>    can be used to configure nodes with inform ation required to =
perform
>    informed DNS server selection decisions.
>
>
> A URL for this Internet-Draft is:
>
http://www.ietf.org/internet-drafts/draft-ietf-mif-dns-server-selection-0=
5.t
xt


------=_NextPart_001_0246_01CC8E43.73EFA520
Content-Type: text/html;
	charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dgb2312"><meta =
name=3DGenerator content=3D"Microsoft Word 14 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:SimSun;
	mso-fareast-language:ZH-CN;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:12.0pt;
	font-family:SimSun;
	mso-fareast-language:ZH-CN;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:SimSun;
	mso-fareast-language:ZH-CN;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1261256640;
	mso-list-type:hybrid;
	mso-list-template-ids:-1712847686 -1568239464 67698691 67698693 =
67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:Calibri;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Hi all,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>This second WGLC resulted in very few comments. In the DHC WG we =
discussed about DHCPv4 option structure and in MIF there was a comment =
about document-internal reference bug.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I have now uploaded a version six that =
contains:<o:p></o:p></span></p><p class=3DMsoListParagraph =
style=3D'text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if =
!supportLists]><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><span style=3D'mso-list:Ignore'>-<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Fixes to the DHCPv4 option structure<o:p></o:p></span></p><p =
class=3DMsoListParagraph style=3D'text-indent:-18.0pt;mso-list:l0 level1 =
lfo1'><![if !supportLists]><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><span style=3D'mso-list:Ignore'>-<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Highlighting stricter length limitation in case of DHCPv4 =
option<o:p></o:p></span></p><p class=3DMsoListParagraph =
style=3D'text-indent:-18.0pt;mso-list:l0 level1 lfo1'><![if =
!supportLists]><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><span style=3D'mso-list:Ignore'>-<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Fix to the reference bug<o:p></o:p></span></p><p =
class=3DMsoListParagraph style=3D'text-indent:-18.0pt;mso-list:l0 level1 =
lfo1'><![if !supportLists]><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><span style=3D'mso-list:Ignore'>-<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Small fixes to missing DHCPv4 considerations in sections 4.5 and =
4.6.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Please see diff: <a =
href=3D"http://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-mif-dns-server-se=
lection-06">http://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-mif-dns-serve=
r-selection-06</a><o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>If no further comments, I think this document is ready to go to the =
IESG.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Thank you,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp; Teemu<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div =
style=3D'border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt'><div><div style=3D'border:none;border-top:solid #B5C4DF =
1.0pt;padding:3.0pt 0cm 0cm 0cm'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
mif-bounces@ietf.org [mailto:mif-bounces@ietf.org] <b>On Behalf Of =
</b>ext Hui Deng<br><b>Sent:</b> 30. syyskuuta 2011 18:29<br><b>To:</b> =
mif@ietf.org; dnsext@ietf.org; dnsop@ietf.org; =
dhcwg@ietf.org<br><b>Cc:</b> pk@isoc.de; =
john_brzozowski@cable.comcast.com; =
sa.morris7@googlemail.com<br><b>Subject:</b> [mif] 2nd Last Call for MIF =
DNS server selection document<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Dear =
all<br>&nbsp;<br>Based on 1st round WG LC, the authors have received =
significant advice about revision and submited a new version =
accordingly:<br><a =
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-mif-dns-server-sel=
ection-05.txt">http://www.ietf.org/internet-drafts/draft-ietf-mif-dns-ser=
ver-selection-05.txt</a><br>&nbsp;<br>And&nbsp;we plan to issue a second =
round WG LC, and cc to DHCWG, DNSEXT, DNSOP related working groups, =
please DNSEXT/DNSOP chairs help to forward to the MLs since I may not =
subscribe to them.<br>&nbsp;<br>This is a 2 weeks with little =
extension&nbsp;LC, it will finish on&nbsp;October 17,<br>Please send =
substantive review and editorial comments to <a =
href=3D"mailto:mif@ietf.org">mif@ietf.org</a><br>&nbsp;<br>Thanks a lot =
for youre view<br>Best regards,<br>&nbsp;<br>Margaret and =
Hui<br>&nbsp;<br>&nbsp;<br>&nbsp;<br>Below are Teemu's writeup =
about&nbsp;the revision:<br>&nbsp;<br>I uploaded -05 update so that next =
comments would take into account changes<br>I already did based on =
discussions with Murray (as was copied to this list).<br>The biggest =
clarifications related to how DNS queries are sent to =
different<br>servers and when all servers are waited for answers (if =
reply is not<br>validated) and when not. I.e. this text:<br>--<br>&nbsp; =
A node SHALL send requests to DNS servers in the order defined by =
the<br>&nbsp; priority list until an acceptable reply is received, all =
replies are<br>&nbsp; received, or a time out occurs.&nbsp; In the case =
of a requested name<br>&nbsp; matching to a specific domain or network =
rule accepted from any<br>&nbsp; interface, a DNSSEC-aware resolver MUST =
NOT proceed with a reply that<br>&nbsp; cannot be validated using DNSSEC =
until all DNS servers on the<br>&nbsp; priority list have been contacted =
or timed out.&nbsp; This protects<br>&nbsp; against possible redirection =
attacks.&nbsp; In the case of the requested<br>&nbsp; name not matching =
to any specific domain or network, first received<br>&nbsp; response =
from any DNS server MAY be considered acceptable.&nbsp; A =
DNSSEC-<br>&nbsp; aware node MAY always contact all DNS server in an =
attempt to receive<br>&nbsp; a response that can be validated, but =
contacting all DNS servers is<br>&nbsp; not mandated for the default =
case as in some deployments that would<br>&nbsp; consume excess =
resources.<br>--<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Teemu<br>&gt; =
-----Original Message-----<br>&gt; From: <a =
href=3D"mailto:mif-bounces@ietf.org">mif-bounces@ietf.org</a> <a =
href=3D"mailto:[mailto:mif-bounces@ietf.org]">[mailto:mif-bounces@ietf.or=
g]</a> On Behalf Of<br>&gt; ext <a =
href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a><br>=
&gt; Sent: 20. syyskuuta 2011 22:10<br>&gt; To: <a =
href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a><br>&gt; =
Cc: <a href=3D"mailto:mif@ietf.org">mif@ietf.org</a><br>&gt; Subject: =
[mif] I-D Action: draft-ietf-mif-dns-server-selection-05.txt<br>- =
</span><span lang=3DZH-CN =
style=3D'font-size:10.0pt'>=CF=D4=CA=BE=D2=FD=D3=C3=CE=C4=D7=D6</span><sp=
an style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
-<br>&gt;<br>&gt; A New Internet-Draft is available from the on-line =
Internet-Drafts<br>directories.<br>&gt; This draft is a work item of the =
Multiple Interfaces Working Group of the<br>&gt; =
IETF.<br>&gt;<br>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Title&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
Improved DNS Server Selection for Multi-Interfaced<br>&gt; =
Nodes<br>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Author(s)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Teemu =
Savolainen<br>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp; Jun-ya =
Kato<br>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp; Ted =
Lemon<br>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Filename&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
draft-ietf-mif-dns-server-selection-0 =
5.txt<br>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Pages&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
26<br>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Date&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : =
2011-09-20<br>&gt;<br>&gt;&nbsp;&nbsp;&nbsp; A multi-interfaced node is =
connected to multiple networks, some of<br>&gt;&nbsp;&nbsp;&nbsp; which =
may be utilizing private DNS namespaces.&nbsp; A node =
commonly<br>&gt;&nbsp;&nbsp;&nbsp; receives DNS server configuration =
information from all connected<br>&gt;&nbsp;&nbsp;&nbsp; networks.&nbsp; =
Some of the DNS servers may have information =
about<br>&gt;&nbsp;&nbsp;&nbsp; namespaces other servers do not =
have.&nbsp; When a multi-interfaced node<br>&gt;&nbsp;&nbsp;&nbsp; needs =
to utilize DNS, the node has to choose which of the servers =
to<br>&gt;&nbsp;&nbsp;&nbsp; contact to.&nbsp; This document describes =
DHCPv4 and DHCPv6 option that<br>&gt;&nbsp;&nbsp;&nbsp; can be used to =
configure nodes with inform ation required to =
perform<br>&gt;&nbsp;&nbsp;&nbsp; informed DNS server selection =
decisions.<br>&gt;<br>&gt;<br>&gt; A URL for this Internet-Draft =
is:<br>&gt; <a =
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-mif-dns-server-sel=
ection-05.txt">http://www.ietf.org/internet-drafts/draft-ietf-mif-dns-ser=
ver-selection-05.txt</a><o:p></o:p></span></p></div></div></div></body></=
html>
------=_NextPart_001_0246_01CC8E43.73EFA520--

------=_NextPart_000_0245_01CC8E43.73EFA520
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0245_01CC8E43.73EFA520--

From Ray.Bellis@nominet.org.uk  Wed Oct 19 03:40:24 2011
Return-Path: <Ray.Bellis@nominet.org.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B781C21F8B9A; Wed, 19 Oct 2011 03:40:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.35
X-Spam-Level: 
X-Spam-Status: No, score=-8.35 tagged_above=-999 required=5 tests=[AWL=0.496,  BAYES_00=-2.599, MIME_BASE64_TEXT=1.753, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YUjRrRhe0Z6N; Wed, 19 Oct 2011 03:40:24 -0700 (PDT)
Received: from mx4.nominet.org.uk (mx4.nominet.org.uk [213.248.199.24]) by ietfa.amsl.com (Postfix) with ESMTP id E87B021F8B92; Wed, 19 Oct 2011 03:40:22 -0700 (PDT)
DomainKey-Signature: s=main.dk.nominet.selector; d=nominet.org.uk; c=nofws; q=dns;  h=X-IronPort-AV:Received:Received:From:To:CC:Subject: Thread-Topic:Thread-Index:Date:Message-ID:References: In-Reply-To:Accept-Language:Content-Language: X-MS-Has-Attach:X-MS-TNEF-Correlator:Content-Type: Content-ID:Content-Transfer-Encoding:MIME-Version; b=caaUtaFTHB5H3HAANahafeEaDk1Jw8+Hd5QVMMi3mxtsbS4/zKpm0dLA 8YpsPN1ZBFsm8cI6uJtJ95uFqzYyCOLlngnIXDaSh7Z6w2zUu6w6ONcS3 2GVnnxX0Qd89xJV;
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nominet.org.uk; i=Ray.Bellis@nominet.org.uk; q=dns/txt; s=main.dkim.nominet.selector; t=1319020823; x=1350556823; h=from:sender:reply-to:subject:date:message-id:to:cc: mime-version:content-transfer-encoding:content-id: content-description:resent-date:resent-from:resent-sender: resent-to:resent-cc:resent-message-id:in-reply-to: references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:list-owner:list-archive; z=From:=20Ray=20Bellis=20<Ray.Bellis@nominet.org.uk> |Subject:=20Re:=20[dnsext]=20[mif]=202nd=20Last=20Call=20 for=20MIF=20DNS=20server=20selection=0D=0A=09document |Date:=20Wed,=2019=20Oct=202011=2010:39:59=20+0000 |Message-ID:=20<121DABD1-65E8-4275-8471-9FA38D25C434@nomi net.org.uk>|To:=20"<teemu.savolainen@nokia.com>=20=20<tee mu.savolainen@nokia.com>"=0D=0A=09<teemu.savolainen@nokia .com>|CC:=20"<denghui02@hotmail.com>"=20<denghui02@hotmai l.com>,=20"<mif@ietf.org>"=0D=0A=09<mif@ietf.org>,=20"<dn sext@ietf.org>"=20<dnsext@ietf.org>,=20"<dnsop@ietf.org>" =0D=0A=09<dnsop@ietf.org>,=20"<dhcwg@ietf.org>"=20<dhcwg@ ietf.org>,=20"<pk@isoc.de>"=0D=0A=09<pk@isoc.de>,=20"<joh n_brzozowski@cable.comcast.com>"=0D=0A=09<john_brzozowski @cable.comcast.com>|MIME-Version:=201.0 |Content-Transfer-Encoding:=20base64|Content-ID:=20<e071c 705-1f96-4283-8414-92c4beee7776>|In-Reply-To:=20<916CE6CF 87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.n okia.com>|References:=20<COL118-W55403198A984BAAE44BA47B1 F70@phx.gbl>=0D=0A=20<916CE6CF87173740BC8A2CE443096962037 82D75@008-AM1MPN1-037.mgdnok.nokia.com>; bh=wjXrwR/5mZrsxKodJhBl0WBtDXFA5FKFX13mPqu7Hv0=; b=5UBvh3985+KrOG/aG36B72pWXl5sB+9xnPyWVTktv20rqxCE7tiZ8fSB cjM/HkAdJyn2Mup19fNJiIzjAP8C2SlM5cnGC7Na617jvF07KYOuneWB2 jwqMWSAJKHOVTEL;
X-IronPort-AV: E=Sophos;i="4.69,371,1315177200"; d="scan'208";a="29067810"
Received: from wds-exc2.okna.nominet.org.uk ([213.248.197.145]) by mx4.nominet.org.uk with ESMTP; 19 Oct 2011 11:40:00 +0100
Received: from WDS-EXC1.okna.nominet.org.uk ([fe80::1593:1394:a91f:8f5f]) by wds-exc2.okna.nominet.org.uk ([fe80::7577:eaca:5241:25d4%19]) with mapi; Wed, 19 Oct 2011 11:40:00 +0100
From: Ray Bellis <Ray.Bellis@nominet.org.uk>
To: "<teemu.savolainen@nokia.com>  <teemu.savolainen@nokia.com>" <teemu.savolainen@nokia.com>
Thread-Topic: [dnsext] [mif] 2nd Last Call for MIF DNS server selection document
Thread-Index: AQHMjipy2DQifQawrE6jw+Ds3oKeKpWDac2A
Date: Wed, 19 Oct 2011 10:39:59 +0000
Message-ID: <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com>
In-Reply-To: <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="gb2312"
Content-ID: <e071c705-1f96-4283-8414-92c4beee7776>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: "<mif@ietf.org>" <mif@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, "<john_brzozowski@cable.comcast.com>" <john_brzozowski@cable.comcast.com>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 10:40:24 -0000
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From moore@network-heretics.com  Wed Oct 19 04:23:44 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7753221F8B92; Wed, 19 Oct 2011 04:23:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.932
X-Spam-Level: 
X-Spam-Status: No, score=-3.932 tagged_above=-999 required=5 tests=[AWL=-0.334, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id icS9UX6rSuuL; Wed, 19 Oct 2011 04:23:43 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id 998B821F8B7A; Wed, 19 Oct 2011 04:23:43 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.mail.srv.osa [10.202.2.46]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id A80E420A54; Wed, 19 Oct 2011 07:23:42 -0400 (EDT)
Received: from frontend1.nyi.mail.srv.osa ([10.202.2.160]) by compute6.internal (MEProxy); Wed, 19 Oct 2011 07:23:42 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:message-id:references:to; s=smtpout; bh=wS7 mQwdhJMKRXy153rWKRoM7znE=; b=DWHItNfRGYj94ScbMWss3zAcdbVdyYmR47W XdQtqq/+0rSRaQtIS0W9wpXzZyrY9WdwfzzHH1u2orr+T3ceDuZIaq0CJXujRBAF qaklVTxD7VqJetmbRq2uwSh65JnMVJbuBrihWihm1ePSggU1fTtVERNf637YFkHQ DpuUs5aY=
X-Sasl-enc: BGjFQ+RkS6H51ygInKuqC5DpPke97MZ+nh/sc/cEx3Lk 1319023422
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id E0DF2407BD6; Wed, 19 Oct 2011 07:23:40 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-52--733704108
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk>
Date: Wed, 19 Oct 2011 07:23:15 -0400
Message-Id: <8EFC868A-8796-4013-BB07-F3D33F33C552@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk>
To: Ray Bellis <Ray.Bellis@nominet.org.uk>
X-Mailer: Apple Mail (2.1084)
X-Mailman-Approved-At: Wed, 19 Oct 2011 05:29:30 -0700
Cc: "<mif@ietf.org>" <mif@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, "<john_brzozowski@cable.comcast.com>" <john_brzozowski@cable.comcast.com>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 11:23:44 -0000

--Apple-Mail-52--733704108
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

On Oct 19, 2011, at 6:39 AM, Ray Bellis wrote:
>=20
> When new gTLDs are introduced it is likely for brand-name gTLDs that =
they will wish to use bare names in the DNS (i.e. a single label =
hostname) for their primary web sites.

I don't see why IETF should give a flying *#&(*#$ what the owners of =
brand-name gTLDs want.   Brand-name gTLDs are an exceedingly stupid =
idea, and treating single label names as anything other than local =
abbreviations flies in the face of 25+ years of practice.  =20

The best thing that IETF could do is to make sure that use of =
single-label gTLDs is so unreliable that no megacorporation would dare =
use them.

Keith


--Apple-Mail-52--733704108
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div><div>On Oct 19, 2011, at 6:39 AM, Ray Bellis =
wrote:</div><blockquote type=3D"cite"><div><font =
class=3D"Apple-style-span" color=3D"#000000"><br></font>When new gTLDs =
are introduced it is likely for brand-name gTLDs that they will wish to =
use bare names in the DNS (i.e. a single label hostname) for their =
primary web sites.<br></div></blockquote><div><br></div><div>I don't see =
why IETF should give a flying *#&amp;(*#$ what the owners of brand-name =
gTLDs want. &nbsp; Brand-name gTLDs are an exceedingly stupid idea, and =
treating single label names as anything other than local abbreviations =
flies in the face of 25+ years of practice. =
&nbsp;&nbsp;</div><div><br></div><div>The best thing that IETF could do =
is to make sure that use of single-label gTLDs is so unreliable that no =
megacorporation would dare use =
them.</div><div><br></div><div>Keith</div><div><br></div></div></body></ht=
ml>=

--Apple-Mail-52--733704108--

From ajs@crankycanuck.ca  Wed Oct 19 05:58:44 2011
Return-Path: <ajs@crankycanuck.ca>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E14CC21F8B9F; Wed, 19 Oct 2011 05:58:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.224
X-Spam-Level: 
X-Spam-Status: No, score=-2.224 tagged_above=-999 required=5 tests=[AWL=-0.225, BAYES_00=-2.599, J_CHICKENPOX_21=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IAV-OoNFf0NP; Wed, 19 Oct 2011 05:58:44 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 5617221F8B34; Wed, 19 Oct 2011 05:58:41 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 131CF1ECB428; Wed, 19 Oct 2011 12:58:31 +0000 (UTC)
Date: Wed, 19 Oct 2011 08:58:33 -0400
From: Andrew Sullivan <ajs@crankycanuck.ca>
To: mif@ietf.org, dnsext@ietf.org, dnsop@ietf.org, dhcwg@ietf.org
Message-ID: <20111019125832.GA18523@shinkuro.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <8EFC868A-8796-4013-BB07-F3D33F33C552@network-heretics.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <8EFC868A-8796-4013-BB07-F3D33F33C552@network-heretics.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
X-Mailman-Approved-At: Wed, 19 Oct 2011 06:23:32 -0700
Subject: [dnsext] bare names (was: [mif] 2nd Last Call for MIF DNS server selection	document)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: mif@ietf.org
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 12:58:45 -0000

Note: I trimmed the cc:s down to just the lists, but if we're going to
pursue this dicussion we probably ought to follow up in mif, since
that's where the draft comes from.  That's why I set reply-to.

On Wed, Oct 19, 2011 at 07:23:15AM -0400, Keith Moore wrote:

> I don't see why IETF should give a flying *#&(*#$ what the owners of
> brand-name gTLDs want.  Brand-name gTLDs are an exceedingly stupid
> idea, and treating single label names as anything other than local
> abbreviations flies in the face of 25+ years of practice.

If you said, "25+ years of practice illustrating how broken the
search-path mechanism is," I'd agree with you.

I think it is largely true that single-label domain names are going to
fail to work in all sorts of amusing ways that will surprise gullible
people who forked over a pile of cash for the privilege of registering
them.  Nevertheless, the search path mechanism has never worked very
well and is notoriously unreliable in the face of split-brain DNS.
Still, too many people continue to rely on the search path for this
document to be the place to deprecate it.  But I agree with Ray (and
apparently Paul Vixie) that the mechanism ought to go away.

Now that Ray has mentioned it, however, perhaps a sentence along these
lines in the second paragraph of 4.6 would be useful:

    It should be noted that the DNS search list mechanism may cause
    surprising results when used with more than one network at a time.

That addresses the other point that Ray was making: search list-style
bare names are often broken if you're not on the right network, and
the point of this draft is precisely that you're _not_ on only one
network, so it isn't clear what "the right network" is.

> The best thing that IETF could do is to make sure that use of
> single-label gTLDs is so unreliable that no megacorporation would
> dare use them.

And clearly that will work, because the IETF has a long record of
success of standing before the tide and telling it to stop.

Best regards,

A

-- 
Andrew Sullivan
ajs@crankycanuck.ca

From ajs@anvilwalrusden.com  Wed Oct 19 06:26:40 2011
Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 973A721F8BE8; Wed, 19 Oct 2011 06:26:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.114
X-Spam-Level: 
X-Spam-Status: No, score=-2.114 tagged_above=-999 required=5 tests=[AWL=-0.115, BAYES_00=-2.599, J_CHICKENPOX_21=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H3XFgoPb0hKR; Wed, 19 Oct 2011 06:26:40 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 234FD21F8A95; Wed, 19 Oct 2011 06:26:40 -0700 (PDT)
Received: from shinkuro.com (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 0B6E31ECB428; Wed, 19 Oct 2011 13:26:25 +0000 (UTC)
Date: Wed, 19 Oct 2011 09:26:34 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: mif@ietf.org, dnsext@ietf.org, dnsop@ietf.org, dhcwg@ietf.org
Message-ID: <20111019132633.GB18523@shinkuro.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <8EFC868A-8796-4013-BB07-F3D33F33C552@network-heretics.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <8EFC868A-8796-4013-BB07-F3D33F33C552@network-heretics.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: [dnsext] bare names (was: [mif] 2nd Last Call for MIF DNS server selection	document)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: mif@ietf.org
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 13:26:40 -0000

Note: I trimmed the cc:s down to just the lists, but if we're going to
pursue this dicussion we probably ought to follow up in mif, since
that's where the draft comes from.  That's why I set reply-to.  Also,
I sent this first from the wrong address, so apologies to those who
see it twice.

On Wed, Oct 19, 2011 at 07:23:15AM -0400, Keith Moore wrote:

> I don't see why IETF should give a flying *#&(*#$ what the owners of
> brand-name gTLDs want.  Brand-name gTLDs are an exceedingly stupid
> idea, and treating single label names as anything other than local
> abbreviations flies in the face of 25+ years of practice.

If you said, "25+ years of practice illustrating how broken the
search-path mechanism is," I'd agree with you.

I think it is largely true that single-label domain names are going to
fail to work in all sorts of amusing ways that will surprise gullible
people who forked over a pile of cash for the privilege of registering
them.  Nevertheless, the search path mechanism has never worked very
well and is notoriously unreliable in the face of split-brain DNS.
Still, too many people continue to rely on the search path for this
document to be the place to deprecate it.  But I agree with Ray (and
apparently Paul Vixie) that the mechanism ought to go away.

Now that Ray has mentioned it, however, perhaps a sentence along these
lines in the second paragraph of 4.6 would be useful:

    It should be noted that the DNS search list mechanism may cause
    surprising results when used with more than one network at a time.

That addresses the other point that Ray was making: search list-style
bare names are often broken if you're not on the right network, and
the point of this draft is precisely that you're _not_ on only one
network, so it isn't clear what "the right network" is.

> The best thing that IETF could do is to make sure that use of
> single-label gTLDs is so unreliable that no megacorporation would
> dare use them.

And clearly that will work, because the IETF has a long record of
success of standing before the tide and telling it to stop.

Best regards,

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com


From moore@network-heretics.com  Wed Oct 19 06:48:51 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18DE321F8B4E; Wed, 19 Oct 2011 06:48:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[AWL=-0.600, BAYES_00=-2.599, J_CHICKENPOX_21=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yNFuZRJLHH-g; Wed, 19 Oct 2011 06:48:50 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id 22A4421F8B5C; Wed, 19 Oct 2011 06:48:50 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.mail.srv.osa [10.202.2.43]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id B4F5420E58; Wed, 19 Oct 2011 09:48:49 -0400 (EDT)
Received: from frontend1.nyi.mail.srv.osa ([10.202.2.160]) by compute3.internal (MEProxy); Wed, 19 Oct 2011 09:48:49 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=9t0F312M2ZXsV+O5xsM0MIAhPUU=; b=uP 0PZPHXPQoD9Bd8L6H5ZvS2sdmUhJiIIC2WPD8hVXXx99aykrh2i7b4oFW7+55p3e RpLMKEA+OoC1IkFf98XPpEPBD0luhyXcKSywJd6YWNyj9oa/ajz0IEkZsAQ6AW+Y k8KcxkpFR86/utCNVrTuC3tez7LaW3By1iUKZIHwk=
X-Sasl-enc: uomQefLftWEkbnnMVAiBfZec6wUFII8JnV/hVNkHhdy4 1319032129
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id 76B1F407CA3; Wed, 19 Oct 2011 09:48:48 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <20111019132633.GB18523@shinkuro.com>
Date: Wed, 19 Oct 2011 09:48:23 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <79350865-2ED5-4B12-BA36-B53550CB01F7@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <8EFC868A-8796-4013-BB07-F3D33F33C552@network-heretics.com> <20111019132633.GB18523@shinkuro.com>
To: mif@ietf.org
X-Mailer: Apple Mail (2.1084)
Cc: dhcwg@ietf.org, dnsop@ietf.org, dnsext@ietf.org
Subject: Re: [dnsext] [mif] bare names (was: 2nd Last Call for MIF DNS server selection	document)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 13:48:51 -0000

On Oct 19, 2011, at 9:26 AM, Andrew Sullivan wrote:

> Note: I trimmed the cc:s down to just the lists, but if we're going to
> pursue this dicussion we probably ought to follow up in mif, since
> that's where the draft comes from.  That's why I set reply-to.  Also,
> I sent this first from the wrong address, so apologies to those who
> see it twice.
>=20
> On Wed, Oct 19, 2011 at 07:23:15AM -0400, Keith Moore wrote:
>=20
>> I don't see why IETF should give a flying *#&(*#$ what the owners of
>> brand-name gTLDs want.  Brand-name gTLDs are an exceedingly stupid
>> idea, and treating single label names as anything other than local
>> abbreviations flies in the face of 25+ years of practice.
>=20
> If you said, "25+ years of practice illustrating how broken the
> search-path mechanism is," I'd agree with you.

I agree that search paths are somewhat broken.   What's not broken is =
the idea of using single-label names as local names. =20

> I think it is largely true that single-label domain names are going to
> fail to work in all sorts of amusing ways that will surprise gullible
> people who forked over a pile of cash for the privilege of registering
> them.  Nevertheless, the search path mechanism has never worked very
> well and is notoriously unreliable in the face of split-brain DNS.

split-brain DNS is an abomination that should be eradicated from the =
planet.

> Still, too many people continue to rely on the search path for this
> document to be the place to deprecate it.  But I agree with Ray (and
> apparently Paul Vixie) that the mechanism ought to go away.

I don't think it should necessarily go away.  But perhaps it needs to be =
better defined, and/or more advice needs to be given to applications =
about how to deal with single-label names.

> Now that Ray has mentioned it, however, perhaps a sentence along these
> lines in the second paragraph of 4.6 would be useful:
>=20
>    It should be noted that the DNS search list mechanism may cause
>    surprising results when used with more than one network at a time.
>=20
> That addresses the other point that Ray was making: search list-style
> bare names are often broken if you're not on the right network, and
> the point of this draft is precisely that you're _not_ on only one
> network, so it isn't clear what "the right network" is.

and sometimes, single-label names are set up to work correctly on =
multiple networks - the salient point being that the meaning of the name =
might be inherently context-sensitive.

>> The best thing that IETF could do is to make sure that use of
>> single-label gTLDs is so unreliable that no megacorporation would
>> dare use them.
>=20
> And clearly that will work, because the IETF has a long record of
> success of standing before the tide and telling it to stop.

this isn't a tide.  this is a small number of parties bent on abuse of =
the Internet.  they deserve to fail.

Keith


From mohta@necom830.hpcl.titech.ac.jp  Wed Oct 19 07:27:13 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E01921F8A7E for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 07:27:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H1giVeyHYDnz for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 07:27:12 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 828B221F8A62 for <dnsext@ietf.org>; Wed, 19 Oct 2011 07:27:12 -0700 (PDT)
Received: (qmail 10688 invoked from network); 19 Oct 2011 14:45:30 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 19 Oct 2011 14:45:30 -0000
Message-ID: <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp>
Date: Wed, 19 Oct 2011 23:25:39 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Mark Andrews <marka@isc.org>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org>
In-Reply-To: <20111019015410.5AA45158826F@drugs.dv.isc.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Why are we re-opening this topic? Was: Suggested update to RFC 4035 section 4.9.2 Handling of the CD Bit
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 14:27:13 -0000

Mark Andrews wrote:

> Getting secure time is not a protocol issue for DNSSEC.  It is
> a operations issue.

The problem of DNS over HTTP is that there is no meaningful
use case.

Though it is an operational issue, protocol modification
proposals are meaningless if the proposals have no use cases,
which means that it is a protocol issue, too.

> Apple, for example, sets ntp.conf to "server time.asia.apple.com"
> with MacOS based on the default location for this machine.

Can you expect NTP work, even though plain DNS over IP is not
expected to work?

> Note for many machines mis-set clocks will get noticed as they are
> looked at every day

And most users blindly acknowledge the notices without knowing
their relevance to secure DNS.

> Similarly Kerberos fails with a 5 minute drift.  When that happens
> you work out which clocks are wrong and correct them.

AFAIK, shared key cryptography does not need secure clocks,
because shared keys should be invalidated in time, but,
even if some implementation needs them, it does not make
secure DNS with insecure clock secure.

> Note time is only significant for DNSSEC to protect against replay
> attacks or to stop someone continuing to use a compromised key.

Wrong.

After some private keys are compromised, MITM can supply forged
data to a client through secure DNS by forging a clock of the
client, which is why the clock of the client must be secure.

						Masataka Ohta

From johnl@iecc.com  Wed Oct 19 08:50:25 2011
Return-Path: <johnl@iecc.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D97921F8BC5 for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 08:50:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -109.961
X-Spam-Level: 
X-Spam-Status: No, score=-109.961 tagged_above=-999 required=5 tests=[AWL=1.238, BAYES_00=-2.599, HABEAS_ACCREDITED_SOI=-4.3, RCVD_IN_BSP_TRUSTED=-4.3, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DLeAtWNtpqT9 for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 08:50:24 -0700 (PDT)
Received: from leila.iecc.com (leila6.iecc.com [IPv6:2001:470:1f07:1126:0:4c:6569:6c61]) by ietfa.amsl.com (Postfix) with ESMTP id 9172E21F8BBF for <dnsext@ietf.org>; Wed, 19 Oct 2011 08:50:24 -0700 (PDT)
Received: (qmail 30543 invoked from network); 19 Oct 2011 15:50:23 -0000
Received: from gal.iecc.com (64.57.183.53) by mail2.iecc.com with SMTP; 19 Oct 2011 15:50:23 -0000
Received: (qmail 11330 invoked from network); 19 Oct 2011 15:50:23 -0000
Received: from leila.iecc.com (64.57.183.34) by mail1.iecc.com with QMQP; 19 Oct 2011 15:50:23 -0000
Date: 19 Oct 2011 15:50:01 -0000
Message-ID: <20111019155001.1671.qmail@joyce.lan>
From: "John Levine" <johnl@iecc.com>
To: dnsext@ietf.org
In-Reply-To: <8EFC868A-8796-4013-BB07-F3D33F33C552@network-heretics.com>
Organization: 
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 7bit
Cc: moore@network-heretics.com
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 15:50:25 -0000

>I don't see why IETF should give a flying *#&(*#$ what the owners of
>brand-name gTLDs want.   Brand-name gTLDs are an exceedingly stupid idea, and
>treating single label names as anything other than local abbreviations flies
>in the face of 25+ years of practice.   

For once, I entirely agree with Keith.  There is no reason for anyone else
to help ICANN sell overpriced vanity TLDs, which are of no value to anyone
other than perhaps the large corporations who want to load them up with yet
more "brand management" junk.

Single component domain names have worked badly for decades (try
http://ws./ and http://ai./) and there's no reason to change that now.

R's,
John

From Ted.Lemon@nominum.com  Wed Oct 19 09:06:46 2011
Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 03B7A21F8C4E; Wed, 19 Oct 2011 09:06:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.722
X-Spam-Level: 
X-Spam-Status: No, score=-105.722 tagged_above=-999 required=5 tests=[AWL=-0.876, BAYES_00=-2.599, MIME_BASE64_TEXT=1.753, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f927hEfWBLbG; Wed, 19 Oct 2011 09:06:45 -0700 (PDT)
Received: from exprod7og102.obsmtp.com (exprod7og102.obsmtp.com [64.18.2.157]) by ietfa.amsl.com (Postfix) with ESMTP id 5883621F8C4C; Wed, 19 Oct 2011 09:06:44 -0700 (PDT)
Received: from shell-too.nominum.com ([64.89.228.229]) (using TLSv1) by exprod7ob102.postini.com ([64.18.6.12]) with SMTP;  Wed, 19 Oct 2011 09:06:44 PDT
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id 561EF1B8319; Wed, 19 Oct 2011 09:06:43 -0700 (PDT)
Received: from webmail.nominum.com (cas-02.win.nominum.com [64.89.228.132]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTPS id 47918190065; Wed, 19 Oct 2011 09:06:43 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from MBX-01.WIN.NOMINUM.COM ([64.89.228.133]) by CAS-02.WIN.NOMINUM.COM ([64.89.228.132]) with mapi id 14.01.0323.003; Wed, 19 Oct 2011 09:06:43 -0700
From: Ted Lemon <Ted.Lemon@nominum.com>
To: "<teemu.savolainen@nokia.com> " <teemu.savolainen@nokia.com>
Thread-Topic: [dhcwg] [mif] 2nd Last Call for MIF DNS server selection document
Thread-Index: AQHMjipiaz0g2rqs70G2ngGlfgipv5WESzGA
Date: Wed, 19 Oct 2011 16:06:42 +0000
Message-ID: <8B37A60F-0C55-4543-9ADB-2BA5A659B212@nominum.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com>
In-Reply-To: <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.1.10]
Content-Type: text/plain; charset="gb2312"
Content-ID: <528A81F214D8144FAB5EFE644EC273C3@nominum.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: "<mif@ietf.org>" <mif@ietf.org>, "dnsop@ietf.org WG" <dnsop@ietf.org>, dnsext List <dnsext@ietf.org>, "pk@isoc.de" <pk@isoc.de>, DHC WG <dhcwg@ietf.org>, Hui Deng <denghui02@hotmail.com>
Subject: Re: [dnsext] [dhcwg] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 16:06:46 -0000
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From mrw@lilacglade.org  Wed Oct 19 09:07:28 2011
Return-Path: <mrw@lilacglade.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9843E21F8CBD; Wed, 19 Oct 2011 09:07:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.265
X-Spam-Level: 
X-Spam-Status: No, score=-102.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2Z9YmLp0vtl4; Wed, 19 Oct 2011 09:07:28 -0700 (PDT)
Received: from mail.suchdamage.org (permutation-city.suchdamage.org [69.25.196.28]) by ietfa.amsl.com (Postfix) with ESMTP id 1B52121F8CA0; Wed, 19 Oct 2011 09:07:28 -0700 (PDT)
Received: from [10.36.0.36] (pool-108-7-232-64.bstnma.fios.verizon.net [108.7.232.64]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (Client did not present a certificate) by mail.suchdamage.org (Postfix) with ESMTPSA id 077DF20188; Wed, 19 Oct 2011 12:08:41 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Margaret Wasserman <mrw@lilacglade.org>
In-Reply-To: <79350865-2ED5-4B12-BA36-B53550CB01F7@network-heretics.com>
Date: Wed, 19 Oct 2011 12:07:27 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <70C7ABD5-DF78-4F35-89DE-152EB1D21954@lilacglade.org>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <8EFC868A-8796-4013-BB07-F3D33F33C552@network-heretics.com> <20111019132633.GB18523@shinkuro.com> <79350865-2ED5-4B12-BA36-B53550CB01F7@network-heretics.com>
To: Keith Moore <moore@network-heretics.com>
X-Mailer: Apple Mail (2.1084)
X-Mailman-Approved-At: Wed, 19 Oct 2011 09:13:44 -0700
Cc: dhcwg@ietf.org, dnsop@ietf.org, mif@ietf.org, dnsext@ietf.org
Subject: Re: [dnsext] [mif] bare names (was: 2nd Last Call for MIF DNS server selection	document)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 16:07:28 -0000

Hi Keith,

On Oct 19, 2011, at 9:48 AM, Keith Moore wrote:
> split-brain DNS is an abomination that should be eradicated from the =
planet.

Split DNS exists and is in wide-spread use, and that is just a fact.  We =
don't have the power to eradicate it, nor do we currently have a better =
solution for the types of things that people use split DNS for.

Margaret


From suruti94@gmail.com  Wed Oct 19 10:27:36 2011
Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A59FD21F8B46 for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 10:27:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L3uxzCnPSRrb for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 10:27:36 -0700 (PDT)
Received: from mail-qw0-f44.google.com (mail-qw0-f44.google.com [209.85.216.44]) by ietfa.amsl.com (Postfix) with ESMTP id 0D1FF11E80CA for <dnsext@ietf.org>; Wed, 19 Oct 2011 10:27:35 -0700 (PDT)
Received: by qadb12 with SMTP id b12so1905077qad.31 for <dnsext@ietf.org>; Wed, 19 Oct 2011 10:27:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=wjQ8ROrXfS0h/GY7P1fzjJPgpPunG/JK0kdCTjY3xXc=; b=PCGj0L4ftln7wyZ9lJaJzqpUZEXu3JdxDKiPNEllUagydnx0YHdb4DButMsRf+6s6x 9q14TfPopT/CkvXGaDBS4jP7X1e0DfHedB7YNc64F3njGgyv/T+lwyhkM0Z7X7nt9spt adkEMI5vzvCN/i/G60gSQ9NV3nKBEkyx9kcPI=
MIME-Version: 1.0
Received: by 10.182.124.10 with SMTP id me10mr1159952obb.40.1319045247241; Wed, 19 Oct 2011 10:27:27 -0700 (PDT)
Received: by 10.182.75.9 with HTTP; Wed, 19 Oct 2011 10:27:27 -0700 (PDT)
In-Reply-To: <20111018041833.GN7743@shinkuro.com>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <20111018041833.GN7743@shinkuro.com>
Date: Wed, 19 Oct 2011 10:27:27 -0700
Message-ID: <CACU5sDnNvLXPOU0fPBUs8sCRvRnMG1bjuV3-xxcv=Uq7mgoVXw@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Andrew Sullivan <ajs@anvilwalrusden.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 17:27:36 -0000

Andrew,

On Mon, Oct 17, 2011 at 9:18 PM, Andrew Sullivan <ajs@anvilwalrusden.com> w=
rote:
> Dear colleagues,
>
> On Tue, Oct 18, 2011 at 01:52:57PM +1100, Mark Andrews wrote:
>>
>> CD=3D1 has stateless retries.
>> CD=3D0 has stateful retries.
>
> Because I have a feeble (not to say febrile) brain, I fail to
> understand the argument implicit above. =A0As near as I can tell, Mark

The discussion that followed this somehow did not answer the specific
question that was raised above. I thought that there was a separate
thread for discussing Mark's proposal out of which this one came
about. My interpretation of the question is a little different. Can
you clarify ?

At least in my mind, the above question was :

What should a recursive server do when it is not able to validate a
response due to the mis-configuration of the authoritative servers ?
Should it retry multiple authoritative servers based on whether the CD
bit is set in the query or not ?

There were two possibilities:

1) What Mark said above: CD =3D1 implies stateless i.e.,  If the
recursive server encounters a mis-configured server and hence cannot
validate the response, it would return the response if CD=3D1 was set in
the query. If CD=3D0, it would try multiple servers and finally validate
the response successfully if there is at least one "good" server.

2) The recursive server always tries multiple authoritative servers
irrespective of the CD bit setting in the query. The DNSSEC bis
updates has the "Always set CD bit policy" which means the recursive
server always sets the CD bit irrespective of what is set in the
incoming query. To make sure that it's cache does not become a DoS
source, it would always try multiple authoritative servers.

Currently this behavior is not defined anywhere in RFC 4035.

-mohan




> is arguing from the position that a particular implementation choice
> is what the protocol demands. =A0I'm not seeing this demand -- neither
> in the original RFCs nor in the existing dnssec-bis-updates draft; but
> I'm fully prepared to admit that I'm missing something, since I'm
> usually missing something.
>
> As co-chair, I hereby ask others to weigh in on this discussion if
> they have a view. =A0If I don't hear anything from others than those who
> have participated, I will take that (as shepherd of
> dnssec-bis-updates) to be evidence that people do not think the
> proposed additions to the dnssec-bis-updates draft should be added,
> and will direct the editors of that draft to ignore this discussion
> for their purposes.
>
> Best,
>
> A
>
> --
> Andrew Sullivan
> ajs@anvilwalrusden.com
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>

From teemu.savolainen@nokia.com  Wed Oct 19 10:58:59 2011
Return-Path: <teemu.savolainen@nokia.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A95B311E808A; Wed, 19 Oct 2011 10:58:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.603
X-Spam-Level: 
X-Spam-Status: No, score=-2.603 tagged_above=-999 required=5 tests=[AWL=-0.004, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m1eaLz0w0hve; Wed, 19 Oct 2011 10:58:59 -0700 (PDT)
Received: from mgw-sa01.nokia.com (smtp.nokia.com [147.243.1.47]) by ietfa.amsl.com (Postfix) with ESMTP id B9D4B21F8C69; Wed, 19 Oct 2011 10:58:58 -0700 (PDT)
Received: from vaebh104.NOE.Nokia.com (vaebh104.europe.nokia.com [10.160.244.30]) by mgw-sa01.nokia.com (Switch-3.4.4/Switch-3.4.3) with ESMTP id p9JHwV1b005940; Wed, 19 Oct 2011 20:58:55 +0300
Received: from smtp.mgd.nokia.com ([65.54.30.8]) by vaebh104.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675);  Wed, 19 Oct 2011 20:58:40 +0300
Received: from 008-AM1MMR1-004.mgdnok.nokia.com (65.54.30.59) by NOK-AM1MHUB-04.mgdnok.nokia.com (65.54.30.8) with Microsoft SMTP Server (TLS) id 8.2.255.0; Wed, 19 Oct 2011 19:58:40 +0200
Received: from 008-AM1MPN1-037.mgdnok.nokia.com ([169.254.7.8]) by 008-AM1MMR1-004.mgdnok.nokia.com ([65.54.30.59]) with mapi id 14.01.0339.002; Wed, 19 Oct 2011 19:58:39 +0200
From: <teemu.savolainen@nokia.com>
To: <Ted.Lemon@nominum.com>
Thread-Topic: [dhcwg] [mif] 2nd Last Call for MIF DNS server selection document
Thread-Index: AQHMjnkxnryNBBR3OkaQECaRsTmFHJWD8JIg
Date: Wed, 19 Oct 2011 17:58:39 +0000
Message-ID: <916CE6CF87173740BC8A2CE4430969620378363C@008-AM1MPN1-037.mgdnok.nokia.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <8B37A60F-0C55-4543-9ADB-2BA5A659B212@nominum.com>
In-Reply-To: <8B37A60F-0C55-4543-9ADB-2BA5A659B212@nominum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-tituslabs-classifications-30: TLPropertyRoot=Nokia;Confidentiality=Company Confidential;Project=None;
x-titus-version: 3.3.8.1
x-headerinfofordlp: None
x-tituslabs-classificationhash-30: VgNFIFU9Hx+/nZJb9Kg7IvIhRytp+v9DPNmP/PIMrEEivHvrY5HV8ew2GaKnuV0phiGjieXUeaEr+yWBsV/pAsnh9Djy2SNxS7msksx6Z/OfCHRgEKpVgcONay+XxEo47aGlgukvaxzNwzA5o/3oGr9YnD+Nx0L9julOW/aDgk0kRd8q5+uGxXPDniEItQeQ733va8gB28zcacTy+Qv0p7MLPMeWb08YY03IqTg6hyvhN84V9KfPuJSEirxMClXnvaRX3+lusqXxPZI8ft7LsmccsCMBn7YMpmJQLMRmzFM=
x-originating-ip: [10.162.93.230]
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_02C9_01CC8EA1.DFA5DDD0"
MIME-Version: 1.0
X-OriginalArrivalTime: 19 Oct 2011 17:58:40.0501 (UTC) FILETIME=[BBD6BA50:01CC8E88]
X-Nokia-AV: Clean
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, dhcwg@ietf.org, denghui02@hotmail.com
Subject: Re: [dnsext] [dhcwg] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 17:58:59 -0000

------=_NextPart_000_02C9_01CC8EA1.DFA5DDD0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Ted, thank you for comments. 

Please feel free to propose text - I love constructive text proposals:-)
During following week would be nice, if possible, so that we can move
forward with the draft before the next IETF.

Now that you say it, we might state that not any VPN can be trusted by
default (but VPN is an example here), but e.g. a VPN Configuration Profile
could enable the setting for that particular VPN connection. If the trusted
VPN then **cks you up, then, well, trusted parties sometimes do that..

Best regards,

	Teemu

> -----Original Message-----
> From: ext Ted Lemon [mailto:Ted.Lemon@nominum.com]
> Sent: 19. lokakuuta 2011 19:07
> To: Savolainen Teemu (Nokia-CTO/Tampere)
> Cc: Hui Deng; <mif@ietf.org>; dnsext List; dnsop@ietf.org WG; DHC WG;
> sa.morris7@googlemail.com; pk@isoc.de
> Subject: Re: [dhcwg] [mif] 2nd Last Call for MIF DNS server selection
> document
> 
> The DHCP changes look good.  You can get multiple selection tuples in
> DHCPv4 if you want, but you seem to have decided its not important, which
> is fine by me.   Let me know if you want me to explain how to do that.
> 
> However, I reread the text on server selection, and it still has a serious
and
> easily exploited security flaw.   In order for DNSSEC validation to save
you
> from an attack, it has to be the case that you look the name up on every
> possible name server to see if any claim it's in a signed zone.   If one
does, it
> has to be validated.   Right now it looks like if the "trusted" server
doesn't
> sign the zone, the DNSSEC validation will never happen.   We dealt with
this
> by trusting some networks more than others, and that eliminates a lot of
the
> risk.
> 
> For example, in the case of a hotel net we're okay, because it will be
less
> trusted than the 3G network.   The case I am most concerned with is when
> you VPN to a site that is not trusted: the default behavior will be to
prefer
> the VPN link, because we presume it is more trustworthy.  A consultant who
> VPNs to multiple corporate sites could be spoofed here though, as could a
> user of a firewall bypass VPN.
> 
> Unfortunately, I don't know of a way to fix this that doesn't fire up both
> radios for every query.   Leaving this off by default is probably the best
we
> can do, but it might be good to add more text to the security
considerations
> section describing specific exploit scenarios.   The text in 10.1 and 10.2
> doesn't address this particular attack vector.
> 
> I would propose adding a requirement that there be a mode, off by default,
> enabled by UI, in which the resolver just fires up both radios, battery be
> damned, but I am not sure anyone would use it, because it would be
difficult
> to explain why and when they should.
> 
> So practically speaking, I am just proposing a tweak to the security
> considerations.   I will send text if you don't object.   Sorry for the
late
> review.

------=_NextPart_000_02C9_01CC8EA1.DFA5DDD0
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_02C9_01CC8EA1.DFA5DDD0--

From Ed.Lewis@neustar.biz  Wed Oct 19 11:02:54 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E6051F0C5B for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 11:02:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.339
X-Spam-Level: 
X-Spam-Status: No, score=-106.339 tagged_above=-999 required=5 tests=[AWL=0.260, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KQ9f28R0TzIy for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 11:02:53 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 1676A1F0C54 for <dnsext@ietf.org>; Wed, 19 Oct 2011 11:02:47 -0700 (PDT)
Received: from Work-Laptop-2.local (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p9JI2iwW003639; Wed, 19 Oct 2011 14:02:45 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [10.31.204.5] by Work-Laptop-2.local (PGP Universal service); Wed, 19 Oct 2011 14:02:46 -0400
X-PGP-Universal: processed; by Work-Laptop-2.local on Wed, 19 Oct 2011 14:02:46 -0400
Mime-Version: 1.0
Message-Id: <a06240800cac4bb837fb6@[10.31.204.5]>
In-Reply-To: <CACU5sDnNvLXPOU0fPBUs8sCRvRnMG1bjuV3-xxcv=Uq7mgoVXw@mail.gmail.com>
References: <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <CACU5sDkH83QFu4x+E2Hky4-0sG9H5vu09pRtsBbKip0OfaLTsQ@mail.gmail.com> <20111018025257.9B41A157C571@drugs.dv.isc.org> <20111018041833.GN7743@shinkuro.com> <CACU5sDnNvLXPOU0fPBUs8sCRvRnMG1bjuV3-xxcv=Uq7mgoVXw@mail.gmail.com>
Date: Wed, 19 Oct 2011 14:02:32 -0400
To: <dnsext@ietf.org>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.72 on 10.20.30.4
Cc: ed.lewis@neustar.biz
Subject: Re: [dnsext] Other views request from chair (was : Why are we re-opening. . .)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 18:02:54 -0000

At 10:27 -0700 10/19/11, Mohan Parthasarathy wrote:

>At least in my mind, the above question was :
>
>What should a recursive server do when it is not able to validate a
>response due to the mis-configuration of the authoritative servers ?
>Should it retry multiple authoritative servers based on whether the CD
>bit is set in the query or not ?

I start with this kind of question, because DNSSEC is not supposed to 
change the nature of DNS:

What happens today, i.e., without DNSSEC, when a recursive server 
reaches a "broken" authoritative server?

Answer: It tries others.  (I'll avoid using the word mis-configured 
here because that's open to too many interpretations.)

Ok, the situation here is different.  In pre-DNSSEC, it was "did I 
get an answer" and in DNSSEC it is "is the answer good enough."  Good 
enough is what, exactly?  What if the first source has a response 
that is syntactically valid but won't validate and the second source 
does.  With CD=1, should the recursor go to the second one?

My thought is - the decision is a matter of local policy.  It's not 
vital to interoperability although the choices lead to different 
results.

>
>There were two possibilities:
>
>1) ...
>2) ...
>Currently this behavior is not defined anywhere in RFC 4035.

That's true and the situation wasn't considered.  My assumption was 
that the recursor would just take the first source and hand that 
back.  If I were writing the prototype code again I would have then 
tried to validate, failed, and cached the failure.  I probably 
eventually would have followed that up with a look at the second 
source, validated the answer, cached that and dumped the 
failed-validation cache.  If the requestor came back again with CD=1, 
I'd answer from cache even though I already did the check.

The base protocol lacked a "get me a fresh answer" bit.  The CD could 
be thought of as the DNSSEC version of "get me a fresh answer."  But 
I wouldn't go there, the protocol, since the beginning, limits the 
requestor's power to push the server around.

None of this is clear.  It wasn't discussed.  It certainly wasn't 
documented.  We can argue about this all day if we want.  What I have 
here is just my opinion - and one I generated sitting in this chair. 
The WG can try to come to a consensus but a 100 messages saying "yes" 
and "no" isn't constructive.

DNSSEC and DNS never considered the ruggedness of it's elements. 
Recursion can be done lightly, falling to SERVFAIL, or it can try 
hard to get an answer.  That "quality" isn't captured in the protocol 
specifications and I don't think we've seriously tried.

I think, maybe it's an implementation choice.
-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

Vote for the word of the day:
"Papa"razzi - father that constantly takes photos of the baby
Corpureaucracy - The institution of corporate "red tape"

From brian.peter.dickson@gmail.com  Wed Oct 19 11:34:21 2011
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BA9C11E80B2; Wed, 19 Oct 2011 11:34:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.496
X-Spam-Level: 
X-Spam-Status: No, score=-3.496 tagged_above=-999 required=5 tests=[AWL=0.103,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZF0XDnuqAUBL; Wed, 19 Oct 2011 11:34:20 -0700 (PDT)
Received: from mail-bw0-f44.google.com (mail-bw0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id 4514111E80B3; Wed, 19 Oct 2011 11:34:19 -0700 (PDT)
Received: by bkas6 with SMTP id s6so2854607bka.31 for <multiple recipients>; Wed, 19 Oct 2011 11:34:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=09eh2298okK5eqGD2ReXW6CQ0OT/2xe2GF9wWKGpgiA=; b=aGOi0PIsGKCvZ1ljy7ufP9lxs0sdzt7jRVYPqXssZ81PZN2PLVanXoVbG1XXFtECBU hTYZAD9g2SHX3/pATQSCG+NszXA08wXrsbUfD2tkHfdNycoRyFbLe6V//4YwaZfYfxyq 4dZSXkAemadgYB7Kp8jN9AHDOc5QrWo5OvvH4=
MIME-Version: 1.0
Received: by 10.223.63.75 with SMTP id a11mr12752210fai.9.1319049256645; Wed, 19 Oct 2011 11:34:16 -0700 (PDT)
Received: by 10.223.16.78 with HTTP; Wed, 19 Oct 2011 11:34:16 -0700 (PDT)
In-Reply-To: <916CE6CF87173740BC8A2CE4430969620378363C@008-AM1MPN1-037.mgdnok.nokia.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <8B37A60F-0C55-4543-9ADB-2BA5A659B212@nominum.com> <916CE6CF87173740BC8A2CE4430969620378363C@008-AM1MPN1-037.mgdnok.nokia.com>
Date: Wed, 19 Oct 2011 14:34:16 -0400
Message-ID: <CAH1iCipDx4zjb0RsS6T7PfcBbg-4s5HLQoXPo97fHprag5W=Zg@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: teemu.savolainen@nokia.com
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, Ted.Lemon@nominum.com, dhcwg@ietf.org, denghui02@hotmail.com
Subject: Re: [dnsext] [dhcwg] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 18:34:21 -0000

I'm not sure where it would belong, exactly, but certainly between
"best practices" and DNSSEC security concerns, is the basic tenet:

The DNS is a unified namespace.

This leads to a number of potential issues, which can largely be
addressed by viewing the issues from the perspective of a unified
name-space's root. And by providing lots of literal and explicit
examples.

E.g.:
- It is recommended that use of private namespaces be restricted to
subdomains of legitimately-assigned domains by the domain owner
exclusively (e.g. ".private.example.com." and NOT ".private.")
- It is recommended that unofficial namespaces be avoided where
practical to do so (e.g. .local, .fake-domain, .TBD)
- It is recommended that any and all domain names be anchored with a
trailing "." when expressed in text form, regardless of scope
(global/private, bare TLD or otherwise) to remove any possible
ambiguity (e.g. ".example.com.", NOT ".example.com" which might
suggest use of search lists)
- It is recommended that inconsistent or conflicting namespace or
contents be avoided (e.g. split DNS with same labels having different
RVALUEs) (possibly handled by non-anchored names and search lists,
which result in unambigous names upon expansion)
- It is recommended that handling of restricting access to "private"
namespaces be handled in a manner that does not induce look-up
failures if the "wrong" nameserver is consulted first (e.g. ISP/global
before VPN/private, have ".private.example.com." return something
OTHER than NXDOMAIN, e.g. servfail or whatever anyone smarter than me
suggests)
- It is recommended that configured Trust Anchors (for private
namespaces) and "learned" Trust Anchors (KSK or ZSK of securely
delegated zones) be handled in a manner compatible with any usage of
split DNS (so that signature validation is deterministic)
- It is recommended that private namespaces underneath secure global
namespaces be DNSSEC-protected with either a global learned Trust
Anchor, or a configured Trust Anchor
- It is recommended that private namespaces be DNSSEC-protected where
practical to do so

The above is just off the top of my head as possible text that could
be used. Comments on style, content, etc., are more than welcome.

Brian

On Wed, Oct 19, 2011 at 1:58 PM,  <teemu.savolainen@nokia.com> wrote:
> Ted, thank you for comments.
>
> Please feel free to propose text - I love constructive text proposals:-)
> During following week would be nice, if possible, so that we can move
> forward with the draft before the next IETF.
>
> Now that you say it, we might state that not any VPN can be trusted by
> default (but VPN is an example here), but e.g. a VPN Configuration Profil=
e
> could enable the setting for that particular VPN connection. If the trust=
ed
> VPN then **cks you up, then, well, trusted parties sometimes do that..
>
> Best regards,
>
> =A0 =A0 =A0 =A0Teemu
>
>> -----Original Message-----
>> From: ext Ted Lemon [mailto:Ted.Lemon@nominum.com]
>> Sent: 19. lokakuuta 2011 19:07
>> To: Savolainen Teemu (Nokia-CTO/Tampere)
>> Cc: Hui Deng; <mif@ietf.org>; dnsext List; dnsop@ietf.org WG; DHC WG;
>> sa.morris7@googlemail.com; pk@isoc.de
>> Subject: Re: [dhcwg] [mif] 2nd Last Call for MIF DNS server selection
>> document
>>
>> The DHCP changes look good. =A0You can get multiple selection tuples in
>> DHCPv4 if you want, but you seem to have decided its not important, whic=
h
>> is fine by me. =A0 Let me know if you want me to explain how to do that.
>>
>> However, I reread the text on server selection, and it still has a serio=
us
> and
>> easily exploited security flaw. =A0 In order for DNSSEC validation to sa=
ve
> you
>> from an attack, it has to be the case that you look the name up on every
>> possible name server to see if any claim it's in a signed zone. =A0 If o=
ne
> does, it
>> has to be validated. =A0 Right now it looks like if the "trusted" server
> doesn't
>> sign the zone, the DNSSEC validation will never happen. =A0 We dealt wit=
h
> this
>> by trusting some networks more than others, and that eliminates a lot of
> the
>> risk.
>>
>> For example, in the case of a hotel net we're okay, because it will be
> less
>> trusted than the 3G network. =A0 The case I am most concerned with is wh=
en
>> you VPN to a site that is not trusted: the default behavior will be to
> prefer
>> the VPN link, because we presume it is more trustworthy. =A0A consultant=
 who
>> VPNs to multiple corporate sites could be spoofed here though, as could =
a
>> user of a firewall bypass VPN.
>>
>> Unfortunately, I don't know of a way to fix this that doesn't fire up bo=
th
>> radios for every query. =A0 Leaving this off by default is probably the =
best
> we
>> can do, but it might be good to add more text to the security
> considerations
>> section describing specific exploit scenarios. =A0 The text in 10.1 and =
10.2
>> doesn't address this particular attack vector.
>>
>> I would propose adding a requirement that there be a mode, off by defaul=
t,
>> enabled by UI, in which the resolver just fires up both radios, battery =
be
>> damned, but I am not sure anyone would use it, because it would be
> difficult
>> to explain why and when they should.
>>
>> So practically speaking, I am just proposing a tweak to the security
>> considerations. =A0 I will send text if you don't object. =A0 Sorry for =
the
> late
>> review.
>
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>
>

From Ed.Lewis@neustar.biz  Wed Oct 19 11:53:58 2011
Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21EF811E80B1 for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 11:53:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.382
X-Spam-Level: 
X-Spam-Status: No, score=-106.382 tagged_above=-999 required=5 tests=[AWL=0.217, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kdxih9Y08QIU for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 11:53:57 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id 69F7511E80A3 for <dnsext@ietf.org>; Wed, 19 Oct 2011 11:53:57 -0700 (PDT)
Received: from Work-Laptop-2.local (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p9JIrtvi003985; Wed, 19 Oct 2011 14:53:56 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Received: from [10.31.204.5] by Work-Laptop-2.local (PGP Universal service); Wed, 19 Oct 2011 14:53:56 -0400
X-PGP-Universal: processed; by Work-Laptop-2.local on Wed, 19 Oct 2011 14:53:56 -0400
Mime-Version: 1.0
Message-Id: <a06240802cac4cbcf51cb@[10.31.204.5]>
In-Reply-To: <CAH1iCipDx4zjb0RsS6T7PfcBbg-4s5HLQoXPo97fHprag5W=Zg@mail.gmail.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com >	<8B37A60F-0C55-4543-9ADB-2BA5A659B212@nominum.com> <916CE6CF87173740BC8A2CE4430969620378363C@008-AM1MPN1-037.mgdnok.nokia.com > <CAH1iCipDx4zjb0RsS6T7PfcBbg-4s5HLQoXPo97fHprag5W=Zg@mail.gmail.com>
Date: Wed, 19 Oct 2011 14:53:52 -0400
To: <dnsext@ietf.org>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Scanned-By: MIMEDefang 2.72 on 10.20.30.4
Cc: ed.lewis@neustar.biz
Subject: [dnsext] Unified namespaces, was Re: ... 2nd Last Call for MIF
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 18:53:58 -0000

I'll address this to just one mail list.

At 14:34 -0400 10/19/11, Brian Dickson wrote:
>I'm not sure where it would belong, exactly, but certainly between
>"best practices" and DNSSEC security concerns, is the basic tenet:
>
>The DNS is a unified namespace.

I disagree.  This would be like saying all Oracle databases have to 
have a common root schema (or whatever is in a DB) and share a 
similar security model, anchored with a central authority.

The DNS, as a protocol, is just that.

The DNS, as a the system we see rooted in ICANN, is one possible name 
space, just like the Internet is just one inter-network.

Nobody has the right to restrict the use of the DNS protocol (to one 
name space).

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

Vote for the word of the day:
"Papa"razzi - father that constantly takes photos of the baby
Corpureaucracy - The institution of corporate "red tape"

From Ted.Lemon@nominum.com  Wed Oct 19 12:09:01 2011
Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6EDE821F8C7F; Wed, 19 Oct 2011 12:09:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.51
X-Spam-Level: 
X-Spam-Status: No, score=-106.51 tagged_above=-999 required=5 tests=[AWL=0.088, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bkCwLvS9dVXd; Wed, 19 Oct 2011 12:09:00 -0700 (PDT)
Received: from exprod7og101.obsmtp.com (exprod7og101.obsmtp.com [64.18.2.155]) by ietfa.amsl.com (Postfix) with ESMTP id E23CC21F8C7E; Wed, 19 Oct 2011 12:08:59 -0700 (PDT)
Received: from shell-too.nominum.com ([64.89.228.229]) (using TLSv1) by exprod7ob101.postini.com ([64.18.6.12]) with SMTP;  Wed, 19 Oct 2011 12:09:00 PDT
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id 15A031B8315; Wed, 19 Oct 2011 12:08:59 -0700 (PDT)
Received: from webmail.nominum.com (cas-02.win.nominum.com [64.89.228.132]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTPS id 0F458190065; Wed, 19 Oct 2011 12:08:59 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from MBX-01.WIN.NOMINUM.COM ([64.89.228.133]) by CAS-02.WIN.NOMINUM.COM ([64.89.228.132]) with mapi id 14.01.0323.003; Wed, 19 Oct 2011 12:08:59 -0700
From: Ted Lemon <Ted.Lemon@nominum.com>
To: "<teemu.savolainen@nokia.com>  <teemu.savolainen@nokia.com>" <teemu.savolainen@nokia.com>
Thread-Topic: [dhcwg] [mif] 2nd Last Call for MIF DNS server selection document
Thread-Index: AQHMjipiaz0g2rqs70G2ngGlfgipv5WESzGAgAAfSICAABOmAA==
Date: Wed, 19 Oct 2011 19:08:58 +0000
Message-ID: <D773D6AE-500C-407A-B0B5-55A035E8B904@nominum.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <8B37A60F-0C55-4543-9ADB-2BA5A659B212@nominum.com> <916CE6CF87173740BC8A2CE4430969620378363C@008-AM1MPN1-037.mgdnok.nokia.com>
In-Reply-To: <916CE6CF87173740BC8A2CE4430969620378363C@008-AM1MPN1-037.mgdnok.nokia.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.1.10]
Content-Type: multipart/alternative; boundary="_000_D773D6AE500C407AB0B555A035E8B904nominumcom_"
MIME-Version: 1.0
Cc: "<mif@ietf.org>" <mif@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>
Subject: Re: [dnsext] [dhcwg] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 19:09:01 -0000

--_000_D773D6AE500C407AB0B555A035E8B904nominumcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

On Oct 19, 2011, at 1:58 PM, <teemu.savolainen@nokia.com<mailto:teemu.savol=
ainen@nokia.com>>
 <teemu.savolainen@nokia.com<mailto:teemu.savolainen@nokia.com>> wrote:
Now that you say it, we might state that not any VPN can be trusted by
default (but VPN is an example here), but e.g. a VPN Configuration Profile
could enable the setting for that particular VPN connection. If the trusted
VPN then **cks you up, then, well, trusted parties sometimes do that..

I suppose requiring the user to explicitly mark the VPN trusted would help.


--_000_D773D6AE500C407AB0B555A035E8B904nominumcom_
Content-Type: text/html; charset="us-ascii"
Content-ID: <E0854946A59C2146B67F6F51F12380EE@nominum.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
<div>
<div>On Oct 19, 2011, at 1:58 PM, &lt;<a href=3D"mailto:teemu.savolainen@no=
kia.com">teemu.savolainen@nokia.com</a>&gt;</div>
<div>&nbsp;&lt;<a href=3D"mailto:teemu.savolainen@nokia.com">teemu.savolain=
en@nokia.com</a>&gt; wrote:</div>
<blockquote type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-=
collapse: separate; font-family: Helvetica; font-style: normal; font-varian=
t: normal; font-weight: normal; letter-spacing: normal; line-height: normal=
; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: n=
one; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-hori=
zontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-dec=
orations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stro=
ke-width: 0px; font-size: medium; ">Now
 that you say it, we might state that not any VPN can be trusted by<br>
default (but VPN is an example here), but e.g. a VPN Configuration Profile<=
br>
could enable the setting for that particular VPN connection. If the trusted=
<br>
VPN then **cks you up, then, well, trusted parties sometimes do that..</spa=
n></blockquote>
</div>
<br>
<div>I suppose requiring the user to explicitly mark the VPN trusted would =
help.</div>
<div><br>
</div>
</body>
</html>

--_000_D773D6AE500C407AB0B555A035E8B904nominumcom_--

From brian.peter.dickson@gmail.com  Wed Oct 19 12:19:36 2011
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7BCB21F8C06 for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 12:19:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.51
X-Spam-Level: 
X-Spam-Status: No, score=-3.51 tagged_above=-999 required=5 tests=[AWL=0.089,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Sjs+xogWlcMd for <dnsext@ietfa.amsl.com>; Wed, 19 Oct 2011 12:19:36 -0700 (PDT)
Received: from mail-ey0-f172.google.com (mail-ey0-f172.google.com [209.85.215.172]) by ietfa.amsl.com (Postfix) with ESMTP id EDBB921F8BF9 for <dnsext@ietf.org>; Wed, 19 Oct 2011 12:19:35 -0700 (PDT)
Received: by eyg24 with SMTP id 24so2124152eyg.31 for <dnsext@ietf.org>; Wed, 19 Oct 2011 12:19:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=1vGjTHdLbZJUd+XYC0ahb3/drdNBkxrP3HpJ6QapWcE=; b=oDM48KEL56CGtmC5s5jRmTknO3GAZnC44ybBYDD+DpO48xMekMwLC3hQjMKS7/1dsI AD9nIcHVQ0bZmbknzFLcHGD2XNzfkJWM8L+UBMeDQ+y7wMpj5x1Y9SV0LXV6WxmFUIx+ DAx0p2Eo1y9BScFpeBFZPxfxVc/CE5plMcAIQ=
MIME-Version: 1.0
Received: by 10.223.63.75 with SMTP id a11mr12986229fai.9.1319051975046; Wed, 19 Oct 2011 12:19:35 -0700 (PDT)
Received: by 10.223.16.78 with HTTP; Wed, 19 Oct 2011 12:19:34 -0700 (PDT)
In-Reply-To: <a06240802cac4cbcf51cb@10.31.204.5>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <8B37A60F-0C55-4543-9ADB-2BA5A659B212@nominum.com> <CAH1iCipDx4zjb0RsS6T7PfcBbg-4s5HLQoXPo97fHprag5W=Zg@mail.gmail.com> <a06240802cac4cbcf51cb@10.31.204.5>
Date: Wed, 19 Oct 2011 15:19:34 -0400
Message-ID: <CAH1iCirKZpvLp6pH2k7ghWKojR3ycfsdtoi+o3363SsHaYGvag@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Unified namespaces, was Re: ... 2nd Last Call for MIF
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 19:19:36 -0000

On Wed, Oct 19, 2011 at 2:53 PM, Edward Lewis <Ed.Lewis@neustar.biz> wrote:
> I'll address this to just one mail list.
>
> At 14:34 -0400 10/19/11, Brian Dickson wrote:
>>
>> I'm not sure where it would belong, exactly, but certainly between
>> "best practices" and DNSSEC security concerns, is the basic tenet:
>>
>> The DNS is a unified namespace.
>
> I disagree. =A0This would be like saying all Oracle databases have to hav=
e a
> common root schema (or whatever is in a DB) and share a similar security
> model, anchored with a central authority.
>
> The DNS, as a protocol, is just that.
>
> The DNS, as a the system we see rooted in ICANN, is one possible name spa=
ce,
> just like the Internet is just one inter-network.
>
> Nobody has the right to restrict the use of the DNS protocol (to one name
> space).

Okay, while technically correct, and to clarify, yes, the DNS protocol
expects to operate over a contiguous topology with a unified
namespace.

The MIF stuff deals with combinations of "private namespace", and "the
public DNS", the latter being the ICANN-rooted one.

My point being, that concerns over stability, security, consistency,
lead to recommendations when MIF-type usage involves the public DNS.

BTW - I think there is an opportunity to "help fix" a pervasive
problem seen at the root servers (of the ICANN-rooted public DNS).

What if, in addition to the names themselves, there was a "flag"
saying "this name is private-only, don't try querying the root"?
If such a flag were added to those nameserver/name combos served in
the proposed standard via DHCP options, this wold have the benefit of
reducing the load of "bad" queries (to which a valid answer will never
be seen), on the root servers.

Thoughts?

Brian

From marka@isc.org  Wed Oct 19 17:06:25 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 700B221F87D3; Wed, 19 Oct 2011 17:06:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.578
X-Spam-Level: 
X-Spam-Status: No, score=-2.578 tagged_above=-999 required=5 tests=[AWL=0.021,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ha1k4BVJkVTB; Wed, 19 Oct 2011 17:06:25 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id CFC8F21F87C9; Wed, 19 Oct 2011 17:06:24 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id C61E45F98E7; Thu, 20 Oct 2011 00:06:09 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 805CE216C6A; Thu, 20 Oct 2011 00:06:07 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id B961B159AF2F; Thu, 20 Oct 2011 11:06:05 +1100 (EST)
To: Margaret Wasserman <mrw@lilacglade.org>
From: Mark Andrews <marka@isc.org>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <8EFC868A-8796-4013-BB07-F3D33F33C552@network-heretics.com> <20111019132633.GB18523@shinkuro.com> <79350865-2ED5-4B12-BA36-B53550CB01F7@network-heretics.com> <70C7ABD5-DF78-4F35-89DE-152EB1D21954@lilacglade.org>
In-reply-to: Your message of "Wed, 19 Oct 2011 12:07:27 EDT." <70C7ABD5-DF78-4F35-89DE-152EB1D21954@lilacglade.org>
Date: Thu, 20 Oct 2011 11:06:05 +1100
Message-Id: <20111020000605.B961B159AF2F@drugs.dv.isc.org>
Cc: dhcwg@ietf.org, dnsop@ietf.org, mif@ietf.org, Keith Moore <moore@network-heretics.com>, dnsext@ietf.org
Subject: Re: [dnsext] [mif] bare names (was: 2nd Last Call for MIF DNS server selection document)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Oct 2011 00:06:25 -0000

In message <70C7ABD5-DF78-4F35-89DE-152EB1D21954@lilacglade.org>, Margaret Wass
erman writes:
> 
> Hi Keith,
> 
> On Oct 19, 2011, at 9:48 AM, Keith Moore wrote:
> > split-brain DNS is an abomination that should be eradicated from the planet
> .
> 
> Split DNS exists and is in wide-spread use, and that is just a fact.  We don'
> t have the power to eradicate it, nor do we currently have a better solution 
> for the types of things that people use split DNS for.
> 
> Margaret

That said there is little technical need for split brain with IPv6
only networks.  IPv4 networks and RFC 1918 addresses created a
technical problem (ambigious address use) that split brain DNS
addresses.

Publishing ULA addresses on the public internet shouldn't cause
problem.  One could even publish link local addresses on the public
internet if we added a globally unique differentiator for the link
to the records.

e.g.
	AAAA <domain> 

The domain would announced in RAs so that nodes on the link could
correctly filter the responses.  It would also allow getaddrinfo
to fill in scope.

8 byte address records would have solved the RFC 1918 address issue.
First 4 bytes are the A records and the next 4 are the public address
of the NAT or 0.0.0.0.  Resolvers would just filter out anything
that wasn't to 0.0.0.0 or their public NAT address.  One could have
even used them to route throuh the NAT using LSR.

> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From teemu.savolainen@nokia.com  Thu Oct 20 00:01:37 2011
Return-Path: <teemu.savolainen@nokia.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1135121F85A1; Thu, 20 Oct 2011 00:01:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.578
X-Spam-Level: 
X-Spam-Status: No, score=-2.578 tagged_above=-999 required=5 tests=[AWL=0.021,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4+0TEhUqtys6; Thu, 20 Oct 2011 00:01:36 -0700 (PDT)
Received: from mgw-sa01.nokia.com (smtp.nokia.com [147.243.1.47]) by ietfa.amsl.com (Postfix) with ESMTP id 3320621F8593; Thu, 20 Oct 2011 00:01:35 -0700 (PDT)
Received: from vaebh105.NOE.Nokia.com (vaebh105.europe.nokia.com [10.160.244.31]) by mgw-sa01.nokia.com (Switch-3.4.4/Switch-3.4.3) with ESMTP id p9K71K4Z007935; Thu, 20 Oct 2011 10:01:29 +0300
Received: from smtp.mgd.nokia.com ([65.54.30.6]) by vaebh105.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675);  Thu, 20 Oct 2011 10:01:20 +0300
Received: from 008-AM1MMR1-002.mgdnok.nokia.com (65.54.30.57) by NOK-am1MHUB-02.mgdnok.nokia.com (65.54.30.6) with Microsoft SMTP Server (TLS) id 8.2.255.0; Thu, 20 Oct 2011 09:01:18 +0200
Received: from 008-AM1MPN1-037.mgdnok.nokia.com ([169.254.7.8]) by 008-AM1MMR1-002.mgdnok.nokia.com ([65.54.30.57]) with mapi id 14.01.0339.002; Thu, 20 Oct 2011 09:01:18 +0200
From: <teemu.savolainen@nokia.com>
To: <Ray.Bellis@nominet.org.uk>
Thread-Topic: [dnsext] [mif] 2nd Last Call for MIF DNS server selection document
Thread-Index: AQHMjlOod32iNq3Hr0aVNz752afFi5WEy7FQ
Date: Thu, 20 Oct 2011 07:01:17 +0000
Message-ID: <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk>
In-Reply-To: <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-tituslabs-classifications-30: TLPropertyRoot=Nokia;Confidentiality=Company Confidential;Project=None;
x-titus-version: 3.3.8.1
x-headerinfofordlp: None
x-tituslabs-classificationhash-30: VgNFIFU9Hx+/nZJb9Kg7IvQmQ0o/K2jquxqC2Uue5GHpzEuo3S9zNfeh3beuXC4d4U+9SoG2zegA7qMLdX6PTG17IL7pxR5S/KY/iCJNnn1c5UqLju8bmTWbhVRC5KYyRvx6Lux+omb+cjLr4ZT4xGr6EYlMoJAb4mKk7Ygo2IOCLEfvotq8eZrg90l9H1dML3IGXW5CR0VaroyKyJb6YmetiFAenF/tDgR293RVPdnMoKPAurwSeBTTqO8uNr6TcXVEvm613p4YTVwzPTjUYrSShwM2n81B2EdPx398YIM=
x-originating-ip: [10.162.69.25]
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_000B_01CC8F0F.35163130"
MIME-Version: 1.0
X-OriginalArrivalTime: 20 Oct 2011 07:01:20.0574 (UTC) FILETIME=[123935E0:01CC8EF6]
X-Nokia-AV: Clean
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, john_brzozowski@cable.comcast.com, dhcwg@ietf.org, denghui02@hotmail.com
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Oct 2011 07:01:37 -0000

------=_NextPart_000_000B_01CC8F0F.35163130
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Ray,

> -----Original Message-----
> From: ext Ray Bellis [mailto:Ray.Bellis@nominet.org.uk]
> Sent: 19. lokakuuta 2011 13:40
> To: Savolainen Teemu (Nokia-CTO/Tampere)
> Cc: <denghui02@hotmail.com>; <mif@ietf.org>; <dnsext@ietf.org>;
> <dnsop@ietf.org>; <dhcwg@ietf.org>; <pk@isoc.de>;
> <john_brzozowski@cable.comcast.com>
> Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection
> document
>=20
> I have concerns about =A74.6:
>=20
> "A bare name (a name without any dots) MUST be first treated as a pre-
DNS
> hostname, and only after that the name SHALL be appended with  domain
> information and described DNS server selection logic be  utilized."
>=20
> When new gTLDs are introduced it is likely for brand-name gTLDs that =
they
> will wish to use bare names in the DNS (i.e. a single label hostname) =
for
their
> primary web sites.
>=20
> Hence bare names may become much more frequently used as DNS names,
> and =A74.6 wouldn't permit those to work unless '.' is also in the =
suffix
list.
>
> I'd like to hear the authors' thoughts on these.  I'm not sure that =
this
draft
> necessarily needs any significant changes - it may only require =
changes to
> ensure that bare names are also considered as potential DNS names in =
their
> own right.

Okay, I understand there is no clear consensus yet how these single =
label
names should be handled by the resolvers at the first place? Should =
resolver
first treat them as pre-DNS hostnames, then as DNS hostnames, and then =
try
search list? The DNS server selection logic would be applied already =
when
resolving single label name, i.e. the network could provide a single =
label
domain "brand" in the domains list.

Maybe section 4.6 could be like this, perhaps (changes in second =
paragraph
and title)?
--
4.6.  Interactions with DNS search lists and single label hostnames

   A node may be configured with DNS search list by DHCPv6
   OPTION_DOMAIN_LIST [RFC3646] or DHCPv4 Domain Search Option
   [RFC3397].

   A bare name (a name without any dots) MUST be first treated as a pre-
   DNS hostname, after which resolution of the name SHALL be attempted
   with DNS, and as a last resort the name SHALL be appended with
   domain information. DNS server selection logic SHALL be=20
   utilized for both of the latter two DNS using methods.

   Resolution for the name containing any dots SHOULD first be attempted
   with DNS servers of all interfaces.  Only if the resolution fails the
   node SHOULD append the name with search list domain(s) and then again
   utilize improved DNS server selection algorithm to decide which DNS
   server(s) to contact.
--

Best regards,

	Teemu


------=_NextPart_000_000B_01CC8F0F.35163130
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_000B_01CC8F0F.35163130--

From sm@resistor.net  Thu Oct 20 01:22:20 2011
Return-Path: <sm@resistor.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2717021F8B23; Thu, 20 Oct 2011 01:22:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.418
X-Spam-Level: 
X-Spam-Status: No, score=-102.418 tagged_above=-999 required=5 tests=[AWL=0.181, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UI5RY41Z1ijk; Thu, 20 Oct 2011 01:22:17 -0700 (PDT)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id C69F421F8B25; Thu, 20 Oct 2011 01:22:17 -0700 (PDT)
Received: from SUBMAN.resistor.net (IDENT:sm@localhost [127.0.0.1]) by mx.elandsys.com (8.14.4/8.14.5) with ESMTP id p9K8M9SL023882; Thu, 20 Oct 2011 01:22:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1319098935; bh=N3Dmm0lWJa/6t0ZCU0mtRthZuL/xuzuCCgy/aU4giNQ=; h=Message-Id:Date:To:From:Subject:Cc:In-Reply-To:References: Mime-Version:Content-Type; b=cx/COIgK9lBuxWjV5XuWHWlxxnPbqSrYUVIF+pMj4MBkjWiYhe1GPFUzydELeuvSb 32X+xmJj4Z+IgQUKUbNMSYM7pOSWVrnLdOwksl2+B+RxYqNIOiPWGWVcF2pgkrRCKE cvUF9gEK4giQNYNAJGBLtWp4ZEkQJFfB+knDAa7g=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=resistor.net; s=mail; t=1319098935; bh=N3Dmm0lWJa/6t0ZCU0mtRthZuL/xuzuCCgy/aU4giNQ=; h=Message-Id:Date:To:From:Subject:Cc:In-Reply-To:References: Mime-Version:Content-Type; b=YIbV39CPRK/5uGvGipxguGj3vPhgOpwVgZNNvgNgKp5cZlOvGhw6QfFFIU4UiAldK iD3ov+2hbJsPb7DXBFqPgdqloKg/5hGuhMQ8OTKOMAdyD6IM/hNu5MEGl4E1hso2zb P+LC0cIqDZ8SLOZq5lx0BIx52brlBSawnDpjkbwU=
Message-Id: <6.2.5.6.2.20111020004109.09649270@resistor.net>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Thu, 20 Oct 2011 01:21:28 -0700
To: teemu.savolainen@nokia.com
From: SM <sm@resistor.net>
In-Reply-To: <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.m gdnok.nokia.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Cc: mif@ietf.org, dnsext@ietf.org
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Oct 2011 08:22:20 -0000

Hi Teemu,

[message trimmed to MIF and DNSEXT]

At 00:01 20-10-2011, teemu.savolainen@nokia.com wrote:
>Okay, I understand there is no clear consensus yet how these single label
>names should be handled by the resolvers at the first place? Should resolver

Section 4.6 discusses about domain search lists.  It's not DNS search 
lists.  From RFC 3646 (it's not a normative reference in the draft):

  "Resolve a name containing no dots by appending with the searchlist
   right away, but once again, no implicit searchlists should be
   used."

>first treat them as pre-DNS hostnames, then as DNS hostnames, and then try

What's pre-DNS hostnames?

>search list? The DNS server selection logic would be applied already when
>resolving single label name, i.e. the network could provide a single label
>domain "brand" in the domains list.

Do you want to make domain "brands" your problem?

 From Section 7:

   "Private namespaces MUST be globally unique in order to keep DNS
    unambiguous and henceforth avoiding caching related issues and
    destination selection problems (see Section 2.3).  Exceptions to this
    rule are domains utilized for local name resolution (such as .local)."

How can the requirement for global uniqueness of anmespace be met?  I 
found a discussion of a unique name space in RFC 2826 but it is only 
for the public name space.  As there is an exception to the 
requirement, it is no longer a MUST.

Regards,
-sm 


From moore@network-heretics.com  Thu Oct 20 18:08:11 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A74E911E8099; Thu, 20 Oct 2011 18:08:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.807
X-Spam-Level: 
X-Spam-Status: No, score=-3.807 tagged_above=-999 required=5 tests=[AWL=-0.208, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sAAg6U9lEK09; Thu, 20 Oct 2011 18:08:10 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id B0DC811E8091; Thu, 20 Oct 2011 18:08:10 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.mail.srv.osa [10.202.2.43]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id CD42F21172; Thu, 20 Oct 2011 21:08:09 -0400 (EDT)
Received: from frontend2.nyi.mail.srv.osa ([10.202.2.161]) by compute3.internal (MEProxy); Thu, 20 Oct 2011 21:08:09 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=qHOj5RVNbeLDBZ3kqQ9hlPRTsH8=; b=nx nXShspT+8/SvrDB8r/9XbhQAzGq0Y1VDp6pdUPzAptbhklkFQeg1AN3F/BlJpCG6 FKBQ7DfHYiWKySxY/r/EIHHdfeJ/SWHrYBNnZJBvmcY2AGRdz+C/2bQV4G/SMGQZ 5l9mqRGunAXTbg6+eC+9SFtGxtCC4QyGDNYPbOqbw=
X-Sasl-enc: oPXSpLq6gHGfeqDCFDuJw/Y+OPTvaTI+76jYhQAU+cxB 1319159289
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id B0A5F4833E7; Thu, 20 Oct 2011 21:08:07 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=iso-8859-1
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <4EA09791.8010705@gmail.com>
Date: Thu, 20 Oct 2011 21:07:41 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl>	<916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com>	<121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
X-Mailer: Apple Mail (2.1084)
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, john_brzozowski@cable.comcast.com, dhcwg@ietf.org, denghui02@hotmail.com
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server	selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 01:08:11 -0000

It might that IETF should consider "bare names" out of its scope, except =
perhaps to say that they're not DNS names, they don't have to =
necessarily be mappable to DNS names, and that their use and behavior is =
host and application-dependent.

Keith

On Oct 20, 2011, at 5:50 PM, Brian E Carpenter wrote:

> Teemu,
>=20
> I don't believe this is a topic where consensus in MIF is very =
relevant.
> It needs to be decided in a much wider community rather than as a =
subsidiary
> question in a MIF document. I suggest leaving it FFS (for further =
study)
> in MIF.
>=20
> Regards
>   Brian Carpenter
>=20
> On 2011-10-20 20:01, teemu.savolainen@nokia.com wrote:
>> Hi Ray,
>>=20
>>> -----Original Message-----
>>> From: ext Ray Bellis [mailto:Ray.Bellis@nominet.org.uk]
>>> Sent: 19. lokakuuta 2011 13:40
>>> To: Savolainen Teemu (Nokia-CTO/Tampere)
>>> Cc: <denghui02@hotmail.com>; <mif@ietf.org>; <dnsext@ietf.org>;
>>> <dnsop@ietf.org>; <dhcwg@ietf.org>; <pk@isoc.de>;
>>> <john_brzozowski@cable.comcast.com>
>>> Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server =
selection
>>> document
>>>=20
>>> I have concerns about =A74.6:
>>>=20
>>> "A bare name (a name without any dots) MUST be first treated as a =
pre-
>> DNS
>>> hostname, and only after that the name SHALL be appended with  =
domain
>>> information and described DNS server selection logic be  utilized."
>>>=20
>>> When new gTLDs are introduced it is likely for brand-name gTLDs that =
they
>>> will wish to use bare names in the DNS (i.e. a single label =
hostname) for
>> their
>>> primary web sites.
>>>=20
>>> Hence bare names may become much more frequently used as DNS names,
>>> and =A74.6 wouldn't permit those to work unless '.' is also in the =
suffix
>> list.
>>> I'd like to hear the authors' thoughts on these.  I'm not sure that =
this
>> draft
>>> necessarily needs any significant changes - it may only require =
changes to
>>> ensure that bare names are also considered as potential DNS names in =
their
>>> own right.
>>=20
>> Okay, I understand there is no clear consensus yet how these single =
label
>> names should be handled by the resolvers at the first place? Should =
resolver
>> first treat them as pre-DNS hostnames, then as DNS hostnames, and =
then try
>> search list? The DNS server selection logic would be applied already =
when
>> resolving single label name, i.e. the network could provide a single =
label
>> domain "brand" in the domains list.
>>=20
>> Maybe section 4.6 could be like this, perhaps (changes in second =
paragraph
>> and title)?
>> --
>> 4.6.  Interactions with DNS search lists and single label hostnames
>>=20
>>   A node may be configured with DNS search list by DHCPv6
>>   OPTION_DOMAIN_LIST [RFC3646] or DHCPv4 Domain Search Option
>>   [RFC3397].
>>=20
>>   A bare name (a name without any dots) MUST be first treated as a =
pre-
>>   DNS hostname, after which resolution of the name SHALL be attempted
>>   with DNS, and as a last resort the name SHALL be appended with
>>   domain information. DNS server selection logic SHALL be=20
>>   utilized for both of the latter two DNS using methods.
>>=20
>>   Resolution for the name containing any dots SHOULD first be =
attempted
>>   with DNS servers of all interfaces.  Only if the resolution fails =
the
>>   node SHOULD append the name with search list domain(s) and then =
again
>>   utilize improved DNS server selection algorithm to decide which DNS
>>   server(s) to contact.
>> --
>>=20
>> Best regards,
>>=20
>> 	Teemu
>>=20
>>=20
>>=20
>> =
------------------------------------------------------------------------
>>=20
>> _______________________________________________
>> mif mailing list
>> mif@ietf.org
>> https://www.ietf.org/mailman/listinfo/mif
>=20
> _______________________________________________
> mif mailing list
> mif@ietf.org
> https://www.ietf.org/mailman/listinfo/mif


From drc@virtualized.org  Thu Oct 20 18:19:44 2011
Return-Path: <drc@virtualized.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF4BB11E8096; Thu, 20 Oct 2011 18:19:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2coio1NjPHS2; Thu, 20 Oct 2011 18:19:44 -0700 (PDT)
Received: from trantor.virtualized.org (trantor.virtualized.org [199.48.134.42]) by ietfa.amsl.com (Postfix) with ESMTP id 5B1EE11E8091; Thu, 20 Oct 2011 18:19:44 -0700 (PDT)
Received: from [10.0.1.5] (c-24-4-109-25.hsd1.ca.comcast.net [24.4.109.25]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: drc) by trantor.virtualized.org (Postfix) with ESMTPSA id 1B4431704E; Fri, 21 Oct 2011 01:19:43 +0000 (UTC)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=iso-8859-1
From: David Conrad <drc@virtualized.org>
In-Reply-To: <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com>
Date: Thu, 20 Oct 2011 18:19:41 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl>	<916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com>	<121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com>
To: Keith Moore <moore@network-heretics.com>
X-Mailer: Apple Mail (2.1251.1)
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, john_brzozowski@cable.comcast.com, dhcwg@ietf.org, denghui02@hotmail.com, Brian E Carpenter <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server	selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 01:19:44 -0000

On Oct 20, 2011, at 6:07 PM, Keith Moore wrote:
> It might that IETF should consider "bare names" out of its scope, =
except perhaps to say that they're not DNS names, they don't have to =
necessarily be mappable to DNS names, and that their use and behavior is =
host and application-dependent.

Can we please not redefine what a "DNS name" is to meet a particular =
agenda?

Isn't it sufficient to say a 'bare name' does not conform to a hostname =
as defined in RFC 952 and modified by RFCs 1122?

Regards,
-drc


From moore@network-heretics.com  Thu Oct 20 18:39:27 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A575C1F0C47; Thu, 20 Oct 2011 18:39:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.792
X-Spam-Level: 
X-Spam-Status: No, score=-3.792 tagged_above=-999 required=5 tests=[AWL=-0.193, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jidTSuKNg4Vu; Thu, 20 Oct 2011 18:39:27 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id 034D71F0C3C; Thu, 20 Oct 2011 18:39:27 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.mail.srv.osa [10.202.2.46]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id 88D7E2067F; Thu, 20 Oct 2011 21:39:26 -0400 (EDT)
Received: from frontend2.nyi.mail.srv.osa ([10.202.2.161]) by compute6.internal (MEProxy); Thu, 20 Oct 2011 21:39:26 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=63q2SBi6u8A4nDGLr3DDLXaMfps=; b=Rn rO5oMbPjMub7bH20PmCW391uID4P7/95wKfDFEcD+JA6w/JPnwL6eVdk36l7Dasg ZQhJ+/MVWSJ8GmjRy9Q/VJnph02tb8SylgtB26Q7ihKJ3an1ObEC/McCIDV03aOi T80Ds01OsXKVs00vwm3rKN2xjS9d/gRssXPamEtqs=
X-Sasl-enc: 4NGv0e7cIBi+zvGFuuisqbcmpKgbEx9ToGkpLUFi34x7 1319161166
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id B70494833A4; Thu, 20 Oct 2011 21:39:24 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org>
Date: Thu, 20 Oct 2011 21:38:58 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl>	<916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com>	<121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org>
To: David Conrad <drc@virtualized.org>
X-Mailer: Apple Mail (2.1084)
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, john_brzozowski@cable.comcast.com, dhcwg@ietf.org, denghui02@hotmail.com, Brian E Carpenter <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server	selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 01:39:27 -0000

On Oct 20, 2011, at 9:19 PM, David Conrad wrote:

> On Oct 20, 2011, at 6:07 PM, Keith Moore wrote:
>> It might that IETF should consider "bare names" out of its scope, =
except perhaps to say that they're not DNS names, they don't have to =
necessarily be mappable to DNS names, and that their use and behavior is =
host and application-dependent.
>=20
> Can we please not redefine what a "DNS name" is to meet a particular =
agenda?

I wasn't trying to do so.

> Isn't it sufficient to say a 'bare name' does not conform to a =
hostname as defined in RFC 952 and modified by RFCs 1122?

Probably.  I'm just suggesting that trying to nail down the behavior of =
such names is probably a rathole as well as likely to cause significant =
disruption.


From brian.peter.dickson@gmail.com  Thu Oct 20 20:15:35 2011
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F31FA1F0C41; Thu, 20 Oct 2011 20:15:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.522
X-Spam-Level: 
X-Spam-Status: No, score=-3.522 tagged_above=-999 required=5 tests=[AWL=0.078,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4QnpfhUF6OSF; Thu, 20 Oct 2011 20:15:34 -0700 (PDT)
Received: from mail-bw0-f44.google.com (mail-bw0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id AC1C11F0C3B; Thu, 20 Oct 2011 20:15:33 -0700 (PDT)
Received: by bkas6 with SMTP id s6so4925088bka.31 for <multiple recipients>; Thu, 20 Oct 2011 20:15:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=4/MacuvD/MPyqs8qwmxiyGvn1PLyk5nLFdimmTH87R0=; b=obGZ8HsKsSgUSkRNGoox557xXXrkrgDONSBC9WSP4XOH+a/XHYcj9Ky+0r3k2m9bNY CnqO3lF6zND+t0HUm8TPafrIvAwNQHCocrqWS8gbUgD4htJyG2NwP9FNaFH48wJA/JP2 Y6+f6SoVxXR8QSCsxjLmDkJm8DWIk/nk68dgg=
MIME-Version: 1.0
Received: by 10.223.77.77 with SMTP id f13mr14270480fak.19.1319166932717; Thu, 20 Oct 2011 20:15:32 -0700 (PDT)
Received: by 10.223.16.78 with HTTP; Thu, 20 Oct 2011 20:15:32 -0700 (PDT)
In-Reply-To: <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com>
Date: Thu, 20 Oct 2011 23:15:32 -0400
Message-ID: <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Keith Moore <moore@network-heretics.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-Mailman-Approved-At: Thu, 20 Oct 2011 20:48:25 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, john_brzozowski@cable.comcast.com, dhcwg@ietf.org, denghui02@hotmail.com, Brian E Carpenter <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 03:15:35 -0000

I think we can skirt this rat-hole if we separate the two following
distinct cases:

Case A: "foo"
Case B: "foo." (with terminating "dot").

Case B meets the technical requirements of a Fully Qualified Domain
Name, structurally speaking.
Case A does not.

Case A is a "bare name", case B is not.

If we stick to the notions of FQDN versus anything else, we can avoid
entering the rat-hole, IMHO.

(I.e., We don't need to get into any issues over the number of labels
in an FQDN; an FQDN does not require treatment, special or otherwise;
etc., etc.,)

Brian Dickson

On Thu, Oct 20, 2011 at 9:38 PM, Keith Moore <moore@network-heretics.com> w=
rote:
>
> On Oct 20, 2011, at 9:19 PM, David Conrad wrote:
>
>> On Oct 20, 2011, at 6:07 PM, Keith Moore wrote:
>>> It might that IETF should consider "bare names" out of its scope, excep=
t perhaps to say that they're not DNS names, they don't have to necessarily=
 be mappable to DNS names, and that their use and behavior is host and appl=
ication-dependent.
>>
>> Can we please not redefine what a "DNS name" is to meet a particular age=
nda?
>
> I wasn't trying to do so.
>
>> Isn't it sufficient to say a 'bare name' does not conform to a hostname =
as defined in RFC 952 and modified by RFCs 1122?
>
> Probably. =A0I'm just suggesting that trying to nail down the behavior of=
 such names is probably a rathole as well as likely to cause significant di=
sruption.
>
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
>

From marka@isc.org  Thu Oct 20 18:50:13 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 34D8721F8A35; Thu, 20 Oct 2011 18:50:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.565
X-Spam-Level: 
X-Spam-Status: No, score=-2.565 tagged_above=-999 required=5 tests=[AWL=0.034,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dj2nn88JorR8; Thu, 20 Oct 2011 18:50:12 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id 651AF21F8634; Thu, 20 Oct 2011 18:50:10 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 069365F988D; Fri, 21 Oct 2011 01:49:54 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 3F472216C6A; Fri, 21 Oct 2011 01:49:52 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id B2A8815ACCA7; Fri, 21 Oct 2011 12:49:49 +1100 (EST)
To: David Conrad <drc@virtualized.org>
From: Mark Andrews <marka@isc.org>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org>
In-reply-to: Your message of "Thu, 20 Oct 2011 18:19:41 PDT." <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org>
Date: Fri, 21 Oct 2011 12:49:49 +1100
Message-Id: <20111021014949.B2A8815ACCA7@drugs.dv.isc.org>
X-Mailman-Approved-At: Thu, 20 Oct 2011 20:48:42 -0700
Cc: mif@ietf.org, Keith Moore <moore@network-heretics.com>, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, john_brzozowski@cable.comcast.com, dhcwg@ietf.org, denghui02@hotmail.com, Brian E Carpenter <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 01:50:13 -0000

In message <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org>, David Conrad
 writes:
> On Oct 20, 2011, at 6:07 PM, Keith Moore wrote:
> > It might that IETF should consider "bare names" out of its scope, except pe
> rhaps to say that they're not DNS names, they don't have to necessarily be ma
> ppable to DNS names, and that their use and behavior is host and application-
> dependent.
> 
> Can we please not redefine what a "DNS name" is to meet a particular agenda?
> 
> Isn't it sufficient to say a 'bare name' does not conform to a hostname as de
> fined in RFC 952 and modified by RFCs 1122?

The problem is that they *are* hostnames, just not "domain style" (RFC 952)
or "hierarchical" (RFC 921) hostnames.

> Regards,
> -drc
> 
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From teemu.savolainen@nokia.com  Fri Oct 21 00:15:16 2011
Return-Path: <teemu.savolainen@nokia.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D95A11E80A1; Fri, 21 Oct 2011 00:15:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.579
X-Spam-Level: 
X-Spam-Status: No, score=-2.579 tagged_above=-999 required=5 tests=[AWL=0.020,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8JFbRmyWmsd8; Fri, 21 Oct 2011 00:15:15 -0700 (PDT)
Received: from mgw-sa02.nokia.com (smtp.nokia.com [147.243.1.48]) by ietfa.amsl.com (Postfix) with ESMTP id D5C6711E808C; Fri, 21 Oct 2011 00:15:14 -0700 (PDT)
Received: from vaebh105.NOE.Nokia.com (vaebh105.europe.nokia.com [10.160.244.31]) by mgw-sa02.nokia.com (Switch-3.4.4/Switch-3.4.4) with ESMTP id p9L7F7ca025097; Fri, 21 Oct 2011 10:15:07 +0300
Received: from smtp.mgd.nokia.com ([65.54.30.8]) by vaebh105.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675);  Fri, 21 Oct 2011 10:15:06 +0300
Received: from 008-AM1MMR1-003.mgdnok.nokia.com (65.54.30.58) by NOK-AM1MHUB-04.mgdnok.nokia.com (65.54.30.8) with Microsoft SMTP Server (TLS) id 8.2.255.0; Fri, 21 Oct 2011 09:15:06 +0200
Received: from 008-AM1MPN1-037.mgdnok.nokia.com ([169.254.7.8]) by 008-AM1MMR1-003.mgdnok.nokia.com ([65.54.30.58]) with mapi id 14.01.0339.002; Fri, 21 Oct 2011 09:15:05 +0200
From: <teemu.savolainen@nokia.com>
To: <brian.e.carpenter@gmail.com>
Thread-Topic: [mif] [dnsext] 2nd Last Call for MIF DNS server	selection document
Thread-Index: AQHMj3JGB7FreQH6+EqCg+ltMTYsr5WGYYlQ
Date: Fri, 21 Oct 2011 07:15:05 +0000
Message-ID: <916CE6CF87173740BC8A2CE44309696203784B1F@008-AM1MPN1-037.mgdnok.nokia.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com>
In-Reply-To: <4EA09791.8010705@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-tituslabs-classifications-30: TLPropertyRoot=Nokia;Confidentiality=Company Confidential;Project=None;
x-titus-version: 3.3.8.1
x-headerinfofordlp: None
x-tituslabs-classificationhash-30: VgNFIFU9Hx+/nZJb9Kg7IleTS5gKgr+JhCehPOzQb7X8VPIDGtFQ+zxfOgeaBUZsOG8Ek7lD2xu5WHF5/rxKyBmC4Zgoz9lY65iVD+EwKfx/HOyCbcbCouTzciSIqgIMf/5bLh0Sai/jE6sG24Xx+7Vb5YLSzlGNh/xlWFKXjhG/VugZS7r2MiqJJ+wJiYnj7oW0F1q2Pewb5bJXqVC5toWbFgVuespx3qoYFmYIO7yzifaaSr9b380ixgq8cDxL9AfCqPWq32/ZgZAi48Q3WSxOadDP3x3m22zqpSDkV30=
x-originating-ip: [10.162.93.230]
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0164_01CC8FDA.4BCA8DB0"
MIME-Version: 1.0
X-OriginalArrivalTime: 21 Oct 2011 07:15:06.0851 (UTC) FILETIME=[2922D330:01CC8FC1]
X-Nokia-AV: Clean
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, john_brzozowski@cable.comcast.com, dhcwg@ietf.org, denghui02@hotmail.com
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server	selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 07:15:16 -0000

------=_NextPart_000_0164_01CC8FDA.4BCA8DB0
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

Brian,

Would the following text be then ok? Please note I changed the domain =
addition from SHOULD to MAY, if there is going to be attempt to =
deprecate/redefine/update search list logics. Or do you think it should =
remain SHOULD?
--
4.6.  Interactions with DNS search lists

   A node may be configured with DNS search list via DHCPv6
   OPTION_DOMAIN_LIST [RFC3646] or via DHCPv4 Domain Search Option
   [RFC3397].

   A bare name (a name without any dots) MUST be first treated as a pre-
   DNS hostname or handled by other means that, as of this writing, are
   under discussion in the IETF and that are out of the scope of this
   document.  If the bare name resolution fails, the name MAY then be
   appended with the domain information.  If the bare name is appended
   with the domain information the described DNS server selection logic
   SHALL be utilized for the resulting name.

   Resolution for the name containing any dots SHOULD first be attempted
   with DNS servers of all interfaces.  Only if the resolution fails the
   node MAY append the name with search list domain(s) and then again
   utilize improved DNS server selection algorithm to decide which DNS
   server(s) to contact.
--

Best regards,

	Teemu

> -----Original Message-----
> From: ext Brian E Carpenter [mailto:brian.e.carpenter@gmail.com]
> Sent: 21. lokakuuta 2011 00:50
> To: Savolainen Teemu (Nokia-CTO/Tampere)
> Cc: Ray.Bellis@nominet.org.uk; mif@ietf.org; dnsop@ietf.org;
> dnsext@ietf.org; pk@isoc.de; john_brzozowski@cable.comcast.com;
> dhcwg@ietf.org; denghui02@hotmail.com
> Subject: Re: [mif] [dnsext] 2nd Last Call for MIF DNS server selection
> document
>=20
> Teemu,
>=20
> I don't believe this is a topic where consensus in MIF is very =
relevant.
> It needs to be decided in a much wider community rather than as a =
subsidiary
> question in a MIF document. I suggest leaving it FFS (for further =
study) in MIF.
>=20
> Regards
>    Brian Carpenter
>=20
> On 2011-10-20 20:01, teemu.savolainen@nokia.com wrote:
> > Hi Ray,
> >
> >> -----Original Message-----
> >> From: ext Ray Bellis [mailto:Ray.Bellis@nominet.org.uk]
> >> Sent: 19. lokakuuta 2011 13:40
> >> To: Savolainen Teemu (Nokia-CTO/Tampere)
> >> Cc: <denghui02@hotmail.com>; <mif@ietf.org>; <dnsext@ietf.org>;
> >> <dnsop@ietf.org>; <dhcwg@ietf.org>; <pk@isoc.de>;
> >> <john_brzozowski@cable.comcast.com>
> >> Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server
> >> selection document
> >>
> >> I have concerns about =C2=A74.6:
> >>
> >> "A bare name (a name without any dots) MUST be first treated as a
> >> pre-
> > DNS
> >> hostname, and only after that the name SHALL be appended with  =
domain
> >> information and described DNS server selection logic be  utilized."
> >>
> >> When new gTLDs are introduced it is likely for brand-name gTLDs =
that
> >> they will wish to use bare names in the DNS (i.e. a single label
> >> hostname) for
> > their
> >> primary web sites.
> >>
> >> Hence bare names may become much more frequently used as DNS
> names,
> >> and =C2=A74.6 wouldn't permit those to work unless '.' is also in =
the
> >> suffix
> > list.
> >> I'd like to hear the authors' thoughts on these.  I'm not sure that
> >> this
> > draft
> >> necessarily needs any significant changes - it may only require
> >> changes to ensure that bare names are also considered as potential
> >> DNS names in their own right.
> >
> > Okay, I understand there is no clear consensus yet how these single
> > label names should be handled by the resolvers at the first place?
> > Should resolver first treat them as pre-DNS hostnames, then as DNS
> > hostnames, and then try search list? The DNS server selection logic
> > would be applied already when resolving single label name, i.e. the
> > network could provide a single label domain "brand" in the domains =
list.
> >
> > Maybe section 4.6 could be like this, perhaps (changes in second
> > paragraph and title)?
> > --
> > 4.6.  Interactions with DNS search lists and single label hostnames
> >
> >    A node may be configured with DNS search list by DHCPv6
> >    OPTION_DOMAIN_LIST [RFC3646] or DHCPv4 Domain Search Option
> >    [RFC3397].
> >
> >    A bare name (a name without any dots) MUST be first treated as a =
pre-
> >    DNS hostname, after which resolution of the name SHALL be =
attempted
> >    with DNS, and as a last resort the name SHALL be appended with
> >    domain information. DNS server selection logic SHALL be
> >    utilized for both of the latter two DNS using methods.
> >
> >    Resolution for the name containing any dots SHOULD first be =
attempted
> >    with DNS servers of all interfaces.  Only if the resolution fails =
the
> >    node SHOULD append the name with search list domain(s) and then =
again
> >    utilize improved DNS server selection algorithm to decide which =
DNS
> >    server(s) to contact.
> > --
> >
> > Best regards,
> >
> > 	Teemu
> >
> >
> >
> > =
----------------------------------------------------------------------
> > --
> >
> > _______________________________________________
> > mif mailing list
> > mif@ietf.org
> > https://www.ietf.org/mailman/listinfo/mif


------=_NextPart_000_0164_01CC8FDA.4BCA8DB0
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIOuzCCAzYw
ggIeoAMCAQICBDpVqdkwDQYJKoZIhvcNAQEFBQAwKTEOMAwGA1UEChMFTm9raWExFzAVBgNVBAMT
Dk5va2lhICBSb290IENBMB4XDTAxMDEwNTExMDUwNVoXDTE2MDEwMjExMDUwNVowKTEOMAwGA1UE
ChMFTm9raWExFzAVBgNVBAMTDk5va2lhICBSb290IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A
MIIBCgKCAQEAsrTy8gLmr4LYvp0khVUVHw7ascdl+Cjr+yI5MlZ6J/U6Qsvkiqthgqq8rPcLV0P1
92TfBr27VgKEeCaZe0icS1jC2spM/wRv3j2WxdkKxb9kDJtuCNJaRBqvi5vGTHB15nmEmKuL5f3i
rAxeHqPjgS496oWcudzFT1e7Xrc/gWGFYd72+/ykIFXjWOMZv6QpxD8x1hLPyh2YVXRk9U7N7pvm
RQNX29g4SCFJY2BBIa5JPlwIF8Nc9IePaC/E/2M4tGMtiOOZlm99EoL7N0hJZtFSvUwdCBud/viH
4DgsKGjNkNKi6pAHc9IaXB6tIykcoYp+L+oe/3+cuEJaCj1EKwIDAQABo2YwZDASBgNVHRMBAf8E
CDAGAQH/AgEEMB0GA1UdDgQWBBSNjfefoQ0AITLvqe0iruA79NB9sDAfBgNVHSMEGDAWgBSNjfef
oQ0AITLvqe0iruA79NB9sDAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQEFBQADggEBAIGEPql2
TALyKi/h1J+Mh5XolAtYppcSOLMtBkoA7ZovGBDNvl0VbZs8AAojJqkUoWBB+L6DKyl/jKhNfKcu
rWRGRyj7pnbxrKLsI3gmWNWkyo2b60wJwe9fqPD5ZQy3oEiMit9l0Ba6il/k2GqYopUCNMa7mfeb
E2LeBy5ChYMiCi97UQSJvAdzEYylTJw8Awc6AiM2Ve5N+XxsmKgNf/2A/5IJ3EZZ+wFRmkI4062A
oNU302rqAt0HH88jzoUF4AfYHWl6HpYhGXFbcX44rHINyPmFBRxLYIFJ6ZWUr/mXpL/e6rqFtNWO
kV6UoJND7OVZkbLh7F1+lcqXRU8TPBMwggOHMIICb6ADAgECAgRBtbHpMA0GCSqGSIb3DQEBBQUA
MCkxDjAMBgNVBAoTBU5va2lhMRcwFQYDVQQDEw5Ob2tpYSAgUm9vdCBDQTAeFw0wNjAzMzAwOTU3
MTFaFw0xNjAxMDIxMTA1MDVaMDMxCzAJBgNVBAYTAkZJMQ4wDAYDVQQKEwVOb2tpYTEUMBIGA1UE
AxMLTm9raWEgQkkgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDtFCg3QEjSCg6T
IUxoWsNwELh8bBNiUQPCPmg8c2DHQYXWWCSCMb+S0Fvh1qqI1xt+XnzyFq+5eqzGzDj4UaBcG+d9
qxrCFly8sHyoPTryyPrR0EI2UUDWwfS6ojhqgwghRqo8G38TjFusyBtLub/5L6yvWYSOHD+JcB+q
VM2fbkArPYK4Ydv8WG/DbHjGn0gKq0zwpVZKI/gCK/QALYvte02NXseqvY9/GOyLtjy3Z8erFv71
KKTq+gxI/7DK55pJf3PoD+kT4kyGm6EF9DTdK4ojMdar17uyX0IOZz/4vkkF0d+60nmnLX63FJPA
jUyB0HUNJ32NXDo9UsM38aoNAgMBAAGjgawwgakwDwYDVR0TAQH/BAUwAwEB/zARBgNVHSAECjAI
MAYGBFUdIAAwDgYDVR0PAQH/BAQDAgGGMFQGA1UdIwRNMEuAFI2N95+hDQAhMu+p7SKu4Dv00H2w
oS2kKzApMQ4wDAYDVQQKEwVOb2tpYTEXMBUGA1UEAxMOTm9raWEgIFJvb3QgQ0GCBDpVqdkwHQYD
VR0OBBYEFKcksD7Fg+8EDlB2Sxgy58pW0Sy6MA0GCSqGSIb3DQEBBQUAA4IBAQAC3lEUplDlVNOT
Pjz/XFezXx2bV2XbCFindhA3F815Egi55H6/cYezEjoP4QLNEGGl2I3aLvkn5A0T8I4pbiFPhIiu
B/frbbGg6k6GjQLe/bFQ8F1mAOOR+GyneKZFPfzaRV0jiIR9QqnMXTf8RvKkCJyFj10MZVsLIy/Y
uBkzeP3JhzDhUdtPfwmJN6ZbIhH5uR/2BwAGtgQknb8WX3I4wnhWtMUxB8XmayayYs8qWYeIiVkI
FV+sLTkWUWVvvKUjyakBpbAW2vUP84DYsJ8TL1YefNjf/nIOByMcORLuV/1gPjyv00qJbcB59AA+
iXe3zIo8QNcgXG0uPQQFmrGDMIID5DCCAsygAwIBAgIQMH5apak8lEy6LmLlLsJy8TANBgkqhkiG
9w0BAQUFADAzMQswCQYDVQQGEwJGSTEOMAwGA1UEChMFTm9raWExFDASBgNVBAMTC05va2lhIEJJ
IENBMB4XDTExMDkwNjA1NTIwNFoXDTE0MDkwNjA1NTIwNFowVjEOMAwGA1UECgwFTm9raWExDzAN
BgNVBAsMBlBlb3BsZTEYMBYGCgmSJomT8ixkAQEMCDEwMDI0Njc2MRkwFwYDVQQDDBBTYXZvbGFp
bmVuIFRlZW11MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAshEsmw6Yiz6XWX26oF+I
s5fsfE1OfCjOelclmtqCiIgXND5klkNOBs2d4ZGzgD9mN+XnTZnOTh249c2WxPBugf12DCcDmBAJ
gL+VuWUJVBTE5NRchm/O8nZnZsRFst+gAC9/Juykh4+EYewZ7QbpnlwW7hNpj8eH+rMr+OZHKzdp
KTftgVjmuF4JJ/cPMQUjL8SuGj+zBW6IWPOZdqkEMtf7Pr8kkYbZsh0SgJ0ceRHZ7Uc06mB/y+C1
UnJPxehTTdu8tpCjdzXgBw/H2uuW1J3qdHbCfbuDILql8V8RiZKubcZLhdsD3Jvj8qK0DGWBJa6x
p90q5p3pLE8LvAeCgQIDAQABo4HQMIHNMA4GA1UdDwEB/wQEAwIEMDAfBgNVHSMEGDAWgBSnJLA+
xYPvBA5QdksYMufKVtEsujAZBgNVHSAEEjAQMA4GDCsGAQQBXgExBgEHAzA5BgNVHR8EMjAwMC6g
LKAqhihodHRwOi8vY3JsLm5va2lhLmNvbS9Ob2tpYSUyMEJJJTIwQ0EuY3JsMCUGA1UdEQQeMByB
GnRlZW11LnNhdm9sYWluZW5Abm9raWEuY29tMB0GA1UdDgQWBBQTRzvZsgmQrAGCeuzdHTGAC6Jg
UzANBgkqhkiG9w0BAQUFAAOCAQEACmPVsdi07pjK5gDa+W5JlE2C74kVVsB8alBqfioYeR5At2FG
B7sua4Dz5H7TJMpZ1jYFeI+zjexD5f+beY2IlV15lMoWD+5e38QlLYjwfe2LAyvdzBKXW0e0U6Bt
p78ft4gyVak1X+Db+ebR+FNHUOMNhm+yK3w9sy5ZQzBFusIx4OgxGvcZhyhmd9WjipSTalgPwgqV
Ju2aPADCG++OEXmgEWRLsR4yNopkgK4ftVqrN5uUtLs83qdeXTRcNRiET1IOx5zmYFZ6q3gjKIx5
iyuxcDeYas93vVHUcaRRYpsoby5CHq7Z/j/TQhtqO/knWuxLFFiCUgdGKMKrRkg29DCCBAowggLy
oAMCAQICEQCBvi+p+bA/dBtBtybwA6YYMA0GCSqGSIb3DQEBBQUAMDMxCzAJBgNVBAYTAkZJMQ4w
DAYDVQQKEwVOb2tpYTEUMBIGA1UEAxMLTm9raWEgQkkgQ0EwHhcNMTEwOTA2MDU1MDM0WhcNMTMw
OTA1MDU1MDM0WjBWMQ4wDAYDVQQKDAVOb2tpYTEPMA0GA1UECwwGUGVvcGxlMRgwFgYKCZImiZPy
LGQBAQwIMTAwMjQ2NzYxGTAXBgNVBAMMEFNhdm9sYWluZW4gVGVlbXUwggEiMA0GCSqGSIb3DQEB
AQUAA4IBDwAwggEKAoIBAQDFPmbRVwuo52v+h6xnQUqokAx2xsHjmPBniEkzgtgBNJsFi838ATEg
1zsx+VotoJg7hMijcrQfpTAgW6gpLGnlmw5QQswrNK1zleOHb4pA5JguU3WhVKFkAH/6/2EU2k/9
m8Pb/gwP55cYg80R6fRmbdsWKhseXF/1isW/rJcWLmIYDg/rXfo3ixqtT9MroAMiuoXnb0ij1L2d
Jj64LDp3Ld8Jo0qZzk3Fj4apo8PBd8eAH6HloVBJkxQcwAnv561A+Xi1GHZ2mafRYJGO+1uBDwyd
g/8ybEXXA4MKo8lPKjBebYBUFvz80DBA/Lq74UysXkG23BSulcG4xQSYGlyzAgMBAAGjgfUwgfIw
HwYDVR0jBBgwFoAUpySwPsWD7wQOUHZLGDLnylbRLLowGQYDVR0gBBIwEDAOBgwrBgEEAV4BMQYB
BgQwOQYDVR0fBDIwMDAuoCygKoYoaHR0cDovL2NybC5ub2tpYS5jb20vTm9raWElMjBCSSUyMENB
LmNybDAjBgNVHSUEHDAaBggrBgEFBQcDAgYEVR0lAAYIKwYBBQUHAwQwDgYDVR0PAQH/BAQDAgeA
MCUGA1UdEQQeMByBGnRlZW11LnNhdm9sYWluZW5Abm9raWEuY29tMB0GA1UdDgQWBBTGhbTJF0EX
iagjymQo6GIuSQeRVDANBgkqhkiG9w0BAQUFAAOCAQEAqai6TxZ/BlMHZIhJNPriBPXkQhUlBkGA
buJZ5sVm1HIQhWN8elZKjjJdHi1qWEKhMg7yHjEMZsyV8XAZzK0UnOqkpUnt+jnVkNZ9O7/jRtyK
f4WUtq5jErc8Hlv4bbGFRHk1T7AuLLE52r1lYOdmoibnQp03QtlDvHUNa68G7jvzThJhieB7U1xh
vH3yy0ktaVnWEgAylqf9yIUFjnqau5R6cE1Xo57IYPk/KitX0YF+OigEI/bOQVMi+fze93ZsAOJv
/z6g/NGemvUgl5YSdX0uPQK6kEHf/sp/nZyUWWQ7OjtVSqkq2YuYEueQFxTfafl+78GWqgm6W/Bl
32laYzGCAuswggLnAgEBMEgwMzELMAkGA1UEBhMCRkkxDjAMBgNVBAoTBU5va2lhMRQwEgYDVQQD
EwtOb2tpYSBCSSBDQQIRAIG+L6n5sD90G0G3JvADphgwCQYFKw4DAhoFAKCCAXgwGAYJKoZIhvcN
AQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTExMDIxMDcxNTAyWjAjBgkqhkiG9w0B
CQQxFgQU/Vl+6RAs5fBf/r2vYheh9YPWN/4wVgYJKwYBBAGCNxAEMUkwRzAzMQswCQYDVQQGEwJG
STEOMAwGA1UEChMFTm9raWExFDASBgNVBAMTC05va2lhIEJJIENBAhAwflqlqTyUTLouYuUuwnLx
MFgGCyqGSIb3DQEJEAILMUmgRzAzMQswCQYDVQQGEwJGSTEOMAwGA1UEChMFTm9raWExFDASBgNV
BAMTC05va2lhIEJJIENBAhAwflqlqTyUTLouYuUuwnLxMGcGCSqGSIb3DQEJDzFaMFgwCgYIKoZI
hvcNAwcwDgYIKoZIhvcNAwICAgCAMA0GCCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMC
AgEoMAcGBSsOAwIaMAoGCCqGSIb3DQIFMA0GCSqGSIb3DQEBAQUABIIBAFTY/9GrEc/npbelzD08
P8a6qXVjWULhmI5reF2GjAJ2Rhpx1cHq+H1/4PTCzagCxvYmuwoBbHzd4jFDAd1m3Pbq9RNRHkZf
Nfmv9WU5QyjgsmqQL2MnWWD3ne2PCplPCcAa3/lPVGccem1EEQUsD+glrTFBmQh+YExUxg/Bol1e
oct6irB2Aem7wUWKMsrgOshO1Ytx3z+fwmqSwPNIrHFZ1Mk8bBOzg1rZDDH+UBPGQgVVl+dT9nvt
lscLjzp8xfYdqocIOP/69pT3SJLEUwLXO7Znb7A1SlZ0y42hC+R9AZ8kpEElpWGnDBRl17UlziQv
+IHz2NRL2+wcVeiFQ1wAAAAAAAA=

------=_NextPart_000_0164_01CC8FDA.4BCA8DB0--

From teemu.savolainen@nokia.com  Fri Oct 21 00:22:03 2011
Return-Path: <teemu.savolainen@nokia.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4072A1F0C59; Fri, 21 Oct 2011 00:22:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.582
X-Spam-Level: 
X-Spam-Status: No, score=-2.582 tagged_above=-999 required=5 tests=[AWL=0.017,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XsrjmcP6wB27; Fri, 21 Oct 2011 00:22:02 -0700 (PDT)
Received: from mgw-sa01.nokia.com (smtp.nokia.com [147.243.1.47]) by ietfa.amsl.com (Postfix) with ESMTP id C55D41F0C3B; Fri, 21 Oct 2011 00:22:01 -0700 (PDT)
Received: from vaebh104.NOE.Nokia.com (vaebh104.europe.nokia.com [10.160.244.30]) by mgw-sa01.nokia.com (Switch-3.4.4/Switch-3.4.4) with ESMTP id p9L7LuO7002664; Fri, 21 Oct 2011 10:21:57 +0300
Received: from smtp.mgd.nokia.com ([65.54.30.5]) by vaebh104.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675);  Fri, 21 Oct 2011 10:21:53 +0300
Received: from 008-AM1MMR1-002.mgdnok.nokia.com (65.54.30.57) by NOK-am1MHUB-01.mgdnok.nokia.com (65.54.30.5) with Microsoft SMTP Server (TLS) id 8.2.255.0; Fri, 21 Oct 2011 09:21:53 +0200
Received: from 008-AM1MPN1-037.mgdnok.nokia.com ([169.254.7.8]) by 008-AM1MMR1-002.mgdnok.nokia.com ([65.54.30.57]) with mapi id 14.01.0339.002; Fri, 21 Oct 2011 09:21:52 +0200
From: <teemu.savolainen@nokia.com>
To: <brian.peter.dickson@gmail.com>
Thread-Topic: [dnsext] [mif] 2nd Last Call for MIF DNS server selection document
Thread-Index: AQHMj6R+QZ795RKazUe9WQ1xF1IpB5WGZKHA
Date: Fri, 21 Oct 2011 07:21:51 +0000
Message-ID: <916CE6CF87173740BC8A2CE44309696203784B63@008-AM1MPN1-037.mgdnok.nokia.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com>
In-Reply-To: <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-tituslabs-classifications-30: TLPropertyRoot=Nokia;Confidentiality=Company Confidential;Project=None;
x-titus-version: 3.3.8.1
x-headerinfofordlp: None
x-tituslabs-classificationhash-30: VgNFIFU9Hx+/nZJb9Kg7IvQmQ0o/K2jquxqC2Uue5GHpzEuo3S9zNfeh3beuXC4d4U+9SoG2zegA7qMLdX6PTG17IL7pxR5S/KY/iCJNnn1c5UqLju8bmTWbhVRC5KYyRvx6Lux+omb+cjLr4ZT4xGr6EYlMoJAb4mKk7Ygo2IOCLEfvotq8eZrg90l9H1dML3IGXW5CR0VaroyKyJb6YmetiFAenF/tDgR293RVPdnMoKPAurwSeBTTqO8uNr6TcXVEvm613p4YTVwzPTjUYrSShwM2n81B2EdPx398YIM=
x-originating-ip: [10.162.93.230]
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_017A_01CC8FDB.3D0BB910"
MIME-Version: 1.0
X-OriginalArrivalTime: 21 Oct 2011 07:21:53.0406 (UTC) FILETIME=[1B7631E0:01CC8FC2]
X-Nokia-AV: Clean
Cc: dhcwg@ietf.org, dnsop@ietf.org, mif@ietf.org, dnsext@ietf.org
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 07:22:03 -0000

------=_NextPart_000_017A_01CC8FDB.3D0BB910
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

(resending only to mailing list recipients)

Brian,

Do you agree that nodes' behavioral differences between "foo" and "foo."
names is out of the scope of this particular MIF draft?

There could perhaps be another draft, which would say that if name is =
"foo"
it should not be appended with search lists but "foo." might? And =
whatever
other differences in their handling would be, and what impacts it would =
have
e.g. intranet designers?

Please see also in another email my suggestion for section 4.6 text. =
That
text should now allow possible changes for the bare name handling while
still allowing coexistence with DNS server selection.

Best regards,

Teemu

> -----Original Message-----
> From: dnsext-bounces@ietf.org [mailto:dnsext-bounces@ietf.org] On =
Behalf
> Of ext Brian Dickson
> Sent: 21. lokakuuta 2011 06:16
> To: Keith Moore
> Cc: mif@ietf.org; dnsop@ietf.org; dnsext@ietf.org; pk@isoc.de;
> john_brzozowski@cable.comcast.com; dhcwg@ietf.org;
> denghui02@hotmail.com; Brian E Carpenter
> Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection
> document
>=20
> I think we can skirt this rat-hole if we separate the two following
distinct
> cases:
>=20
> Case A: "foo"
> Case B: "foo." (with terminating "dot").
>=20
> Case B meets the technical requirements of a Fully Qualified Domain =
Name,
> structurally speaking.
> Case A does not.
>=20
> Case A is a "bare name", case B is not.
>=20
> If we stick to the notions of FQDN versus anything else, we can avoid
> entering the rat-hole, IMHO.
>=20
> (I.e., We don't need to get into any issues over the number of labels =
in
an
> FQDN; an FQDN does not require treatment, special or otherwise; etc.,
etc.,)
>=20
> Brian Dickson
>=20
> On Thu, Oct 20, 2011 at 9:38 PM, Keith Moore <moore@network-
> heretics.com> wrote:
> >
> > On Oct 20, 2011, at 9:19 PM, David Conrad wrote:
> >
> >> On Oct 20, 2011, at 6:07 PM, Keith Moore wrote:
> >>> It might that IETF should consider "bare names" out of its scope,
except
> perhaps to say that they're not DNS names, they don't have to =
necessarily
be
> mappable to DNS names, and that their use and behavior is host and
> application-dependent.
> >>
> >> Can we please not redefine what a "DNS name" is to meet a =
particular
> agenda?
> >
> > I wasn't trying to do so.
> >
> >> Isn't it sufficient to say a 'bare name' does not conform to a =
hostname
as
> defined in RFC 952 and modified by RFCs 1122?
> >
> > Probably. =A0I'm just suggesting that trying to nail down the =
behavior of
such
> names is probably a rathole as well as likely to cause significant
disruption.
> >
> > _______________________________________________
> > dnsext mailing list
> > dnsext@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsext
> >
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext

------=_NextPart_000_017A_01CC8FDB.3D0BB910
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIOuzCCAzYw
ggIeoAMCAQICBDpVqdkwDQYJKoZIhvcNAQEFBQAwKTEOMAwGA1UEChMFTm9raWExFzAVBgNVBAMT
Dk5va2lhICBSb290IENBMB4XDTAxMDEwNTExMDUwNVoXDTE2MDEwMjExMDUwNVowKTEOMAwGA1UE
ChMFTm9raWExFzAVBgNVBAMTDk5va2lhICBSb290IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A
MIIBCgKCAQEAsrTy8gLmr4LYvp0khVUVHw7ascdl+Cjr+yI5MlZ6J/U6Qsvkiqthgqq8rPcLV0P1
92TfBr27VgKEeCaZe0icS1jC2spM/wRv3j2WxdkKxb9kDJtuCNJaRBqvi5vGTHB15nmEmKuL5f3i
rAxeHqPjgS496oWcudzFT1e7Xrc/gWGFYd72+/ykIFXjWOMZv6QpxD8x1hLPyh2YVXRk9U7N7pvm
RQNX29g4SCFJY2BBIa5JPlwIF8Nc9IePaC/E/2M4tGMtiOOZlm99EoL7N0hJZtFSvUwdCBud/viH
4DgsKGjNkNKi6pAHc9IaXB6tIykcoYp+L+oe/3+cuEJaCj1EKwIDAQABo2YwZDASBgNVHRMBAf8E
CDAGAQH/AgEEMB0GA1UdDgQWBBSNjfefoQ0AITLvqe0iruA79NB9sDAfBgNVHSMEGDAWgBSNjfef
oQ0AITLvqe0iruA79NB9sDAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQEFBQADggEBAIGEPql2
TALyKi/h1J+Mh5XolAtYppcSOLMtBkoA7ZovGBDNvl0VbZs8AAojJqkUoWBB+L6DKyl/jKhNfKcu
rWRGRyj7pnbxrKLsI3gmWNWkyo2b60wJwe9fqPD5ZQy3oEiMit9l0Ba6il/k2GqYopUCNMa7mfeb
E2LeBy5ChYMiCi97UQSJvAdzEYylTJw8Awc6AiM2Ve5N+XxsmKgNf/2A/5IJ3EZZ+wFRmkI4062A
oNU302rqAt0HH88jzoUF4AfYHWl6HpYhGXFbcX44rHINyPmFBRxLYIFJ6ZWUr/mXpL/e6rqFtNWO
kV6UoJND7OVZkbLh7F1+lcqXRU8TPBMwggOHMIICb6ADAgECAgRBtbHpMA0GCSqGSIb3DQEBBQUA
MCkxDjAMBgNVBAoTBU5va2lhMRcwFQYDVQQDEw5Ob2tpYSAgUm9vdCBDQTAeFw0wNjAzMzAwOTU3
MTFaFw0xNjAxMDIxMTA1MDVaMDMxCzAJBgNVBAYTAkZJMQ4wDAYDVQQKEwVOb2tpYTEUMBIGA1UE
AxMLTm9raWEgQkkgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDtFCg3QEjSCg6T
IUxoWsNwELh8bBNiUQPCPmg8c2DHQYXWWCSCMb+S0Fvh1qqI1xt+XnzyFq+5eqzGzDj4UaBcG+d9
qxrCFly8sHyoPTryyPrR0EI2UUDWwfS6ojhqgwghRqo8G38TjFusyBtLub/5L6yvWYSOHD+JcB+q
VM2fbkArPYK4Ydv8WG/DbHjGn0gKq0zwpVZKI/gCK/QALYvte02NXseqvY9/GOyLtjy3Z8erFv71
KKTq+gxI/7DK55pJf3PoD+kT4kyGm6EF9DTdK4ojMdar17uyX0IOZz/4vkkF0d+60nmnLX63FJPA
jUyB0HUNJ32NXDo9UsM38aoNAgMBAAGjgawwgakwDwYDVR0TAQH/BAUwAwEB/zARBgNVHSAECjAI
MAYGBFUdIAAwDgYDVR0PAQH/BAQDAgGGMFQGA1UdIwRNMEuAFI2N95+hDQAhMu+p7SKu4Dv00H2w
oS2kKzApMQ4wDAYDVQQKEwVOb2tpYTEXMBUGA1UEAxMOTm9raWEgIFJvb3QgQ0GCBDpVqdkwHQYD
VR0OBBYEFKcksD7Fg+8EDlB2Sxgy58pW0Sy6MA0GCSqGSIb3DQEBBQUAA4IBAQAC3lEUplDlVNOT
Pjz/XFezXx2bV2XbCFindhA3F815Egi55H6/cYezEjoP4QLNEGGl2I3aLvkn5A0T8I4pbiFPhIiu
B/frbbGg6k6GjQLe/bFQ8F1mAOOR+GyneKZFPfzaRV0jiIR9QqnMXTf8RvKkCJyFj10MZVsLIy/Y
uBkzeP3JhzDhUdtPfwmJN6ZbIhH5uR/2BwAGtgQknb8WX3I4wnhWtMUxB8XmayayYs8qWYeIiVkI
FV+sLTkWUWVvvKUjyakBpbAW2vUP84DYsJ8TL1YefNjf/nIOByMcORLuV/1gPjyv00qJbcB59AA+
iXe3zIo8QNcgXG0uPQQFmrGDMIID5DCCAsygAwIBAgIQMH5apak8lEy6LmLlLsJy8TANBgkqhkiG
9w0BAQUFADAzMQswCQYDVQQGEwJGSTEOMAwGA1UEChMFTm9raWExFDASBgNVBAMTC05va2lhIEJJ
IENBMB4XDTExMDkwNjA1NTIwNFoXDTE0MDkwNjA1NTIwNFowVjEOMAwGA1UECgwFTm9raWExDzAN
BgNVBAsMBlBlb3BsZTEYMBYGCgmSJomT8ixkAQEMCDEwMDI0Njc2MRkwFwYDVQQDDBBTYXZvbGFp
bmVuIFRlZW11MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAshEsmw6Yiz6XWX26oF+I
s5fsfE1OfCjOelclmtqCiIgXND5klkNOBs2d4ZGzgD9mN+XnTZnOTh249c2WxPBugf12DCcDmBAJ
gL+VuWUJVBTE5NRchm/O8nZnZsRFst+gAC9/Juykh4+EYewZ7QbpnlwW7hNpj8eH+rMr+OZHKzdp
KTftgVjmuF4JJ/cPMQUjL8SuGj+zBW6IWPOZdqkEMtf7Pr8kkYbZsh0SgJ0ceRHZ7Uc06mB/y+C1
UnJPxehTTdu8tpCjdzXgBw/H2uuW1J3qdHbCfbuDILql8V8RiZKubcZLhdsD3Jvj8qK0DGWBJa6x
p90q5p3pLE8LvAeCgQIDAQABo4HQMIHNMA4GA1UdDwEB/wQEAwIEMDAfBgNVHSMEGDAWgBSnJLA+
xYPvBA5QdksYMufKVtEsujAZBgNVHSAEEjAQMA4GDCsGAQQBXgExBgEHAzA5BgNVHR8EMjAwMC6g
LKAqhihodHRwOi8vY3JsLm5va2lhLmNvbS9Ob2tpYSUyMEJJJTIwQ0EuY3JsMCUGA1UdEQQeMByB
GnRlZW11LnNhdm9sYWluZW5Abm9raWEuY29tMB0GA1UdDgQWBBQTRzvZsgmQrAGCeuzdHTGAC6Jg
UzANBgkqhkiG9w0BAQUFAAOCAQEACmPVsdi07pjK5gDa+W5JlE2C74kVVsB8alBqfioYeR5At2FG
B7sua4Dz5H7TJMpZ1jYFeI+zjexD5f+beY2IlV15lMoWD+5e38QlLYjwfe2LAyvdzBKXW0e0U6Bt
p78ft4gyVak1X+Db+ebR+FNHUOMNhm+yK3w9sy5ZQzBFusIx4OgxGvcZhyhmd9WjipSTalgPwgqV
Ju2aPADCG++OEXmgEWRLsR4yNopkgK4ftVqrN5uUtLs83qdeXTRcNRiET1IOx5zmYFZ6q3gjKIx5
iyuxcDeYas93vVHUcaRRYpsoby5CHq7Z/j/TQhtqO/knWuxLFFiCUgdGKMKrRkg29DCCBAowggLy
oAMCAQICEQCBvi+p+bA/dBtBtybwA6YYMA0GCSqGSIb3DQEBBQUAMDMxCzAJBgNVBAYTAkZJMQ4w
DAYDVQQKEwVOb2tpYTEUMBIGA1UEAxMLTm9raWEgQkkgQ0EwHhcNMTEwOTA2MDU1MDM0WhcNMTMw
OTA1MDU1MDM0WjBWMQ4wDAYDVQQKDAVOb2tpYTEPMA0GA1UECwwGUGVvcGxlMRgwFgYKCZImiZPy
LGQBAQwIMTAwMjQ2NzYxGTAXBgNVBAMMEFNhdm9sYWluZW4gVGVlbXUwggEiMA0GCSqGSIb3DQEB
AQUAA4IBDwAwggEKAoIBAQDFPmbRVwuo52v+h6xnQUqokAx2xsHjmPBniEkzgtgBNJsFi838ATEg
1zsx+VotoJg7hMijcrQfpTAgW6gpLGnlmw5QQswrNK1zleOHb4pA5JguU3WhVKFkAH/6/2EU2k/9
m8Pb/gwP55cYg80R6fRmbdsWKhseXF/1isW/rJcWLmIYDg/rXfo3ixqtT9MroAMiuoXnb0ij1L2d
Jj64LDp3Ld8Jo0qZzk3Fj4apo8PBd8eAH6HloVBJkxQcwAnv561A+Xi1GHZ2mafRYJGO+1uBDwyd
g/8ybEXXA4MKo8lPKjBebYBUFvz80DBA/Lq74UysXkG23BSulcG4xQSYGlyzAgMBAAGjgfUwgfIw
HwYDVR0jBBgwFoAUpySwPsWD7wQOUHZLGDLnylbRLLowGQYDVR0gBBIwEDAOBgwrBgEEAV4BMQYB
BgQwOQYDVR0fBDIwMDAuoCygKoYoaHR0cDovL2NybC5ub2tpYS5jb20vTm9raWElMjBCSSUyMENB
LmNybDAjBgNVHSUEHDAaBggrBgEFBQcDAgYEVR0lAAYIKwYBBQUHAwQwDgYDVR0PAQH/BAQDAgeA
MCUGA1UdEQQeMByBGnRlZW11LnNhdm9sYWluZW5Abm9raWEuY29tMB0GA1UdDgQWBBTGhbTJF0EX
iagjymQo6GIuSQeRVDANBgkqhkiG9w0BAQUFAAOCAQEAqai6TxZ/BlMHZIhJNPriBPXkQhUlBkGA
buJZ5sVm1HIQhWN8elZKjjJdHi1qWEKhMg7yHjEMZsyV8XAZzK0UnOqkpUnt+jnVkNZ9O7/jRtyK
f4WUtq5jErc8Hlv4bbGFRHk1T7AuLLE52r1lYOdmoibnQp03QtlDvHUNa68G7jvzThJhieB7U1xh
vH3yy0ktaVnWEgAylqf9yIUFjnqau5R6cE1Xo57IYPk/KitX0YF+OigEI/bOQVMi+fze93ZsAOJv
/z6g/NGemvUgl5YSdX0uPQK6kEHf/sp/nZyUWWQ7OjtVSqkq2YuYEueQFxTfafl+78GWqgm6W/Bl
32laYzGCAuswggLnAgEBMEgwMzELMAkGA1UEBhMCRkkxDjAMBgNVBAoTBU5va2lhMRQwEgYDVQQD
EwtOb2tpYSBCSSBDQQIRAIG+L6n5sD90G0G3JvADphgwCQYFKw4DAhoFAKCCAXgwGAYJKoZIhvcN
AQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTExMDIxMDcyMTQ3WjAjBgkqhkiG9w0B
CQQxFgQU/bt/B0rQv3tXWH/VWaFd5Jxuc+UwVgYJKwYBBAGCNxAEMUkwRzAzMQswCQYDVQQGEwJG
STEOMAwGA1UEChMFTm9raWExFDASBgNVBAMTC05va2lhIEJJIENBAhAwflqlqTyUTLouYuUuwnLx
MFgGCyqGSIb3DQEJEAILMUmgRzAzMQswCQYDVQQGEwJGSTEOMAwGA1UEChMFTm9raWExFDASBgNV
BAMTC05va2lhIEJJIENBAhAwflqlqTyUTLouYuUuwnLxMGcGCSqGSIb3DQEJDzFaMFgwCgYIKoZI
hvcNAwcwDgYIKoZIhvcNAwICAgCAMA0GCCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMC
AgEoMAcGBSsOAwIaMAoGCCqGSIb3DQIFMA0GCSqGSIb3DQEBAQUABIIBAH4fWcHUHaqLq7VSsA/L
VPnpWJ409zY/ASwFn0TVo/n3fnC9W5E2KgpzOFLjaa8A2Fxn2GB6jRhRyAVn/LBRjYXCPdm0q47m
Ce0KpR1DY4ekloMqJnRGE6t1Ye4eodux9DGCQ4TErS7Dr4k6ytHjW0T4kdJ+HIZex+oeTuxZRQKE
7Hr6vdn6iFnSoYVskxrHAfH3vkhfIKCO1hpm4vppevOrtwPqy1j/XWvg7B8GF0z/xu+dbeRyEXOZ
a9ZJ1IvGNRij+ouTTljaH8OKW8LE3B2mac5QfVkQjNxnX6bL3dC6+fnCqgCEa3JWRsK7/8bpPwym
wc0THHNYNSMAq7rAU7oAAAAAAAA=

------=_NextPart_000_017A_01CC8FDB.3D0BB910--

From Ray.Bellis@nominet.org.uk  Fri Oct 21 00:46:42 2011
Return-Path: <Ray.Bellis@nominet.org.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A134521F8573; Fri, 21 Oct 2011 00:46:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.392
X-Spam-Level: 
X-Spam-Status: No, score=-9.392 tagged_above=-999 required=5 tests=[AWL=1.207,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lpy8rUyDKuk1; Fri, 21 Oct 2011 00:46:42 -0700 (PDT)
Received: from mx4.nominet.org.uk (mail.nominet.org.uk [213.248.199.24]) by ietfa.amsl.com (Postfix) with ESMTP id 139D921F8558; Fri, 21 Oct 2011 00:46:39 -0700 (PDT)
DomainKey-Signature: s=main.dk.nominet.selector; d=nominet.org.uk; c=nofws; q=dns;  h=X-IronPort-AV:Received:Received:From:To:CC:Subject: Thread-Topic:Thread-Index:Date:Message-ID:References: In-Reply-To:Accept-Language:Content-Language: X-MS-Has-Attach:X-MS-TNEF-Correlator:Content-Type: Content-ID:Content-Transfer-Encoding:MIME-Version; b=4lIPe9h/lP5oeitSpD+/S8S+PqTENj9FOMu10FwfIwiNacJY/oDbnPTO qOPsByGxsWjgCql8yraPUdsXbgmm00naRICl39YJfvWSnOFkuaTHFyD4E 4FsO1lKPmtn61h3;
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nominet.org.uk; i=Ray.Bellis@nominet.org.uk; q=dns/txt; s=main.dkim.nominet.selector; t=1319183201; x=1350719201; h=from:sender:reply-to:subject:date:message-id:to:cc: mime-version:content-transfer-encoding:content-id: content-description:resent-date:resent-from:resent-sender: resent-to:resent-cc:resent-message-id:in-reply-to: references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:list-owner:list-archive; z=From:=20Ray=20Bellis=20<Ray.Bellis@nominet.org.uk> |Subject:=20Re:=20[mif]=20[dnsext]=202nd=20Last=20Call=20 for=20MIF=20DNS=20server=09selection=0D=0A=09document |Date:=20Fri,=2021=20Oct=202011=2007:46:30=20+0000 |Message-ID:=20<7B1BA1C2-3EC4-48B7-B02F-85E78456D726@nomi net.org.uk>|To:=20"<teemu.savolainen@nokia.com>=20=20<tee mu.savolainen@nokia.com>"=0D=0A=09<teemu.savolainen@nokia .com>|CC:=20"<brian.peter.dickson@gmail.com>"=20<brian.pe ter.dickson@gmail.com>,=0D=0A=09"<dhcwg@ietf.org>"=20<dhc wg@ietf.org>,=20"<dnsop@ietf.org>"=20<dnsop@ietf.org>,=0D =0A=09"<mif@ietf.org>"=20<mif@ietf.org>,=20"<dnsext@ietf. org>"=20<dnsext@ietf.org>|MIME-Version:=201.0 |Content-Transfer-Encoding:=20quoted-printable |Content-ID:=20<629d8135-1b4c-46b1-8d20-8923cdfff68d> |In-Reply-To:=20<916CE6CF87173740BC8A2CE44309696203784B63 @008-AM1MPN1-037.mgdnok.nokia.com>|References:=20<COL118- W55403198A984BAAE44BA47B1F70@phx.gbl>=0D=0A=20<916CE6CF87 173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nok ia.com>=0D=0A=20<121DABD1-65E8-4275-8471-9FA38D25C434@nom inet.org.uk>=0D=0A=20<916CE6CF87173740BC8A2CE443096962037 83EE0@008-AM1MPN1-037.mgdnok.nokia.com>=0D=0A=20<4EA09791 .8010705@gmail.com>=0D=0A=20<C8398996-79B5-437E-82A5-6B86 9ECF8F4E@network-heretics.com>=0D=0A=20<94C2E518-F34F-49E 4-B15C-2CCCFAA96667@virtualized.org>=0D=0A=20<12477381-9F 74-4C50-B576-47EE4322F6BC@network-heretics.com>=0D=0A=20< CAH1iCiqsN-R87VK3vKityPsY+NXA=3D0DRASYf_vmBSy8gvYwHdQ@mai l.gmail.com>=0D=0A=20<916CE6CF87173740BC8A2CE443096962037 84B63@008-AM1MPN1-037.mgdnok.nokia.com>; bh=WZZN/BdQ6CyR1gwX5EH1rUOG3EV73LdrRq/d3r4AVMU=; b=dGbdwyTSANfvyA3UCm7GUYTK2WtbVFjuaggnRl9oH9b3IiNjmVuDtnwF yEsqKpD6aFmX6k4Dni7uySvW8gMK8rmgvHJiCna+3tFlgWS43IRTtMmKi XzPTa6G/XgH0xOL;
X-IronPort-AV: E=Sophos;i="4.69,384,1315177200"; d="scan'208";a="29100681"
Received: from wds-exc2.okna.nominet.org.uk ([213.248.197.145]) by mx4.nominet.org.uk with ESMTP; 21 Oct 2011 08:46:32 +0100
Received: from WDS-EXC1.okna.nominet.org.uk ([fe80::1593:1394:a91f:8f5f]) by wds-exc2.okna.nominet.org.uk ([fe80::7577:eaca:5241:25d4%19]) with mapi; Fri, 21 Oct 2011 08:46:32 +0100
From: Ray Bellis <Ray.Bellis@nominet.org.uk>
To: "<teemu.savolainen@nokia.com>  <teemu.savolainen@nokia.com>" <teemu.savolainen@nokia.com>
Thread-Topic: [mif] [dnsext] 2nd Last Call for MIF DNS server	selection document
Thread-Index: AQHMj8Imxcbx/iS/+UW6nUgghEBBq5WGWs8A
Date: Fri, 21 Oct 2011 07:46:30 +0000
Message-ID: <7B1BA1C2-3EC4-48B7-B02F-85E78456D726@nominet.org.uk>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B63@008-AM1MPN1-037.mgdnok.nokia.com>
In-Reply-To: <916CE6CF87173740BC8A2CE44309696203784B63@008-AM1MPN1-037.mgdnok.nokia.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <629d8135-1b4c-46b1-8d20-8923cdfff68d>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<mif@ietf.org>" <mif@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server	selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 07:46:42 -0000

On 21 Oct 2011, at 08:21, <teemu.savolainen@nokia.com>
 <teemu.savolainen@nokia.com> wrote:

> Do you agree that nodes' behavioral differences between "foo" and "foo."
> names is out of the scope of this particular MIF draft?

In my view neither the draft nor MIF should be encoding any changes to clie=
nt name resolution behaviour that depend on the "bareness" of a supplied na=
me.

Existing OSes have many varying algorithms for deciding which name service(=
s) to use to resolve any particular name, some of which have user-configura=
ble knobs (e.g. "options: ndots" in /etc/resolv.conf).

By all means use server selection once the OS has decided that "DNS" is the=
 correct name service, but that algorithm shouldn't IMHO impact or otherwis=
e specify the prior name service selection algorithm.

> There could perhaps be another draft, which would say that if name is "fo=
o"
> it should not be appended with search lists but "foo." might?

If anything it would be the other way around - 'foo.' is explicitly already=
 full qualified, and MUST NOT be appended with search lists.

Ray



From moore@network-heretics.com  Fri Oct 21 07:10:48 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3295121F8AED; Fri, 21 Oct 2011 07:10:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.768
X-Spam-Level: 
X-Spam-Status: No, score=-3.768 tagged_above=-999 required=5 tests=[AWL=-0.169, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lo6DlaJCxZ77; Fri, 21 Oct 2011 07:10:47 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id 6021521F8B1A; Fri, 21 Oct 2011 07:10:44 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.mail.srv.osa [10.202.2.46]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id C652921427; Fri, 21 Oct 2011 10:10:35 -0400 (EDT)
Received: from frontend1.nyi.mail.srv.osa ([10.202.2.160]) by compute6.internal (MEProxy); Fri, 21 Oct 2011 10:10:35 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=cRfCSQxXa5CuxeLAc8AqVR6bGf8=; b=b/ HCS9HcV76vueIB9sRyneIyxwRBxjEtzShrKef+XfVgVLINGqy2Iysea5eXR/lGSQ Q4q10dZokjR83OJExfDk/0Mece1kYdkPQE/MzgUtDBQnCc32PymS0QaUoVaNckpg HIsn4REWVKE3mnpGQCEHgZAzChtaRf/9snXOJjwqo=
X-Sasl-enc: Ha7BrwBdL6cjhz3taJOw+wulibPHp2Rydy1NpM65Lsim 1319206235
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id F0FFF408BCC; Fri, 21 Oct 2011 10:10:33 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <916CE6CF87173740BC8A2CE44309696203784B1F@008-AM1MPN1-037.mgdnok.nokia.com>
Date: Fri, 21 Oct 2011 10:10:07 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <71BF497E-6C6F-4EAF-817F-1478FFB51FE2@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <916CE6CF87173740BC8A2CE44309696203784B1F@008-AM1MPN1-037.mgdnok.nokia.com>
To: <teemu.savolainen@nokia.com>
X-Mailer: Apple Mail (2.1084)
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, john_brzozowski@cable.comcast.com, dhcwg@ietf.org, denghui02@hotmail.com, brian.e.carpenter@gmail.com
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server	selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 14:10:48 -0000

On Oct 21, 2011, at 3:15 AM, <teemu.savolainen@nokia.com> wrote:

> Brian,
>=20
> Would the following text be then ok? Please note I changed the domain =
addition from SHOULD to MAY, if there is going to be attempt to =
deprecate/redefine/update search list logics. Or do you think it should =
remain SHOULD?
> --
> 4.6.  Interactions with DNS search lists
>=20
>   A node may be configured with DNS search list via DHCPv6
>   OPTION_DOMAIN_LIST [RFC3646] or via DHCPv4 Domain Search Option
>   [RFC3397].
>=20
>   A bare name (a name without any dots) MUST be first treated as a =
pre-
>   DNS hostname or handled by other means that, as of this writing, are
>   under discussion in the IETF and that are out of the scope of this
>   document.  If the bare name resolution fails, the name MAY then be
>   appended with the domain information.  If the bare name is appended
>   with the domain information the described DNS server selection logic
>   SHALL be utilized for the resulting name.

Associating MUST with undefined behavior makes no sense at all.

>   Resolution for the name containing any dots SHOULD first be =
attempted
>   with DNS servers of all interfaces.  Only if the resolution fails =
the
>   node MAY append the name with search list domain(s) and then again
>   utilize improved DNS server selection algorithm to decide which DNS
>   server(s) to contact.

Names containing dots SHOULD NOT (perhaps MUST NOT) be subject to =
searches.  They should already be considered fully qualified.

Just because a lookup "fails" does not mean that the name is not valid.  =
It could fail for temporary reasons, or because the TLD server wasn't =
reachable.

Back before there was a .CS TLD, searching on names containing dots was =
common.   Lots of computer science departments had .CS subdomains (e.g. =
cs.utk.edu used to be my mail domain), and people were accustomed to =
being able to send mail to moore@cs or moore@host.cs).   Once the .CS =
TLD was defined it became obvious that domains containing any dots =
should not be subject to search.

Keith



From Ted.Lemon@nominum.com  Fri Oct 21 08:19:09 2011
Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D50F21F8B3D; Fri, 21 Oct 2011 08:19:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.535
X-Spam-Level: 
X-Spam-Status: No, score=-106.535 tagged_above=-999 required=5 tests=[AWL=0.062, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zgKyUCzLPAEQ; Fri, 21 Oct 2011 08:19:08 -0700 (PDT)
Received: from exprod7og111.obsmtp.com (exprod7og111.obsmtp.com [64.18.2.175]) by ietfa.amsl.com (Postfix) with ESMTP id 0B68021F8AD8; Fri, 21 Oct 2011 08:19:07 -0700 (PDT)
Received: from shell-too.nominum.com ([64.89.228.229]) (using TLSv1) by exprod7ob111.postini.com ([64.18.6.12]) with SMTP;  Fri, 21 Oct 2011 08:19:08 PDT
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id BEA181B827A; Fri, 21 Oct 2011 08:19:06 -0700 (PDT)
Received: from webmail.nominum.com (cas-01.win.nominum.com [64.89.228.131]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTPS id B6735190065; Fri, 21 Oct 2011 08:19:06 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from MBX-01.WIN.NOMINUM.COM ([64.89.228.133]) by CAS-01.WIN.NOMINUM.COM ([64.89.228.131]) with mapi id 14.01.0323.003; Fri, 21 Oct 2011 08:19:07 -0700
From: Ted Lemon <Ted.Lemon@nominum.com>
To: Keith Moore <moore@network-heretics.com>
Thread-Topic: [DNSOP] [dnsext] [mif] 2nd Last Call for MIF DNS server selection	document
Thread-Index: AQHMkAQNa5aq/ROWxEuy8rvfsHIUPpWHXtwA
Date: Fri, 21 Oct 2011 15:19:06 +0000
Message-ID: <F932CA9C-3489-48AC-A454-5B7A91CF129A@nominum.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com>
In-Reply-To: <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.1.10]
Content-Type: multipart/alternative; boundary="_000_F932CA9C348948ACA4545B7A91CF129Anominumcom_"
MIME-Version: 1.0
Cc: DHC WG <dhcwg@ietf.org>, "dnsop@ietf.org WG" <dnsop@ietf.org>, "<mif@ietf.org>" <mif@ietf.org>, dnsext List <dnsext@ietf.org>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 15:19:09 -0000

--_000_F932CA9C348948ACA4545B7A91CF129Anominumcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

On Oct 21, 2011, at 11:13 AM, Keith Moore wrote:
IMO: search lists are useful, but only with "bare names" - and the behavior=
 of those should be implementation dependent.  Trying to nail it down will =
break too much widespread practice.

On a desktop workstation they are useful, because you can largely trust the=
 security of the physical network.   On mobile nodes, though, they are harm=
ful, because they open up a really easy avenue for exploit.

On MIF nodes, they also open up potential for mistakes.   So if we are to m=
eet the spirit of your request here, it will still require a document descr=
ibing what the mistakes are, and providing advice on how to avoid them.


--_000_F932CA9C348948ACA4545B7A91CF129Anominumcom_
Content-Type: text/html; charset="us-ascii"
Content-ID: <D9788151E64039419C07C9C86C6772EB@nominum.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
<div>
<div>On Oct 21, 2011, at 11:13 AM, Keith Moore wrote:</div>
<blockquote type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-=
collapse: separate; font-family: Helvetica; font-style: normal; font-varian=
t: normal; font-weight: normal; letter-spacing: normal; line-height: normal=
; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: n=
one; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-hori=
zontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-dec=
orations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stro=
ke-width: 0px; font-size: medium; ">IMO:
 search lists are useful, but only with &quot;bare names&quot; - and the be=
havior of those should be implementation dependent. &nbsp;Trying to nail it=
 down will break too much widespread practice.</span></blockquote>
</div>
<br>
<div>On a desktop workstation they are useful, because you can largely trus=
t the security of the physical network. &nbsp; On mobile nodes, though, the=
y are harmful, because they open up a really easy avenue for exploit.</div>
<div><br>
</div>
<div>On MIF nodes, they also open up potential for mistakes. &nbsp; So if w=
e are to meet the spirit of your request here, it will still require a docu=
ment describing what the mistakes are, and providing advice on how to avoid=
 them.</div>
<div><br>
</div>
</body>
</html>

--_000_F932CA9C348948ACA4545B7A91CF129Anominumcom_--

From moore@network-heretics.com  Fri Oct 21 08:31:40 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCA6D1F0C86; Fri, 21 Oct 2011 08:31:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.725
X-Spam-Level: 
X-Spam-Status: No, score=-3.725 tagged_above=-999 required=5 tests=[AWL=-0.127, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vJC+7-eR9wM8; Fri, 21 Oct 2011 08:31:40 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id DEA8E1F0C6F; Fri, 21 Oct 2011 08:31:39 -0700 (PDT)
Received: from compute5.internal (compute5.nyi.mail.srv.osa [10.202.2.45]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id 8D08920ED3; Fri, 21 Oct 2011 11:31:34 -0400 (EDT)
Received: from frontend1.nyi.mail.srv.osa ([10.202.2.160]) by compute5.internal (MEProxy); Fri, 21 Oct 2011 11:31:34 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:message-id:references:to; s=smtpout; bh=RJ8 /hnttN06bpudUkmxXY+8hH9M=; b=PFb+3ysonRxnPG/EvBeDnSfHXinPKZW7Tjm CFMB37t3ClqFtPZa3e7ez8i08VjpVHebMJ8MpODdYX8XLqbjq7nOM1p4ylEPDvG2 tJwk7Hzw13eNqTaQBLC7pyvSK3jmZz87DFUC1nr8T0mC9a6HJX0NLa4S2+5Shxz7 NADCl5ZU=
X-Sasl-enc: BzEFGSjkiIBbwK80rQASp2a9o7T/Qd5G2tJt+7/7ULLg 1319211093
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id F2938408C18; Fri, 21 Oct 2011 11:31:32 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-69--546033778
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <F932CA9C-3489-48AC-A454-5B7A91CF129A@nominum.com>
Date: Fri, 21 Oct 2011 11:31:06 -0400
Message-Id: <1DF30BB4-76DB-427A-8ACF-A345BAE26FA6@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <F932CA9C-3489-48AC-A454-5B7A91CF129A@nominum.com>
To: Ted Lemon <Ted.Lemon@nominum.com>
X-Mailer: Apple Mail (2.1084)
Cc: DHC WG <dhcwg@ietf.org>, "dnsop@ietf.org WG" <dnsop@ietf.org>, "<mif@ietf.org>" <mif@ietf.org>, dnsext List <dnsext@ietf.org>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 15:31:41 -0000

--Apple-Mail-69--546033778
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

On Oct 21, 2011, at 11:19 AM, Ted Lemon wrote:

> On Oct 21, 2011, at 11:13 AM, Keith Moore wrote:
>> IMO: search lists are useful, but only with "bare names" - and the =
behavior of those should be implementation dependent.  Trying to nail it =
down will break too much widespread practice.
>=20
> On a desktop workstation they are useful, because you can largely =
trust the security of the physical network.   On mobile nodes, though, =
they are harmful, because they open up a really easy avenue for exploit.

True.  But unsecured DNS is easily exploited regardless of whether bare =
names are used.  (and I've never bought the idea that DNSSEC =
verification can reasonably be done by an external host)

(When I think about things, I generally assume that nearly all nodes are =
mobile, because that's clearly the way things are going.  I expect that =
desktop workstations - in the sense of hosts that serve individual users =
and have fixed locations in the network - will be almost nonexistent in =
a very short time.  They don't need to be special-cased.)

> On MIF nodes, they also open up potential for mistakes.   So if we are =
to meet the spirit of your request here, it will still require a =
document describing what the mistakes are, and providing advice on how =
to avoid them.

Understood.   I just think it's going to be tricky to do that without =
breaking a lot of existing behavior.  But in principle, there's nothing =
wrong with describing security vulnerabilities and workarounds for =
those.

Keith


--Apple-Mail-69--546033778
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div><div>On Oct 21, 2011, at 11:19 AM, Ted Lemon wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite">

<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">

<div style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">
<div>
<div>On Oct 21, 2011, at 11:13 AM, Keith Moore wrote:</div>
<blockquote type="cite"><span class="Apple-style-span" style="border-collapse: separate; font-family: Helvetica; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-size: medium; ">IMO:
 search lists are useful, but only with "bare names" - and the behavior of those should be implementation dependent. &nbsp;Trying to nail it down will break too much widespread practice.</span></blockquote>
</div>
<br>
<div>On a desktop workstation they are useful, because you can largely trust the security of the physical network. &nbsp; On mobile nodes, though, they are harmful, because they open up a really easy avenue for exploit.</div></div></blockquote><div><br></div>True. &nbsp;But unsecured DNS is easily exploited regardless of whether bare names are used. &nbsp;(and I've never bought the idea that DNSSEC verification can reasonably be done by an external host)</div><div><br></div><div>(When I think about things, I generally assume that nearly all nodes are mobile, because that's clearly the way things are going. &nbsp;I expect that desktop workstations - in the sense of hosts that serve individual users and have fixed locations in the network - will be almost nonexistent in a very short time. &nbsp;They don't need to be special-cased.)</div><div><br><blockquote type="cite"><div style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">

<div>On MIF nodes, they also open up potential for mistakes. &nbsp; So if we are to meet the spirit of your request here, it will still require a document describing what the mistakes are, and providing advice on how to avoid them.</div>
</div>

</blockquote><br></div><div>Understood. &nbsp; I just think it's going to be tricky to do that without breaking a lot of existing behavior. &nbsp;But in principle, there's nothing wrong with describing security vulnerabilities and workarounds for those.</div><div><br></div><div>Keith</div><div><br></div></body></html>
--Apple-Mail-69--546033778--

From teemu.savolainen@nokia.com  Fri Oct 21 11:54:32 2011
Return-Path: <teemu.savolainen@nokia.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C80A1F0C81; Fri, 21 Oct 2011 11:54:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.583
X-Spam-Level: 
X-Spam-Status: No, score=-2.583 tagged_above=-999 required=5 tests=[AWL=0.016,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9+GnTtVoNXXS; Fri, 21 Oct 2011 11:54:31 -0700 (PDT)
Received: from mgw-da02.nokia.com (smtp.nokia.com [147.243.128.26]) by ietfa.amsl.com (Postfix) with ESMTP id 7E78B1F0C62; Fri, 21 Oct 2011 11:54:31 -0700 (PDT)
Received: from vaebh106.NOE.Nokia.com (vaebh106.europe.nokia.com [10.160.244.32]) by mgw-da02.nokia.com (Switch-3.4.4/Switch-3.4.4) with ESMTP id p9LIsTjq028071; Fri, 21 Oct 2011 21:54:30 +0300
Received: from smtp.mgd.nokia.com ([65.54.30.8]) by vaebh106.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675);  Fri, 21 Oct 2011 21:54:24 +0300
Received: from 008-AM1MMR1-006.mgdnok.nokia.com (65.54.30.61) by NOK-AM1MHUB-04.mgdnok.nokia.com (65.54.30.8) with Microsoft SMTP Server (TLS) id 8.2.255.0; Fri, 21 Oct 2011 20:54:23 +0200
Received: from 008-AM1MPN1-037.mgdnok.nokia.com ([169.254.7.8]) by 008-AM1MMR1-006.mgdnok.nokia.com ([65.54.30.61]) with mapi id 14.01.0339.002; Fri, 21 Oct 2011 20:54:23 +0200
From: <teemu.savolainen@nokia.com>
To: <moore@network-heretics.com>
Thread-Topic: [mif] [dnsext] 2nd Last Call for MIF DNS server	selection document
Thread-Index: AQHMj3JGB7FreQH6+EqCg+ltMTYsr5WGYYlQgABUUICAAG8GUA==
Date: Fri, 21 Oct 2011 18:54:23 +0000
Message-ID: <916CE6CF87173740BC8A2CE4430969620378524D@008-AM1MPN1-037.mgdnok.nokia.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <916CE6CF87173740BC8A2CE44309696203784B1F@008-AM1MPN1-037.mgdnok.nokia.com> <71BF497E-6C6F-4EAF-817F-1478FFB51FE2@network-heretics.com>
In-Reply-To: <71BF497E-6C6F-4EAF-817F-1478FFB51FE2@network-heretics.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-tituslabs-classifications-30: TLPropertyRoot=Nokia;Confidentiality=Company Confidential;Project=None;
x-titus-version: 3.3.8.1
x-headerinfofordlp: None
x-tituslabs-classificationhash-30: VgNFIFU9Hx+/nZJb9Kg7IleTS5gKgr+JhCehPOzQb7X8VPIDGtFQ+zxfOgeaBUZsOG8Ek7lD2xu5WHF5/rxKyBmC4Zgoz9lY65iVD+EwKfx/HOyCbcbCouTzciSIqgIMf/5bLh0Sai/jE6sG24Xx+7Vb5YLSzlGNh/xlWFKXjhG/VugZS7r2MiqJJ+wJiYnj7oW0F1q2Pewb5bJXqVC5toWbFgVuespx3qoYFmYIO7yzifaaSr9b380ixgq8cDxL9AfCqPWq32/ZgZAi48Q3WSxOadDP3x3m22zqpSDkV30=
x-originating-ip: [10.162.69.25]
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_005E_01CC903B.FD6CFBF0"
MIME-Version: 1.0
X-OriginalArrivalTime: 21 Oct 2011 18:54:24.0657 (UTC) FILETIME=[D9EFF010:01CC9022]
X-Nokia-AV: Clean
Cc: dhcwg@ietf.org, dnsop@ietf.org, mif@ietf.org, dnsext@ietf.org
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server	selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 18:54:32 -0000

------=_NextPart_000_005E_01CC903B.FD6CFBF0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Now that more people are involved in discussions, this bare name / DNS
search list area seems to look like quite a deep swamp without clear IETF
consensus.

Perhaps we should discuss first if this particular topic (=section 4.6) is
needed in this document at all, because, after all, the focus is on
selecting the DNS server based on matching domains. 

Best regards,

	Teemu

> -----Original Message-----
> From: ext Keith Moore [mailto:moore@network-heretics.com]
> Sent: 21. lokakuuta 2011 17:10
> To: Savolainen Teemu (Nokia-CTO/Tampere)
> Cc: brian.e.carpenter@gmail.com; mif@ietf.org; dnsop@ietf.org;
> dnsext@ietf.org; pk@isoc.de; john_brzozowski@cable.comcast.com;
> dhcwg@ietf.org; denghui02@hotmail.com
> Subject: Re: [mif] [dnsext] 2nd Last Call for MIF DNS server selection
> document
> 
> 
> On Oct 21, 2011, at 3:15 AM, <teemu.savolainen@nokia.com> wrote:
> 
> > Brian,
> >
> > Would the following text be then ok? Please note I changed the domain
> addition from SHOULD to MAY, if there is going to be attempt to
> deprecate/redefine/update search list logics. Or do you think it should
> remain SHOULD?
> > --
> > 4.6.  Interactions with DNS search lists
> >
> >   A node may be configured with DNS search list via DHCPv6
> >   OPTION_DOMAIN_LIST [RFC3646] or via DHCPv4 Domain Search Option
> >   [RFC3397].
> >
> >   A bare name (a name without any dots) MUST be first treated as a pre-
> >   DNS hostname or handled by other means that, as of this writing, are
> >   under discussion in the IETF and that are out of the scope of this
> >   document.  If the bare name resolution fails, the name MAY then be
> >   appended with the domain information.  If the bare name is appended
> >   with the domain information the described DNS server selection logic
> >   SHALL be utilized for the resulting name.
> 
> Associating MUST with undefined behavior makes no sense at all.
> 
> >   Resolution for the name containing any dots SHOULD first be attempted
> >   with DNS servers of all interfaces.  Only if the resolution fails the
> >   node MAY append the name with search list domain(s) and then again
> >   utilize improved DNS server selection algorithm to decide which DNS
> >   server(s) to contact.
> 
> Names containing dots SHOULD NOT (perhaps MUST NOT) be subject to
> searches.  They should already be considered fully qualified.
> 
> Just because a lookup "fails" does not mean that the name is not valid.
It
> could fail for temporary reasons, or because the TLD server wasn't
> reachable.
> 
> Back before there was a .CS TLD, searching on names containing dots was
> common.   Lots of computer science departments had .CS subdomains (e.g.
> cs.utk.edu used to be my mail domain), and people were accustomed to
> being able to send mail to moore@cs or moore@host.cs).   Once the .CS TLD
> was defined it became obvious that domains containing any dots should not
> be subject to search.
> 
> Keith
> 


------=_NextPart_000_005E_01CC903B.FD6CFBF0
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_005E_01CC903B.FD6CFBF0--

From teemu.savolainen@nokia.com  Fri Oct 21 00:15:16 2011
Return-Path: <teemu.savolainen@nokia.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA90911E808C; Fri, 21 Oct 2011 00:15:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.581
X-Spam-Level: 
X-Spam-Status: No, score=-2.581 tagged_above=-999 required=5 tests=[AWL=0.018,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U2lvJQYVyTRK; Fri, 21 Oct 2011 00:15:15 -0700 (PDT)
Received: from mgw-sa02.nokia.com (smtp.nokia.com [147.243.1.48]) by ietfa.amsl.com (Postfix) with ESMTP id D5CFD11E8095; Fri, 21 Oct 2011 00:15:14 -0700 (PDT)
Received: from vaebh104.NOE.Nokia.com (vaebh104.europe.nokia.com [10.160.244.30]) by mgw-sa02.nokia.com (Switch-3.4.4/Switch-3.4.4) with ESMTP id p9L7F7lh025099; Fri, 21 Oct 2011 10:15:10 +0300
Received: from smtp.mgd.nokia.com ([65.54.30.5]) by vaebh104.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675);  Fri, 21 Oct 2011 10:15:07 +0300
Received: from 008-AM1MMR1-004.mgdnok.nokia.com (65.54.30.59) by NOK-am1MHUB-01.mgdnok.nokia.com (65.54.30.5) with Microsoft SMTP Server (TLS) id 8.2.255.0; Fri, 21 Oct 2011 09:15:07 +0200
Received: from 008-AM1MPN1-037.mgdnok.nokia.com ([169.254.7.8]) by 008-AM1MMR1-004.mgdnok.nokia.com ([65.54.30.59]) with mapi id 14.01.0339.002; Fri, 21 Oct 2011 09:15:06 +0200
From: <teemu.savolainen@nokia.com>
To: <brian.peter.dickson@gmail.com>, <moore@network-heretics.com>
Thread-Topic: [dnsext] [mif] 2nd Last Call for MIF DNS server selection document
Thread-Index: AQHMj6R+QZ795RKazUe9WQ1xF1IpB5WGXdfw
Date: Fri, 21 Oct 2011 07:15:06 +0000
Message-ID: <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com>
In-Reply-To: <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-tituslabs-classifications-30: TLPropertyRoot=Nokia;Confidentiality=Company Confidential;Project=None;
x-titus-version: 3.3.8.1
x-headerinfofordlp: None
x-tituslabs-classificationhash-30: VgNFIFU9Hx+/nZJb9Kg7IvQmQ0o/K2jquxqC2Uue5GHpzEuo3S9zNfeh3beuXC4d4U+9SoG2zegA7qMLdX6PTG17IL7pxR5S/KY/iCJNnn1c5UqLju8bmTWbhVRC5KYyRvx6Lux+omb+cjLr4ZT4xGr6EYlMoJAb4mKk7Ygo2IOCLEfvotq8eZrg90l9H1dML3IGXW5CR0VaroyKyJb6YmetiFAenF/tDgR293RVPdnMoKPAurwSeBTTqO8uNr6TcXVEvm613p4YTVwzPTjUYrSShwM2n81B2EdPx398YIM=
x-originating-ip: [10.162.93.230]
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0168_01CC8FDA.4CD5BC20"
MIME-Version: 1.0
X-OriginalArrivalTime: 21 Oct 2011 07:15:07.0820 (UTC) FILETIME=[29B6AEC0:01CC8FC1]
X-Nokia-AV: Clean
X-Mailman-Approved-At: Sat, 22 Oct 2011 02:31:09 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, john_brzozowski@cable.comcast.com, dhcwg@ietf.org, denghui02@hotmail.com, brian.e.carpenter@gmail.com
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 07:15:17 -0000

------=_NextPart_000_0168_01CC8FDA.4CD5BC20
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Brian,

Do you agree that nodes' behavioral differences between "foo" and "foo."
names is out of the scope of this particular MIF draft?

There could perhaps be another draft, which would say that if name is =
"foo"
it should not be appended with search lists but "foo." might? And =
whatever
other differences in their handling would be, and what impacts it would =
have
e.g. intranet designers?

Please see also in another email my suggestion for section 4.6 text. =
That
text should now allow possible changes for the bare name handling while
still allowing coexistence with DNS server selection.

Best regards,

Teemu

> -----Original Message-----
> From: dnsext-bounces@ietf.org [mailto:dnsext-bounces@ietf.org] On =
Behalf
> Of ext Brian Dickson
> Sent: 21. lokakuuta 2011 06:16
> To: Keith Moore
> Cc: mif@ietf.org; dnsop@ietf.org; dnsext@ietf.org; pk@isoc.de;
> john_brzozowski@cable.comcast.com; dhcwg@ietf.org;
> denghui02@hotmail.com; Brian E Carpenter
> Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection
> document
>=20
> I think we can skirt this rat-hole if we separate the two following
distinct
> cases:
>=20
> Case A: "foo"
> Case B: "foo." (with terminating "dot").
>=20
> Case B meets the technical requirements of a Fully Qualified Domain =
Name,
> structurally speaking.
> Case A does not.
>=20
> Case A is a "bare name", case B is not.
>=20
> If we stick to the notions of FQDN versus anything else, we can avoid
> entering the rat-hole, IMHO.
>=20
> (I.e., We don't need to get into any issues over the number of labels =
in
an
> FQDN; an FQDN does not require treatment, special or otherwise; etc.,
etc.,)
>=20
> Brian Dickson
>=20
> On Thu, Oct 20, 2011 at 9:38 PM, Keith Moore <moore@network-
> heretics.com> wrote:
> >
> > On Oct 20, 2011, at 9:19 PM, David Conrad wrote:
> >
> >> On Oct 20, 2011, at 6:07 PM, Keith Moore wrote:
> >>> It might that IETF should consider "bare names" out of its scope,
except
> perhaps to say that they're not DNS names, they don't have to =
necessarily
be
> mappable to DNS names, and that their use and behavior is host and
> application-dependent.
> >>
> >> Can we please not redefine what a "DNS name" is to meet a =
particular
> agenda?
> >
> > I wasn't trying to do so.
> >
> >> Isn't it sufficient to say a 'bare name' does not conform to a =
hostname
as
> defined in RFC 952 and modified by RFCs 1122?
> >
> > Probably. =A0I'm just suggesting that trying to nail down the =
behavior of
such
> names is probably a rathole as well as likely to cause significant
disruption.
> >
> > _______________________________________________
> > dnsext mailing list
> > dnsext@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsext
> >
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext

------=_NextPart_000_0168_01CC8FDA.4CD5BC20
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0168_01CC8FDA.4CD5BC20--

From marka@isc.org  Fri Oct 21 04:30:25 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A88E21F8B57; Fri, 21 Oct 2011 04:30:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.567
X-Spam-Level: 
X-Spam-Status: No, score=-2.567 tagged_above=-999 required=5 tests=[AWL=0.032,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id erbvr9Lt53+v; Fri, 21 Oct 2011 04:30:24 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id 2165E21F8B56; Fri, 21 Oct 2011 04:30:24 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id 80A76C941E; Fri, 21 Oct 2011 11:30:11 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id CDDF5216C6B; Fri, 21 Oct 2011 11:30:10 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 0653615B8AA7; Fri, 21 Oct 2011 22:30:08 +1100 (EST)
To: Brian Dickson <brian.peter.dickson@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com>
In-reply-to: Your message of "Thu, 20 Oct 2011 23:15:32 EDT." <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com>
Date: Fri, 21 Oct 2011 22:30:08 +1100
Message-Id: <20111021113008.0653615B8AA7@drugs.dv.isc.org>
X-Mailman-Approved-At: Sat, 22 Oct 2011 02:31:09 -0700
Cc: mif@ietf.org, Keith Moore <moore@network-heretics.com>, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, dhcwg@ietf.org, denghui02@hotmail.com, Brian E Carpenter <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 11:30:25 -0000

In message <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com>
, Brian Dickson writes:
> I think we can skirt this rat-hole if we separate the two following
> distinct cases:
> 
> Case A: "foo"
> Case B: "foo." (with terminating "dot").
> 
> Case B meets the technical requirements of a Fully Qualified Domain
> Name, structurally speaking.
> Case A does not.
>
> Case A is a "bare name", case B is not.
> 
> If we stick to the notions of FQDN versus anything else, we can avoid
> entering the rat-hole, IMHO.
> 
> (I.e., We don't need to get into any issues over the number of labels
> in an FQDN; an FQDN does not require treatment, special or otherwise;
> etc., etc.,)

A domain style hostname have periods *seperating* labels.  RFC 952.
 
> Brian Dickson
> 
> On Thu, Oct 20, 2011 at 9:38 PM, Keith Moore <moore@network-heretics.com> w=
> rote:
> >
> > On Oct 20, 2011, at 9:19 PM, David Conrad wrote:
> >
> >> On Oct 20, 2011, at 6:07 PM, Keith Moore wrote:
> >>> It might that IETF should consider "bare names" out of its scope, excep=
> t perhaps to say that they're not DNS names, they don't have to necessarily=
>  be mappable to DNS names, and that their use and behavior is host and appl=
> ication-dependent.
> >>
> >> Can we please not redefine what a "DNS name" is to meet a particular age=
> nda?
> >
> > I wasn't trying to do so.
> >
> >> Isn't it sufficient to say a 'bare name' does not conform to a hostname =
> as defined in RFC 952 and modified by RFCs 1122?
> >
> > Probably. =A0I'm just suggesting that trying to nail down the behavior of=
>  such names is probably a rathole as well as likely to cause significant di=
> sruption.
> >
> > _______________________________________________
> > dnsext mailing list
> > dnsext@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsext
> >
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From moore@network-heretics.com  Fri Oct 21 07:05:24 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 894D811E8098; Fri, 21 Oct 2011 07:05:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.779
X-Spam-Level: 
X-Spam-Status: No, score=-3.779 tagged_above=-999 required=5 tests=[AWL=-0.180, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p2vjS6HGjVnp; Fri, 21 Oct 2011 07:05:24 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id DC4EF11E8082; Fri, 21 Oct 2011 07:05:23 -0700 (PDT)
Received: from compute4.internal (compute4.nyi.mail.srv.osa [10.202.2.44]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id DC37E211EE; Fri, 21 Oct 2011 10:05:22 -0400 (EDT)
Received: from frontend1.nyi.mail.srv.osa ([10.202.2.160]) by compute4.internal (MEProxy); Fri, 21 Oct 2011 10:05:22 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=ntspVps5aKo4yODxjI0+szf2FEo=; b=Lz a/V6hpk23qZRn2DhBOnx9wiDoWk1vZvAWNq0ryQGF3oOTBOW9R41lg8mh9Poq9zS 5Ux2+JlQ9YXHWajUbZbLwxtpx5D6vXOdE1s6R8aJ5r/7rmp7sa3QBG5hPWsYYm8A ry7gulVyn0YtULhegq/IHAO2z1G7Ab90Z+Zv7cC+U=
X-Sasl-enc: V8xt21HSkfyeN+uGMyOnlZA2xiV99+2HCQ41Q23Q2nZJ 1319205922
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id 90540408BF4; Fri, 21 Oct 2011 10:05:18 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com>
Date: Fri, 21 Oct 2011 10:04:50 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <814EB5AF-16C2-4016-9D52-61183B82988C@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com>
To: <teemu.savolainen@nokia.com>
X-Mailer: Apple Mail (2.1084)
X-Mailman-Approved-At: Sat, 22 Oct 2011 02:31:09 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, john_brzozowski@cable.comcast.com, dhcwg@ietf.org, denghui02@hotmail.com, brian.e.carpenter@gmail.com
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 14:05:24 -0000

On Oct 21, 2011, at 3:15 AM, <teemu.savolainen@nokia.com> wrote:

> Brian,
>=20
> Do you agree that nodes' behavioral differences between "foo" and =
"foo."
> names is out of the scope of this particular MIF draft?

That's not how I would state it.   I think handling of "foo." is =
something that IETF can define, but handling of "foo" is probably better =
left undefined.

And honestly I don't see why handling of non-DNS names like "foo" is in =
scope for MIF.   =20

As for lookup of DNS names, results of DNS lookup on any interface =
should be considered valid for all interfaces.=20

> There could perhaps be another draft, which would say that if name is =
"foo"
> it should not be appended with search lists but "foo." might?

Actually, it's the other way around.  "foo." is already an FQDN and =
shouldn't be subject to any search lists.  The behavior of lookups of =
"foo" is implementation dependent, but it's common practice to subject =
it to searching. =20

Keith



From Ted.Lemon@nominum.com  Fri Oct 21 08:07:52 2011
Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCAB521F8B77; Fri, 21 Oct 2011 08:07:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.525
X-Spam-Level: 
X-Spam-Status: No, score=-106.525 tagged_above=-999 required=5 tests=[AWL=0.073, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SxNpsV9a-nlm; Fri, 21 Oct 2011 08:07:52 -0700 (PDT)
Received: from exprod7og112.obsmtp.com (exprod7og112.obsmtp.com [64.18.2.177]) by ietfa.amsl.com (Postfix) with ESMTP id 9D5F621F8B72; Fri, 21 Oct 2011 08:07:51 -0700 (PDT)
Received: from shell-too.nominum.com ([64.89.228.229]) (using TLSv1) by exprod7ob112.postini.com ([64.18.6.12]) with SMTP;  Fri, 21 Oct 2011 08:07:52 PDT
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id A43B01B828A; Fri, 21 Oct 2011 08:07:50 -0700 (PDT)
Received: from webmail.nominum.com (cas-01.win.nominum.com [64.89.228.131]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTPS id 73029190065; Fri, 21 Oct 2011 08:07:50 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from MBX-01.WIN.NOMINUM.COM ([64.89.228.133]) by CAS-01.WIN.NOMINUM.COM ([64.89.228.131]) with mapi id 14.01.0323.003; Fri, 21 Oct 2011 08:07:50 -0700
From: Ted Lemon <Ted.Lemon@nominum.com>
To: "<teemu.savolainen@nokia.com>  <teemu.savolainen@nokia.com>" <teemu.savolainen@nokia.com>
Thread-Topic: [DNSOP] [dnsext] [mif] 2nd Last Call for MIF DNS server selection	document
Thread-Index: AQHMj8FjrK4qqOtNf0uZ77rRbwqOEJWHXDkA
Date: Fri, 21 Oct 2011 15:07:49 +0000
Message-ID: <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com>
In-Reply-To: <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.1.10]
Content-Type: multipart/alternative; boundary="_000_708F32123C9C4B61AA77EFA8F1CA5B04nominumcom_"
MIME-Version: 1.0
X-Mailman-Approved-At: Sat, 22 Oct 2011 02:31:09 -0700
Cc: "<mif@ietf.org>" <mif@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>, "<moore@network-heretics.com>" <moore@network-heretics.com>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server	selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 15:07:52 -0000

--_000_708F32123C9C4B61AA77EFA8F1CA5B04nominumcom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

On Oct 21, 2011, at 3:15 AM, <teemu.savolainen@nokia.com<mailto:teemu.savol=
ainen@nokia.com>>
 <teemu.savolainen@nokia.com<mailto:teemu.savolainen@nokia.com>> wrote:
There could perhaps be another draft, which would say that if name is "foo"
it should not be appended with search lists but "foo." might? And whatever
other differences in their handling would be, and what impacts it would hav=
e
e.g. intranet designers?

I tend to agree with others who have observed that this question is beyond =
the WG's core competency.  But there really is a mif question having to do =
with how search lists are handled.   Personally I tend to side with the cro=
wd that believes that DNS search lists should be deprecated with extreme pr=
ejudice, but if the consensus is otherwise, I think this draft you describe=
 does need to be written.


--_000_708F32123C9C4B61AA77EFA8F1CA5B04nominumcom_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <6C8905D726ECDB408A4A5BA1A546CE39@nominum.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
<div>
<div>On Oct 21, 2011, at 3:15 AM, &lt;<a href=3D"mailto:teemu.savolainen@no=
kia.com">teemu.savolainen@nokia.com</a>&gt;</div>
<div>&nbsp;&lt;<a href=3D"mailto:teemu.savolainen@nokia.com">teemu.savolain=
en@nokia.com</a>&gt; wrote:</div>
<blockquote type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-=
collapse: separate; font-family: Helvetica; font-style: normal; font-varian=
t: normal; font-weight: normal; letter-spacing: normal; line-height: normal=
; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: n=
one; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-hori=
zontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-dec=
orations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stro=
ke-width: 0px; font-size: medium; ">There
 could perhaps be another draft, which would say that if name is &quot;foo&=
quot;<br>
it should not be appended with search lists but &quot;foo.&quot; might? And=
 whatever<br>
other differences in their handling would be, and what impacts it would hav=
e<br>
e.g. intranet designers?</span></blockquote>
</div>
<br>
<div>I tend to agree with others who have observed that this question is be=
yond the WG's core competency. &nbsp;But there really is a mif question hav=
ing to do with how search lists are handled. &nbsp; Personally I tend to si=
de with the crowd that believes that DNS search
 lists should be deprecated with extreme prejudice, but if the consensus is=
 otherwise, I think this draft you describe does need to be written.</div>
<div><br>
</div>
</body>
</html>

--_000_708F32123C9C4B61AA77EFA8F1CA5B04nominumcom_--

From Ted.Lemon@nominum.com  Fri Oct 21 08:11:15 2011
Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E66C21F84D3; Fri, 21 Oct 2011 08:11:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.531
X-Spam-Level: 
X-Spam-Status: No, score=-106.531 tagged_above=-999 required=5 tests=[AWL=0.067, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tjSWOssWhG5v; Fri, 21 Oct 2011 08:11:14 -0700 (PDT)
Received: from exprod7og118.obsmtp.com (exprod7og118.obsmtp.com [64.18.2.8]) by ietfa.amsl.com (Postfix) with ESMTP id F3BEB21F899D; Fri, 21 Oct 2011 08:11:13 -0700 (PDT)
Received: from shell-too.nominum.com ([64.89.228.229]) (using TLSv1) by exprod7ob118.postini.com ([64.18.6.12]) with SMTP;  Fri, 21 Oct 2011 08:11:14 PDT
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id 3B65E1B8289; Fri, 21 Oct 2011 08:11:12 -0700 (PDT)
Received: from webmail.nominum.com (cas-02.win.nominum.com [64.89.228.132]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTPS id 2D6FF190065; Fri, 21 Oct 2011 08:11:12 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from MBX-01.WIN.NOMINUM.COM ([64.89.228.133]) by CAS-02.WIN.NOMINUM.COM ([64.89.228.132]) with mapi id 14.01.0323.003; Fri, 21 Oct 2011 08:11:12 -0700
From: Ted Lemon <Ted.Lemon@nominum.com>
To: Keith Moore <moore@network-heretics.com>
Thread-Topic: [DNSOP] [dnsext] [mif] 2nd Last Call for MIF DNS server selection document
Thread-Index: AQHMj/p/EJ7srXfEcECXhO5NFotd3ZWHXLmA
Date: Fri, 21 Oct 2011 15:11:11 +0000
Message-ID: <75E5E225-5E08-48AC-8FA4-2C4174486514@nominum.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <814EB5AF-16C2-4016-9D52-61183B82988C@network-heretics.com>
In-Reply-To: <814EB5AF-16C2-4016-9D52-61183B82988C@network-heretics.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.1.10]
Content-Type: multipart/alternative; boundary="_000_75E5E2255E0848AC8FA42C4174486514nominumcom_"
MIME-Version: 1.0
X-Mailman-Approved-At: Sat, 22 Oct 2011 02:31:09 -0700
Cc: "<mif@ietf.org>" <mif@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server	selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 15:11:15 -0000

--_000_75E5E2255E0848AC8FA42C4174486514nominumcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

On Oct 21, 2011, at 10:04 AM, Keith Moore wrote:
And honestly I don't see why handling of non-DNS names like "foo" is in sco=
pe for MIF.

Because such names are typically resolved using DNS search lists, and at le=
ase one mechanism for setting up search lists is interface-specific.


--_000_75E5E2255E0848AC8FA42C4174486514nominumcom_
Content-Type: text/html; charset="us-ascii"
Content-ID: <28F19B1C4F11B245AB55DE864221E7BD@nominum.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
<div>
<div>On Oct 21, 2011, at 10:04 AM, Keith Moore wrote:</div>
<blockquote type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-=
collapse: separate; font-family: Helvetica; font-style: normal; font-varian=
t: normal; font-weight: normal; letter-spacing: normal; line-height: normal=
; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: n=
one; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-hori=
zontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-dec=
orations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stro=
ke-width: 0px; font-size: medium; ">And
 honestly I don't see why handling of non-DNS names like &quot;foo&quot; is=
 in scope for MIF. &nbsp;&nbsp;&nbsp;<br>
</span></blockquote>
</div>
<br>
<div>Because such names are typically resolved using DNS search lists, and =
at lease one mechanism for setting up search lists is interface-specific.</=
div>
<div><br>
</div>
</body>
</html>

--_000_75E5E2255E0848AC8FA42C4174486514nominumcom_--

From moore@network-heretics.com  Fri Oct 21 08:13:57 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 888B21F0C64; Fri, 21 Oct 2011 08:13:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.457
X-Spam-Level: 
X-Spam-Status: No, score=-3.457 tagged_above=-999 required=5 tests=[AWL=-0.459, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_33=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nfw8aZqjxkAq; Fri, 21 Oct 2011 08:13:56 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id B89821F0C69; Fri, 21 Oct 2011 08:13:53 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.mail.srv.osa [10.202.2.43]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id 54B2620AB5; Fri, 21 Oct 2011 11:13:53 -0400 (EDT)
Received: from frontend1.nyi.mail.srv.osa ([10.202.2.160]) by compute3.internal (MEProxy); Fri, 21 Oct 2011 11:13:53 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:message-id:references:to; s=smtpout; bh=lCO X1kCTIlP095ifCEhUWw/V1Zw=; b=jdcervDjgROLH43YBshK5JCzcGkDR2Lx1rY L1WYX01xjYjaTtvchGmev+oCzNagHTiRkrjg/eRxzKDZNk+lwMbG85oHOO5rB5W/ 8QIpWhQCpyv2QIXtAiydGATcb763ywDuta5WD2GP8ptkui6lho49wFbv4/MCRbYF Ts4bI7to=
X-Sasl-enc: bQ9eg22JollG3hR4uNW4sZJbiW43Gqc9UOPy+j63j6Yc 1319210032
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id 2BD84408A4E; Fri, 21 Oct 2011 11:13:51 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-67--547095658
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com>
Date: Fri, 21 Oct 2011 11:13:24 -0400
Message-Id: <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com>
To: Ted Lemon <Ted.Lemon@nominum.com>
X-Mailer: Apple Mail (2.1084)
X-Mailman-Approved-At: Sat, 22 Oct 2011 02:31:09 -0700
Cc: "<mif@ietf.org>" <mif@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 15:13:57 -0000

--Apple-Mail-67--547095658
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

On Oct 21, 2011, at 11:07 AM, Ted Lemon wrote:

> On Oct 21, 2011, at 3:15 AM, <teemu.savolainen@nokia.com>
>  <teemu.savolainen@nokia.com> wrote:
>> There could perhaps be another draft, which would say that if name is =
"foo"
>> it should not be appended with search lists but "foo." might? And =
whatever
>> other differences in their handling would be, and what impacts it =
would have
>> e.g. intranet designers?
>=20
> I tend to agree with others who have observed that this question is =
beyond the WG's core competency.  But there really is a mif question =
having to do with how search lists are handled.   Personally I tend to =
side with the crowd that believes that DNS search lists should be =
deprecated with extreme prejudice, but if the consensus is otherwise, I =
think this draft you describe does need to be written.
>=20

IMO: search lists are useful, but only with "bare names" - and the =
behavior of those should be implementation dependent.  Trying to nail it =
down will break too much widespread practice.

Names containing "." should not be subject to search lists.  Given a =
name like foo.bar, there's no reliable way to tell whether "bar" is a =
TLD or a subdomain of something in the search list.=20

(No, trying to look up "foo.bar" starting from the DNS root, and failing =
over if that lookup fails, is not sufficient, because of (a) temporary =
failures and (b) it still doesn't tell you what the user _meant_.  It =
makes much more sense to say that any name containing a "." is =
unambiguously an FQDN.)


--Apple-Mail-67--547095658
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div><div>On Oct 21, 2011, at 11:07 AM, Ted Lemon wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite">

<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">

<div style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">
<div>
<div>On Oct 21, 2011, at 3:15 AM, &lt;<a href="mailto:teemu.savolainen@nokia.com">teemu.savolainen@nokia.com</a>&gt;</div>
<div>&nbsp;&lt;<a href="mailto:teemu.savolainen@nokia.com">teemu.savolainen@nokia.com</a>&gt; wrote:</div>
<blockquote type="cite"><span class="Apple-style-span" style="border-collapse: separate; font-family: Helvetica; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-size: medium; ">There
 could perhaps be another draft, which would say that if name is "foo"<br>
it should not be appended with search lists but "foo." might? And whatever<br>
other differences in their handling would be, and what impacts it would have<br>
e.g. intranet designers?</span></blockquote>
</div>
<br>
<div>I tend to agree with others who have observed that this question is beyond the WG's core competency. &nbsp;But there really is a mif question having to do with how search lists are handled. &nbsp; Personally I tend to side with the crowd that believes that DNS search
 lists should be deprecated with extreme prejudice, but if the consensus is otherwise, I think this draft you describe does need to be written.</div>
<div><br>
</div>
</div>

</blockquote></div><br><div>IMO: search lists are useful, but only with "bare names" - and the behavior of those should be implementation dependent. &nbsp;Trying to nail it down will break too much widespread practice.</div><div><br></div><div>Names containing "." should not be subject to search lists. &nbsp;Given a name like foo.bar,&nbsp;there's no reliable way to tell whether "bar" is a TLD or a subdomain of something in the search list.&nbsp;</div><div><br></div><div>(No, trying to look up "foo.bar" starting from the DNS root, and failing over if that lookup fails, is not sufficient, because of (a) temporary failures and (b) it still doesn't tell you what the user _meant_. &nbsp;It makes much more sense to say that any name containing a "." is unambiguously an FQDN.)</div><div><br></div></body></html>
--Apple-Mail-67--547095658--

From moore@network-heretics.com  Fri Oct 21 08:23:29 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C20241F0C7A; Fri, 21 Oct 2011 08:23:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.732
X-Spam-Level: 
X-Spam-Status: No, score=-3.732 tagged_above=-999 required=5 tests=[AWL=-0.134, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UHKl4j3-2McO; Fri, 21 Oct 2011 08:23:28 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id 9FAB81F0C7E; Fri, 21 Oct 2011 08:23:24 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.mail.srv.osa [10.202.2.46]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id 522A5212ED; Fri, 21 Oct 2011 11:22:53 -0400 (EDT)
Received: from frontend1.nyi.mail.srv.osa ([10.202.2.160]) by compute6.internal (MEProxy); Fri, 21 Oct 2011 11:22:53 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:message-id:references:to; s=smtpout; bh=EMs naNbFWAbzYVTmyAPeyIEOvaM=; b=JhOGr+0bYJQTTEeukNUKTLnraTetWpYnsnr pb6b3qdGV/2lDNjgBIPcElwF44LhDhkKAImfMDxPbht/Cr4jT3MBwQLxD0UfCQAa y/XS5rSpwC0/ywP7kYDFuYwlYAQFtW1+pqzSKtbeIo4X4YwGPgkncqvWsSP38dRj In2T6fYo=
X-Sasl-enc: Qf8h6JOfifsvLjYPPPW90nSw7CLtRuk73ndPBq5FV+P/ 1319210572
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id BB9A2408B64; Fri, 21 Oct 2011 11:22:50 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-68--546556678
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <75E5E225-5E08-48AC-8FA4-2C4174486514@nominum.com>
Date: Fri, 21 Oct 2011 11:22:23 -0400
Message-Id: <D96D9D1E-04D9-47D3-9104-7A63C03BF038@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <814EB5AF-16C2-4016-9D52-61183B82988C@network-heretics.com> <75E5E225-5E08-48AC-8FA4-2C4174486514@nominum.com>
To: Ted Lemon <Ted.Lemon@nominum.com>
X-Mailer: Apple Mail (2.1084)
X-Mailman-Approved-At: Sat, 22 Oct 2011 02:31:09 -0700
Cc: "<mif@ietf.org>" <mif@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 15:23:30 -0000

--Apple-Mail-68--546556678
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

On Oct 21, 2011, at 11:11 AM, Ted Lemon wrote:

> On Oct 21, 2011, at 10:04 AM, Keith Moore wrote:
>> And honestly I don't see why handling of non-DNS names like "foo" is =
in scope for MIF.   =20
>=20
> Because such names are typically resolved using DNS search lists, and =
at lease one mechanism for setting up search lists is =
interface-specific.

I don't think it's MIF's job to try to make all existing hacks work, =
while limiting its scope to specifying how hosts and apps implement =
things. =20

I think it's potentially reasonable for MIF to say things like "here's =
how you should configure your networks if you want them to be usable =
from hosts with multiple interfaces."

Also, the subject of multiple active interfaces per host exposes a =
number of cracks in the Internet architecture, and also exposes cracks =
in some of the hacks that people have used to work around cracks in the =
Internet architecture.   IMO, MIF should not be trying to add more =
hacks.  MIF should primarily do what's best for the Internet =
architecture in the long term, realizing that IPv4 and therefore RFC =
1918 are at EOL.  Hacks to accommodate the existing world should be =
considered of secondary importance, and should only be considered if =
they don't pollute the architecture in the long run.

Also, it's arguable that v6 link-local addresses should not be used by =
applications, even on ad hoc networks, because randomly-generated ULIA =
prefixes are much better.  And the way you figure out which interface(s) =
to use in order to reach ULIAs is via routing protocols, not via =
assuming that a DNS query is specific to a particular network interface.


--Apple-Mail-68--546556678
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div><div>On Oct 21, 2011, at 11:11 AM, Ted Lemon wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite">

<meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii">

<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">
<div>
<div>On Oct 21, 2011, at 10:04 AM, Keith Moore wrote:</div>
<blockquote type=3D"cite"><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; orphans: 2; text-align: -webkit-auto; =
text-indent: 0px; text-transform: none; white-space: normal; widows: 2; =
word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; ">And
 honestly I don't see why handling of non-DNS names like "foo" is in =
scope for MIF. &nbsp;&nbsp;&nbsp;<br>
</span></blockquote>
</div>
<br>
<div>Because such names are typically resolved using DNS search lists, =
and at lease one mechanism for setting up search lists is =
interface-specific.</div>
</div>

</blockquote><br></div><div>I don't think it's MIF's job to try to make =
all existing hacks work, while limiting its scope to specifying how =
hosts and apps implement things. &nbsp;</div><div><br></div><div>I think =
it's potentially reasonable for MIF to say things like "here's how you =
should configure your networks if you want them to be usable from hosts =
with multiple interfaces."</div><br><div>Also, the subject of multiple =
active interfaces per host exposes a number of cracks in the Internet =
architecture, and also exposes cracks in some of the hacks that people =
have used to work around cracks in the Internet architecture. &nbsp; =
IMO, MIF should not be trying to add more hacks. &nbsp;MIF should =
primarily do what's best for the Internet architecture in the long term, =
realizing that IPv4 and therefore RFC 1918 are at EOL. &nbsp;Hacks to =
accommodate the existing world should be considered of secondary =
importance, and should only be considered if they don't pollute the =
architecture in the long run.</div><div><br></div><div>Also, it's =
arguable that v6 link-local addresses should not be used by =
applications, even on ad hoc networks, because randomly-generated ULIA =
prefixes are much better. &nbsp;And the way you figure out which =
interface(s) to use in order to reach ULIAs is via routing protocols, =
not via assuming that a DNS query is specific to a particular network =
interface.</div><div><br></div></body></html>=

--Apple-Mail-68--546556678--

From brian.e.carpenter@gmail.com  Fri Oct 21 12:29:52 2011
Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 34F5321F8B3F; Fri, 21 Oct 2011 12:29:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.089
X-Spam-Level: 
X-Spam-Status: No, score=-103.089 tagged_above=-999 required=5 tests=[AWL=-0.090, BAYES_00=-2.599, J_CHICKENPOX_37=0.6, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yrHI8wz7X9MH; Fri, 21 Oct 2011 12:29:51 -0700 (PDT)
Received: from mail-bw0-f44.google.com (mail-bw0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id A378421F8B3D; Fri, 21 Oct 2011 12:29:50 -0700 (PDT)
Received: by mail-bw0-f44.google.com with SMTP id s6so6056678bka.31 for <multiple recipients>; Fri, 21 Oct 2011 12:29:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=message-id:date:from:organization:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=JRwdP+KXzPm8ahbrR73oyzDeY8fLfo6xr/DukOIFsV8=; b=L1waKSsjziLu8EsUyV6O2WPOf5IH2Nt5MRYoWO95UfHlu7on+Jm861Ysh8UripP9M2 AWzMq3nl+5NtP20mLhRNzrx1xyvlO4nnUiwGLFp8pLvLcDPDf/99EEv3ltLsffLCl4q7 jFOsXlJ4DOHXtgEEn7wR9Jy3hr1mV5V6gJ7rs=
Received: by 10.223.76.201 with SMTP id d9mr26561529fak.12.1319225390225; Fri, 21 Oct 2011 12:29:50 -0700 (PDT)
Received: from [10.1.1.4] ([121.98.251.219]) by mx.google.com with ESMTPS id n12sm23804539fan.9.2011.10.21.12.29.44 (version=SSLv3 cipher=OTHER); Fri, 21 Oct 2011 12:29:49 -0700 (PDT)
Message-ID: <4EA1C81D.8000805@gmail.com>
Date: Sat, 22 Oct 2011 08:29:33 +1300
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
User-Agent: Thunderbird 2.0.0.6 (Windows/20070728)
MIME-Version: 1.0
To: teemu.savolainen@nokia.com
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl>	<916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com>	<121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <916CE6CF87173740BC8A2CE44309696203784B1F@008-AM1MPN1-037.mgdnok.nokia.com>
In-Reply-To: <916CE6CF87173740BC8A2CE44309696203784B1F@008-AM1MPN1-037.mgdnok.nokia.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-Mailman-Approved-At: Sat, 22 Oct 2011 02:31:09 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, john_brzozowski@cable.comcast.com, dhcwg@ietf.org, denghui02@hotmail.com
Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server	selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2011 19:29:52 -0000

Teemu,

I think that the spirit of what you propose is correct, but as Keith poin=
ts
out it really isn't appropriate to use RFC 2119 language about a pragmati=
c
approach that clearly lies outside the definition of the DNS namespace.
If an implementor is willing to take the risk of transforming www.example=

into www.example.com, because at the time of writing there is no TLD "exa=
mple",
that's the implementor's risk, but it shouldn't be dignified with normati=
ve
keywords IMHO.

Regards
   Brian Carpenter

On 2011-10-21 20:15, teemu.savolainen@nokia.com wrote:
> Brian,
>=20
> Would the following text be then ok? Please note I changed the domain a=
ddition from SHOULD to MAY, if there is going to be attempt to deprecate/=
redefine/update search list logics. Or do you think it should remain SHOU=
LD?
> --
> 4.6.  Interactions with DNS search lists
>=20
>    A node may be configured with DNS search list via DHCPv6
>    OPTION_DOMAIN_LIST [RFC3646] or via DHCPv4 Domain Search Option
>    [RFC3397].
>=20
>    A bare name (a name without any dots) MUST be first treated as a pre=
-
>    DNS hostname or handled by other means that, as of this writing, are=

>    under discussion in the IETF and that are out of the scope of this
>    document.  If the bare name resolution fails, the name MAY then be
>    appended with the domain information.  If the bare name is appended
>    with the domain information the described DNS server selection logic=

>    SHALL be utilized for the resulting name.
>=20
>    Resolution for the name containing any dots SHOULD first be attempte=
d
>    with DNS servers of all interfaces.  Only if the resolution fails th=
e
>    node MAY append the name with search list domain(s) and then again
>    utilize improved DNS server selection algorithm to decide which DNS
>    server(s) to contact.
> --
>=20
> Best regards,
>=20
> 	Teemu
>=20
>> -----Original Message-----
>> From: ext Brian E Carpenter [mailto:brian.e.carpenter@gmail.com]
>> Sent: 21. lokakuuta 2011 00:50
>> To: Savolainen Teemu (Nokia-CTO/Tampere)
>> Cc: Ray.Bellis@nominet.org.uk; mif@ietf.org; dnsop@ietf.org;
>> dnsext@ietf.org; pk@isoc.de; john_brzozowski@cable.comcast.com;
>> dhcwg@ietf.org; denghui02@hotmail.com
>> Subject: Re: [mif] [dnsext] 2nd Last Call for MIF DNS server selection=

>> document
>>
>> Teemu,
>>
>> I don't believe this is a topic where consensus in MIF is very relevan=
t.
>> It needs to be decided in a much wider community rather than as a subs=
idiary
>> question in a MIF document. I suggest leaving it FFS (for further stud=
y) in MIF.
>>
>> Regards
>>    Brian Carpenter
>>
>> On 2011-10-20 20:01, teemu.savolainen@nokia.com wrote:
>>> Hi Ray,
>>>
>>>> -----Original Message-----
>>>> From: ext Ray Bellis [mailto:Ray.Bellis@nominet.org.uk]
>>>> Sent: 19. lokakuuta 2011 13:40
>>>> To: Savolainen Teemu (Nokia-CTO/Tampere)
>>>> Cc: <denghui02@hotmail.com>; <mif@ietf.org>; <dnsext@ietf.org>;
>>>> <dnsop@ietf.org>; <dhcwg@ietf.org>; <pk@isoc.de>;
>>>> <john_brzozowski@cable.comcast.com>
>>>> Subject: Re: [dnsext] [mif] 2nd Last Call for MIF DNS server
>>>> selection document
>>>>
>>>> I have concerns about =C2=A74.6:
>>>>
>>>> "A bare name (a name without any dots) MUST be first treated as a
>>>> pre-
>>> DNS
>>>> hostname, and only after that the name SHALL be appended with  domai=
n
>>>> information and described DNS server selection logic be  utilized."
>>>>
>>>> When new gTLDs are introduced it is likely for brand-name gTLDs that=

>>>> they will wish to use bare names in the DNS (i.e. a single label
>>>> hostname) for
>>> their
>>>> primary web sites.
>>>>
>>>> Hence bare names may become much more frequently used as DNS
>> names,
>>>> and =C2=A74.6 wouldn't permit those to work unless '.' is also in th=
e
>>>> suffix
>>> list.
>>>> I'd like to hear the authors' thoughts on these.  I'm not sure that
>>>> this
>>> draft
>>>> necessarily needs any significant changes - it may only require
>>>> changes to ensure that bare names are also considered as potential
>>>> DNS names in their own right.
>>> Okay, I understand there is no clear consensus yet how these single
>>> label names should be handled by the resolvers at the first place?
>>> Should resolver first treat them as pre-DNS hostnames, then as DNS
>>> hostnames, and then try search list? The DNS server selection logic
>>> would be applied already when resolving single label name, i.e. the
>>> network could provide a single label domain "brand" in the domains li=
st.
>>>
>>> Maybe section 4.6 could be like this, perhaps (changes in second
>>> paragraph and title)?
>>> --
>>> 4.6.  Interactions with DNS search lists and single label hostnames
>>>
>>>    A node may be configured with DNS search list by DHCPv6
>>>    OPTION_DOMAIN_LIST [RFC3646] or DHCPv4 Domain Search Option
>>>    [RFC3397].
>>>
>>>    A bare name (a name without any dots) MUST be first treated as a p=
re-
>>>    DNS hostname, after which resolution of the name SHALL be attempte=
d
>>>    with DNS, and as a last resort the name SHALL be appended with
>>>    domain information. DNS server selection logic SHALL be
>>>    utilized for both of the latter two DNS using methods.
>>>
>>>    Resolution for the name containing any dots SHOULD first be attemp=
ted
>>>    with DNS servers of all interfaces.  Only if the resolution fails =
the
>>>    node SHOULD append the name with search list domain(s) and then ag=
ain
>>>    utilize improved DNS server selection algorithm to decide which DN=
S
>>>    server(s) to contact.
>>> --
>>>
>>> Best regards,
>>>
>>> 	Teemu
>>>
>>>
>>>
>>> ---------------------------------------------------------------------=
-
>>> --
>>>
>>> _______________________________________________
>>> mif mailing list
>>> mif@ietf.org
>>> https://www.ietf.org/mailman/listinfo/mif
>=20


From dougb@dougbarton.us  Sat Oct 22 11:49:43 2011
Return-Path: <dougb@dougbarton.us>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 778B521F847F for <dnsext@ietfa.amsl.com>; Sat, 22 Oct 2011 11:49:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.489
X-Spam-Level: 
X-Spam-Status: No, score=-2.489 tagged_above=-999 required=5 tests=[AWL=-0.090, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, J_CHICKENPOX_43=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ei+TlM2jufJ3 for <dnsext@ietfa.amsl.com>; Sat, 22 Oct 2011 11:49:43 -0700 (PDT)
Received: from mail2.fluidhosting.com (mx22.fluidhosting.com [204.14.89.5]) by ietfa.amsl.com (Postfix) with ESMTP id 1DA4B21F8484 for <dnsext@ietf.org>; Sat, 22 Oct 2011 11:49:42 -0700 (PDT)
Received: (qmail 10717 invoked by uid 399); 22 Oct 2011 18:43:01 -0000
Received: from unknown (HELO 172-17-198-245.globalsuite.net) (dougb@dougbarton.us@12.207.105.210) by mail2.fluidhosting.com with ESMTPAM; 22 Oct 2011 18:43:01 -0000
X-Originating-IP: 12.207.105.210
X-Sender: dougb@dougbarton.us
Message-ID: <4EA30EB0.6080605@dougbarton.us>
Date: Sat, 22 Oct 2011 11:42:56 -0700
From: Doug Barton <dougb@dougbarton.us>
Organization: http://SupersetSolutions.com/
User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:7.0.1) Gecko/20111001 Thunderbird/7.0.1
MIME-Version: 1.0
To: Keith Moore <moore@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com>
In-Reply-To: <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com>
X-Enigmail-Version: undefined
OpenPGP: id=1A1ABC84
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: "<mif@ietf.org>" <mif@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, Ted Lemon <Ted.Lemon@nominum.com>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Oct 2011 18:49:43 -0000

On 10/21/2011 08:13, Keith Moore wrote:
> Names containing "." should not be subject to search lists.  Given a
> name like foo.bar, there's no reliable way to tell whether "bar" is a
> TLD or a subdomain of something in the search list. 

I've been following this discussion, mostly in the hopes that it would
go away. :)  However since the discussion keeps circling I thought I'd
throw in my 2 cents.

1. I think we're all in agreement that dot-terminated names (e.g.,
example.) should not be subject to search lists. I personally don't have
any problems with any document mentioning that this is the expected
behavior.

2. I think most of us agree that a bare label (no dots, e.g., example)
will almost certainly be subject to a search list. My suggestion would
be that the common behavior be described in a "here be dragons" format,
without attempting to be proscriptive.

3. For hostnames with a dot (although not necessarily ending in a TLD,
such as foo.example) I think it's reasonable to say that the desired
behavior is to first try to look them up "as is" without applying a
search list, and if that fails to then apply the search list; with the
same caveat as above, descriptive language for this document instead of
proscriptive.

In regards to 3, let's say I have a domain, example.org. In my network I
have various subdomains that represent various network segments, let's
say foo, bar, and baz. Personally, I find it convenient to put
'example.com' in the search list for all of my hosts, and then type 'ssh
host.bar' and go off on my merry way. Yes, I understand that in my
simple example I could theoretically put all 3 subdomains in the search
list. Now assume that my network isn't actually that simple ...


hth,

Doug

-- 

	Nothin' ever doesn't change, but nothin' changes much.
			-- OK Go

	Breadth of IT experience, and depth of knowledge in the DNS.
	Yours for the right price.  :)  http://SupersetSolutions.com/


From moore@network-heretics.com  Sat Oct 22 12:21:31 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 63A0C21F85B9; Sat, 22 Oct 2011 12:21:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.419
X-Spam-Level: 
X-Spam-Status: No, score=-3.419 tagged_above=-999 required=5 tests=[AWL=-0.420, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LiNvaQlA53FK; Sat, 22 Oct 2011 12:21:30 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id 8DE2221F85AE; Sat, 22 Oct 2011 12:21:30 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.mail.srv.osa [10.202.2.43]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id D6C55204B3; Sat, 22 Oct 2011 15:21:29 -0400 (EDT)
Received: from frontend2.nyi.mail.srv.osa ([10.202.2.161]) by compute3.internal (MEProxy); Sat, 22 Oct 2011 15:21:29 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=OYf4hyQkCqr26hQ3ulZWEawjd8k=; b=hI EBRptIVlofYveBd0pH/3t6+bVz/VR2ZibRmXuuCqGArgPF9AEqCOBxOIXn8Nc5yW ZxbBtNKGvp+hh0ezBx3LH0i0nYTOowl/bkFIF58cF1E1Tm6ZfekWBG9n1o6ZDiGw w1YT/xKt00q9SlhzMYHpyrb3QJ5h4CI/VPKQ7sOAc=
X-Sasl-enc: MHQtqGbQzFJaAEuw0+prAzhI2zEDgD0oFib6Qk2xscXw 1319311289
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id DDFCC483363; Sat, 22 Oct 2011 15:21:27 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <4EA30EB0.6080605@dougbarton.us>
Date: Sat, 22 Oct 2011 15:21:00 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <4EA30EB0.6080605@dougbarton.us>
To: Doug Barton <dougb@dougbarton.us>
X-Mailer: Apple Mail (2.1084)
Cc: "<mif@ietf.org>" <mif@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, Ted Lemon <Ted.Lemon@nominum.com>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Oct 2011 19:21:31 -0000

On Oct 22, 2011, at 2:42 PM, Doug Barton wrote:

> On 10/21/2011 08:13, Keith Moore wrote:
>> Names containing "." should not be subject to search lists.  Given a
>> name like foo.bar, there's no reliable way to tell whether "bar" is a
>> TLD or a subdomain of something in the search list.=20
>=20
> I've been following this discussion, mostly in the hopes that it would
> go away. :)  However since the discussion keeps circling I thought I'd
> throw in my 2 cents.
>=20
> 1. I think we're all in agreement that dot-terminated names (e.g.,
> example.) should not be subject to search lists. I personally don't =
have
> any problems with any document mentioning that this is the expected
> behavior.

agree.  however there are standard protocols for which a trailing dot in =
a domain name is a syntax error.

> 2. I think most of us agree that a bare label (no dots, e.g., example)
> will almost certainly be subject to a search list. My suggestion would
> be that the common behavior be described in a "here be dragons" =
format,
> without attempting to be proscriptive.

mostly agree.   I don't think "will almost certainly be subject to a =
search list" is accurate, though I do think "may be subject to a search =
list" is reasonable.

> 3. For hostnames with a dot (although not necessarily ending in a TLD,
> such as foo.example) I think it's reasonable to say that the desired
> behavior is to first try to look them up "as is" without applying a
> search list, and if that fails to then apply the search list; with the
> same caveat as above, descriptive language for this document instead =
of
> proscriptive.

Strongly disagree.  That would leave users without a =
protocol-independent way of unambiguously specifying "this is a =
fully-qualified domain name".

The practice of applying search lists to names with "."s in them needs =
to die.

Keith


From Ted.Lemon@nominum.com  Sat Oct 22 12:42:03 2011
Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9288821F8505; Sat, 22 Oct 2011 12:42:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.54
X-Spam-Level: 
X-Spam-Status: No, score=-106.54 tagged_above=-999 required=5 tests=[AWL=0.058, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hGDQIyPt4o4C; Sat, 22 Oct 2011 12:42:03 -0700 (PDT)
Received: from exprod7og114.obsmtp.com (exprod7og114.obsmtp.com [64.18.2.215]) by ietfa.amsl.com (Postfix) with ESMTP id 6E6A821F84F8; Sat, 22 Oct 2011 12:42:01 -0700 (PDT)
Received: from shell-too.nominum.com ([64.89.228.229]) (using TLSv1) by exprod7ob114.postini.com ([64.18.6.12]) with SMTP;  Sat, 22 Oct 2011 12:42:02 PDT
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id B06331B80CC; Sat, 22 Oct 2011 12:41:59 -0700 (PDT)
Received: from webmail.nominum.com (cas-01.win.nominum.com [64.89.228.131]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTPS id 8EAD4190065; Sat, 22 Oct 2011 12:41:58 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from MBX-01.WIN.NOMINUM.COM ([64.89.228.133]) by CAS-01.WIN.NOMINUM.COM ([64.89.228.131]) with mapi id 14.01.0323.003; Sat, 22 Oct 2011 12:41:58 -0700
From: Ted Lemon <Ted.Lemon@nominum.com>
To: Keith Moore <moore@network-heretics.com>
Thread-Topic: [DNSOP] [dnsext] [mif] 2nd Last Call for MIF DNS server selection	document
Thread-Index: AQHMkAQNa5aq/ROWxEuy8rvfsHIUPpWHXtwAgAADWgCAAdhrgA==
Date: Sat, 22 Oct 2011 19:41:58 +0000
Message-ID: <835BF3F4-B0A1-4BBA-988F-FE147573CED0@nominum.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <F932CA9C-3489-48AC-A454-5B7A91CF129A@nominum.com> <1DF30BB4-76DB-427A-8ACF-A345BAE26FA6@network-heretics.com>
In-Reply-To: <1DF30BB4-76DB-427A-8ACF-A345BAE26FA6@network-heretics.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.1.10]
Content-Type: multipart/alternative; boundary="_000_835BF3F4B0A14BBA988FFE147573CED0nominumcom_"
MIME-Version: 1.0
Cc: DHC WG <dhcwg@ietf.org>, "dnsop@ietf.org WG" <dnsop@ietf.org>, "<mif@ietf.org>" <mif@ietf.org>, dnsext List <dnsext@ietf.org>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Oct 2011 19:42:03 -0000

--_000_835BF3F4B0A14BBA988FFE147573CED0nominumcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

On Oct 21, 2011, at 11:31 AM, Keith Moore wrote:
True.  But unsecured DNS is easily exploited regardless of whether bare nam=
es are used.  (and I've never bought the idea that DNSSEC verification can =
reasonably be done by an external host)

Yes.   But if a bare name is used, a bogus search list can also bypass DNSS=
EC validation.

--_000_835BF3F4B0A14BBA988FFE147573CED0nominumcom_
Content-Type: text/html; charset="us-ascii"
Content-ID: <74A845C4EF7F6B46885862A4F1B79942@nominum.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
<div>
<div>On Oct 21, 2011, at 11:31 AM, Keith Moore wrote:</div>
<blockquote type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-=
collapse: separate; font-family: Helvetica; font-style: normal; font-varian=
t: normal; font-weight: normal; letter-spacing: normal; line-height: normal=
; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: n=
one; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-hori=
zontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-dec=
orations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stro=
ke-width: 0px; font-size: medium; ">True.
 &nbsp;But unsecured DNS is easily exploited regardless of whether bare nam=
es are used. &nbsp;(and I've never bought the idea that DNSSEC verification=
 can reasonably be done by an external host)</span></blockquote>
</div>
<br>
<div>Yes. &nbsp; But if a bare name is used, a bogus search list can also b=
ypass DNSSEC validation.</div>
</body>
</html>

--_000_835BF3F4B0A14BBA988FFE147573CED0nominumcom_--

From Ted.Lemon@nominum.com  Sun Oct 23 12:16:58 2011
Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E9E421F8AFB; Sun, 23 Oct 2011 12:16:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.543
X-Spam-Level: 
X-Spam-Status: No, score=-106.543 tagged_above=-999 required=5 tests=[AWL=0.055, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CaOR2W2z9cxV; Sun, 23 Oct 2011 12:16:57 -0700 (PDT)
Received: from exprod7og114.obsmtp.com (exprod7og114.obsmtp.com [64.18.2.215]) by ietfa.amsl.com (Postfix) with ESMTP id A319221F8AF1; Sun, 23 Oct 2011 12:16:56 -0700 (PDT)
Received: from shell-too.nominum.com ([64.89.228.229]) (using TLSv1) by exprod7ob114.postini.com ([64.18.6.12]) with SMTP;  Sun, 23 Oct 2011 12:16:57 PDT
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id 984601B8100; Sun, 23 Oct 2011 12:16:46 -0700 (PDT)
Received: from webmail.nominum.com (cas-02.win.nominum.com [64.89.228.132]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTPS id E5345190061; Sun, 23 Oct 2011 12:16:44 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from MBX-01.WIN.NOMINUM.COM ([64.89.228.133]) by CAS-02.WIN.NOMINUM.COM ([64.89.228.132]) with mapi id 14.01.0323.003; Sun, 23 Oct 2011 12:16:44 -0700
From: Ted Lemon <Ted.Lemon@nominum.com>
To: Matthew Pounsett <matt@conundrum.com>
Thread-Topic: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
Thread-Index: AQHMkOpvITs2+PZEH0y/sWnZoIPa2ZWJMvoAgAC9ioCAANObgA==
Date: Sun, 23 Oct 2011 19:16:44 +0000
Message-ID: <A3FA9584-ECE7-4EA0-8F86-F3CD483F96E8@nominum.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <4EA30EB0.6080605@dougbarton.us> <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com>
In-Reply-To: <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [192.168.1.10]
Content-Type: multipart/alternative; boundary="_000_A3FA9584ECE74EA08F86F3CD483F96E8nominumcom_"
MIME-Version: 1.0
Cc: DHC WG <dhcwg@ietf.org>, "dnsop@ietf.org WG" <dnsop@ietf.org>, "<mif@ietf.org>" <mif@ietf.org>, dnsext List <dnsext@ietf.org>, Brian E Carpenter <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Oct 2011 19:16:58 -0000

--_000_A3FA9584ECE74EA08F86F3CD483F96E8nominumcom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

On Oct 23, 2011, at 2:39 AM, Matthew Pounsett wrote:
I think we need to accept that this practice is here to stay, and figure ou=
t how to deal with it on those terms.

There is no secure way to do search lists in a MIF environment.   Or, reall=
y, even in a SIF environment.   So saying "we just have to deal with it," w=
hile it may seem pragmatic, is really just avoiding the issue: it won't go =
away just because we ignore it.

Remember: it used to be the case that people would authenticate rsh traffic=
 using the source IP address, and this persisted long after it was clear th=
at it was untenable.   But the practice has been largely eliminated at this=
 point.   So it's not the case that just because some practice is "crucial,=
" it will inevitably persist forever.

The way search lists ought to be handled in a UI is to come up with a list =
of all the names that match the term the user has typed, and offer the user=
 the opportunity to select which of those names to choose.   But that's a U=
I hack, so essentially out of scope.   Also, in order to do this in a MIF e=
nvironment, you have to try resolving the name on both interfaces, which so=
me people think is not acceptable.


--_000_A3FA9584ECE74EA08F86F3CD483F96E8nominumcom_
Content-Type: text/html; charset="us-ascii"
Content-ID: <E556F012A2421647B6EAA3565F74AD8E@nominum.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
<div>
<div>On Oct 23, 2011, at 2:39 AM, Matthew Pounsett wrote:</div>
<blockquote type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-=
collapse: separate; font-family: Helvetica; font-style: normal; font-varian=
t: normal; font-weight: normal; letter-spacing: normal; line-height: normal=
; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: n=
one; white-space: normal; widows: 2; word-spacing: 0px; -webkit-border-hori=
zontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-dec=
orations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stro=
ke-width: 0px; font-size: medium; ">I
 think we need to accept that this practice is here to stay, and figure out=
 how to deal with it on those terms.<br>
</span></blockquote>
</div>
<br>
<div>There is no secure way to do search lists in a MIF environment. &nbsp;=
 Or, really, even in a SIF environment. &nbsp; So saying &quot;we just have=
 to deal with it,&quot; while it may seem pragmatic, is really just avoidin=
g the issue: it won't go away just because we ignore
 it.</div>
<div><br>
</div>
<div>Remember: it used to be the case that people would authenticate rsh tr=
affic using the source IP address, and this persisted long after it was cle=
ar that it was untenable. &nbsp; But the practice has been largely eliminat=
ed at this point. &nbsp; So it's not the case
 that just because some practice is &quot;crucial,&quot; it will inevitably=
 persist forever.</div>
<div><br>
</div>
<div>The way search lists ought to be handled in a UI is to come up with a =
list of all the names that match the term the user has typed, and offer the=
 user the opportunity to select which of those names to choose. &nbsp; But =
that's a UI hack, so essentially out
 of scope. &nbsp; Also, in order to do this in a MIF environment, you have =
to try resolving the name on both interfaces, which some people think is no=
t acceptable.</div>
<div><br>
</div>
</body>
</html>

--_000_A3FA9584ECE74EA08F86F3CD483F96E8nominumcom_--

From marka@isc.org  Sun Oct 23 20:57:59 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E56A521F8ACC; Sun, 23 Oct 2011 20:57:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.557
X-Spam-Level: 
X-Spam-Status: No, score=-2.557 tagged_above=-999 required=5 tests=[AWL=0.042,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K4XEzklZgECr; Sun, 23 Oct 2011 20:57:59 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by ietfa.amsl.com (Postfix) with ESMTP id 2724721F8A80; Sun, 23 Oct 2011 20:57:59 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id C35C5C9425; Mon, 24 Oct 2011 03:57:43 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 3458B216C6B; Mon, 24 Oct 2011 03:57:43 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 18A9915CA56E; Mon, 24 Oct 2011 14:57:38 +1100 (EST)
To: Donald Eastlake <d3e3e3@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <4EA30EB0.6080605@dougbarton.us> <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <20111023234921.6E1D915C005F@drugs.dv.isc.org> <CAF4+nEGCHVe6PCHJ-PKckc_7p-4yxQBvcO3dQzv1DdiapTfoKg@mail.gmail.com>
In-reply-to: Your message of "Sun, 23 Oct 2011 21:18:19 EDT." <CAF4+nEGCHVe6PCHJ-PKckc_7p-4yxQBvcO3dQzv1DdiapTfoKg@mail.gmail.com>
Date: Mon, 24 Oct 2011 14:57:38 +1100
Message-Id: <20111024035738.18A9915CA56E@drugs.dv.isc.org>
Cc: "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<mif@ietf.org>" <mif@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>
Subject: Re: [dnsext] [dhcwg] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 03:58:00 -0000

In message <CAF4+nEGCHVe6PCHJ-PKckc_7p-4yxQBvcO3dQzv1DdiapTfoKg@mail.gmail.com>
, Donald Eastlake writes:
> Hi,
> 
> On Sun, Oct 23, 2011 at 7:49 PM, Mark Andrews <marka@isc.org> wrote:
> >
> > In message <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com>, Matthew =
> Pounse
> > tt writes:
> >>
> >> On 2011/10/22, at 15:21, Keith Moore wrote:
> >>
> >> >
> >> > On Oct 22, 2011, at 2:42 PM, Doug Barton wrote:
> >> >
> >> >> 1. I think we're all in agreement that dot-terminated names (e.g.,
> >> >> example.) should not be subject to search lists. I personally don't have
> >> >> any problems with any document mentioning that this is the expected
> >> >> behavior.
> >> >
> >> > agree.  however there are standard protocols for which a trailing dot in a
> >> domain name is a syntax error.
> >>
> >> Any protocol that makes a standard FQDN a syntax error is itself in erro=
> r.  N
> >> ot to say that these don't exist, but if people are writing protocols th=
> at ca
> >> n't deal with a properly formatted FQDN they need to stop.  Now.
> >
> > Except it isn't a standard hostname.  Periods *seperate* labels in
> > hostnames RFC 952.  They DO NOT appear at the end of hostnames.
> 
> Isn't there the the root label, which is the null string, at the end
> of all FQDNs, so the period at the end does separate labels?

Not in hostnames. See RFC 952.


> Thanks,
> Donald
> ==============================
>  Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
>  155 Beaver Street, Milford, MA 01757 USA
>  d3e3e3@gmail.com
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From matt@conundrum.com  Sat Oct 22 23:41:20 2011
Return-Path: <matt@conundrum.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EF3B21F84B7; Sat, 22 Oct 2011 23:41:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_33=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9ER42OZwPrrB; Sat, 22 Oct 2011 23:41:20 -0700 (PDT)
Received: from coke.conundrum.com (coke.conundrum.com [216.235.9.139]) by ietfa.amsl.com (Postfix) with ESMTP id 1C5A121F84B5; Sat, 22 Oct 2011 23:41:19 -0700 (PDT)
Received: from chani.conundrum.com (chani.conundrum.com [216.235.10.34]) by coke.conundrum.com (8.13.1/8.12.6) with ESMTP id p9N6dTF1070668; Sun, 23 Oct 2011 02:39:33 -0400 (EDT) (envelope-from matt@conundrum.com)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=us-ascii
From: Matthew Pounsett <matt@conundrum.com>
In-Reply-To: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com>
Date: Sun, 23 Oct 2011 02:39:23 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <4EA30EB0.6080605@dougbarton.us> <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com>
To: Keith Moore <moore@network-heretics.com>
X-Mailer: Apple Mail (2.1251.1)
X-Mailman-Approved-At: Mon, 24 Oct 2011 00:40:54 -0700
Cc: "<mif@ietf.org>" <mif@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, Ted Lemon <Ted.Lemon@nominum.com>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Oct 2011 06:41:20 -0000

On 2011/10/22, at 15:21, Keith Moore wrote:

>=20
> On Oct 22, 2011, at 2:42 PM, Doug Barton wrote:
>=20
>> 1. I think we're all in agreement that dot-terminated names (e.g.,
>> example.) should not be subject to search lists. I personally don't =
have
>> any problems with any document mentioning that this is the expected
>> behavior.
>=20
> agree.  however there are standard protocols for which a trailing dot =
in a domain name is a syntax error.

Any protocol that makes a standard FQDN a syntax error is itself in =
error.  Not to say that these don't exist, but if people are writing =
protocols that can't deal with a properly formatted FQDN they need to =
stop.  Now.

> Strongly disagree.  That would leave users without a =
protocol-independent way of unambiguously specifying "this is a =
fully-qualified domain name".
>=20
> The practice of applying search lists to names with "."s in them needs =
to die.

I can't agree with this statement.  As others have said, the practice of =
using a search list to allow 'ssh foo.bar' to reach =
'foo.bar.example.com' isn't going anywhere, and there are a lot of =
people that make extensive use of the convenience.  Ask any security =
professional about how easy it is to compete with convenient access.

I think we need to accept that this practice is here to stay, and figure =
out how to deal with it on those terms.



From marka@isc.org  Sun Oct 23 16:49:46 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 07F1E21F8B5A; Sun, 23 Oct 2011 16:49:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.268
X-Spam-Level: 
X-Spam-Status: No, score=-2.268 tagged_above=-999 required=5 tests=[AWL=-0.269, BAYES_00=-2.599, J_CHICKENPOX_33=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kB8Yn68lZHkv; Sun, 23 Oct 2011 16:49:45 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id 3D48521F8B2B; Sun, 23 Oct 2011 16:49:45 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 7EEAD5F984C; Sun, 23 Oct 2011 23:49:29 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 39EDD216C6A; Sun, 23 Oct 2011 23:49:27 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 6E1D915C005F; Mon, 24 Oct 2011 10:49:21 +1100 (EST)
To: Matthew Pounsett <matt@conundrum.com>
From: Mark Andrews <marka@isc.org>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <4EA30EB0.6080605@dougbarton.us> <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com>
In-reply-to: Your message of "Sun, 23 Oct 2011 02:39:23 EDT." <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com>
Date: Mon, 24 Oct 2011 10:49:21 +1100
Message-Id: <20111023234921.6E1D915C005F@drugs.dv.isc.org>
X-Mailman-Approved-At: Mon, 24 Oct 2011 00:40:54 -0700
Cc: "<mif@ietf.org>" <mif@ietf.org>, Keith Moore <moore@network-heretics.com>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, Ted Lemon <Ted.Lemon@nominum.com>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Oct 2011 23:49:46 -0000

In message <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com>, Matthew Pounse
tt writes:
> 
> On 2011/10/22, at 15:21, Keith Moore wrote:
> 
> > 
> > On Oct 22, 2011, at 2:42 PM, Doug Barton wrote:
> > 
> >> 1. I think we're all in agreement that dot-terminated names (e.g.,
> >> example.) should not be subject to search lists. I personally don't have
> >> any problems with any document mentioning that this is the expected
> >> behavior.
> > 
> > agree.  however there are standard protocols for which a trailing dot in a 
> domain name is a syntax error.
> 
> Any protocol that makes a standard FQDN a syntax error is itself in error.  N
> ot to say that these don't exist, but if people are writing protocols that ca
> n't deal with a properly formatted FQDN they need to stop.  Now.

Except it isn't a standard hostname.  Periods *seperate* labels in
hostnames RFC 952.  They DO NOT appear at the end of hostnames.

Appending a period to the end of a name is user interface hack to
prevent searching.  If is also a way to prevent the appending of
the current origin to all names in a DNS master file as the current
origin is always appended if it isn't done.

In addition single labels are not HEIRACHICAL / DOMAIN STYLE names
as envisioned when we went from a flat namespace of simple hostnames
to a heirarchical namespace.

	foo.bar is a heirachical hostname.
	bar is a simple hostname.

Why are we trying to bring them back on a global context?

> > Strongly disagree.  That would leave users without a protocol-independent w
> ay of unambiguously specifying "this is a fully-qualified domain name".
> > 
> > The practice of applying search lists to names with "."s in them needs to d
> ie.
> 
> I can't agree with this statement.  As others have said, the practice of usin
> g a search list to allow 'ssh foo.bar' to reach 'foo.bar.example.com' isn't g
> oing anywhere, and there are a lot of people that make extensive use of the c
> onvenience.  Ask any security professional about how easy it is to compete wi
> th convenient access.
> 
> I think we need to accept that this practice is here to stay, and figure out 
> how to deal with it on those terms.

People deal with all sorts of changes.  Point out the obvious
security flaws, make enough fuss, vendors have to ship with this
behaviour gone/disabled.  People stop worrying about it.

> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From moore@network-heretics.com  Sun Oct 23 18:17:46 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FC6521F86F6; Sun, 23 Oct 2011 18:17:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.399
X-Spam-Level: 
X-Spam-Status: No, score=-3.399 tagged_above=-999 required=5 tests=[AWL=-0.400, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cFvrrG6Bz7v7; Sun, 23 Oct 2011 18:17:45 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id 4431921F86EE; Sun, 23 Oct 2011 18:17:45 -0700 (PDT)
Received: from compute5.internal (compute5.nyi.mail.srv.osa [10.202.2.45]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id 86E4820D46; Sun, 23 Oct 2011 21:17:44 -0400 (EDT)
Received: from frontend2.nyi.mail.srv.osa ([10.202.2.161]) by compute5.internal (MEProxy); Sun, 23 Oct 2011 21:17:44 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=2ab8+ViZ27U9NFEJlh9l3c60myQ=; b=h2 tC7SBBxmGTJTc7gNDSE+ubRcWNwX4qDtaeZFmBzxwjqsBW1a4QD6eQRIGmsrdnqj MYf2w6Wv7eYdxM3UrYf3ynM0fdYLyw8HTxXAviCUGFXj2Rkc8GVH2sHF8z02Cuhj TUf4iUhtvETBLUZZZfDQfzpN1J+7ZakAFOVWhay/M=
X-Sasl-enc: y9OuLXkWY312JgkI8BhujiI98xkBJ+fvetjH0MQAZMnV 1319419063
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id 6B6E7483436; Sun, 23 Oct 2011 21:17:42 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com>
Date: Sun, 23 Oct 2011 21:17:41 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <4EA30EB0.6080605@dougbarton.us> <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com>
To: Matthew Pounsett <matt@conundrum.com>
X-Mailer: Apple Mail (2.1084)
X-Mailman-Approved-At: Mon, 24 Oct 2011 00:40:54 -0700
Cc: "<mif@ietf.org>" <mif@ietf.org>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, Ted Lemon <Ted.Lemon@nominum.com>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 01:17:46 -0000

On Oct 23, 2011, at 2:39 AM, Matthew Pounsett wrote:

>=20
> On 2011/10/22, at 15:21, Keith Moore wrote:
>=20
>>=20
>> On Oct 22, 2011, at 2:42 PM, Doug Barton wrote:
>>=20
>>> 1. I think we're all in agreement that dot-terminated names (e.g.,
>>> example.) should not be subject to search lists. I personally don't =
have
>>> any problems with any document mentioning that this is the expected
>>> behavior.
>>=20
>> agree.  however there are standard protocols for which a trailing dot =
in a domain name is a syntax error.
>=20
> Any protocol that makes a standard FQDN a syntax error is itself in =
error.  Not to say that these don't exist, but if people are writing =
protocols that can't deal with a properly formatted FQDN they need to =
stop.  Now.

Per RFC 952, a standard FQDN does not contain a trailing dot.   Neither =
do email addresses nor domains in URLs.    Changing that set of embedded =
practices is much more difficult than changing the expectations of the =
relative few who currently expect names with dots to be subject to =
search lists.

>> Strongly disagree.  That would leave users without a =
protocol-independent way of unambiguously specifying "this is a =
fully-qualified domain name".
>>=20
>> The practice of applying search lists to names with "."s in them =
needs to die.
>=20
> I can't agree with this statement.  As others have said, the practice =
of using a search list to allow 'ssh foo.bar' to reach =
'foo.bar.example.com' isn't going anywhere, and there are a lot of =
people that make extensive use of the convenience.

It needs to die because it's fundamentally broken.   Vanity TLDs will =
only make it worse.   I understand that there are sites that use it and =
people who are accustomed to it.   I don't pretend that we can stop =
them.   We can, however, explain the negative consequences of doing this =
(some of which might be specific to systems with multiple interfaces), =
and recommend that they transition away from that practice.   And =
recommendations for systems with multiple interfaces can be chosen in =
such a way as to allow search lists to break even more.

Keith


From d3e3e3@gmail.com  Sun Oct 23 18:18:43 2011
Return-Path: <d3e3e3@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D503C21F8A35; Sun, 23 Oct 2011 18:18:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.728
X-Spam-Level: 
X-Spam-Status: No, score=-103.728 tagged_above=-999 required=5 tests=[AWL=-0.729, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KLoYucS6Qaqj; Sun, 23 Oct 2011 18:18:43 -0700 (PDT)
Received: from mail-bw0-f44.google.com (mail-bw0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id 466B421F89B8; Sun, 23 Oct 2011 18:18:42 -0700 (PDT)
Received: by bkas6 with SMTP id s6so8676336bka.31 for <multiple recipients>; Sun, 23 Oct 2011 18:18:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; bh=HsFoV4+GW+UNolfedzuqmFG2y0VHS31eIeqxoYGb6sw=; b=p9hn9TaQQ5kcjDNImX5HXStldfMQN91wAZBNP7br1LKZqIJOTVIZ5MtX0g925FjZwv EDGR+B47ydds4vBdrUJBvJuuvXfpxKktRVCf2c4Clpyz6jCdZBqcZ4XBQeQ24F2ocflh a8ixAOf9w2SyRTJ9Ktdcm0pEILhq9td6CkOJk=
Received: by 10.223.62.15 with SMTP id v15mr39979659fah.22.1319419119269; Sun, 23 Oct 2011 18:18:39 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.152.2.4 with HTTP; Sun, 23 Oct 2011 18:18:19 -0700 (PDT)
In-Reply-To: <20111023234921.6E1D915C005F@drugs.dv.isc.org>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <4EA30EB0.6080605@dougbarton.us> <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <20111023234921.6E1D915C005F@drugs.dv.isc.org>
From: Donald Eastlake <d3e3e3@gmail.com>
Date: Sun, 23 Oct 2011 21:18:19 -0400
Message-ID: <CAF4+nEGCHVe6PCHJ-PKckc_7p-4yxQBvcO3dQzv1DdiapTfoKg@mail.gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-Mailman-Approved-At: Mon, 24 Oct 2011 00:40:54 -0700
Cc: "<mif@ietf.org>" <mif@ietf.org>, Keith Moore <moore@network-heretics.com>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, Ted Lemon <Ted.Lemon@nominum.com>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [dhcwg] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 01:18:44 -0000

Hi,

On Sun, Oct 23, 2011 at 7:49 PM, Mark Andrews <marka@isc.org> wrote:
>
> In message <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com>, Matthew =
Pounse
> tt writes:
>>
>> On 2011/10/22, at 15:21, Keith Moore wrote:
>>
>> >
>> > On Oct 22, 2011, at 2:42 PM, Doug Barton wrote:
>> >
>> >> 1. I think we're all in agreement that dot-terminated names (e.g.,
>> >> example.) should not be subject to search lists. I personally don't h=
ave
>> >> any problems with any document mentioning that this is the expected
>> >> behavior.
>> >
>> > agree. =A0however there are standard protocols for which a trailing do=
t in a
>> domain name is a syntax error.
>>
>> Any protocol that makes a standard FQDN a syntax error is itself in erro=
r. =A0N
>> ot to say that these don't exist, but if people are writing protocols th=
at ca
>> n't deal with a properly formatted FQDN they need to stop. =A0Now.
>
> Except it isn't a standard hostname. =A0Periods *seperate* labels in
> hostnames RFC 952. =A0They DO NOT appear at the end of hostnames.

Isn't there the the root label, which is the null string, at the end
of all FQDNs, so the period at the end does separate labels?

Thanks,
Donald
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D
=A0Donald E. Eastlake 3rd=A0=A0 +1-508-333-2270 (cell)
=A0155 Beaver Street,=A0Milford, MA 01757 USA
=A0d3e3e3@gmail.com

> Appending a period to the end of a name is user interface hack to
> prevent searching. =A0If is also a way to prevent the appending of
> the current origin to all names in a DNS master file as the current
> origin is always appended if it isn't done.
>
> In addition single labels are not HEIRACHICAL / DOMAIN STYLE names
> as envisioned when we went from a flat namespace of simple hostnames
> to a heirarchical namespace.
>
> =A0 =A0 =A0 =A0foo.bar is a heirachical hostname.
> =A0 =A0 =A0 =A0bar is a simple hostname.
>
> Why are we trying to bring them back on a global context?
>
>> > Strongly disagree. =A0That would leave users without a protocol-indepe=
ndent w
>> ay of unambiguously specifying "this is a fully-qualified domain name".
>> >
>> > The practice of applying search lists to names with "."s in them needs=
 to d
>> ie.
>>
>> I can't agree with this statement. =A0As others have said, the practice =
of usin
>> g a search list to allow 'ssh foo.bar' to reach 'foo.bar.example.com' is=
n't g
>> oing anywhere, and there are a lot of people that make extensive use of =
the c
>> onvenience. =A0Ask any security professional about how easy it is to com=
pete wi
>> th convenient access.
>>
>> I think we need to accept that this practice is here to stay, and figure=
 out
>> how to deal with it on those terms.
>
> People deal with all sorts of changes. =A0Point out the obvious
> security flaws, make enough fuss, vendors have to ship with this
> behaviour gone/disabled. =A0People stop worrying about it.
>
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
c.org
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www.ietf.org/mailman/listinfo/dhcwg
>

From sthaug@nethelp.no  Sun Oct 23 23:15:06 2011
Return-Path: <sthaug@nethelp.no>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EE9121F8C28 for <dnsext@ietfa.amsl.com>; Sun, 23 Oct 2011 23:15:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.999
X-Spam-Level: 
X-Spam-Status: No, score=-5.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_33=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zYvwO0yOH4NQ for <dnsext@ietfa.amsl.com>; Sun, 23 Oct 2011 23:15:06 -0700 (PDT)
Received: from bizet.nethelp.no (bizet.nethelp.no [195.1.209.33]) by ietfa.amsl.com (Postfix) with SMTP id 84DA121F8C1F for <dnsext@ietf.org>; Sun, 23 Oct 2011 23:15:05 -0700 (PDT)
Received: (qmail 49707 invoked from network); 24 Oct 2011 06:08:23 -0000
Received: from bizet.nethelp.no (HELO localhost) (195.1.209.33) by bizet.nethelp.no with SMTP; 24 Oct 2011 06:08:23 -0000
Date: Mon, 24 Oct 2011 08:08:22 +0200 (CEST)
Message-Id: <20111024.080822.74700976.sthaug@nethelp.no>
To: moore@network-heretics.com
From: sthaug@nethelp.no
In-Reply-To: <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com>
X-Mailer: Mew version 3.3 on Emacs 21.3 / Mule 5.0 (SAKAKI)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Mailman-Approved-At: Mon, 24 Oct 2011 00:40:54 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, Ted.Lemon@nominum.com, dhcwg@ietf.org, denghui02@hotmail.com, brian.e.carpenter@gmail.com
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 06:15:07 -0000

> > I can't agree with this statement.  As others have said, the practice of using a search list to allow 'ssh foo.bar' to reach 'foo.bar.example.com' isn't going anywhere, and there are a lot of people that make extensive use of the convenience.
> 
> It needs to die because it's fundamentally broken.   Vanity TLDs will only make it worse.   I understand that there are sites that use it and people who are accustomed to it.   I don't pretend that we can stop them.   We can, however, explain the negative consequences of doing this (some of which might be specific to systems with multiple interfaces), and recommend that they transition away from that practice.   And recommendations for systems with multiple interfaces can be chosen in such a way as to allow search lists to break even more.

I routinely use short names (and thus search lists) in my work. I am
aware of vanity domains, and of RFC 1535. Have I stopped using short
names and search lists? No, the convenience is just too great.

In trying to stop the use of short names and search lists I believe
you're trying to fight human nature. It's a waste of time, and unlikely
to be productive.

Steinar Haug, Nethelp consulting, sthaug@nethelp.no

From mohta@necom830.hpcl.titech.ac.jp  Mon Oct 24 02:39:59 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 31BFC21F8CBF for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 02:39:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[AWL=-0.000,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kUfyC4YF++sA for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 02:39:58 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 2FA1921F8CBC for <dnsext@ietf.org>; Mon, 24 Oct 2011 02:39:55 -0700 (PDT)
Received: (qmail 59930 invoked from network); 24 Oct 2011 10:00:54 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 24 Oct 2011 10:00:54 -0000
Message-ID: <4EA5329D.8050607@necom830.hpcl.titech.ac.jp>
Date: Mon, 24 Oct 2011 18:40:45 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: dnsext@ietf.org
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp>
In-Reply-To: <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Subject: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 09:39:59 -0000

	http://www.ietf.org/id/draft-ohta-practically-secure-dns-00.txt

						Masataka Ohta

From moore@network-heretics.com  Mon Oct 24 03:53:10 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F0AE21F8BDB; Mon, 24 Oct 2011 03:53:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.381
X-Spam-Level: 
X-Spam-Status: No, score=-3.381 tagged_above=-999 required=5 tests=[AWL=-0.382, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6eU3CmqIhTcs; Mon, 24 Oct 2011 03:53:08 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id D054B21F8BD8; Mon, 24 Oct 2011 03:53:08 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.mail.srv.osa [10.202.2.41]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id E1063205F2; Mon, 24 Oct 2011 06:53:07 -0400 (EDT)
Received: from frontend2.nyi.mail.srv.osa ([10.202.2.161]) by compute1.internal (MEProxy); Mon, 24 Oct 2011 06:53:07 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=XxqCXQNflGGfqp26mZ9XFd1o+Mk=; b=GW qiDNEXydGYg5SKe5/z9GL+FpG500FnR8qaqdYUK3zL4FOqaHE/b0yWbZGWrfMPdN rjfpf+mFSo4XOWOGBtwn/5BhX7jMcVH/Pn6QW6ql3B2ONUFJO+R1Yz/eFQqEh6K3 mlrRCvydWtjfyTCGGBTuPy8STt11nsOjP3JES22ls=
X-Sasl-enc: GZQd13ftozDfZsaK5kHKyuE49V5sXYB6/QLlNAr2GSkz 1319453587
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id E3DB24833A2; Mon, 24 Oct 2011 06:53:05 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <20111024.080822.74700976.sthaug@nethelp.no>
Date: Mon, 24 Oct 2011 06:53:05 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no>
To: sthaug@nethelp.no
X-Mailer: Apple Mail (2.1084)
X-Mailman-Approved-At: Mon, 24 Oct 2011 04:14:15 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, Ted.Lemon@nominum.com, dhcwg@ietf.org, denghui02@hotmail.com, brian.e.carpenter@gmail.com
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 10:53:10 -0000

On Oct 24, 2011, at 2:08 AM, sthaug@nethelp.no wrote:

>>> I can't agree with this statement.  As others have said, the =
practice of using a search list to allow 'ssh foo.bar' to reach =
'foo.bar.example.com' isn't going anywhere, and there are a lot of =
people that make extensive use of the convenience.
>>=20
>> It needs to die because it's fundamentally broken.   Vanity TLDs will =
only make it worse.   I understand that there are sites that use it and =
people who are accustomed to it.   I don't pretend that we can stop =
them.   We can, however, explain the negative consequences of doing this =
(some of which might be specific to systems with multiple interfaces), =
and recommend that they transition away from that practice.   And =
recommendations for systems with multiple interfaces can be chosen in =
such a way as to allow search lists to break even more.
>=20
> I routinely use short names (and thus search lists) in my work. I am
> aware of vanity domains, and of RFC 1535. Have I stopped using short
> names and search lists? No, the convenience is just too great.
>=20
> In trying to stop the use of short names and search lists I believe
> you're trying to fight human nature. It's a waste of time, and =
unlikely
> to be productive.

Just to be clear, I'm not trying to forbid the use of search lists with =
"bare" (single-label) names.   I'm just pointing out that for the vast =
majority of the contexts in which domain names are used, the expectation =
is that a domain name that contains a "." is fully-qualified.  The need =
for domain names to behave consistently from one host to another and one =
application to another is much, much more important, than the need to =
apply search lists to queries of domain names that contain "."s.  =20


From alex@alex.org.uk  Mon Oct 24 04:20:54 2011
Return-Path: <alex@alex.org.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51B7421F886A; Mon, 24 Oct 2011 04:20:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5PVQU91LeoEz; Mon, 24 Oct 2011 04:20:54 -0700 (PDT)
Received: from mail.avalus.com (mail.avalus.com [IPv6:2001:41c8:10:1dd::10]) by ietfa.amsl.com (Postfix) with ESMTP id CECAB21F8801; Mon, 24 Oct 2011 04:20:53 -0700 (PDT)
Received: from [192.168.100.15] (87-194-71-186.bethere.co.uk [87.194.71.186]) by mail.avalus.com (Postfix) with ESMTPSA id 79769C56100; Mon, 24 Oct 2011 12:20:51 +0100 (BST)
Date: Mon, 24 Oct 2011 12:20:50 +0100
From: Alex Bligh <alex@alex.org.uk>
To: Ted Lemon <Ted.Lemon@nominum.com>, Keith Moore <moore@network-heretics.com>
Message-ID: <B52E25DC88B2277D83EC6299@Ximines.local>
In-Reply-To: <835BF3F4-B0A1-4BBA-988F-FE147573CED0@nominum.com>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <F932CA9C-3489-48AC-A454-5B7A91CF129A@nominum.com> <1DF30BB4-76DB-427A-8ACF-A345BAE26FA6@network-heretics.com> <835BF3F4-B0A1-4BBA-988F-FE147573CED0@nominum.com>
X-Mailer: Mulberry/4.0.8 (Mac OS X)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Cc: DHC WG <dhcwg@ietf.org>, "dnsop@ietf.org WG" <dnsop@ietf.org>, "<mif@ietf.org>" <mif@ietf.org>, dnsext List <dnsext@ietf.org>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection	document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Alex Bligh <alex@alex.org.uk>
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 11:20:54 -0000

--On 22 October 2011 19:41:58 +0000 Ted Lemon <Ted.Lemon@nominum.com> wrote:

> Yes.   But if a bare name is used, a bogus search list can also bypass
> DNSSEC validation.

For the hard of understanding, please could you expand on this?

Doesn't the client know the full name being looked up, even with a search
list?

-- 
Alex Bligh

From alex@alex.org.uk  Mon Oct 24 04:19:26 2011
Return-Path: <alex@alex.org.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D65C21F8CFB; Mon, 24 Oct 2011 04:19:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 92+JBbx-W4Dz; Mon, 24 Oct 2011 04:19:25 -0700 (PDT)
Received: from mail.avalus.com (mail.avalus.com [IPv6:2001:41c8:10:1dd::10]) by ietfa.amsl.com (Postfix) with ESMTP id AE59D21F8CFA; Mon, 24 Oct 2011 04:19:25 -0700 (PDT)
Received: from [192.168.100.15] (87-194-71-186.bethere.co.uk [87.194.71.186]) by mail.avalus.com (Postfix) with ESMTPSA id B71E6C56100; Mon, 24 Oct 2011 12:19:21 +0100 (BST)
Date: Mon, 24 Oct 2011 12:19:21 +0100
From: Alex Bligh <alex@alex.org.uk>
To: Keith Moore <moore@network-heretics.com>, sthaug@nethelp.no
Message-ID: <E68B291B136EE9E8CFBF68F0@Ximines.local>
In-Reply-To: <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com>
X-Mailer: Mulberry/4.0.8 (Mac OS X)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-Mailman-Approved-At: Mon, 24 Oct 2011 05:01:33 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, Ted.Lemon@nominum.com, dhcwg@ietf.org, denghui02@hotmail.com, brian.e.carpenter@gmail.com
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server	selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Alex Bligh <alex@alex.org.uk>
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 11:19:26 -0000

--On 24 October 2011 06:53:05 -0400 Keith Moore 
<moore@network-heretics.com> wrote:

> I'm just pointing out that for the vast majority of the contexts in which
> domain names are used, the expectation is that a domain name that
> contains a "." is fully-qualified.

This is sampling bias.

In the vast majority of contexts where domain names (term used
loosely) are used, those domain names contain at least one dot.

In the vast majority of contexts where domain names (term used
loosely) are used, those domain names are fully qualified.

It is therefore statistically unsurprising that in the vast
majority of contexts where domain with a dot in them, are used
they are fully qualified.

The question here should be "where search lists are used, are
they frequently used in combination with domain names that
are not fully qualified". I would suggest the answer to this
question is "yes". If so, then to the extent that search lists
are supported, you need to make them interwork names with
dots in them. Moreover, with a search list of "example.com",
having "mail" work, but not "mail.dev" is going to be a
pretty surprising outcome.

I think the two options are either deprecating search lists
(or not supporting them), or supporting them properly, in
which case they must be used whatever domain name is
specified, and the way to avoid using a search list
is the same old hack as before (i.e. putting a dot on the
end).

-- 
Alex Bligh

From moore@network-heretics.com  Mon Oct 24 04:30:00 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1689221F8D0A; Mon, 24 Oct 2011 04:30:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.664
X-Spam-Level: 
X-Spam-Status: No, score=-3.664 tagged_above=-999 required=5 tests=[AWL=-0.065, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5KjWjx7pmI0T; Mon, 24 Oct 2011 04:29:59 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id 564B621F8D10; Mon, 24 Oct 2011 04:29:59 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.mail.srv.osa [10.202.2.43]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id E30F22069D; Mon, 24 Oct 2011 07:29:58 -0400 (EDT)
Received: from frontend2.nyi.mail.srv.osa ([10.202.2.161]) by compute3.internal (MEProxy); Mon, 24 Oct 2011 07:29:58 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=jAXQvOkjqKiLN+83phnbP3ADYoA=; b=sD 0now8Xf63AyRMiplS5cWsJdp2t00qNDfDtgqJqi07FujJr4QgP18OauqL6KieZ/+ kVbFZ+FOnr6J4vUzWUwmWsEcyKGCtV0IkB4to93PSQE9404QStuFG5ygSibIQYBr ZpzGpr1H7qVcqMmtR9RA71jhUr7xy0Nxqpz6OY7W4=
X-Sasl-enc: +XEezKKO7/7jLeKv5Zb3tBJvhlp1ghuET5P0asA+ObTA 1319455798
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id B3B4748336D; Mon, 24 Oct 2011 07:29:56 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <E68B291B136EE9E8CFBF68F0@Ximines.local>
Date: Mon, 24 Oct 2011 07:29:55 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local>
To: Alex Bligh <alex@alex.org.uk>
X-Mailer: Apple Mail (2.1084)
X-Mailman-Approved-At: Mon, 24 Oct 2011 05:01:33 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, Ted.Lemon@nominum.com, dhcwg@ietf.org, denghui02@hotmail.com, brian.e.carpenter@gmail.com
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server	selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 11:30:00 -0000

On Oct 24, 2011, at 7:19 AM, Alex Bligh wrote:

> --On 24 October 2011 06:53:05 -0400 Keith Moore =
<moore@network-heretics.com> wrote:
>=20
>> I'm just pointing out that for the vast majority of the contexts in =
which
>> domain names are used, the expectation is that a domain name that
>> contains a "." is fully-qualified.
>=20
> This is sampling bias.

No, I don't think so.  The vast majority of contexts where domain names =
are used, are contexts in which the domain is supplied by one party and =
(at least potentially) used by another party.  Email addresses, URLs, =
domain names written on advertisements and business cards, etc. =20

> The question here should be "where search lists are used, are
> they frequently used in combination with domain names that
> are not fully qualified". I would suggest the answer to this
> question is "yes".

That's not a useful way to phrase the question, because there's no way =
for software to know whether or not the user intends that a name =
containing "." is fully-qualified.

> If so, then to the extent that search lists
> are supported, you need to make them interwork names with
> dots in them. Moreover, with a search list of "example.com",
> having "mail" work, but not "mail.dev" is going to be a
> pretty surprising outcome.

It will be surprising to that relatively small portion of users that =
relies on search lists being applied to multi-label names.   But =
overall, having a clear, visible distinction between names for which =
searching is potentially applied (i.e. bare or single-label names), and =
names for which searching is not applied (multi-label names) results in =
less surprising behavior for everyone.

> I think the two options are either deprecating search lists
> (or not supporting them), or supporting them properly, in
> which case they must be used whatever domain name is
> specified, and the way to avoid using a search list
> is the same old hack as before (i.e. putting a dot on the
> end).

Supporting search lists "properly" is NOT using them whenever a domain =
name is specified.  That makes all domain names context-sensitive, and =
breaks every application that uses domain names supplied by other =
parties or in other contexts.

Keith


From alex@alex.org.uk  Mon Oct 24 04:55:47 2011
Return-Path: <alex@alex.org.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B590921F87D3; Mon, 24 Oct 2011 04:55:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level: 
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_33=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 95J0Z4Do5UMZ; Mon, 24 Oct 2011 04:55:47 -0700 (PDT)
Received: from mail.avalus.com (mail.avalus.com [IPv6:2001:41c8:10:1dd::10]) by ietfa.amsl.com (Postfix) with ESMTP id C771521F8C60; Mon, 24 Oct 2011 04:55:33 -0700 (PDT)
Received: from [192.168.100.15] (87-194-71-186.bethere.co.uk [87.194.71.186]) by mail.avalus.com (Postfix) with ESMTPSA id 3D8D8C560FA; Mon, 24 Oct 2011 12:55:30 +0100 (BST)
Date: Mon, 24 Oct 2011 12:55:29 +0100
From: Alex Bligh <alex@alex.org.uk>
To: Keith Moore <moore@network-heretics.com>
Message-ID: <AFC2B32D1BE5A9E449B8D8A1@Ximines.local>
In-Reply-To: <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com>
X-Mailer: Mulberry/4.0.8 (Mac OS X)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-Mailman-Approved-At: Mon, 24 Oct 2011 05:01:33 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, Ted.Lemon@nominum.com, dhcwg@ietf.org, denghui02@hotmail.com, brian.e.carpenter@gmail.com
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS	server	selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Alex Bligh <alex@alex.org.uk>
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 11:55:48 -0000

--On 24 October 2011 07:29:55 -0400 Keith Moore 
<moore@network-heretics.com> wrote:


>>> I'm just pointing out that for the vast majority of the contexts in
>>> which domain names are used, the expectation is that a domain name that
>>> contains a "." is fully-qualified.
>>
>> This is sampling bias.
>
> No, I don't think so.  The vast majority of contexts where domain names
> are used, are contexts in which the domain is supplied by one party and
> (at least potentially) used by another party.  Email addresses, URLs,
> domain names written on advertisements and business cards, etc.

Of course, but that explicitly excludes every case where a search
list is useful. That's why I'm saying you have to look at the
cases were a search list is used. In large organisations "domain names"
(used loosely) can have dots in and be expected to have
search list items appended. Given search list use is rare,
it's obviously going to be rare to have them with dots.

>> The question here should be "where search lists are used, are
>> they frequently used in combination with domain names that
>> are not fully qualified". I would suggest the answer to this
>> question is "yes".
>
> That's not a useful way to phrase the question, because there's no way
> for software to know whether or not the user intends that a name
> containing "." is fully-qualified.

You are begging the question. Of course the name "foo.bar" is
ambiguous. That's precisely /why/ there is a search list, so
foo.bar is only looked up if foo.bar.example.com (or whatever)
does not exist. The existence of the "if" step means that the
software cannot know what the domain means (in the sense
of what it will ultimately resolve to) without doing a lookup.

>> If so, then to the extent that search lists
>> are supported, you need to make them interwork names with
>> dots in them. Moreover, with a search list of "example.com",
>> having "mail" work, but not "mail.dev" is going to be a
>> pretty surprising outcome.
>
> It will be surprising to that relatively small portion of users that
> relies on search lists being applied to multi-label names.   But overall,
> having a clear, visible distinction between names for which searching is
> potentially applied (i.e. bare or single-label names), and names for
> which searching is not applied (multi-label names) results in less
> surprising behavior for everyone.

I do not think you have established that a relatively small number
of users of search lists use multi-label names. I suspect that
is not true.

>> I think the two options are either deprecating search lists
>> (or not supporting them), or supporting them properly, in
>> which case they must be used whatever domain name is
>> specified, and the way to avoid using a search list
>> is the same old hack as before (i.e. putting a dot on the
>> end).
>
> Supporting search lists "properly" is NOT using them whenever a domain
> name is specified.  That makes all domain names context-sensitive, and
> breaks every application that uses domain names supplied by other parties
> or in other contexts.

I don't have RFC references to hand, but precisely for the reasons you have
set out above, I do not believe there is anything within them that search
lists should only be used if "a domain name is specified", precisely
because it's impossible to tell whether a string with dots in it is "a
domain name", or merely something to go on the front of search lists.

What you are, I think, saying, is that you want to change the behaviour of
search lists so they only work with single labels. What I'm saying is that
there are likely to be a significant number of users of search lists who
are affected by that, as they currently pass things with dots in them. A
completely unscientific analysis I know, but every internet company I have
worked with since we moved out of uucp naming has done this, and not
because I have told them to. Even current 20 person software house does
this. So, if you are going to substantially break search lists (which is
not inherently a bad idea - they have caused all sorts of trouble in times
past), you might as well just deprecate them or not support them.

-- 
Alex Bligh

From jabley@hopcount.ca  Mon Oct 24 06:13:25 2011
Return-Path: <jabley@hopcount.ca>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B112D21F8C16 for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 06:13:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FbJL8r4jY4Qr for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 06:13:24 -0700 (PDT)
Received: from monster.hopcount.ca (monster.hopcount.ca [216.235.14.38]) by ietfa.amsl.com (Postfix) with ESMTP id 0087521F8BEB for <dnsext@ietf.org>; Mon, 24 Oct 2011 06:13:23 -0700 (PDT)
Received: from [41.82.152.79] (helo=[10.10.0.138]) by monster.hopcount.ca with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.76 (FreeBSD)) (envelope-from <jabley@hopcount.ca>) id 1RIKKk-000C8L-4p; Mon, 24 Oct 2011 13:13:13 +0000
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=us-ascii
From: Joe Abley <jabley@hopcount.ca>
In-Reply-To: <4EA5329D.8050607@necom830.hpcl.titech.ac.jp>
Date: Mon, 24 Oct 2011 13:12:33 +0000
Content-Transfer-Encoding: quoted-printable
Message-Id: <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
X-Mailer: Apple Mail (2.1251.1)
X-SA-Exim-Connect-IP: 41.82.152.79
X-SA-Exim-Mail-From: jabley@hopcount.ca
X-SA-Exim-Scanned: No (on monster.hopcount.ca); SAEximRunCond expanded to false
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 13:13:25 -0000

On 2011-10-24, at 09:40, Masataka Ohta wrote:

> 	http://www.ietf.org/id/draft-ohta-practically-secure-dns-00.txt

You characterise the possible reasons why successive responses to the =
same query, sent close together with different query IDs, might be =
different. I think the set of possible reasons is simpler than you =
suggest, namely

(a) the responses are legitimately different (e.g. your possible cases =
1, 2 and 3)

(b) the responses are different for a malicious, undesirable reason =
(your case 4)

I don't understand from your draft how I distinguish between (a) and =
(b), except in the corner case where I happen to be intimately aware of =
what the originator of the DNS data (the maintainer of the corresponding =
zone) intends. The text that provides the necessary guidance in =
identifying your case (4) is not clear to me.

Your draft also doesn't seem to address the threat that a man in the =
middle receives both queries from the client and replies to them with =
bogus data, in such a way that a client following your direction =
believes the answer to be secure.

I presume that your proposal addresses a particular subset of existing =
threats, and that you view mitigation of that subset to be sufficient to =
declare the result "practically secure". It would help me understand the =
proposal if you outlined what those threats were.

As I read it, the guidance in your draft would cause some legitimate =
responses to be discarded and at the same time provides a recipe which =
would allow anybody with malicious intent to feed lies to a client and =
have them accepted as secure.

Either my understanding is faulty (in which case perhaps the draft would =
benefit from clarification) or the proposal seems to have limited =
applicability.


Joe=

From paul@xelerance.com  Mon Oct 24 06:45:19 2011
Return-Path: <paul@xelerance.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DBC421F8DF8 for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 06:45:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YTZY2FyU8UEq for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 06:45:18 -0700 (PDT)
Received: from mx.xelerance.com (mx.xelerance.com [193.110.157.188]) by ietfa.amsl.com (Postfix) with ESMTP id 67E1F21F8DE4 for <dnsext@ietf.org>; Mon, 24 Oct 2011 06:45:18 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mx.xelerance.com (Postfix) with ESMTP id 2C840528 for <dnsext@ietf.org>; Mon, 24 Oct 2011 09:44:42 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=xelerance.com; h= content-type:content-type:mime-version:user-agent:references :message-id:in-reply-to:subject:subject:from:from:date:date :received:received:received:received; s=smtp; t=1319463881; x= 1320068681; bh=BOtmAnvDy4zECvWtNB7ukAIIvQ3lS4cMNbhGg0zPMOA=; b=O aYj2VtyujxGTPxokFRqHGqlYgzMKlApK87qu+OfaPmWB2wd6ILAFAnxadl5VNu8x PXyZkR4EHnDQjztqKnKP1EaTSrUKlAUpXR8Z9d1O/3NJUQNU4MFo2bZC1dIEw+wT DX4DJ8FXKw9FN9tQtTkV9rz66cfjeYMu75La2Ffll8=
Received: from mx.xelerance.com ([127.0.0.1]) by localhost (mx.xelerance.com [127.0.0.1]) (amavisd-new, port 10026) with LMTP id 0K6slfpZ9Fsc for <dnsext@ietf.org>; Mon, 24 Oct 2011 09:44:41 -0400 (EDT)
Received: from mail.xelerance.com (mail.xelerance.com [193.110.157.189]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.xelerance.com (Postfix) with ESMTPS id 0E0696B for <dnsext@ietf.org>; Mon, 24 Oct 2011 09:44:41 -0400 (EDT)
Received: by mail.xelerance.com (Postfix, from userid 1001) id 2373FB13; Mon, 24 Oct 2011 09:44:39 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by mail.xelerance.com (Postfix) with ESMTP id 1DFFB598 for <dnsext@ietf.org>; Mon, 24 Oct 2011 09:44:39 -0400 (EDT)
Date: Mon, 24 Oct 2011 09:44:39 -0400 (EDT)
From: Paul Wouters <paul@xelerance.com>
To: dnsext@ietf.org
In-Reply-To: <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca>
Message-ID: <alpine.DEB.2.00.1110240940230.9077@mail.xelerance.com>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca>
User-Agent: Alpine 2.00 (DEB 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 13:45:19 -0000

> On 2011-10-24, at 09:40, Masataka Ohta wrote:
>
> 	http://www.ietf.org/id/draft-ohta-practically-secure-dns-00.txt

Isn't all of this already proposed in http://tools.ietf.org/html/draft-wijngaards-dnsext-resolver-side-mitigation-01
and implemented in unbound?

It also totally ignores the fact that if all involved name servers are "secure" (definition unknown) but
the traffic path is not, the "secure" client is still going to take rewritten replies. Eg this draft
does not even handle the "starbucks wifi" scenario or any transparent DNS proxy scenario.

Paul

From nweaver@icsi.berkeley.edu  Mon Oct 24 07:55:14 2011
Return-Path: <nweaver@icsi.berkeley.edu>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B472221F8E3E for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 07:55:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.207
X-Spam-Level: 
X-Spam-Status: No, score=-2.207 tagged_above=-999 required=5 tests=[AWL=-0.392, BAYES_00=-2.599, NUMERIC_HTTP_ADDR=0.001, SARE_URI_DIGITS4=0.415, URI_HEX=0.368]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cIqUH0InFWlN for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 07:55:14 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id 4CBFE21F8DEA for <dnsext@ietf.org>; Mon, 24 Oct 2011 07:55:14 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 84E542C400C; Mon, 24 Oct 2011 07:55:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 6dh+eHI72RWI; Mon, 24 Oct 2011 07:55:08 -0700 (PDT)
Received: from gala.icir.org (gala [192.150.187.49]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 386E02C4003; Mon, 24 Oct 2011 07:55:08 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=us-ascii
From: Nicholas Weaver <nweaver@icsi.berkeley.edu>
In-Reply-To: <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca>
Date: Mon, 24 Oct 2011 07:55:07 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <F9E39FDF-289E-4690-81D2-AE6B8DA43420@icsi.berkeley.edu>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
X-Mailer: Apple Mail (2.1251.1)
Cc: dnsext List <dnsext@ietf.org>
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 14:55:14 -0000

On 2011-10-24, at 09:40, Masataka Ohta wrote:

> 	http://www.ietf.org/id/draft-ohta-practically-secure-dns-00.txt



This draft only addresses out of path adversaries, those which may =
trigger a request but can not see the actual packets.  There exists =
several critical in-path adversaries (including, in practice, the =
resolvers themselves) that are active in the wild that this can not =
address, and thus saying "Secure" is a misnomer, it is secure against =
out-of-path attackers/blind injection attacks only.



The probability of performing blind injection is already vastly reduced =
by a combination of source port randomization and 0x20 encoding, and the =
damage DONE by blind injection can be mitigated by better glue policies =
of which you've advocated in the past.  To my knowledge, Unbound =
implements all of these: source port randomization + 0x20 to reduce the =
probability, and glue policy to reduce the damage. [1]  I think 0x20 is =
off by default but not sure.



Also, There exists an easier approach for fallback under conflict: retry =
using TCP rather than UDP. =20

TCP, with its much larger state space (32b sequence number on each side =
plus 16b transaction ID) is effectively immune to blind injection =
attacks.



[1] Glue policy is essential, as otherwise deliberately synthetic names =
(e.g. 12314515125125125.com) can be used to corrupt glue records yet =
don't benefit from the increased entropy of 0x20.


From paul@xelerance.com  Mon Oct 24 09:22:24 2011
Return-Path: <paul@xelerance.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCF1F1F0C59 for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 09:22:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mkfQSODjeORj for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 09:22:24 -0700 (PDT)
Received: from mx.xelerance.com (mx.xelerance.com [193.110.157.188]) by ietfa.amsl.com (Postfix) with ESMTP id 920BA1F0C58 for <dnsext@ietf.org>; Mon, 24 Oct 2011 09:22:23 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mx.xelerance.com (Postfix) with ESMTP id 14A174E4 for <dnsext@ietf.org>; Mon, 24 Oct 2011 12:21:48 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=xelerance.com; h= content-type:content-type:mime-version:user-agent:references :message-id:in-reply-to:subject:subject:from:from:date:date :received:received:received:received; s=smtp; t=1319473307; x= 1320078107; bh=Usqi3vbk8koU2b8+PUBOdY2YXkOr+yVu9JapmbVb7zw=; b=U zccg0fdavsUQHc9SH4dM8c8F5QSH+sbjQ9Q4n3MzeYd+mERLjnPC8tsHd/Ss4l4F /xOf7zJYKsxtF/tc9GVf74QFHQwSExxY7ogD/b+dYiHK0NftbmNreY/VWYbcXV4A GmUe1hu+3WvLhfuUm4+9BTMBv5YIguMMbrrEZRql5o=
Received: from mx.xelerance.com ([127.0.0.1]) by localhost (mx.xelerance.com [127.0.0.1]) (amavisd-new, port 10026) with LMTP id cywvdk7h43AF for <dnsext@ietf.org>; Mon, 24 Oct 2011 12:21:47 -0400 (EDT)
Received: from mail.xelerance.com (mail.xelerance.com [193.110.157.189]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.xelerance.com (Postfix) with ESMTPS id 4DC8689 for <dnsext@ietf.org>; Mon, 24 Oct 2011 12:21:47 -0400 (EDT)
Received: by mail.xelerance.com (Postfix, from userid 1001) id 1EC7DB13; Mon, 24 Oct 2011 12:21:45 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by mail.xelerance.com (Postfix) with ESMTP id 16C38598 for <dnsext@ietf.org>; Mon, 24 Oct 2011 12:21:45 -0400 (EDT)
Date: Mon, 24 Oct 2011 12:21:43 -0400 (EDT)
From: Paul Wouters <paul@xelerance.com>
To: dnsext List <dnsext@ietf.org>
In-Reply-To: <F9E39FDF-289E-4690-81D2-AE6B8DA43420@icsi.berkeley.edu>
Message-ID: <alpine.DEB.2.00.1110241210140.9077@mail.xelerance.com>
References: <20111009135505.GA85221@shinkuro.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <F9E39FDF-289E-4690-81D2-AE6B8DA43420@icsi.berkeley.edu>
User-Agent: Alpine 2.00 (DEB 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 16:22:24 -0000

On Mon, 24 Oct 2011, Nicholas Weaver wrote:

> 0x20 to reduce the probability, and glue policy to reduce the damage. [1]  I think 0x20 is off by default but not sure.

When GoDaddy broke their servers a few months ago, 0x20 basically died. You will be failing thousands of domains
if you enable 0x20 :(

Paul

From nweaver@icsi.berkeley.edu  Mon Oct 24 09:23:53 2011
Return-Path: <nweaver@icsi.berkeley.edu>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2FF771F0C58 for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 09:23:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.468
X-Spam-Level: 
X-Spam-Status: No, score=-2.468 tagged_above=-999 required=5 tests=[AWL=0.131,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sIij0A47bjTh for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 09:23:49 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id 37DB81F0C4F for <dnsext@ietf.org>; Mon, 24 Oct 2011 09:23:48 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 20F952C400D; Mon, 24 Oct 2011 09:23:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id WQLLTF8XypUx; Mon, 24 Oct 2011 09:23:47 -0700 (PDT)
Received: from gala.icir.org (gala [192.150.187.49]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id D6E0D2C4003; Mon, 24 Oct 2011 09:23:47 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=us-ascii
From: Nicholas Weaver <nweaver@icsi.berkeley.edu>
In-Reply-To: <alpine.DEB.2.00.1110241210140.9077@mail.xelerance.com>
Date: Mon, 24 Oct 2011 09:23:47 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <6C3F11FF-BDCE-4BF1-BEB8-4A3C9A737630@icsi.berkeley.edu>
References: <20111009135505.GA85221@shinkuro.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <F9E39FDF-289E-4690-81D2-AE6B8DA43420@icsi.berkeley.edu> <alpine.DEB.2.00.1110241210140.9077@mail.xelerance.com>
To: Paul Wouters <paul@xelerance.com>
X-Mailer: Apple Mail (2.1251.1)
Cc: dnsext List <dnsext@ietf.org>
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 16:23:53 -0000

On Oct 24, 2011, at 9:21 AM, Paul Wouters wrote:

> On Mon, 24 Oct 2011, Nicholas Weaver wrote:
>=20
>> 0x20 to reduce the probability, and glue policy to reduce the damage. =
[1]  I think 0x20 is off by default but not sure.
>=20
> When GoDaddy broke their servers a few months ago, 0x20 basically =
died. You will be failing thousands of domains
> if you enable 0x20 :(

No, you'll be slowing down resolution, not failing, since you treat 0x20 =
like you do EDNS: timeout means retry without, and memoize that =
information.

Better yet, make the "Memoize the information" be "always use TCP", and =
force them to fix their resolver under the load.


From moore@network-heretics.com  Mon Oct 24 05:16:22 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97AB221F8D07; Mon, 24 Oct 2011 05:16:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.361
X-Spam-Level: 
X-Spam-Status: No, score=-3.361 tagged_above=-999 required=5 tests=[AWL=-0.362, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FvmIR3Gn0xsE; Mon, 24 Oct 2011 05:16:21 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id B413C21F8D06; Mon, 24 Oct 2011 05:16:21 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.mail.srv.osa [10.202.2.43]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id 2C8A0200CE; Mon, 24 Oct 2011 08:16:21 -0400 (EDT)
Received: from frontend2.nyi.mail.srv.osa ([10.202.2.161]) by compute3.internal (MEProxy); Mon, 24 Oct 2011 08:16:21 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=UmQDL+lxJSKsSYskY8PEi/zl51Q=; b=Q/ OdCbFI4DrI5390aHKwofEJs5wiLNbOsOL1oFdbX4547tPKTKK8log8HJHi0I11K9 K8qmehl+buwAHP37Bk+Sjwn8Ofm5hW2IY9CoAfk2tEf0D/xDa4HG/GkW+OObAOhX BoSNlUreY046ykOjtgbGj1yCcmXrbNBbbw7vtX2/g=
X-Sasl-enc: nGCVSs1QPiuJ+WId8Q20kbu/o7g5mPJG///tgD0gq41j 1319458580
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id B08764833D6; Mon, 24 Oct 2011 08:16:18 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <AFC2B32D1BE5A9E449B8D8A1@Ximines.local>
Date: Mon, 24 Oct 2011 08:16:17 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com> <AFC2B32D1BE5A9E449B8D8A1@Ximines.local>
To: Alex Bligh <alex@alex.org.uk>
X-Mailer: Apple Mail (2.1084)
X-Mailman-Approved-At: Mon, 24 Oct 2011 09:32:33 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, Ted.Lemon@nominum.com, dhcwg@ietf.org, denghui02@hotmail.com, brian.e.carpenter@gmail.com
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS	server	selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 12:16:22 -0000

On Oct 24, 2011, at 7:55 AM, Alex Bligh wrote:

>=20
>=20
> --On 24 October 2011 07:29:55 -0400 Keith Moore =
<moore@network-heretics.com> wrote:
>=20
>=20
>>>> I'm just pointing out that for the vast majority of the contexts in
>>>> which domain names are used, the expectation is that a domain name =
that
>>>> contains a "." is fully-qualified.
>>>=20
>>> This is sampling bias.
>>=20
>> No, I don't think so.  The vast majority of contexts where domain =
names
>> are used, are contexts in which the domain is supplied by one party =
and
>> (at least potentially) used by another party.  Email addresses, URLs,
>> domain names written on advertisements and business cards, etc.
>=20
> Of course, but that explicitly excludes every case where a search
> list is useful.

That's the point - search lists are not appropriate most of the time, =
and it's very hard for software to distinguish the cases where they are =
potentially appropriate from the cases when they're not, and it's not =
possible for software to do this in all cases.

The presence or absence of a '.' is a simple and easily-understood =
convention.  It might be somewhat inconvenient for large organizations =
that currently rely on search lists for multi-label names, but overall =
that's a small price to pay in exchange for having consistent behavior =
of domain names across the board. =20

The only reason that those organizations have managed to get away with =
it so far is that TLDs (particularly TLDs with more than 2 characters) =
have been relatively few in number.  But with vanity TLDs this will no =
longer be the case.

>>> The question here should be "where search lists are used, are
>>> they frequently used in combination with domain names that
>>> are not fully qualified". I would suggest the answer to this
>>> question is "yes".
>>=20
>> That's not a useful way to phrase the question, because there's no =
way
>> for software to know whether or not the user intends that a name
>> containing "." is fully-qualified.
>=20
> You are begging the question. Of course the name "foo.bar" is
> ambiguous.

No, it's not ambiguous.  It's fully qualified. =20

> That's precisely /why/ there is a search list, so
> foo.bar is only looked up if foo.bar.example.com (or whatever)
> does not exist.

That's insane.   That allows a local enterprise to change the meaning of =
every domain name.  Domain names are supposed to have the same meaning =
everywhere in the Internet.

>>> If so, then to the extent that search lists
>>> are supported, you need to make them interwork names with
>>> dots in them. Moreover, with a search list of "example.com",
>>> having "mail" work, but not "mail.dev" is going to be a
>>> pretty surprising outcome.
>>=20
>> It will be surprising to that relatively small portion of users that
>> relies on search lists being applied to multi-label names.   But =
overall,
>> having a clear, visible distinction between names for which searching =
is
>> potentially applied (i.e. bare or single-label names), and names for
>> which searching is not applied (multi-label names) results in less
>> surprising behavior for everyone.
>=20
> I do not think you have established that a relatively small number
> of users of search lists use multi-label names. I suspect that
> is not true.

My assumption is that search lists in conjunction with multi-label names =
are mostly used within fairly large enterprises, but search lists are =
potentially in much wider use.

>>> I think the two options are either deprecating search lists
>>> (or not supporting them), or supporting them properly, in
>>> which case they must be used whatever domain name is
>>> specified, and the way to avoid using a search list
>>> is the same old hack as before (i.e. putting a dot on the
>>> end).
>>=20
>> Supporting search lists "properly" is NOT using them whenever a =
domain
>> name is specified.  That makes all domain names context-sensitive, =
and
>> breaks every application that uses domain names supplied by other =
parties
>> or in other contexts.
>=20
> I don't have RFC references to hand, but precisely for the reasons you =
have
> set out above, I do not believe there is anything within them that =
search
> lists should only be used if "a domain name is specified", precisely
> because it's impossible to tell whether a string with dots in it is "a
> domain name", or merely something to go on the front of search lists.
>=20
> What you are, I think, saying, is that you want to change the =
behaviour of
> search lists so they only work with single labels. What I'm saying is =
that
> there are likely to be a significant number of users of search lists =
who
> are affected by that, as they currently pass things with dots in them.

No disagreement on that point.  But search lists always have been =
broken.  It's just unfortunate that DNS APIs have supported them for so =
long, and their behavior has become entrenched in several organizations =
(including some that ought to know better).

My belief is that local names (i.e. bare or single-label names) are =
useful and necessary but their behavior cannot really be standardized.  =
So letting them continue to be subject to search lists is a useful =
compromise that is less drastic than doing away with search lists =
entirely.  It also has the virtue of being a simple rule that users can =
easily understand (a name with a "." is always fully qualified and =
usable in a global context, a name without a "." is ambiguous and only =
useful in a local context).

Keith


From paul@xelerance.com  Mon Oct 24 09:33:18 2011
Return-Path: <paul@xelerance.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D05D1F0C71 for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 09:33:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kU8T9k69-vV5 for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 09:33:17 -0700 (PDT)
Received: from mx.xelerance.com (mx.xelerance.com [193.110.157.188]) by ietfa.amsl.com (Postfix) with ESMTP id 112D01F0C72 for <dnsext@ietf.org>; Mon, 24 Oct 2011 09:33:17 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mx.xelerance.com (Postfix) with ESMTP id B54543B2 for <dnsext@ietf.org>; Mon, 24 Oct 2011 12:32:42 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=xelerance.com; h= content-type:content-type:mime-version:user-agent:references :message-id:in-reply-to:subject:subject:from:from:date:date :received:received:received:received; s=smtp; t=1319473961; x= 1320078761; bh=FD6xyeayAI0Ww1fM5MTHDRlltImyoAU3OJuk+AW/q54=; b=M ieJTGeJEmQ2NaHJhT5TLo6IJ/JPnIASmQeTCitIKVB6zuwxgX8NBDAlxVhMepo06 bktHAGQQwvnrnQWQ0t5Ei6ScNnYpf921BFNVc1WHHC0RxqM3cy4l6w5Ez7BkESrV +xSuhqvw9jZ/RmnR/ID2RoETbT9V9VE/8MCWMveWOw=
Received: from mx.xelerance.com ([127.0.0.1]) by localhost (mx.xelerance.com [127.0.0.1]) (amavisd-new, port 10026) with LMTP id 66vUjcNBFhNV for <dnsext@ietf.org>; Mon, 24 Oct 2011 12:32:41 -0400 (EDT)
Received: from mail.xelerance.com (mail.xelerance.com [193.110.157.189]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.xelerance.com (Postfix) with ESMTPS id D807F89 for <dnsext@ietf.org>; Mon, 24 Oct 2011 12:32:41 -0400 (EDT)
Received: by mail.xelerance.com (Postfix, from userid 1001) id 1EFF7B13; Mon, 24 Oct 2011 12:32:40 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by mail.xelerance.com (Postfix) with ESMTP id 1DB07598 for <dnsext@ietf.org>; Mon, 24 Oct 2011 12:32:40 -0400 (EDT)
Date: Mon, 24 Oct 2011 12:32:40 -0400 (EDT)
From: Paul Wouters <paul@xelerance.com>
To: dnsext List <dnsext@ietf.org>
In-Reply-To: <alpine.DEB.2.00.1110241210140.9077@mail.xelerance.com>
Message-ID: <alpine.DEB.2.00.1110241230110.9077@mail.xelerance.com>
References: <20111009135505.GA85221@shinkuro.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <F9E39FDF-289E-4690-81D2-AE6B8DA43420@icsi.berkeley.edu> <alpine.DEB.2.00.1110241210140.9077@mail.xelerance.com>
User-Agent: Alpine 2.00 (DEB 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 16:33:18 -0000

On Mon, 24 Oct 2011, Paul Wouters wrote:

> When GoDaddy broke their servers a few months ago, 0x20 basically died. You 
> will be failing thousands of domains
> if you enable 0x20 :(

Just to clarify. godaddy.com itself is fine, since it is using a different (better!)
nameserver implementation then their customers' nameservers:

$ dig StoneKeep.cOm @ns45.domaincontrol.com.

; <<>> DiG 9.7.4b1-RedHat-9.7.4-0.3.b1.fc14 <<>> StoneKeep.cOm @ns45.domaincontrol.com.
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61049
;; flags: qr aa; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 0

;; QUESTION SECTION:
;stonekeep.com.			IN	A

;; ANSWER SECTION:
stonekeep.com.		1800	IN	A	96.39.62.68

;; AUTHORITY SECTION:
stonekeep.com.		3600	IN	NS	ns45.domaincontrol.com.
stonekeep.com.		3600	IN	NS	ns46.domaincontrol.com.

;; Query time: 24 msec
;; SERVER: 216.69.185.23#53(216.69.185.23)
;; WHEN: Mon Oct 24 12:29:10 2011
;; MSG SIZE  rcvd: 99

$ dig  GoDaddy.cOm @cns1.secureserver.net.

; <<>> DiG 9.7.4b1-RedHat-9.7.4-0.3.b1.fc14 <<>> GoDaddy.cOm @cns1.secureserver.net.
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22167
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 3, ADDITIONAL: 3
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;GoDaddy.cOm.			IN	A

;; ANSWER SECTION:
GoDaddy.cOm.		300	IN	A	97.74.104.201

;; AUTHORITY SECTION:
GoDaddy.cOm.		3600	IN	NS	cns3.secureserver.net.
GoDaddy.cOm.		3600	IN	NS	cns1.secureserver.net.
GoDaddy.cOm.		3600	IN	NS	cns2.secureserver.net.

;; ADDITIONAL SECTION:
cns1.secureserver.net.	3600	IN	A	208.109.255.100
cns2.secureserver.net.	3600	IN	A	216.69.185.100
cns3.secureserver.net.	3600	IN	A	64.202.167.31

;; Query time: 25 msec
;; SERVER: 208.109.255.100#53(208.109.255.100)
;; WHEN: Mon Oct 24 12:30:20 2011
;; MSG SIZE  rcvd: 166


From nweaver@icsi.berkeley.edu  Mon Oct 24 09:35:25 2011
Return-Path: <nweaver@icsi.berkeley.edu>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7A871F0C77 for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 09:35:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.501
X-Spam-Level: 
X-Spam-Status: No, score=-2.501 tagged_above=-999 required=5 tests=[AWL=0.098,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id egTy+DmmWfaD for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 09:35:25 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id C471D1F0C71 for <dnsext@ietf.org>; Mon, 24 Oct 2011 09:35:24 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 62B582C400E; Mon, 24 Oct 2011 09:35:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id dTkIsgRhVvI4; Mon, 24 Oct 2011 09:35:20 -0700 (PDT)
Received: from gala.icir.org (gala [192.150.187.49]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 245152C4003; Mon, 24 Oct 2011 09:35:20 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=us-ascii
From: Nicholas Weaver <nweaver@icsi.berkeley.edu>
In-Reply-To: <alpine.DEB.2.00.1110241230110.9077@mail.xelerance.com>
Date: Mon, 24 Oct 2011 09:35:19 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <3E5E369E-8AAF-42DE-8257-9E32A975CB0D@icsi.berkeley.edu>
References: <20111009135505.GA85221@shinkuro.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <F9E39FDF-289E-4690-81D2-AE6B8DA43420@icsi.berkeley.edu> <alpine.DEB.2.00.1110241210140.9077@mail.xelerance.com> <alpine.DEB.2.00.1110241230 110.9077@mail.xelerance.com>
To: Paul Wouters <paul@xelerance.com>
X-Mailer: Apple Mail (2.1251.1)
Cc: dnsext List <dnsext@ietf.org>
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 16:35:25 -0000

On Oct 24, 2011, at 9:32 AM, Paul Wouters wrote:

> On Mon, 24 Oct 2011, Paul Wouters wrote:
>=20
>> When GoDaddy broke their servers a few months ago, 0x20 basically =
died. You will be failing thousands of domains
>> if you enable 0x20 :(
>=20
> Just to clarify. godaddy.com itself is fine, since it is using a =
different (better!)
> nameserver implementation then their customers' nameservers:

Oh, thats even easier.  You get the downcased response back the first =
time, and you treat it as "Use TCP for this server".




From moore@network-heretics.com  Mon Oct 24 13:58:53 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42CCA21F8C5A; Mon, 24 Oct 2011 13:58:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.949
X-Spam-Level: 
X-Spam-Status: No, score=-2.949 tagged_above=-999 required=5 tests=[AWL=0.050,  BAYES_00=-2.599, J_CHICKENPOX_51=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VqDN4cuWe+SI; Mon, 24 Oct 2011 13:58:52 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id 8FCA621F8C56; Mon, 24 Oct 2011 13:58:52 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.mail.srv.osa [10.202.2.41]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id D566620A34; Mon, 24 Oct 2011 16:58:51 -0400 (EDT)
Received: from frontend2.nyi.mail.srv.osa ([10.202.2.161]) by compute1.internal (MEProxy); Mon, 24 Oct 2011 16:58:51 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=IRB4Gz658TNDQWj+N4Ot8jigmhI=; b=O3 OhK1kLvs6eW77HbfkGrexZcqeVv1c+hdsra2Waknt583kAtrgNbKlP1WSg30kM7Y 9EyDlBVvchsdFNtia9ZME+iwywIpabCYY4FvPdPOmczxCch90lSzDDaM4zRnTAlf VAJVRCD1EiaKcwNq8EfEdtuIb65bi9+xAVUsCKP2Y=
X-Sasl-enc: IIWzyM/J8Wgor2KFWDbIhub1hhy7v2uriFKA/LuGAMDO 1319489931
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id 32E9A483436; Mon, 24 Oct 2011 16:58:50 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=utf-8
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <4EA5D012.9090708@dougbarton.us>
Date: Mon, 24 Oct 2011 16:58:49 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <45E6700D-4207-4807-B8A4-2CFC56440038@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com> <AFC2B32D1BE5A9E449B8D8A1@Ximines.local> <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com> <4EA5D012.9090708@dougbarton.us>
To: Doug Barton <dougb@dougbarton.us>
X-Mailer: Apple Mail (2.1084)
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, dhcwg@ietf.org
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS	server	selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 20:58:53 -0000

On Oct 24, 2011, at 4:52 PM, Doug Barton wrote:

> On 10/24/2011 05:16, Keith Moore wrote:
>> That's the point - search lists are not appropriate most of the time, =
and it's very hard for software to distinguish the cases where they are =
potentially appropriate from the cases when they're not, and it's not =
possible for software to do this in all cases.
>=20
> There's been something missing from this discussion, and I finally put
> my finger on it. TMK most stub resolvers have an option similar to =
this
> one from ISC's:
>=20
> ndots:n
>        sets a threshold for the number of dots which
>        must appear in a name given to res_query() (see
>        resolver(3)) before an initial absolute query
>        will be made.  The default for n is =E2=80=9C1=E2=80=9D, =
mean=E2=80=90
>        ing that if there are any dots in a name, the
>        name will be tried first as an absolute name
>        before any search list elements are appended to
>        it.
>=20
> So it seems that this question is already a matter of local policy,
> which given the number and quality of the divergent views seems
> eminently reasonable. Can we move on now?

No, because relying on "local policy" is not sufficient for =
interoperability.

I think there's a need for IETF to document why any other value than 1 =
is a Bad Idea, and more to the point, why it will break things.    The =
problem isn't entirely specific to hosts with multiple interfaces.  But =
given that using multiple interfaces makes the problem worse, MIF might =
want to take on some of the work of documenting why it will break =
things.

Keith


From dougb@dougbarton.us  Mon Oct 24 13:59:23 2011
Return-Path: <dougb@dougbarton.us>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 124B211E811C for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 13:59:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.173
X-Spam-Level: 
X-Spam-Status: No, score=-3.173 tagged_above=-999 required=5 tests=[AWL=0.426,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vTdQWt21vJ63 for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 13:59:22 -0700 (PDT)
Received: from mail2.fluidhosting.com (mx22.fluidhosting.com [204.14.89.5]) by ietfa.amsl.com (Postfix) with ESMTP id 82CF911E8083 for <dnsext@ietf.org>; Mon, 24 Oct 2011 13:59:22 -0700 (PDT)
Received: (qmail 11010 invoked by uid 399); 24 Oct 2011 20:52:36 -0000
Received: from unknown (HELO 172-17-198-245.globalsuite.net) (dougb@dougbarton.us@12.207.105.210) by mail2.fluidhosting.com with ESMTPAM; 24 Oct 2011 20:52:36 -0000
X-Originating-IP: 12.207.105.210
X-Sender: dougb@dougbarton.us
Message-ID: <4EA5D012.9090708@dougbarton.us>
Date: Mon, 24 Oct 2011 13:52:34 -0700
From: Doug Barton <dougb@dougbarton.us>
Organization: http://SupersetSolutions.com/
User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:7.0.1) Gecko/20111001 Thunderbird/7.0.1
MIME-Version: 1.0
To: Keith Moore <moore@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com> <AFC2B32D1BE5A9E449B8D8A1@Ximines.local> <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com>
In-Reply-To: <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com>
X-Enigmail-Version: undefined
OpenPGP: id=1A1ABC84
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, dhcwg@ietf.org
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS	server	selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 20:59:23 -0000

On 10/24/2011 05:16, Keith Moore wrote:
> That's the point - search lists are not appropriate most of the time, and it's very hard for software to distinguish the cases where they are potentially appropriate from the cases when they're not, and it's not possible for software to do this in all cases.

There's been something missing from this discussion, and I finally put
my finger on it. TMK most stub resolvers have an option similar to this
one from ISC's:

ndots:n
        sets a threshold for the number of dots which
        must appear in a name given to res_query() (see
        resolver(3)) before an initial absolute query
        will be made.  The default for n is â€œ1â€, meanâ€
        ing that if there are any dots in a name, the
        name will be tried first as an absolute name
        before any search list elements are appended to
        it.

So it seems that this question is already a matter of local policy,
which given the number and quality of the divergent views seems
eminently reasonable. Can we move on now?


Doug

-- 

	Nothin' ever doesn't change, but nothin' changes much.
			-- OK Go

	Breadth of IT experience, and depth of knowledge in the DNS.
	Yours for the right price.  :)  http://SupersetSolutions.com/


From dougb@dougbarton.us  Mon Oct 24 14:29:43 2011
Return-Path: <dougb@dougbarton.us>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F04BC11E815C for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 14:29:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.944
X-Spam-Level: 
X-Spam-Status: No, score=-2.944 tagged_above=-999 required=5 tests=[AWL=0.055,  BAYES_00=-2.599, J_CHICKENPOX_51=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MbV1DA1ArKrN for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 14:29:42 -0700 (PDT)
Received: from mail2.fluidhosting.com (mx22.fluidhosting.com [204.14.89.5]) by ietfa.amsl.com (Postfix) with ESMTP id 112E611E816E for <dnsext@ietf.org>; Mon, 24 Oct 2011 14:29:41 -0700 (PDT)
Received: (qmail 25785 invoked by uid 399); 24 Oct 2011 21:29:39 -0000
Received: from unknown (HELO 172-17-198-245.globalsuite.net) (dougb@dougbarton.us@12.207.105.210) by mail2.fluidhosting.com with ESMTPAM; 24 Oct 2011 21:29:39 -0000
X-Originating-IP: 12.207.105.210
X-Sender: dougb@dougbarton.us
Message-ID: <4EA5D8C1.9060303@dougbarton.us>
Date: Mon, 24 Oct 2011 14:29:37 -0700
From: Doug Barton <dougb@dougbarton.us>
Organization: http://SupersetSolutions.com/
User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:7.0.1) Gecko/20111001 Thunderbird/7.0.1
MIME-Version: 1.0
To: Keith Moore <moore@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com> <AFC2B32D1BE5A9E449B8D8A1@Ximines.local> <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com> <4EA5D012.9090708@dougbarton.us> <45E6700D-4207-4807-B8A4-2CFC56440038@network-heretics.com>
In-Reply-To: <45E6700D-4207-4807-B8A4-2CFC56440038@network-heretics.com>
X-Enigmail-Version: undefined
OpenPGP: id=1A1ABC84
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, dhcwg@ietf.org
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS	server	selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 21:29:43 -0000

On 10/24/2011 13:58, Keith Moore wrote:
> 
> On Oct 24, 2011, at 4:52 PM, Doug Barton wrote:
> 
>> On 10/24/2011 05:16, Keith Moore wrote:
>>> That's the point - search lists are not appropriate most of the time, and it's very hard for software to distinguish the cases where they are potentially appropriate from the cases when they're not, and it's not possible for software to do this in all cases.
>>
>> There's been something missing from this discussion, and I finally put
>> my finger on it. TMK most stub resolvers have an option similar to this
>> one from ISC's:
>>
>> ndots:n
>>        sets a threshold for the number of dots which
>>        must appear in a name given to res_query() (see
>>        resolver(3)) before an initial absolute query
>>        will be made.  The default for n is â€œ1â€, meanâ€
>>        ing that if there are any dots in a name, the
>>        name will be tried first as an absolute name
>>        before any search list elements are appended to
>>        it.
>>
>> So it seems that this question is already a matter of local policy,
>> which given the number and quality of the divergent views seems
>> eminently reasonable. Can we move on now?
> 
> No, because relying on "local policy" is not sufficient for interoperability.

I don't see how local resolution issues feed into interoperability here.

> I think there's a need for IETF to document why any other value than 1 is a Bad Idea, and more to the point, why it will break things.    The problem isn't entirely specific to hosts with multiple interfaces.  But given that using multiple interfaces makes the problem worse, MIF might want to take on some of the work of documenting why it will break things.

That seems to be an opinion of yours that isn't widely shared.



-- 

	Nothin' ever doesn't change, but nothin' changes much.
			-- OK Go

	Breadth of IT experience, and depth of knowledge in the DNS.
	Yours for the right price.  :)  http://SupersetSolutions.com/


From lconroy@insensate.co.uk  Mon Oct 24 14:34:27 2011
Return-Path: <lconroy@insensate.co.uk>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48E5D21F8A97; Mon, 24 Oct 2011 14:34:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_51=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NsQIbihlDX51; Mon, 24 Oct 2011 14:34:26 -0700 (PDT)
Received: from insensate.co.uk (ghost.insensate.co.uk [213.152.49.121]) by ietfa.amsl.com (Postfix) with ESMTP id 5052221F867F; Mon, 24 Oct 2011 14:34:25 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by insensate.co.uk (Postfix) with ESMTP id D7BA9D27E2; Mon, 24 Oct 2011 22:34:24 +0100 (BST)
X-Virus-Scanned: amavisd-new at insensate.co.uk
Received: from insensate.co.uk ([127.0.0.1]) by localhost (psyche.insensate.co.uk [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EZ1aekG6CA5N; Mon, 24 Oct 2011 22:34:24 +0100 (BST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by insensate.co.uk (Postfix) with ESMTP id CC905D27D7; Mon, 24 Oct 2011 22:34:23 +0100 (BST)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=utf-8
From: Lawrence Conroy <lconroy@insensate.co.uk>
In-Reply-To: <4EA5D012.9090708@dougbarton.us>
Date: Mon, 24 Oct 2011 22:34:23 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <CB52BAAF-F38F-4815-9B91-4656F1F3837F@insensate.co.uk>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com> <AFC2B32D1BE5A9E449B8D8A1@Ximines.local> <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com> <4EA5D012.9090708@dougbarton.us>
To: Doug Barton <dougb@dougbarton.us>
X-Mailer: Apple Mail (2.1084)
Cc: dnsop@ietf.org, mif@ietf.org, Keith Moore <moore@network-heretics.com>, dnsext@ietf.org
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS	server	selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 21:34:27 -0000

Hi there Doug, Keith, folks,
 Speaking of broken mechanisms ... how many dots?
arstechnica.com is OK
      co.uk is not OK

ndots strikes me as a chocolate soldier in the fire used to warm the =
chocolate teapot that is search lists.

At best these are context dependent (and keep IT support in business). =
At worst ...
 one day I WILL be arrested for tazering the bean counter (why is it =
always one of
 those?) who insists that "intranet" is a fine web server name useful =
anywhere.

[I came damn close a few times with Yankee hotel reservations accessible =
only via
 1-800 'phone numbers]

Speaking of interoperability -- the comment "it works for everyone here" =
is not
 a good sign that the solution is interoperable.

IMO, search lists and ndots are both abominations, and should not be =
given the oxygen of publicity.

all the best,
  Lawrence



On 24 Oct 2011, at 21:52, Doug Barton wrote:
> On 10/24/2011 05:16, Keith Moore wrote:
>> That's the point - search lists are not appropriate most of the time, =
and it's very hard for software to distinguish the cases where they are =
potentially appropriate from the cases when they're not, and it's not =
possible for software to do this in all cases.
>=20
> There's been something missing from this discussion, and I finally put
> my finger on it. TMK most stub resolvers have an option similar to =
this
> one from ISC's:
>=20
> ndots:n
>        sets a threshold for the number of dots which
>        must appear in a name given to res_query() (see
>        resolver(3)) before an initial absolute query
>        will be made.  The default for n is =E2=80=9C1=E2=80=9D, =
mean=E2=80=90
>        ing that if there are any dots in a name, the
>        name will be tried first as an absolute name
>        before any search list elements are appended to
>        it.
>=20
> So it seems that this question is already a matter of local policy,
> which given the number and quality of the divergent views seems
> eminently reasonable. Can we move on now?


From moore@network-heretics.com  Mon Oct 24 16:30:13 2011
Return-Path: <moore@network-heretics.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D35711E81DB; Mon, 24 Oct 2011 16:30:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.251
X-Spam-Level: 
X-Spam-Status: No, score=-3.251 tagged_above=-999 required=5 tests=[AWL=0.348,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id min-Btt8dL2c; Mon, 24 Oct 2011 16:30:12 -0700 (PDT)
Received: from out5.smtp.messagingengine.com (out5.smtp.messagingengine.com [66.111.4.29]) by ietfa.amsl.com (Postfix) with ESMTP id CD64A11E81E6; Mon, 24 Oct 2011 16:30:11 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.mail.srv.osa [10.202.2.46]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id 6BACB20A60; Mon, 24 Oct 2011 19:30:11 -0400 (EDT)
Received: from frontend2.nyi.mail.srv.osa ([10.202.2.161]) by compute6.internal (MEProxy); Mon, 24 Oct 2011 19:30:11 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id :references:to; s=smtpout; bh=fMTskqonfUOLo+LqPAWo2oS/tZ0=; b=Or ZV0teLABvMSqecZZWVflatvadDZYVVLPDA6vn0nkuUHrrtXPoEmSi/xnxcMyyp82 DWBxUpqaOfx3dD+SF5iYH6WrCRfLkQ5xwsoPD6eX0P47BUIfCIs78zwYSYetP7w7 UVVCILNZIn1smCY1FyBEJhkeOrJjVsSKojNzglYpM=
X-Sasl-enc: VHzIfnm4khwY8ZXipl/UYTYzRW6f5Edit35m/RnWH21M 1319499010
Received: from [192.168.1.16] (host65-16-145-177.birch.net [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id 648364833DA; Mon, 24 Oct 2011 19:30:09 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Keith Moore <moore@network-heretics.com>
In-Reply-To: <1319496624.28149.399.camel@destiny.pc.cs.cmu.edu>
Date: Mon, 24 Oct 2011 19:30:08 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <B479C8DD-BC2F-4969-89DC-CE0A084DAB80@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com> <AFC2B32D1BE5A9E449B8D8A1@Ximines.local> <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com> <4EA5D012.9090708@dougbarton.us> <28623_1319491641_p9OLRK2S028590_45E6700D-4207-4807-B8A4-2CFC56440038@network-heretics.com> <1319496624.28149.399.camel@destiny.pc.cs.cmu.edu>
To: Jeffrey Hutzelman <jhutz@cmu.edu>
X-Mailer: Apple Mail (2.1084)
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, dhcwg@ietf.org
Subject: Re: [dnsext] [dhcwg] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 23:30:13 -0000

On Oct 24, 2011, at 6:50 PM, Jeffrey Hutzelman wrote:

>>> So it seems that this question is already a matter of local policy,
>>> which given the number and quality of the divergent views seems
>>> eminently reasonable. Can we move on now?
>>=20
>> No, because relying on "local policy" is not sufficient for =
interoperability.
>=20
> For interoperability, one can use absolute names, with the trailing =
dot,

uh, no.   Names with trailing dots aren't allowed in many contexts.   =
And in some of the contexts in which they are allowed, they get =
"canonicalized" to names without trailing dots.

> or specify that in the context of whatever protocol, all names are to =
be
> taken as relative to the root, or use other than a printed
> representation.

...so a DNS name means different things in one context than in another.  =
Bad Idea.

>  In some cases this may require that implementations use
> resolver interfaces which make it clear that a name to be resolved is
> absolute, or that they append the empty label to relative names before
> passing them on to the resolver.
>=20
> On the other hand, in user interface, which is primarily where =
relative
> names are intended to be used, local policy is quite sufficient.

no.  Domain names are written on buses, billboards, business cards.  =
They do get transcribed, quite often actually, and they need to have the =
same meanings when typed in as they do when clicked on.

In a small number of cases, where a user gets immediate feedback after =
he types in the name and before a host attempts to contact a server, it =
might be sufficient to "canonicalize" a name, show the user how the name =
will actually be interpreted, and let him click "ok" before contacting =
the server.   But even then, what if the "canonicalization" is wrong?  =
How is the user supposed to know how to tell the software to treat the =
name as an FQDN?  If he types in the '.', the dot will disappear when =
the name is canonicalized.   That's not exactly effective reinforcement. =
  It says to the user "you should not have typed in that final dot".  =
And the practice of not using a trailing "." is nearly universal.  =
Changing that practice is much harder than changing from IPv4 and IPv6.

Some people are working way too hard to try to save something that was =
never a good idea in the first place.  =20

I'm not arguing that all software that currently applies searching to =
names with dots in them has to die a violent death, and immediately =
either be updated or deleted from all computers everywhere (as if...).  =
I'm just saying that IETF should recommend against the practice of using =
search lists with multi-label names, and document the harm that it does. =
 Sites can still do it if they want to, or they can manage their own =
transitions away from using search paths for such names, on their own =
timeframes.   After all, this has been a practice for ~30 years in some =
places, nobody should expect it all to change overnight.

>  As long as I and the software on my machine agree on what a name I =
type means, it's none of the IETF's business.

(So what?  It's also none of IETF's business if you _______________  =
<---- pick anything that is utterly senseless here)

Of course, you can do whatever you want.  But IETF should promote =
practices that make good sense, even though we realize that some people =
will decide for themselves to not follow them.

> Can an enterprise change the name of every domain name?  On machines
> they control, yes.

Of course they can.  But it makes absolutely no sense for IETF to bless =
that practice or to ignore it when we know that it does harm. =20

The presumption of the standards is that you want your machines to =
interoperate with other machines.  If you don't want interoperability, =
have a day - screw things up however you want.  (as long as you only =
affect your own machines, of course.).  Nobody's forcing you to keep =
your machines conforming.

> While I agree wholeheartedly with the notion of a unique domain name
> space, I also believe that mapping a relative or abbreviated name onto
> that namespace is _entirely_ a matter of local policy.

That's a convenient philosophy if you _only_ care that local things =
interoperate with one another.

>  It is perhaps
> appropriate for the IETF to provide mechanisms for distributing that
> policy, for those who wish to use them, but not to dictate what the
> policy must be.

IETF's job is to help the Internet work,  not to endorse every bit of =
local brain damage that people are attached to.

> Do things get worse as new TLDs appear?  Yes, sometimes.

Be prepared for it to happen more often.  Do you really want to rethink =
your naming scheme every time someone creates a vanity TLD that happens =
to collide with some subdomain of cmu.edu?   Even if that's only once =
every year or three, how often does it need to happen before it's no =
longer worth the trouble?

I mean, I'm sure that the relevant people at CMU are quite capable of =
evaluating that decision for themselves.    An IETF RFC isn't going to =
tell them anything that they can't figure out already.   But that's not =
true of Internet users, network administrators, software implementors in =
general.

> Does that mean we're abandoning "options ndots:2"?  Not aggressively.
> It has faded over time, but more due to a failure to actively apply it
> to newer systems than to any conscious decision that it's a problem.
>=20
> Further, given this position, I wonder why you think even a value of 1
> is acceptable in the face of vanity TLDs.

Because (a) local names are essential, (b) the ability to distinguish =
local names from FQDNs is also essential, and (c) use of a single-label =
name as a local name (meaning, a name subject to local interpretation) =
is a very widespread and well-entrenched practice.   Sites that =
associate address (or MX) records with vanity TLDs will lose, and they =
deserve to lose.

>  I know why I do, both from
> the perspective of an IETF (it's a local policy matter, period) and =
for
> myself (search for local names first, don't trust DNS results (yet) =
for
> security, and write absolute names when you want to bypass search
> lists).

The way you write an absolute name is to include a '.' in it.

Keith




From mohta@necom830.hpcl.titech.ac.jp  Mon Oct 24 16:48:47 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B4BA311E8214 for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 16:48:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wix4q52cMwxS for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 16:48:47 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id EF9BA11E8210 for <dnsext@ietf.org>; Mon, 24 Oct 2011 16:48:46 -0700 (PDT)
Received: (qmail 66116 invoked from network); 25 Oct 2011 00:09:33 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 25 Oct 2011 00:09:33 -0000
Message-ID: <4EA5F96C.70607@necom830.hpcl.titech.ac.jp>
Date: Tue, 25 Oct 2011 08:49:00 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Joe Abley <jabley@hopcount.ca>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca>
In-Reply-To: <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 23:48:47 -0000

Joe Abley wrote:

>> 	http://www.ietf.org/id/draft-ohta-practically-secure-dns-00.txt
> 
> You characterise the possible reasons why successive responses to
> the same query, sent close together with different query IDs,
> might be different.

My intention is to have exhaustive list of reasons.

> I think the set of possible reasons is simpler than you suggest, namely
> 
> (a) the responses are legitimately different (e.g. your possible cases 1, 2 and 3)
> 
> (b) the responses are different for a malicious, undesirable reason (your case 4)

That's useless classification.

The important difference of 3) from 1) and 2) is that lack of identical
replies are persistent over up to 4 queries, during which 4) is
identified to be occurring.

> I don't understand from your draft how I distinguish between (a)
> and (b),

because it is meaningless to distinguish (a) and (b).

> Your draft also doesn't seem to address the threat that a man in the

Why can't you wrap lines properly?

SDNS with automatic servers for clients to modify domain
information with password confirmation is not secure from
a men in the middle attacks, either.

						Masataka Ohta

From mohta@necom830.hpcl.titech.ac.jp  Mon Oct 24 16:56:24 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D486A11E8162 for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 16:56:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SV74Kyjk+lEe for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 16:56:24 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id A69B721F8B72 for <dnsext@ietf.org>; Mon, 24 Oct 2011 16:56:23 -0700 (PDT)
Received: (qmail 66164 invoked from network); 25 Oct 2011 00:17:19 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 25 Oct 2011 00:17:19 -0000
Message-ID: <4EA5FB3D.20509@necom830.hpcl.titech.ac.jp>
Date: Tue, 25 Oct 2011 08:56:45 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: dnsext@ietf.org
References: <20111009135505.GA85221@shinkuro.com> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <alpine.DEB.2.00.1110240940230.9077@mail.xelerance.com>
In-Reply-To: <alpine.DEB.2.00.1110240940230.9077@mail.xelerance.com>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 23:56:24 -0000

Paul Wouters wrote:

> Isn't all of this already proposed in 
> http://tools.ietf.org/html/draft-wijngaards-dnsext-resolver-side-mitigation-01 

Which one?

> It also totally ignores the fact that if all involved name servers are 
> "secure" (definition unknown) but

SDNS also totally ignores the fact that SDNS with automatic servers
for clients to modify domain information is not secure if related
servers are not secure.

> the traffic path is not,

SDNS with automatic servers for clients to modify domain
information with password confirmation is not secure if the
traffic path is not secure.

> the "secure" client is still going to take
> rewritten replies. Eg this draft
> does not even handle the "starbucks wifi" scenario or any transparent
> DNS proxy scenario.

SDNS also ignores the fact that secure time is practically
impossible to obtain within certain private networks.

						Masataka Ohta

From mohta@necom830.hpcl.titech.ac.jp  Mon Oct 24 17:04:03 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A493321F8CAA for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 17:04:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[AWL=-0.000,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3bH5fmaaLUXY for <dnsext@ietfa.amsl.com>; Mon, 24 Oct 2011 17:04:03 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id C7D7F21F8C98 for <dnsext@ietf.org>; Mon, 24 Oct 2011 17:04:02 -0700 (PDT)
Received: (qmail 66213 invoked from network); 25 Oct 2011 00:25:12 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 25 Oct 2011 00:25:12 -0000
Message-ID: <4EA5FD15.4050702@necom830.hpcl.titech.ac.jp>
Date: Tue, 25 Oct 2011 09:04:37 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Nicholas Weaver <nweaver@icsi.berkeley.edu>
References: <20111009135505.GA85221@shinkuro.com> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <F9E39FDF-289E-4690-81D2-AE6B8DA43420@icsi.berkeley.edu>
In-Reply-To: <F9E39FDF-289E-4690-81D2-AE6B8DA43420@icsi.berkeley.edu>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext List <dnsext@ietf.org>
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 00:04:03 -0000

Nicholas Weaver wrote:

Why can't you wrap lines properly?

> The probability of performing blind injection is already vastly reduced by a combination of source port

See the abstract of the draft.

> Also, There exists an easier approach for fallback under conflict: retry using TCP

TCP is not always supported.

> [1] Glue policy is essential,

That's a solved problem.

							Masataka Ohta

From marka@isc.org  Mon Oct 24 17:09:23 2011
Return-Path: <marka@isc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C5DFE21F8C4A; Mon, 24 Oct 2011 17:09:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.259
X-Spam-Level: 
X-Spam-Status: No, score=-2.259 tagged_above=-999 required=5 tests=[AWL=-0.260, BAYES_00=-2.599, J_CHICKENPOX_51=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u6UpPCwVf8ZW; Mon, 24 Oct 2011 17:09:23 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by ietfa.amsl.com (Postfix) with ESMTP id 9C91621F8C09; Mon, 24 Oct 2011 17:09:22 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 5EFE85F984C; Tue, 25 Oct 2011 00:09:02 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (unknown [IPv6:2001:470:1f00:820:6233:4bff:fe01:7585]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 507EA216C6A; Tue, 25 Oct 2011 00:08:55 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 61F9815CE347; Tue, 25 Oct 2011 11:08:53 +1100 (EST)
To: Lawrence Conroy <lconroy@insensate.co.uk>
From: Mark Andrews <marka@isc.org>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com> <AFC2B32D1BE5A9E449B8D8A1@Ximines.local> <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com> <4EA5D012.9090708@dougbarton.us> <CB52BAAF-F38F-4815-9B91-4656F1F3837F@insensate.co.uk>
In-reply-to: Your message of "Mon, 24 Oct 2011 22:34:23 BST." <CB52BAAF-F38F-4815-9B91-4656F1F3837F@insensate.co.uk>
Date: Tue, 25 Oct 2011 11:08:53 +1100
Message-Id: <20111025000853.61F9815CE347@drugs.dv.isc.org>
Cc: dnsop@ietf.org, mif@ietf.org, dnsext@ietf.org
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 00:09:23 -0000

In message <CB52BAAF-F38F-4815-9B91-4656F1F3837F@insensate.co.uk>, Lawrence Con
roy writes:
> Hi there Doug, Keith, folks,
>  Speaking of broken mechanisms ... how many dots?
> arstechnica.com is OK
>       co.uk is not OK
> 
> ndots strikes me as a chocolate soldier in the fire used to warm the 
> chocolate teapot that is search lists.
> 
> At best these are context dependent (and keep IT support in business). At 
> worst ...
>  one day I WILL be arrested for tazering the bean counter (why is it 
> always one of
>  those?) who insists that "intranet" is a fine web server name useful 
> anywhere.
> 
> [I came damn close a few times with Yankee hotel reservations accessible 
> only via
>  1-800 'phone numbers]
> 
> Speaking of interoperability -- the comment "it works for everyone here" 
> is not
>  a good sign that the solution is interoperable.
> 
> IMO, search lists and ndots are both abominations, and should not be 
> given the oxygen of publicity.
> 
> all the best,
>   Lawrence
> 
> 
> 
> On 24 Oct 2011, at 21:52, Doug Barton wrote:
> > On 10/24/2011 05:16, Keith Moore wrote:
> >> That's the point - search lists are not appropriate most of the time, 
> and it's very hard for software to distinguish the cases where they are 
> potentially appropriate from the cases when they're not, and it's not 
> possible for software to do this in all cases.
> > 
> > There's been something missing from this discussion, and I finally put
> > my finger on it. TMK most stub resolvers have an option similar to this
> > one from ISC's:
> > 
> > ndots:n
> >        sets a threshold for the number of dots which
> >        must appear in a name given to res_query() (see
> >        resolver(3)) before an initial absolute query
> >        will be made.  The default for n is â€œ1â€, meanâ€
> >        ing that if there are any dots in a name, the
> >        name will be tried first as an absolute name
> >        before any search list elements are appended to
> >        it.
> > 
> > So it seems that this question is already a matter of local policy,
> > which given the number and quality of the divergent views seems
> > eminently reasonable. Can we move on now?
> 
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext

In many cases when ndots is not 1 there are no DNS entries that
will match <any-tld>.<search-list-entry>.  That said the set of
<any-tld> is growing so it is going to get harder and harder to
ensure that this condition is being met.

Walled gardens shouldn't be creating their own TLDs.  ISP's, hotspots,
etc. should not be search list at all.  The definitely should not
be relying on "label" being found on a search list.

As far as I can tell there are only two places where setting search
list make sense.

	1. Enterprises.
	2. Homes.

Everywhere else you DO NOT control the machine requesting the address
and setting search lists could actually result in criminal prosecution.
Just because the machine requested a search list it doesn't mean
that you should be supplying one.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org

From mayer@gis.net  Mon Oct 24 10:19:07 2011
Return-Path: <mayer@gis.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 717C811E8094; Mon, 24 Oct 2011 10:19:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level: 
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_33=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ekL5QH-mgr1z; Mon, 24 Oct 2011 10:19:07 -0700 (PDT)
Received: from mail1.ntp.org (mail1.ntp.org [IPv6:2001:4f8:fff7:1::5]) by ietfa.amsl.com (Postfix) with ESMTP id C0A9711E808D; Mon, 24 Oct 2011 10:19:06 -0700 (PDT)
Received: from [198.22.153.6] (helo=[10.60.100.127]) by mail1.ntp.org with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.76 (FreeBSD)) (envelope-from <mayer@gis.net>) id 1RIOAk-000HJu-6D; Mon, 24 Oct 2011 17:18:51 +0000
Message-ID: <4EA59DF0.9090802@gis.net>
Date: Mon, 24 Oct 2011 13:18:40 -0400
From: Danny Mayer <mayer@gis.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:5.0) Gecko/20110624 Thunderbird/5.0
MIME-Version: 1.0
To: Mark Andrews <marka@isc.org>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <4EA30EB0.6080605@dougbarton.us> <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <20111023234921.6E1D915C005F@drugs.dv.isc.org>
In-Reply-To: <20111023234921.6E1D915C005F@drugs.dv.isc.org>
X-Enigmail-Version: 1.2
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-SA-Exim-Connect-IP: 198.22.153.6
X-SA-Exim-Rcpt-To: marka@isc.org, matt@conundrum.com, mif@ietf.org, moore@network-heretics.com, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, Ted.Lemon@nominum.com, dhcwg@ietf.org, denghui02@hotmail.com, brian.e.carpenter@gmail.com
X-SA-Exim-Mail-From: mayer@gis.net
X-SA-Exim-Version: 4.2
X-SA-Exim-Scanned: Yes (on mail1.ntp.org)
X-Mailman-Approved-At: Tue, 25 Oct 2011 01:30:48 -0700
Cc: "<mif@ietf.org>" <mif@ietf.org>, Keith Moore <moore@network-heretics.com>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, Ted Lemon <Ted.Lemon@nominum.com>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>
Subject: Re: [dnsext] [dhcwg] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: mayer@gis.net
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 17:19:07 -0000

On 10/23/2011 7:49 PM, Mark Andrews wrote:
> 
> In message <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com>, Matthew Pounse
> tt writes:
>>
>> On 2011/10/22, at 15:21, Keith Moore wrote:
>>
>>>
>>> On Oct 22, 2011, at 2:42 PM, Doug Barton wrote:
>>>
>>>> 1. I think we're all in agreement that dot-terminated names (e.g.,
>>>> example.) should not be subject to search lists. I personally don't have
>>>> any problems with any document mentioning that this is the expected
>>>> behavior.
>>>
>>> agree.  however there are standard protocols for which a trailing dot in a 
>> domain name is a syntax error.
>>
>> Any protocol that makes a standard FQDN a syntax error is itself in error.  N
>> ot to say that these don't exist, but if people are writing protocols that ca
>> n't deal with a properly formatted FQDN they need to stop.  Now.
> 
> Except it isn't a standard hostname.  Periods *seperate* labels in
> hostnames RFC 952.  They DO NOT appear at the end of hostnames.
> 
> Appending a period to the end of a name is user interface hack to
> prevent searching.  If is also a way to prevent the appending of
> the current origin to all names in a DNS master file as the current
> origin is always appended if it isn't done.
> 
> In addition single labels are not HEIRACHICAL / DOMAIN STYLE names
> as envisioned when we went from a flat namespace of simple hostnames
> to a heirarchical namespace.
> 
> 	foo.bar is a heirachical hostname.
> 	bar is a simple hostname.
> 
> Why are we trying to bring them back on a global context?

I'm not even sure why we are having this discussion. You are right, of
course.

DNS doesn't know anything about search lists, nor does it care. Any
valid string presented to DNS is by definition a FQDN and DNS will
proceed accordingly. If the application choosing to consult a domain
search list it's up to that application, but DNS is not involved in the
consultation.

Danny

From jhutz@cmu.edu  Mon Oct 24 15:50:47 2011
Return-Path: <jhutz@cmu.edu>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C58111E81D3; Mon, 24 Oct 2011 15:50:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -107.249
X-Spam-Level: 
X-Spam-Status: No, score=-107.249 tagged_above=-999 required=5 tests=[AWL=0.750, BAYES_00=-2.599, GB_I_LETTER=-2, J_CHICKENPOX_51=0.6, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2L6j9wsUbB0E; Mon, 24 Oct 2011 15:50:46 -0700 (PDT)
Received: from smtp03.srv.cs.cmu.edu (SMTP03.SRV.CS.CMU.EDU [128.2.217.198]) by ietfa.amsl.com (Postfix) with ESMTP id 10B3511E81CD; Mon, 24 Oct 2011 15:50:42 -0700 (PDT)
Received: from [66.233.146.161] (66-233-146-161.pit.clearwire-wmx.net [66.233.146.161] (may be forged)) (authenticated bits=0) by smtp03.srv.cs.cmu.edu (8.13.6/8.13.6) with ESMTP id p9OMoQWP023425 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 24 Oct 2011 18:50:28 -0400 (EDT)
From: Jeffrey Hutzelman <jhutz@cmu.edu>
To: Keith Moore <moore@network-heretics.com>
In-Reply-To: <28623_1319491641_p9OLRK2S028590_45E6700D-4207-4807-B8A4-2CFC56440038@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com> <AFC2B32D1BE5A9E449B8D8A1@Ximines.local> <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com> <4EA5D012.9090708@dougbarton.us> <28623_1319491641_p9OLRK2S028590_45E6700D-4207-4807-B8A4-2CFC56440038@network-heretics.com>
Content-Type: text/plain; charset="UTF-8"
Date: Mon, 24 Oct 2011 18:50:24 -0400
Message-ID: <1319496624.28149.399.camel@destiny.pc.cs.cmu.edu>
Mime-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 8bit
X-Scanned-By: mimedefang-cmuscs on 128.2.217.198
X-Mailman-Approved-At: Tue, 25 Oct 2011 01:30:48 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, dhcwg@ietf.org, jhutz@cmu.edu
Subject: Re: [dnsext] [dhcwg] [DNSOP] [mif] 2nd Last Call for MIF DNS	server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2011 22:50:47 -0000

On Mon, 2011-10-24 at 16:58 -0400, Keith Moore wrote:
> On Oct 24, 2011, at 4:52 PM, Doug Barton wrote:
> 
> > On 10/24/2011 05:16, Keith Moore wrote:
> >> That's the point - search lists are not appropriate most of the time, and it's very hard for software to distinguish the cases where they are potentially appropriate from the cases when they're not, and it's not possible for software to do this in all cases.
> > 
> > There's been something missing from this discussion, and I finally put
> > my finger on it. TMK most stub resolvers have an option similar to this
> > one from ISC's:
> > 
> > ndots:n
> >        sets a threshold for the number of dots which
> >        must appear in a name given to res_query() (see
> >        resolver(3)) before an initial absolute query
> >        will be made.  The default for n is â€œ1â€, meanâ€
> >        ing that if there are any dots in a name, the
> >        name will be tried first as an absolute name
> >        before any search list elements are appended to
> >        it.
> > 
> > So it seems that this question is already a matter of local policy,
> > which given the number and quality of the divergent views seems
> > eminently reasonable. Can we move on now?
> 
> No, because relying on "local policy" is not sufficient for interoperability.

For interoperability, one can use absolute names, with the trailing dot,
or specify that in the context of whatever protocol, all names are to be
taken as relative to the root, or use other than a printed
representation.  In some cases this may require that implementations use
resolver interfaces which make it clear that a name to be resolved is
absolute, or that they append the empty label to relative names before
passing them on to the resolver.

On the other hand, in user interface, which is primarily where relative
names are intended to be used, local policy is quite sufficient.  As
long as I and the software on my machine agree on what a name I type
means, it's none of the IETF's business.

Can an enterprise change the name of every domain name?  On machines
they control, yes.


While I agree wholeheartedly with the notion of a unique domain name
space, I also believe that mapping a relative or abbreviated name onto
that namespace is _entirely_ a matter of local policy.  It is perhaps
appropriate for the IETF to provide mechanisms for distributing that
policy, for those who wish to use them, but not to dictate what the
policy must be.




> I think there's a need for IETF to document why any other value than 1
>  is a Bad Idea, and more to the point, why it will break things.

It's not a Bad Idea, and it doesn't break things, or at least not so
badly that the convenience isn't worth it.  In this, I speak from years
of operational experience, not only of personal use of also that of the
many users of systems I operate support.

Do things get worse as new TLDs appear?  Yes, sometimes.

Have we mostly had to abandon use of relative names ending in .cs and
other two-letter suffixes?  Yes, but we _mostly_ didn't use them anyway,
due to our deep namespace and the appearance of those domains in our
search list (here, "foo.bar" usually means "foo.bar.cs.cmu.edu").

Does that mean we're abandoning "options ndots:2"?  Not aggressively.
It has faded over time, but more due to a failure to actively apply it
to newer systems than to any conscious decision that it's a problem.

Further, given this position, I wonder why you think even a value of 1
is acceptable in the face of vanity TLDs.  I know why I do, both from
the perspective of an IETF (it's a local policy matter, period) and for
myself (search for local names first, don't trust DNS results (yet) for
security, and write absolute names when you want to bypass search
lists).


> The
>  problem isn't entirely specific to hosts with multiple interfaces. 
>  But given that using multiple interfaces makes the problem worse, MIF
>  might want to take on some of the work of documenting why it will
>  break things.

I can see how using an untrusted search list makes it worse.

I can also see how using multiple sets of nameservers which provide
different views of the namespace makes things worse, and I can see how
using multiple interfaces makes this more likely.  But, that has nothing
to do with search lists and occurs even if every name is always treated
as absolute.  I can see two answers to this:

1) Use DNSSEC
2) Don't trust results from unsecured DNS for anything important.

I fail to see how using multiple interfaces makes the problem worse, in
itself.  Can you elaborate?

-- Jeff


From jhutz@cmu.edu  Mon Oct 24 17:05:08 2011
Return-Path: <jhutz@cmu.edu>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F16B621F8CC4; Mon, 24 Oct 2011 17:05:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.656
X-Spam-Level: 
X-Spam-Status: No, score=-106.656 tagged_above=-999 required=5 tests=[AWL=-0.057, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1dCJQgvUqE7Z; Mon, 24 Oct 2011 17:05:07 -0700 (PDT)
Received: from smtp01.srv.cs.cmu.edu (SMTP01.SRV.CS.CMU.EDU [128.2.217.196]) by ietfa.amsl.com (Postfix) with ESMTP id EE16321F8CB8; Mon, 24 Oct 2011 17:05:06 -0700 (PDT)
Received: from [66.233.146.161] (66-233-146-161.pit.clearwire-wmx.net [66.233.146.161] (may be forged)) (authenticated bits=0) by smtp01.srv.cs.cmu.edu (8.13.6/8.13.6) with ESMTP id p9P04sjx010043 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 24 Oct 2011 20:04:56 -0400 (EDT)
From: Jeffrey Hutzelman <jhutz@cmu.edu>
To: Keith Moore <moore@network-heretics.com>
In-Reply-To: <B479C8DD-BC2F-4969-89DC-CE0A084DAB80@network-heretics.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com> <AFC2B32D1BE5A9E449B8D8A1@Ximines.local> <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com> <4EA5D012.9090708@dougbarton.us> <28623_1319491641_p9OLRK2S028590_45E6700D-4207-4807-B8A4-2CFC56440038@network-heretics.com> <1319496624.28149.399.camel@destiny.pc.cs.cmu.edu> <B479C8DD-BC2F-4969-89DC-CE0A084DAB80@network-heretics.com>
Content-Type: text/plain; charset="UTF-8"
Date: Mon, 24 Oct 2011 20:04:52 -0400
Message-ID: <1319501092.28149.545.camel@destiny.pc.cs.cmu.edu>
Mime-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 7bit
X-Scanned-By: mimedefang-cmuscs on 128.2.217.196
X-Mailman-Approved-At: Tue, 25 Oct 2011 01:30:48 -0700
Cc: mif@ietf.org, dnsop@ietf.org, dnsext@ietf.org, pk@isoc.de, dhcwg@ietf.org, jhutz@cmu.edu
Subject: Re: [dnsext] [dhcwg] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 00:05:08 -0000

On Mon, 2011-10-24 at 19:30 -0400, Keith Moore wrote:
> On Oct 24, 2011, at 6:50 PM, Jeffrey Hutzelman wrote:
> 
> >>> So it seems that this question is already a matter of local policy,
> >>> which given the number and quality of the divergent views seems
> >>> eminently reasonable. Can we move on now?
> >> 
> >> No, because relying on "local policy" is not sufficient for interoperability.
> > 
> > For interoperability, one can use absolute names, with the trailing dot,
> 
> uh, no.   Names with trailing dots aren't allowed in many contexts.  
>  And in some of the contexts in which they are allowed, they get
>  "canonicalized" to names without trailing dots.

Yup; that's a problem.  And I agree that changing it may not be the most
practical solution to the problem.


> 
> > or specify that in the context of whatever protocol, all names are to be
> > taken as relative to the root, or use other than a printed
> > representation.
> 
> ...so a DNS name means different things in one context than in another.  Bad Idea.

Hm?  Not at all.  Really, only unambiguous names ought to ever appear on
the wire.  One way for a protocol to do that is too use absolute names
exclusively; another is to use "relative" names which are always
relative to the root; this is the same as using absolute names without
the trailing dot.  Another is to use names relative to some unambiguous
origin, as is done in DNS master files.

The important thing is that a name always mean the same thing, not that
it be represented the same way in all protocols.


> >  In some cases this may require that implementations use
> > resolver interfaces which make it clear that a name to be resolved is
> > absolute, or that they append the empty label to relative names before
> > passing them on to the resolver.
> > 
> > On the other hand, in user interface, which is primarily where relative
> > names are intended to be used, local policy is quite sufficient.
> 
> no.  Domain names are written on buses, billboards, business cards. 
>  They do get transcribed, quite often actually, and they need to have
>  the same meanings when typed in as they do when clicked on.

Yup, that's a problem, too, in many ways.  Of course, such names should
always be fully-qualified; you can't expect useful results if you use a
relative name on the side of a bus.  Or at least, you can't unless you
really meant an absolute name but left off the trailing dot, which is
what everyone will think you meant anyway.


> Some people are working way too hard to try to save something that was
>  never a good idea in the first place.   
> 
> I'm not arguing that all software that currently applies searching to
>  names with dots in them has to die a violent death, and immediately
>  either be updated or deleted from all computers everywhere (as
>  if...).  I'm just saying that IETF should recommend against the
>  practice of using search lists with multi-label names, and document
>  the harm that it does.  Sites can still do it if they want to, or they
>  can manage their own transitions away from using search paths for such
>  names, on their own timeframes.   After all, this has been a practice
>  for ~30 years in some places, nobody should expect it all to change
>  overnight.

Right.  That's what local policy _is_.
Of course it's reasonable for the IETF to recommend default policy, and
describe some of the pitfalls associated with other possible policies.
And I certainly agree that ndots:1 is a reasonable default policy that
will work for most people while causing few problems.  Which makes it
convenient that it's what most vendors already do today.

> > While I agree wholeheartedly with the notion of a unique domain name
> > space, I also believe that mapping a relative or abbreviated name onto
> > that namespace is _entirely_ a matter of local policy.
> 
> That's a convenient philosophy if you _only_ care that local things
>  interoperate with one another.

I only care that abbreviated names work for local things.  For non-local
things, I find it acceptable that fully-qualified names must be used to
obtain interoperability.


> > Further, given this position, I wonder why you think even a value of 1
> > is acceptable in the face of vanity TLDs.


> Because (a) local names are essential, (b) the ability to distinguish
>  local names from FQDNs is also essential, and (c) use of a
>  single-label name as a local name (meaning, a name subject to local
>  interpretation) is a very widespread and well-entrenched practice.  
>  Sites that associate address (or MX) records with vanity TLDs will
>  lose, and they deserve to lose.

OK; on these points we agree.

Note, however, that to me "local interpretation" means as defined by me
and whoever else is involved in setting policy for me, and _not_ as
defined by the coffee shop I happen to be sitting in.  IMHO, local names
are useless if I cannot depend on their meaning.

Ideally, it would be desirable to have an interoperable way to have
multi-label local names.  When "local" gets to be large, a flat
namespace becomes unwieldy, but abbreviation is still highly desirable.
Why should I have to type more to talk to a relatively nearby machine
that is part of my organization than to talk to a total stranger?

But, since such a thing is basically impossible, I am satisfied with the
idea that, as a matter of local policy, I can decide that some things
that would otherwise be treated as fully-qualified are instead treated
as local names.  Other people shouldn't get to decide that for me
without my permission, of course.


> >  I know why I do, both from
> > the perspective of an IETF (it's a local policy matter, period) and for
> > myself (search for local names first, don't trust DNS results (yet) for
> > security, and write absolute names when you want to bypass search
> > lists).
> 
> The way you write an absolute name is to include a '.' in it.

Well, yes.

-- Jeff


From jhutz@cmu.edu  Mon Oct 24 17:31:39 2011
Return-Path: <jhutz@cmu.edu>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0D9511E811A; Mon, 24 Oct 2011 17:31:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.349
X-Spam-Level: 
X-Spam-Status: No, score=-106.349 tagged_above=-999 required=5 tests=[AWL=-0.350, BAYES_00=-2.599, J_CHICKENPOX_43=0.6, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zOcHNyVP3ERV; Mon, 24 Oct 2011 17:31:39 -0700 (PDT)
Received: from smtp01.srv.cs.cmu.edu (SMTP01.SRV.CS.CMU.EDU [128.2.217.196]) by ietfa.amsl.com (Postfix) with ESMTP id 3E8BC11E80DB; Mon, 24 Oct 2011 17:31:39 -0700 (PDT)
Received: from [66.233.146.161] (66-233-146-161.pit.clearwire-wmx.net [66.233.146.161] (may be forged)) (authenticated bits=0) by smtp01.srv.cs.cmu.edu (8.13.6/8.13.6) with ESMTP id p9P0VWE5010357 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 24 Oct 2011 20:31:33 -0400 (EDT)
From: Jeffrey Hutzelman <jhutz@cmu.edu>
To: Doug Barton <dougb@dougbarton.us>
In-Reply-To: <23284_1319373366_p9NCa52k028390_4EA30EB0.6080605@dougbarton.us>
References: <COL118-W55403198A984BAAE44BA47B1F70@phx.gbl> <916CE6CF87173740BC8A2CE44309696203782D75@008-AM1MPN1-037.mgdnok.nokia.com> <121DABD1-65E8-4275-8471-9FA38D25C434@nominet.org.uk> <916CE6CF87173740BC8A2CE44309696203783EE0@008-AM1MPN1-037.mgdnok.nokia.com> <4EA09791.8010705@gmail.com> <C8398996-79B5-437E-82A5-6B869ECF8F4E@network-heretics.com> <94C2E518-F34F-49E4-B15C-2CCCFAA96667@virtualized.org> <12477381-9F74-4C50-B576-47EE4322F6BC@network-heretics.com> <CAH1iCiqsN-R87VK3vKityPsY+NXA=0DRASYf_vmBSy8gvYwHdQ@mail.gmail.com> <916CE6CF87173740BC8A2CE44309696203784B27@008-AM1MPN1-037.mgdnok.nokia.com> <708F3212-3C9C-4B61-AA77-EFA8F1CA5B04@nominum.com> <30B1AE01-0A35-48D2-91AF-46FC8B60466C@network-heretics.com> <23284_1319373366_p9NCa52k028390_4EA30EB0.6080605@dougbarton.us>
Content-Type: text/plain; charset="UTF-8"
Date: Mon, 24 Oct 2011 20:30:53 -0400
Message-ID: <1319502653.28149.572.camel@destiny.pc.cs.cmu.edu>
Mime-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 7bit
X-Scanned-By: mimedefang-cmuscs on 128.2.217.196
X-Mailman-Approved-At: Tue, 25 Oct 2011 01:30:48 -0700
Cc: "<mif@ietf.org>" <mif@ietf.org>, Keith Moore <moore@network-heretics.com>, "<dnsop@ietf.org>" <dnsop@ietf.org>, "<dnsext@ietf.org>" <dnsext@ietf.org>, "<pk@isoc.de>" <pk@isoc.de>, Ted Lemon <Ted.Lemon@nominum.com>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "<denghui02@hotmail.com>" <denghui02@hotmail.com>, "<brian.e.carpenter@gmail.com>" <brian.e.carpenter@gmail.com>, jhutz@cmu.edu
Subject: Re: [dnsext] [dhcwg] [DNSOP] [mif] 2nd Last Call for MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 00:31:40 -0000

On Sat, 2011-10-22 at 11:42 -0700, Doug Barton wrote:

> In regards to 3, let's say I have a domain, example.org. In my network I
> have various subdomains that represent various network segments, let's
> say foo, bar, and baz. Personally, I find it convenient to put
> 'example.com' in the search list for all of my hosts, and then type 'ssh
> host.bar' and go off on my merry way. Yes, I understand that in my
> simple example I could theoretically put all 3 subdomains in the search
> list. Now assume that my network isn't actually that simple ...

For example, suppose that each of foo, bar, and baz in turn has a number
of subdomains, and that the total number of such 4th-level domains is
over 250.  Now, imagine that major resolver implementations limit the
search list to a total of 6 domains...




From jabley@hopcount.ca  Tue Oct 25 02:40:28 2011
Return-Path: <jabley@hopcount.ca>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6676B21F8AF8 for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 02:40:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JAcZaPOTv21D for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 02:40:27 -0700 (PDT)
Received: from monster.hopcount.ca (monster.hopcount.ca [216.235.14.38]) by ietfa.amsl.com (Postfix) with ESMTP id BE61421F8C1D for <dnsext@ietf.org>; Tue, 25 Oct 2011 02:40:27 -0700 (PDT)
Received: from [41.214.21.228] (helo=[10.10.0.138]) by monster.hopcount.ca with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.76 (FreeBSD)) (envelope-from <jabley@hopcount.ca>) id 1RIdU5-000E2Y-34; Tue, 25 Oct 2011 09:40:07 +0000
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=us-ascii
From: Joe Abley <jabley@hopcount.ca>
In-Reply-To: <4EA5F96C.70607@necom830.hpcl.titech.ac.jp>
Date: Tue, 25 Oct 2011 09:39:03 +0000
Content-Transfer-Encoding: quoted-printable
Message-Id: <ECEF52EA-4496-41C0-A972-4F0C235BD324@hopcount.ca>
References: <20111009135505.GA85221@shinkuro.com> <20111009213431.4756314E0BDE@drugs.dv.isc.org> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <4EA5F96C.70607@necom830 .hpcl.titech.ac.jp>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
X-Mailer: Apple Mail (2.1251.1)
X-SA-Exim-Connect-IP: 41.214.21.228
X-SA-Exim-Mail-From: jabley@hopcount.ca
X-SA-Exim-Scanned: No (on monster.hopcount.ca); SAEximRunCond expanded to false
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 09:40:28 -0000

On 2011-10-24, at 23:49, Masataka Ohta wrote:

> Joe Abley wrote:
>=20
>>> 	http://www.ietf.org/id/draft-ohta-practically-secure-dns-00.txt
>>=20
>> You characterise the possible reasons why successive responses to
>> the same query, sent close together with different query IDs,
>> might be different.
>=20
> My intention is to have exhaustive list of reasons.

I don't think you are there, yet.

>> I think the set of possible reasons is simpler than you suggest, =
namely
>>=20
>> (a) the responses are legitimately different (e.g. your possible =
cases 1, 2 and 3)
>>=20
>> (b) the responses are different for a malicious, undesirable reason =
(your case 4)
>=20
> That's useless classification.

Right, that was my point.

>> I don't understand from your draft how I distinguish between (a)
>> and (b),
>=20
> because it is meaningless to distinguish (a) and (b).

It's a coarse classification, but distinguishing between (a) and (b) is =
surely the entire point of your proposal.


Joe


From mohta@necom830.hpcl.titech.ac.jp  Tue Oct 25 04:26:36 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EDDC021F85A8 for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 04:26:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1wHiphpGGDL5 for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 04:26:36 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 2CAB421F85A4 for <dnsext@ietf.org>; Tue, 25 Oct 2011 04:26:36 -0700 (PDT)
Received: (qmail 70778 invoked from network); 25 Oct 2011 11:46:55 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 25 Oct 2011 11:46:55 -0000
Message-ID: <4EA69CF9.8000603@necom830.hpcl.titech.ac.jp>
Date: Tue, 25 Oct 2011 20:26:49 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Joe Abley <jabley@hopcount.ca>
References: <20111009135505.GA85221@shinkuro.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <4EA5F96C.70607@necom830.hpcl.titech.ac.jp> <ECEF52EA-4496-41C0-A972-4F0C235BD324@hopcount.ca>
In-Reply-To: <ECEF52EA-4496-41C0-A972-4F0C235BD324@hopcount.ca>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 11:26:37 -0000

Joe Abley wrote:

>>>> 	http://www.ietf.org/id/draft-ohta-practically-secure-dns-00.txt
>>>
>>> You characterise the possible reasons why successive responses to
>>> the same query, sent close together with different query IDs,
>>> might be different.
>>
>> My intention is to have exhaustive list of reasons.
> 
> I don't think you are there, yet.

Which case, do you think, is missing?

>>> (a) the responses are legitimately different (e.g. your possible cases 1, 2 and 3)
>>>
>>> (b) the responses are different for a malicious, undesirable reason (your case 4)
>>
>> That's useless classification.
> 
> Right, that was my point.

That's your classification, which means your, not my, problem
is your point.

>>> I don't understand from your draft how I distinguish between (a)
>>> and (b),
>>
>> because it is meaningless to distinguish (a) and (b).
> 
> It's a coarse classification,

Yes.

> but distinguishing between (a) and
> (b) is surely the entire point of your proposal.

Not at all.

					Masataka Ohta

From jabley@hopcount.ca  Tue Oct 25 05:05:50 2011
Return-Path: <jabley@hopcount.ca>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06F9221F8B0D for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 05:05:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id am5uVNZn3Onh for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 05:05:49 -0700 (PDT)
Received: from monster.hopcount.ca (monster.hopcount.ca [216.235.14.38]) by ietfa.amsl.com (Postfix) with ESMTP id 81D6821F8ADC for <dnsext@ietf.org>; Tue, 25 Oct 2011 05:05:49 -0700 (PDT)
Received: from [41.214.21.228] (helo=[10.10.0.138]) by monster.hopcount.ca with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.76 (FreeBSD)) (envelope-from <jabley@hopcount.ca>) id 1RIfl3-000HJG-6v; Tue, 25 Oct 2011 12:05:48 +0000
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=us-ascii
From: Joe Abley <jabley@hopcount.ca>
In-Reply-To: <4EA69CF9.8000603@necom830.hpcl.titech.ac.jp>
Date: Tue, 25 Oct 2011 12:05:07 +0000
Content-Transfer-Encoding: 7bit
Message-Id: <8EDBDD94-393A-4298-980A-6AA87E9B6D98@hopcount.ca>
References: <20111009135505.GA85221@shinkuro.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <4EA5F96C.70607@necom830.hpcl.titech.ac.jp> <ECEF52EA-4496-41C0-A972-4F0C235BD324@hopcount.ca> <4EA69CF9.8000603@necom830.hpcl.titech.ac.jp>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
X-Mailer: Apple Mail (2.1251.1)
X-SA-Exim-Connect-IP: 41.214.21.228
X-SA-Exim-Mail-From: jabley@hopcount.ca
X-SA-Exim-Scanned: No (on monster.hopcount.ca); SAEximRunCond expanded to false
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 12:05:50 -0000

On 2011-10-25, at 11:26, Masataka Ohta wrote:

> Joe Abley wrote:
> 
>>>>> 	http://www.ietf.org/id/draft-ohta-practically-secure-dns-00.txt
>>>> 
>>>> You characterise the possible reasons why successive responses to
>>>> the same query, sent close together with different query IDs,
>>>> might be different.
>>> 
>>> My intention is to have exhaustive list of reasons.
>> 
>> I don't think you are there, yet.
> 
> Which case, do you think, is missing?

Your cases are (I am paraphrasing)

(1) responses are different because the zone changed between them

(2) responses are different because they come from different caches

(3) responses are different for some other reason

So I agree it's exhaustive, but only because case (3) is so general.

Since enumerating all possible specific reasons for (3) is not
possible, your recipe for distinguishing between (3) and (4) can
only ever hope to work some of the time -- it's a pragmatic choice
presumably intended to be good enough, most of the time.

To benefit from the approach you propose the recipe needs to do
more good than harm.  Without empirical analysis it's not obvious
that this is the case for today's use of the DNS. Without a time
machine, it's not obvious that this is the case for tomorrow's use
of the DNS (unless the intention is to constrain future use of the
DNS).


Joe


From Ted.Lemon@nominum.com  Tue Oct 25 10:20:41 2011
Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AEEB611E8083; Tue, 25 Oct 2011 10:20:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.557
X-Spam-Level: 
X-Spam-Status: No, score=-106.557 tagged_above=-999 required=5 tests=[AWL=0.042, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RHv9ZsOe5DYm; Tue, 25 Oct 2011 10:20:40 -0700 (PDT)
Received: from exprod7og101.obsmtp.com (exprod7og101.obsmtp.com [64.18.2.155]) by ietfa.amsl.com (Postfix) with ESMTP id 0DFED21F8C14; Tue, 25 Oct 2011 10:20:39 -0700 (PDT)
Received: from shell-too.nominum.com ([64.89.228.229]) (using TLSv1) by exprod7ob101.postini.com ([64.18.6.12]) with SMTP;  Tue, 25 Oct 2011 10:20:40 PDT
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id 6AC1E1B8225; Tue, 25 Oct 2011 10:20:38 -0700 (PDT)
Received: from webmail.nominum.com (cas-02.win.nominum.com [64.89.228.132]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTPS id 56E2C190061; Tue, 25 Oct 2011 10:20:37 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from MBX-01.WIN.NOMINUM.COM ([64.89.228.133]) by CAS-02.WIN.NOMINUM.COM ([64.89.228.132]) with mapi id 14.01.0323.003; Tue, 25 Oct 2011 10:20:37 -0700
From: Ted Lemon <Ted.Lemon@nominum.com>
To: Doug Barton <dougb@dougbarton.us>
Thread-Topic: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS	server selection document
Thread-Index: AQHMkpQpQamRm2eD6Eax/sfGruR2mJWNT6kN
Date: Tue, 25 Oct 2011 17:20:37 +0000
Message-ID: <FDA43771-8A01-43D4-85FE-17E282F39F94@nominum.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com> <AFC2B32D1BE5A9E449B8D8A1@Ximines.local> <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com> <4EA5D012.9090708@dougbarton.us> <45E6700D-4207-4807-B8A4-2CFC56440038@network-heretics.com>, <4EA5D8C1.9060303@dougbarton.us>
In-Reply-To: <4EA5D8C1.9060303@dougbarton.us>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "pk@isoc.de" <pk@isoc.de>, "dnsop@ietf.org" <dnsop@ietf.org>, "mif@ietf.org" <mif@ietf.org>, "dnsext@ietf.org" <dnsext@ietf.org>, "dhcwg@ietf.org" <dhcwg@ietf.org>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS	server	selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 17:20:41 -0000

On Oct 24, 2011, at 5:30 PM, "Doug Barton" <dougb@dougbarton.us> wrote:

>> I think there's a need for IETF to document why any other value than 1 i=
s a Bad Idea, and more to the point, why it will break things.    The probl=
em isn't entirely specific to hosts with multiple interfaces.  But given th=
at using multiple interfaces makes the problem worse, MIF might want to tak=
e on some of the work of documenting why it will break things.
>=20
> That seems to be an opinion of yours that isn't widely shared.

The fact that many of us are tired of this interminable rathole and want it=
 to stop is not an indication that we agree with you, Doug. Consensus is no=
t, or at least should not be, determined by counting the number of email me=
ssages for and against. =

From nweaver@ICSI.Berkeley.EDU  Tue Oct 25 10:45:55 2011
Return-Path: <nweaver@ICSI.Berkeley.EDU>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2503B21F8505 for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 10:45:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.521
X-Spam-Level: 
X-Spam-Status: No, score=-2.521 tagged_above=-999 required=5 tests=[AWL=0.078,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EBHp5FXMfLNb for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 10:45:54 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id 6C2B721F84FC for <dnsext@ietf.org>; Tue, 25 Oct 2011 10:45:54 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 410942C401B; Tue, 25 Oct 2011 10:45:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id xUk2oHFDQq36; Tue, 25 Oct 2011 10:45:54 -0700 (PDT)
Received: from gala.icir.org (gala [192.150.187.49]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 020882C4010; Tue, 25 Oct 2011 10:45:54 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=iso-2022-jp
From: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
In-Reply-To: <4EA5FD15.4050702@necom830.hpcl.titech.ac.jp>
Date: Tue, 25 Oct 2011 10:45:53 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <FBEB1192-5060-46C9-9049-24D34E6879A9@ICSI.Berkeley.EDU>
References: <20111009135505.GA85221@shinkuro.com> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <F9E39FDF-289E-4690-81D2-AE6B8DA43420@icsi.berkeley.edu> <4EA5FD15.4050 702@necom830.hpcl.titech.ac.jp>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
X-Mailer: Apple Mail (2.1251.1)
Cc: dnsext List <dnsext@ietf.org>
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 17:45:55 -0000

On Oct 24, 2011, at 5:04 PM, Masataka Ohta wrote:

> Nicholas Weaver wrote:
>=20
> Why can't you wrap lines properly?

Why do you deliberately misconfigure Thunderbird?  Thunderbird reflows =
text unless you deliberately mangle the text by eliminating spaces.

>> The probability of performing blind injection is already vastly =
reduced by a combination of source port
>=20
> See the abstract of the draft.

You exclude 0x20 in the abstract.

You neglect that the notion of "secure" for the separate recursive =
resolver is an absolute joke: you gain far more security by just =
bypassing the recursive resolver completely without even bothering with =
port randomization if you use a non-kaminskiable glue policy.



>> Also, There exists an easier approach for fallback under conflict: =
retry using TCP
>=20
> TCP is not always supported.

Fallback to TCP first, before trying anything else on disagreement, =
because otherwise you are in a world of hurt.


Look at how Facebook handles IP addresses:

The following is 10 queries to glb2.facebook.com for "www.facebook.com"

66.220.147.33
69.171.224.12
69.171.224.11
69.171.228.39
66.220.149.25
66.220.149.66
66.220.149.25
69.171.229.16
69.171.228.40
66.220.147.11

It took 7! tries before a single IP was in agreement. =20

Another test:

66.220.149.67
69.171.228.11
66.220.149.11
69.171.229.15
69.171.224.14
66.220.149.67
69.171.228.39
69.171.224.11
69.171.229.12
69.171.224.11

Now it took 10 tries!




Also, blind injectors can't remove the real packet, so with high =
probability: If you get two responses to the same transaction ID within =
~100ms, discard both: the probability of injected packet is high.  While =
looking for unmatched IDs can produce false positives/malicious false =
positives.


>>  essential,
>=20
> That's a solved problem.

Not if you are running bind. =20

Most resolvers in the wild still use Kaminskiable Glue Policies: they =
enable "race until win" attacks, and attacks that get auth information, =
rather than "one race per TTL".


From dougb@dougbarton.us  Tue Oct 25 11:40:52 2011
Return-Path: <dougb@dougbarton.us>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 474E611E8099 for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 11:40:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.296
X-Spam-Level: 
X-Spam-Status: No, score=-3.296 tagged_above=-999 required=5 tests=[AWL=0.303,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FWcqdvMix+Ns for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 11:40:52 -0700 (PDT)
Received: from mail2.fluidhosting.com (mx22.fluidhosting.com [204.14.89.5]) by ietfa.amsl.com (Postfix) with ESMTP id 3EB0711E809C for <dnsext@ietf.org>; Tue, 25 Oct 2011 11:40:51 -0700 (PDT)
Received: (qmail 10757 invoked by uid 399); 25 Oct 2011 18:33:26 -0000
Received: from unknown (HELO 172-17-198-245.globalsuite.net) (dougb@dougbarton.us@12.207.105.210) by mail2.fluidhosting.com with ESMTPAM; 25 Oct 2011 18:33:26 -0000
X-Originating-IP: 12.207.105.210
X-Sender: dougb@dougbarton.us
Message-ID: <4EA700F4.5050003@dougbarton.us>
Date: Tue, 25 Oct 2011 11:33:24 -0700
From: Doug Barton <dougb@dougbarton.us>
Organization: http://SupersetSolutions.com/
User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:7.0.1) Gecko/20111001 Thunderbird/7.0.1
MIME-Version: 1.0
To: Ted Lemon <Ted.Lemon@nominum.com>
References: <F2045A70-6314-41CF-AC3C-01F1F1ECF84C@network-heretics.com> <96472FB7-8425-4928-8F55-2ABF2CB59A93@conundrum.com> <628C128E-BDA8-46C3-BF07-364A482FE199@network-heretics.com> <20111024.080822.74700976.sthaug@nethelp.no> <59274CC1-611A-445B-A1CF-A0F49329DC1F@network-heretics.com> <E68B291B136EE9E8CFBF68F0@Ximines.local> <EEE0996F-FE4D-4ECF-A685-DD69DFCC87B9@network-heretics.com> <AFC2B32D1BE5A9E449B8D8A1@Ximines.local> <FAB38B5D-9B44-4B25-9268-9DE4A5DDC9FE@network-heretics.com> <4EA5D012.9090708@dougbarton.us> <45E6700D-4207-4807-B8A4-2CFC56440038@network-heretics.com>, <4EA5D8C1.9060303@dougbarton.us> <FDA43771-8A01-43D4-85FE-17E282F39F94@nominum.com>
In-Reply-To: <FDA43771-8A01-43D4-85FE-17E282F39F94@nominum.com>
X-Enigmail-Version: undefined
OpenPGP: id=1A1ABC84
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: "pk@isoc.de" <pk@isoc.de>, "dnsop@ietf.org" <dnsop@ietf.org>, "mif@ietf.org" <mif@ietf.org>, "dnsext@ietf.org" <dnsext@ietf.org>, "dhcwg@ietf.org" <dhcwg@ietf.org>
Subject: Re: [dnsext] [DNSOP] [mif] 2nd Last Call for MIF DNS	server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 18:40:52 -0000

On 10/25/2011 10:20, Ted Lemon wrote:
> 
> 
> On Oct 24, 2011, at 5:30 PM, "Doug Barton" <dougb@dougbarton.us>
> wrote:
> 
>>> I think there's a need for IETF to document why any other value
>>> than 1 is a Bad Idea, and more to the point, why it will break
>>> things.    The problem isn't entirely specific to hosts with
>>> multiple interfaces.  But given that using multiple interfaces
>>> makes the problem worse, MIF might want to take on some of the
>>> work of documenting why it will break things.
>> 
>> That seems to be an opinion of yours that isn't widely shared.
> 
> The fact that many of us are tired of this interminable rathole and
> want it to stop is not an indication that we agree with you, Doug.
> Consensus is not, or at least should not be, determined by counting
> the number of email messages for and against.

Thank $DEITY that's true, or Keith would "win" every "vote." :)

-- 

	Nothin' ever doesn't change, but nothin' changes much.
			-- OK Go

	Breadth of IT experience, and depth of knowledge in the DNS.
	Yours for the right price.  :)  http://SupersetSolutions.com/


From mohta@necom830.hpcl.titech.ac.jp  Tue Oct 25 15:42:34 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32E081F0C4E for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 15:42:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oHgiaYKXdvXZ for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 15:42:33 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id D27FA1F0C4C for <dnsext@ietf.org>; Tue, 25 Oct 2011 15:42:29 -0700 (PDT)
Received: (qmail 75620 invoked from network); 25 Oct 2011 23:03:21 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 25 Oct 2011 23:03:21 -0000
Message-ID: <4EA73B8C.8090802@necom830.hpcl.titech.ac.jp>
Date: Wed, 26 Oct 2011 07:43:24 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Joe Abley <jabley@hopcount.ca>
References: <20111009135505.GA85221@shinkuro.com> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <4EA5F96C.70607@necom830.hpcl.titech.ac.jp> <ECEF52EA-4496-41C0-A972-4F0C235BD324@hopcount.ca> <4EA69CF9.8000603@necom830.hpcl.titech.ac.jp> <8EDBDD94-393A-4298-980A-6AA87E9B6D98@hopcount .ca>
In-Reply-To: <8EDBDD94-393A-4298-980A-6AA87E9B6D98@hopcount.ca>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 22:42:34 -0000

Joe Abley wrote:

> Your cases are (I am paraphrasing)

Don't do that.

> (3) responses are different for some other reason

The draft says:

      3) the server is actively randomizing answers for load balancing
      and other purposes; or

and the point is "actively randomizing".

> Since enumerating all possible specific reasons for (3) is not
> possible,

Sorry, I'm not interested in discussions why  YOUR, not my,
definitions are useless.

So far, you failed to show an example which is not covered
by my cases.

> To benefit from the approach you propose the recipe needs to do
> more good than harm.

So, where is an example that the proposal is harmful?

> Without empirical analysis it's not obvious
> that this is the case for today's use of the DNS.

That's not a valid argument against proposals to be a
proposed standards for the empirical analysis.

> Without a time
> machine, it's not obvious that this is the case for tomorrow's use
> of the DNS (unless the intention is to constrain future use of the
> DNS).

We are solving today's problems.

						Masataka Ohta

From mohta@necom830.hpcl.titech.ac.jp  Tue Oct 25 15:54:04 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F87E11E8090 for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 15:54:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[AWL=-0.000,  BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N4oSRLqolPrC for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 15:54:04 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id 9DA3D11E808C for <dnsext@ietf.org>; Tue, 25 Oct 2011 15:54:03 -0700 (PDT)
Received: (qmail 75676 invoked from network); 25 Oct 2011 23:15:15 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 25 Oct 2011 23:15:15 -0000
Message-ID: <4EA73E59.7090603@necom830.hpcl.titech.ac.jp>
Date: Wed, 26 Oct 2011 07:55:21 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
References: <20111009135505.GA85221@shinkuro.com> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <F9E39FDF-289E-4690-81D2-AE6B8DA43420@icsi.berkeley.edu> <4EA5FD15.4050 702@necom830.hpcl.titech.ac.jp> <FBEB1192-5060-46C9-9049-24D34E6879A9@ICSI.Berkeley.EDU>
In-Reply-To: <FBEB1192-5060-46C9-9049-24D34E6879A9@ICSI.Berkeley.EDU>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext List <dnsext@ietf.org>
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 22:54:04 -0000

Nicholas Weaver wrote:

>> Why can't you wrap lines properly?
> 
> Why do you deliberately misconfigure Thunderbird?

OK. I ignore lengthy lines of your mails.

> You exclude 0x20 in the abstract.

It does not address my case 3) nor exponential growths and
is not practical enough.

> It took 7! tries before a single IP was in agreement.

It has nothing to do with my proposal:

   Otherwise, it should be case 3) and, unless case 4) is identified to
   be simultaneously occurring, one of the replies should be practically
   secure, though it is less secure.

						Masataka Ohta

From brian.peter.dickson@gmail.com  Tue Oct 25 16:48:57 2011
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A4A351F0C9A for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 16:48:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.53
X-Spam-Level: 
X-Spam-Status: No, score=-3.53 tagged_above=-999 required=5 tests=[AWL=0.069,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uk7TYkS2N3Jm for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 16:48:57 -0700 (PDT)
Received: from mail-fx0-f44.google.com (mail-fx0-f44.google.com [209.85.161.44]) by ietfa.amsl.com (Postfix) with ESMTP id CE8FA1F0C96 for <dnsext@ietf.org>; Tue, 25 Oct 2011 16:48:56 -0700 (PDT)
Received: by faas12 with SMTP id s12so1231627faa.31 for <dnsext@ietf.org>; Tue, 25 Oct 2011 16:48:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=RJ12mi8RF84fyVnCQsh1qw43dqr6yypnaHXlm2rtnK8=; b=nTHUFOXAoaOVCZEbtl0KCCwoFGNHTs02Aax17MeERtGKL77ZlMTecx2g7CHhq1w3Kd 5I1idcyFV9P0Y6cFeaanMlMKdfnp709l5oEG7Snw0RgJ35tJVyn+kLGE1IclwRa4zxaR vLYVjJu3p2eNX3qB8PNwJkPWqlDIAa/T0csBM=
MIME-Version: 1.0
Received: by 10.223.76.135 with SMTP id c7mr14855111fak.14.1319586535281; Tue, 25 Oct 2011 16:48:55 -0700 (PDT)
Received: by 10.223.16.78 with HTTP; Tue, 25 Oct 2011 16:48:55 -0700 (PDT)
In-Reply-To: <4EA5FB3D.20509@necom830.hpcl.titech.ac.jp>
References: <20111009135505.GA85221@shinkuro.com> <CACU5sD=-pJUVKG1QmwBX9d-MZJp6_AYkXWDxh_CTAXO=x7+Juw@mail.gmail.com> <20111010051725.3A95214E5206@drugs.dv.isc.org> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <alpine.DEB.2.00.1110240940230.9077@mail.xelerance.com> <4EA5FB3D.20509@necom830.hpcl.titech.ac.jp>
Date: Tue, 25 Oct 2011 19:48:55 -0400
Message-ID: <CAH1iCipCMGKqvyuujnDaM9VLF_GoC9qeKHFoPfCBR1+szSEUGQ@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
Content-Type: text/plain; charset=ISO-8859-1
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2011 23:48:57 -0000

The proposal does not in any way define "secure", which I believe is
going to be problematic for it to be considered by the WG,
let alone the IETF.

Could you please elaborate on what you mean by "secure"?

On Mon, Oct 24, 2011 at 7:56 PM, Masataka Ohta
<mohta@necom830.hpcl.titech.ac.jp> wrote:
> Paul Wouters wrote:
>
>> Isn't all of this already proposed in
>> http://tools.ietf.org/html/draft-wijngaards-dnsext-resolver-side-mitigation-01
>
> Which one?
>
>> It also totally ignores the fact that if all involved name servers are
>> "secure" (definition unknown) but
>
> SDNS also totally ignores the fact that SDNS with automatic servers
> for clients to modify domain information is not secure if related
> servers are not secure.

SDNS considers the modification of domain information out-of-scope.

However, DNS registry operators, registrars, and DNS hosting operators
do not ignore this, and generally employ
whatever they consider best practice in securing their servers, and in
limiting the extent of problems if a server
which by necessity is exposed to the Internet, gets compromised.

>> the traffic path is not,
>
> SDNS with automatic servers for clients to modify domain
> information with password confirmation is not secure if the
> traffic path is not secure.

By negating the conclusion, we in turn infer the negation of the preposition.
If the traffic path is secure, SDNS ... is secure.

Current best (and common) practice is to submit domain information
over secure channels.
This includes encrypted email (2048 RSA), physical devices (flash
memory), out-of-band (fax),
and SSL-protected or IPsec-protected connections (e.g. https).

>> the "secure" client is still going to take
>> rewritten replies. Eg this draft
>> does not even handle the "starbucks wifi" scenario or any transparent
>> DNS proxy scenario.
>
> SDNS also ignores the fact that secure time is practically
> impossible to obtain within certain private networks.

SDNS does not require secure time, only "pretty good" time to prevent
replay and never-expired data usage.
Wall-clock time from a reasonably reputable source, such as WWV, the
TV, or the USNO web site, are all good enough.
Set once, and check every 6 months by comparing to another reasonably
okay source, is more than enough for SDNS.

SDNS addresses man-in-the-middle (providing modified-but-consistent
results). That meets my definition of "secure".

How does not addressing man-in-the-middle (which your proposal does
not) in any way meet the definition of "pretty secure"?

Brian

From mohta@necom830.hpcl.titech.ac.jp  Tue Oct 25 18:34:47 2011
Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C687221F8A97 for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 18:34:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ua8GyI8WdrxZ for <dnsext@ietfa.amsl.com>; Tue, 25 Oct 2011 18:34:47 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id DA93021F8A96 for <dnsext@ietf.org>; Tue, 25 Oct 2011 18:34:46 -0700 (PDT)
Received: (qmail 76523 invoked from network); 26 Oct 2011 01:55:49 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 26 Oct 2011 01:55:49 -0000
Message-ID: <4EA7641F.3050802@necom830.hpcl.titech.ac.jp>
Date: Wed, 26 Oct 2011 10:36:31 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: Brian Dickson <brian.peter.dickson@gmail.com>
References: <20111009135505.GA85221@shinkuro.com> <CACU5sDnd49zbLxqLFOebFfm6UqJ7qZiQuCqY4DeEA4rHiia8GQ@mail.gmail.com> <20111010220027.F1E2614EB649@drugs.dv.isc.org> <4E9C2413.3030000@nlnetlabs.nl> <20111017134650.816981569E8F@drugs.dv.isc.org> <20111017140437.GA7743@shinkuro.com> <20111018014221.C0E871578C86@drugs.dv.isc.org> <20111018040429.GM7743@shinkuro.com> <20111018054252.1EF21157D5EB@drugs.dv.isc.org> <4E9D1FA2.5020608@necom830.hpcl.titech.ac.jp> <4E9D6BAC.7000100@gis.net> <4E9D8459.1030707@necom830.hpcl.titech.ac.jp> <sjm7h42z8p3.fsf@mocana.ihtfp.org> <4E9E140D.8040803@necom830.hpcl.titech.ac.jp> <20111019015410.5AA45158826F@drugs.dv.isc.org> <4E9EDDE3.3050302@necom830.hpcl.titech.ac.jp> <4EA5329D.8050607@necom830.hpcl.titech.ac.jp> <02C8B7BF-7C6F-4BC2-9A40-2EC087895F58@hopcount.ca> <alpine.DEB.2.00.1110240940230.9077@mail.xelerance.com> <4EA5FB3D.20509@necom830.hpcl.titech.ac.jp> <CAH1iCipCMGKqvyuujnDaM9VLF_GoC9qeKHFoPfCBR1+szSEUGQ@mail.gmail.com>
In-Reply-To: <CAH1iCipCMGKqvyuujnDaM9VLF_GoC9qeKHFoPfCBR1+szSEUGQ@mail.gmail.com>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Practically secure DNS
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Oct 2011 01:34:47 -0000

Brian Dickson wrote:

> The proposal does not in any way define "secure", which I believe is
> going to be problematic for it to be considered by the WG,
> let alone the IETF.
> 
> Could you please elaborate on what you mean by "secure"?

"secure" against ID guessing attacks. I'll clarify it with
the next version.

>> SDNS also totally ignores the fact that SDNS with automatic servers
>> for clients to modify domain information is not secure if related
>> servers are not secure.
> 
> SDNS considers the modification of domain information out-of-scope.

That's not very practical.

> However, DNS registry operators, registrars, and DNS hosting operators
> do not ignore this, and generally employ
> whatever they consider best practice in securing their servers, and in
> limiting the extent of problems if a server
> which by necessity is exposed to the Internet, gets compromised.

Your argument is equally applicable against:

> > It also totally ignores the fact that if all involved name servers are
> > "secure" (definition unknown) but

where "secure", here, means all the aspects of security.

> Current best (and common) practice is to submit domain information
> over secure channels.
> This includes encrypted email (2048 RSA),

It needs yet another secure channel to securely tell one's
public key to its peer.

> physical devices (flash memory), out-of-band (fax),

They are not secure.

> and SSL-protected or IPsec-protected connections (e.g. https).

Same as encrypted email.

Worse, https with so many root CAs is practically not secure.

> SDNS does not require secure time, only "pretty good" time to prevent
> replay and never-expired data usage.

Wrong. Without secure time, once a zone is compromised, newly
forged data can be injected with expired certificates.

> Wall-clock time from a reasonably reputable source, such as WWV, the
> TV, or the USNO web site, are all good enough.

Not at all. It's trivially easy to fake radio waves. You don't
even have to tap a wire.

> SDNS addresses man-in-the-middle (providing modified-but-consistent
> results). That meets my definition of "secure".

SDNS does not address man-in-the-middle to obtain secure time.

> How does not addressing man-in-the-middle (which your proposal does
> not) in any way meet the definition of "pretty secure"?

The draft is titled "practically secure" DNS.

						Masataka Ohta

From teemu.savolainen@nokia.com  Wed Oct 26 00:01:28 2011
Return-Path: <teemu.savolainen@nokia.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E694621F84AF; Wed, 26 Oct 2011 00:01:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.482
X-Spam-Level: 
X-Spam-Status: No, score=-0.482 tagged_above=-999 required=5 tests=[AWL=-2.087, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_BASE64_TEXT=1.753, MIME_CHARSET_FARAWAY=2.45]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4zdeipHsh++P; Wed, 26 Oct 2011 00:01:26 -0700 (PDT)
Received: from mgw-sa02.nokia.com (smtp.nokia.com [147.243.1.48]) by ietfa.amsl.com (Postfix) with ESMTP id 2003521F8484; Wed, 26 Oct 2011 00:01:19 -0700 (PDT)
Received: from vaebh106.NOE.Nokia.com (vaebh106.europe.nokia.com [10.160.244.32]) by mgw-sa02.nokia.com (Switch-3.4.4/Switch-3.4.4) with ESMTP id p9Q71CPd024271; Wed, 26 Oct 2011 10:01:18 +0300
Received: from smtp.mgd.nokia.com ([65.54.30.7]) by vaebh106.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675);  Wed, 26 Oct 2011 10:00:51 +0300
Received: from 008-AM1MMR1-007.mgdnok.nokia.com (65.54.30.23) by NOK-AM1MHUB-03.mgdnok.nokia.com (65.54.30.7) with Microsoft SMTP Server (TLS) id 8.2.255.0; Wed, 26 Oct 2011 09:00:47 +0200
Received: from 008-AM1MPN1-037.mgdnok.nokia.com ([169.254.7.8]) by 008-AM1MMR1-007.mgdnok.nokia.com ([65.54.30.23]) with mapi id 14.01.0339.002; Wed, 26 Oct 2011 09:00:46 +0200
From: <teemu.savolainen@nokia.com>
To: <mif@ietf.org>, <dnsext@ietf.org>, <dnsop@ietf.org>, <dhcwg@ietf.org>
Thread-Topic: New rev of MIF DNS server selection document
Thread-Index: AcyTq3sQ9JbsYFTkR5yAi3kg51bouw==
Date: Wed, 26 Oct 2011 07:00:46 +0000
Message-ID: <916CE6CF87173740BC8A2CE44309696203787DCE@008-AM1MPN1-037.mgdnok.nokia.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-tituslabs-classifications-30: TLPropertyRoot=Nokia;Confidentiality=Company Confidential;Project=None;
x-titus-version: 3.3.8.1
x-headerinfofordlp: None
x-tituslabs-classificationhash-30: 0Ywc1/TmJmZP14okFmB8GOGuG+9CndY/chBUg2sNqfclVQc560ay4nTVu+Pyk2IAuFttQ0hJIgNZv0C/nLXvVl6FFyrPFpbSBOJjV37tYwuNoeTkhogx7FiT8UlHtNh3raK/yv2tgY3MgXDEMDyjWF7v2fpwqE5b1AYchEkJFQCkQUWl7EB+ZbJkdpe0Azkr2V/cOFBVnD04GNJZ4cF4iaQZsj+MbhDweV76wYxTT/s6Sm6Cel+NQRlCDM/kxxA4
x-originating-ip: [10.162.56.71]
Content-Type: multipart/alternative; boundary="_000_916CE6CF87173740BC8A2CE44309696203787DCE008AM1MPN1037mg_"
MIME-Version: 1.0
X-OriginalArrivalTime: 26 Oct 2011 07:00:51.0909 (UTC) FILETIME=[FF9DC750:01CC93AC]
X-Nokia-AV: Clean
Subject: [dnsext] New rev of MIF DNS server selection document
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Oct 2011 07:01:28 -0000

--_000_916CE6CF87173740BC8A2CE44309696203787DCE008AM1MPN1037mg_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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--_000_916CE6CF87173740BC8A2CE44309696203787DCE008AM1MPN1037mg_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:SimSun;
	mso-fareast-language:ZH-CN;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:12.0pt;
	font-family:SimSun;
	mso-fareast-language:ZH-CN;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	mso-fareast-language:ZH-CN;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:SimSun;
	mso-fareast-language:ZH-CN;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	mso-fareast-language:ZH-CN;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:459230403;
	mso-list-type:hybrid;
	mso-list-template-ids:-1366498370 881372110 67698691 67698693 67698689 676=
98691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:Calibri;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l1
	{mso-list-id:1261256640;
	mso-list-type:hybrid;
	mso-list-template-ids:-1712847686 -1568239464 67698691 67698693 67698689 6=
7698691 67698693 67698689 67698691 67698693;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:Calibri;}
@list l1:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l1:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l1:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l1:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l1:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l1:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l1:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l1:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hi all,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Thank you for all the dis=
cussions.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I have submitted -07 vers=
ion with the following changes:<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo3"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso=
-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Complete removal =
of section 4.6 about DNS search list option handling. This topic clearly is=
 something that is too big for this draft to cover and
 also seems to be mostly out of the scope of this draft. If there some day =
will be a new draft that addresses various issues with DNS search lists, it=
 might also discuss the issues related to MIF<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo3"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso=
-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Security addition=
s, namely the following two additions:<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:72.0pt;text-indent:-18.0=
pt;mso-list:l0 level2 lfo3">
<![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&quot;Cour=
ier New&quot;;color:#1F497D"><span style=3D"mso-list:Ignore">o<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">=A1=B0In some occ=
asions an interface may be considered trusted only if explicitly configured=
 to be trusted.=A1=B1<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:72.0pt;text-indent:-18.0=
pt;mso-list:l0 level2 lfo3">
<![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&quot;Cour=
ier New&quot;;color:#1F497D"><span style=3D"mso-list:Ignore">o<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">=A1=B0An implemen=
tation may not be able to determine trust levels without explicit configura=
tion provided by user or administrator.&nbsp; Therefore, for example,
 an implementation may not by default trust configuration received even ove=
r VPN interfaces.=A1=B1<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo3"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso=
-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">DHCPv4 option str=
ucture clarification:<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:72.0pt;text-indent:-18.0=
pt;mso-list:l0 level2 lfo3">
<![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&quot;Cour=
ier New&quot;;color:#1F497D"><span style=3D"mso-list:Ignore">o<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Possibility to ha=
ve multiple options that are concatenated as described in RFC3396<o:p></o:p=
></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:72.0pt;text-indent:-18.0=
pt;mso-list:l0 level2 lfo3">
<![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&quot;Cour=
ier New&quot;;color:#1F497D"><span style=3D"mso-list:Ignore">o<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Removal of =A1=B0=
payload len=A1=B1 field<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I now think that after th=
ese improvements this is even more ready to go towards IESG</span><span sty=
le=3D"font-size:11.0pt;font-family:Wingdings;color:#1F497D">J</span><span s=
tyle=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I-D itself: http://www.ie=
tf.org/id/draft-ietf-mif-dns-server-selection-07.txt<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Diff to -06:&nbsp; http:/=
/tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-mif-dns-server-selection-07<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regards,<o:p></o:p><=
/span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Teemu<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> dhcwg-bo=
unces@ietf.org [mailto:dhcwg-bounces@ietf.org]
<b>On Behalf Of </b>Savolainen Teemu (Nokia-CTO/Tampere)<br>
<b>Sent:</b> 19. lokakuuta 2011 09:43<br>
<b>To:</b> denghui02@hotmail.com; mif@ietf.org; dnsext@ietf.org; dnsop@ietf=
.org; dhcwg@ietf.org<br>
<b>Cc:</b> sa.morris7@googlemail.com; pk@isoc.de<br>
<b>Subject:</b> Re: [dhcwg] [mif] 2nd Last Call for MIF DNS server selectio=
n document<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hi all,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">This second WGLC resulted=
 in very few comments. In the DHC WG we discussed about DHCPv4 option struc=
ture and in MIF there was a comment about document-internal
 reference bug.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I have now uploaded a ver=
sion six that contains:<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l1 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso=
-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Fixes to the DHCP=
v4 option structure<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l1 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso=
-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Highlighting stri=
cter length limitation in case of DHCPv4 option<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l1 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso=
-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Fix to the refere=
nce bug<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l1 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso=
-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Small fixes to mi=
ssing DHCPv4 considerations in sections 4.5 and 4.6.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Please see diff:
<a href=3D"http://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-mif-dns-server-s=
election-06">
http://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-mif-dns-server-selection-06=
</a><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">If no further comments, I=
 think this document is ready to go to the IESG.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Thank you,<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Teemu<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:mif-bounces@ietf.org">mif-bounces@ietf.org</a> <a href=3D=
"mailto:[mailto:mif-bounces@ietf.org]">
[mailto:mif-bounces@ietf.org]</a> <b>On Behalf Of </b>ext Hui Deng<br>
<b>Sent:</b> 30. syyskuuta 2011 18:29<br>
<b>To:</b> <a href=3D"mailto:mif@ietf.org">mif@ietf.org</a>; <a href=3D"mai=
lto:dnsext@ietf.org">
dnsext@ietf.org</a>; <a href=3D"mailto:dnsop@ietf.org">dnsop@ietf.org</a>; =
<a href=3D"mailto:dhcwg@ietf.org">
dhcwg@ietf.org</a><br>
<b>Cc:</b> <a href=3D"mailto:pk@isoc.de">pk@isoc.de</a>; <a href=3D"mailto:=
john_brzozowski@cable.comcast.com">
john_brzozowski@cable.comcast.com</a>; <a href=3D"mailto:sa.morris7@googlem=
ail.com">
sa.morris7@googlemail.com</a><br>
<b>Subject:</b> [mif] 2nd Last Call for MIF DNS server selection document<o=
:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">Dear all<=
br>
&nbsp;<br>
Based on 1st round WG LC, the authors have received significant advice abou=
t revision and submited a new version accordingly:<br>
<a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-mif-dns-server-se=
lection-05.txt">http://www.ietf.org/internet-drafts/draft-ietf-mif-dns-serv=
er-selection-05.txt</a><br>
&nbsp;<br>
And&nbsp;we plan to issue a second round WG LC, and cc to DHCWG, DNSEXT, DN=
SOP related working groups, please DNSEXT/DNSOP chairs help to forward to t=
he MLs since I may not subscribe to them.<br>
&nbsp;<br>
This is a 2 weeks with little extension&nbsp;LC, it will finish on&nbsp;Oct=
ober 17,<br>
Please send substantive review and editorial comments to <a href=3D"mailto:=
mif@ietf.org">
mif@ietf.org</a><br>
&nbsp;<br>
Thanks a lot for youre view<br>
Best regards,<br>
&nbsp;<br>
Margaret and Hui<br>
&nbsp;<br>
&nbsp;<br>
&nbsp;<br>
Below are Teemu's writeup about&nbsp;the revision:<br>
&nbsp;<br>
I uploaded -05 update so that next comments would take into account changes=
<br>
I already did based on discussions with Murray (as was copied to this list)=
.<br>
The biggest clarifications related to how DNS queries are sent to different=
<br>
servers and when all servers are waited for answers (if reply is not<br>
validated) and when not. I.e. this text:<br>
--<br>
&nbsp; A node SHALL send requests to DNS servers in the order defined by th=
e<br>
&nbsp; priority list until an acceptable reply is received, all replies are=
<br>
&nbsp; received, or a time out occurs.&nbsp; In the case of a requested nam=
e<br>
&nbsp; matching to a specific domain or network rule accepted from any<br>
&nbsp; interface, a DNSSEC-aware resolver MUST NOT proceed with a reply tha=
t<br>
&nbsp; cannot be validated using DNSSEC until all DNS servers on the<br>
&nbsp; priority list have been contacted or timed out.&nbsp; This protects<=
br>
&nbsp; against possible redirection attacks.&nbsp; In the case of the reque=
sted<br>
&nbsp; name not matching to any specific domain or network, first received<=
br>
&nbsp; response from any DNS server MAY be considered acceptable.&nbsp; A D=
NSSEC-<br>
&nbsp; aware node MAY always contact all DNS server in an attempt to receiv=
e<br>
&nbsp; a response that can be validated, but contacting all DNS servers is<=
br>
&nbsp; not mandated for the default case as in some deployments that would<=
br>
&nbsp; consume excess resources.<br>
--<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Teemu<br>
&gt; -----Original Message-----<br>
&gt; From: <a href=3D"mailto:mif-bounces@ietf.org">mif-bounces@ietf.org</a>=
 <a href=3D"mailto:[mailto:mif-bounces@ietf.org]">
[mailto:mif-bounces@ietf.org]</a> On Behalf Of<br>
&gt; ext <a href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.o=
rg</a><br>
&gt; Sent: 20. syyskuuta 2011 22:10<br>
&gt; To: <a href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>=
<br>
&gt; Cc: <a href=3D"mailto:mif@ietf.org">mif@ietf.org</a><br>
&gt; Subject: [mif] I-D Action: draft-ietf-mif-dns-server-selection-05.txt<=
br>
- </span><span lang=3D"ZH-CN" style=3D"font-size:10.0pt">=CF=D4=CA=BE=D2=FD=
=D3=C3=CE=C4=D7=D6</span><span style=3D"font-size:10.0pt;font-family:&quot;=
Tahoma&quot;,&quot;sans-serif&quot;"> -<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts<br>
directories.<br>
&gt; This draft is a work item of the Multiple Interfaces Working Group of =
the<br>
&gt; IETF.<br>
&gt;<br>
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Title&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Improved DNS Server Selection for Multi-I=
nterfaced<br>
&gt; Nodes<br>
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Author(s)&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp; : Teemu Savolainen<br>
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; Jun-ya Kato<br>
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; Ted Lemon<br>
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Filename&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp; : draft-ietf-mif-dns-server-selection-0 5.txt<br>
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Pages&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 26<br>
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Date&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 2011-09-20<br>
&gt;<br>
&gt;&nbsp;&nbsp;&nbsp; A multi-interfaced node is connected to multiple net=
works, some of<br>
&gt;&nbsp;&nbsp;&nbsp; which may be utilizing private DNS namespaces.&nbsp;=
 A node commonly<br>
&gt;&nbsp;&nbsp;&nbsp; receives DNS server configuration information from a=
ll connected<br>
&gt;&nbsp;&nbsp;&nbsp; networks.&nbsp; Some of the DNS servers may have inf=
ormation about<br>
&gt;&nbsp;&nbsp;&nbsp; namespaces other servers do not have.&nbsp; When a m=
ulti-interfaced node<br>
&gt;&nbsp;&nbsp;&nbsp; needs to utilize DNS, the node has to choose which o=
f the servers to<br>
&gt;&nbsp;&nbsp;&nbsp; contact to.&nbsp; This document describes DHCPv4 and=
 DHCPv6 option that<br>
&gt;&nbsp;&nbsp;&nbsp; can be used to configure nodes with inform ation req=
uired to perform<br>
&gt;&nbsp;&nbsp;&nbsp; informed DNS server selection decisions.<br>
&gt;<br>
&gt;<br>
&gt; A URL for this Internet-Draft is:<br>
&gt; <a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-mif-dns-serv=
er-selection-05.txt">
http://www.ietf.org/internet-drafts/draft-ietf-mif-dns-server-selection-05.=
txt</a><o:p></o:p></span></p>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_916CE6CF87173740BC8A2CE44309696203787DCE008AM1MPN1037mg_--

From anicoll@cert.org  Thu Oct 27 08:18:45 2011
Return-Path: <anicoll@cert.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB4E221F8B57 for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 08:18:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nEsPaBrUPdJX for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 08:18:44 -0700 (PDT)
Received: from shetland.sei.cmu.edu (shetland.sei.cmu.edu [192.58.107.44]) by ietfa.amsl.com (Postfix) with ESMTP id 5DAE021F8B58 for <dnsext@ietf.org>; Thu, 27 Oct 2011 08:18:44 -0700 (PDT)
Received: from pawpaw.sei.cmu.edu (pawpaw.sei.cmu.edu [10.64.21.22]) by shetland.sei.cmu.edu (8.14.4/8.14.4/1294) with ESMTP id p9RFIh34009818 for <dnsext@ietf.org>; Thu, 27 Oct 2011 11:18:43 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cert.org; s=jthatj15xw2j; t=1319728723; bh=7T0U0sBl/DD8uTaG6OR/AKSqKHiZotIGC4c7s6/A4EY=; h=From:To:Date:Subject:Message-ID:Content-Type:MIME-Version:Sender: Reply-To:Cc:In-Reply-To:References; b=myeleQCQd0N96xiWbRLMi5Z10n3nlJ6mhyhvV9yRCE7L5uIQrI7hRLW2bJozL+kDB SCRBaxGuygkZHMOYpchaV4DMK7+kuEstgpySnihC6QxD/O6Ck9a9+C0J/vfVDGTKl+ HZOeS0/MnDmZiuy6L8F1w6Ki9/QNpaPsNt2gQCXU=
Received: from owa.sei.cmu.edu (vader.sei.cmu.edu [10.64.28.14]) by pawpaw.sei.cmu.edu (8.14.4/8.14.4/1348) with ESMTP id p9RFIh2k024036 for <dnsext@ietf.org>; Thu, 27 Oct 2011 11:18:43 -0400
Received: from EXCHANGE.sei.cmu.edu ([10.64.28.13]) by vader.sei.cmu.edu ([10.64.28.14]) with mapi; Thu, 27 Oct 2011 11:18:42 -0400
From: Alex Nicoll <anicoll@cert.org>
To: "dnsext@ietf.org" <dnsext@ietf.org>
Date: Thu, 27 Oct 2011 11:18:41 -0400
Thread-Topic: RFC 4408 question
Thread-Index: AcyUu7Xx1bBIRY9oQd6iCBnAx9fqPQ==
Message-ID: <A32A045574615B4FAB96C4952BA5768BB78866EC28@EXCHANGE.sei.cmu.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_A32A045574615B4FAB96C4952BA5768BB78866EC28EXCHANGEseicm_"
MIME-Version: 1.0
Subject: [dnsext] RFC 4408 question
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Oct 2011 15:18:46 -0000

--_000_A32A045574615B4FAB96C4952BA5768BB78866EC28EXCHANGEseicm_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Folks -

I was trying to ensure my parser for SPF records was up to snuff, when I re=
alized that it doesn't parse tabs as white space, and some folks are using =
tabs as white spaces.  I wasn't sure if that was part of the spec or not, s=
o I went back to RFC 4408 and checked.  The RFC specifies (section 7) that =
e-mail header information should use folding white space as per RFC2822, bu=
t it does not specify that for TXT/SPF records.  All other references in th=
e document only refer to "spaces".

So - Is there a n RFC out there that specifies what a valid "white-space" c=
haracter is for SPF?  Should I just use RFC 2822's FWS?  Is there an IETF d=
ocument which explains that "white space" =3D=3D=3D "Ascii 0x09, 0x20, ....=
."?

Thanks in advance for putting up with my noob-ish-ness!

-Alex

Alex Nicoll
Senior Cybersecurity Analyst
CERT
Carnegie Mellon University/Software Engineering Institute
anicoll@cert.org<mailto:anicoll@cert.org>
(412)268-9205 (USA)

"Due to the current economic crisis, the Academic Advisory Council has modi=
fied the current exchange rate of pictures to words.  As of October 1st, 20=
11, a picture is now worth only 396 words.  Please adjust your software acc=
ordingly."


--_000_A32A045574615B4FAB96C4952BA5768BB78866EC28EXCHANGEseicm_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 12 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>Folks &#8211; <o=
:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal=
>I was trying to ensure my parser for SPF records was up to snuff, when I r=
ealized that it doesn&#8217;t parse tabs as white space, and some folks are=
 using tabs as white spaces.&nbsp; I wasn&#8217;t sure if that was part of =
the spec or not, so I went back to RFC 4408 and checked.&nbsp; The RFC spec=
ifies (section 7) that e-mail header information should use folding white s=
pace as per RFC2822, but it does not specify that for TXT/SPF records.&nbsp=
; All other references in the document only refer to &#8220;spaces&#8221;.&=
nbsp; <o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DM=
soNormal>So &#8211; Is there a n RFC out there that specifies what a valid =
&#8220;white-space&#8221; character is for SPF?&nbsp; Should I just use RFC=
 2822&#8217;s FWS?&nbsp; Is there an IETF document which explains that &#82=
20;white space&#8221; =3D=3D=3D &#8220;Ascii 0x09, 0x20, &#8230;..&#8221;?<=
o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNorma=
l>Thanks in advance for putting up with my noob-ish-ness!<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>-Alex<o:p></o:p=
></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Alex Ni=
coll<o:p></o:p></p><p class=3DMsoNormal>Senior Cybersecurity Analyst <o:p><=
/o:p></p><p class=3DMsoNormal>CERT<o:p></o:p></p><p class=3DMsoNormal>Carne=
gie Mellon University/Software Engineering Institute<o:p></o:p></p><p class=
=3DMsoNormal><a href=3D"mailto:anicoll@cert.org">anicoll@cert.org</a><o:p><=
/o:p></p><p class=3DMsoNormal>(412)268-9205 (USA)<o:p></o:p></p><p class=3D=
MsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>&quot;Due to the curren=
t economic crisis, the Academic Advisory Council has modified the current e=
xchange rate of pictures to words.&nbsp; As of October 1st, 2011, a picture=
 is now worth only 396 words.&nbsp; Please adjust your software accordingly=
.&quot; <o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></bo=
dy></html>=

--_000_A32A045574615B4FAB96C4952BA5768BB78866EC28EXCHANGEseicm_--

From paul.hoffman@vpnc.org  Thu Oct 27 08:26:16 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE95721F8496 for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 08:26:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.578
X-Spam-Level: 
X-Spam-Status: No, score=-102.578 tagged_above=-999 required=5 tests=[AWL=0.021, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WObGAy5Z7Rzt for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 08:26:16 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 4C69D21F8464 for <dnsext@ietf.org>; Thu, 27 Oct 2011 08:26:07 -0700 (PDT)
Received: from [10.20.30.103] (50-0-66-4.dsl.dynamic.fusionbroadband.com [50.0.66.4]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p9RFQ3i7019718 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 27 Oct 2011 08:26:04 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=us-ascii
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <A32A045574615B4FAB96C4952BA5768BB78866EC28@EXCHANGE.sei.cmu.edu>
Date: Thu, 27 Oct 2011 08:26:03 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <CB0E2C24-5389-46A2-81C7-C52FFD544036@vpnc.org>
References: <A32A045574615B4FAB96C4952BA5768BB78866EC28@EXCHANGE.sei.cmu.edu>
To: Alex Nicoll <anicoll@cert.org>
X-Mailer: Apple Mail (2.1251.1)
Cc: "dnsext@ietf.org" <dnsext@ietf.org>
Subject: Re: [dnsext] RFC 4408 question
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Oct 2011 15:26:16 -0000

I strongly suspect you want to be sending this to the DKIM WG mailing =
list, not the DNSEXT WG mailing list. DNS doesn't care about this.

--Paul Hoffman=

From anicoll@cert.org  Thu Oct 27 08:39:57 2011
Return-Path: <anicoll@cert.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA9B321F8B85 for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 08:39:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[AWL=0.001,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rCP5wycm2slW for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 08:39:56 -0700 (PDT)
Received: from plainfield.sei.cmu.edu (plainfield.sei.cmu.edu [192.58.107.45]) by ietfa.amsl.com (Postfix) with ESMTP id 6E53721F8AB8 for <dnsext@ietf.org>; Thu, 27 Oct 2011 08:39:56 -0700 (PDT)
Received: from pawpaw.sei.cmu.edu (pawpaw.sei.cmu.edu [10.64.21.22]) by plainfield.sei.cmu.edu (8.14.4/8.14.4/1294) with ESMTP id p9RFdolI001363; Thu, 27 Oct 2011 11:39:50 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cert.org; s=jthatj15xw2j; t=1319729990; bh=Q1phWDOa4i/4b5+U/q7nCjVNwxWI0NlwjlxxXb200Nw=; h=From:To:CC:Date:Subject:Message-ID:References:In-Reply-To: Content-Type:Content-Transfer-Encoding:MIME-Version:Sender: Reply-To; b=DJ9vGGdPP5gEOoHZQCkPUygF9mtj0kUpbf9IrPJThGspJtRswW/daijm5GCX81ObG wnA6DhmpqPWMpK0GEKNjHDy+NhF4HhV3QbVf7nene43yUbh5VyIiZL29GDgySdA+ks o6msTvsV8nL1gGDMOxLe1gHRQcKoNkq/0l/IYiXY=
Received: from owa.sei.cmu.edu (vader.sei.cmu.edu [10.64.28.14]) by pawpaw.sei.cmu.edu (8.14.4/8.14.4/1348) with ESMTP id p9RFdnP0025906; Thu, 27 Oct 2011 11:39:49 -0400
Received: from EXCHANGE.sei.cmu.edu ([10.64.28.13]) by vader.sei.cmu.edu ([10.64.28.14]) with mapi; Thu, 27 Oct 2011 11:39:49 -0400
From: Alex Nicoll <anicoll@cert.org>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Date: Thu, 27 Oct 2011 11:39:48 -0400
Thread-Topic: [dnsext] RFC 4408 question
Thread-Index: AcyUvL/yrUCaRV2cR4GPbrECFGrscwAAYLwQ
Message-ID: <A32A045574615B4FAB96C4952BA5768BB78866ECFC@EXCHANGE.sei.cmu.edu>
References: <A32A045574615B4FAB96C4952BA5768BB78866EC28@EXCHANGE.sei.cmu.edu> <CB0E2C24-5389-46A2-81C7-C52FFD544036@vpnc.org>
In-Reply-To: <CB0E2C24-5389-46A2-81C7-C52FFD544036@vpnc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "dnsext@ietf.org" <dnsext@ietf.org>
Subject: Re: [dnsext] RFC 4408 question
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Oct 2011 15:39:58 -0000

Paul -=20

I apologize if the post is off topic, though after your note I checked out =
the DKIM list.  I honestly don't think they'd care either, as they're more =
concerned with making sure DKIM gets off the ground than fixing a slightly =
competing standard.  I couldn't find a ietf-spf list, and yet again I canno=
t reach openspf.org for some odd reason.  Do you know of another, more rele=
vant place to post?  DNSOP?

-Alex=20

-----Original Message-----
From: Paul Hoffman [mailto:paul.hoffman@vpnc.org]=20
Sent: Thursday, October 27, 2011 11:26 AM
To: Alex Nicoll
Cc: dnsext@ietf.org
Subject: Re: [dnsext] RFC 4408 question

I strongly suspect you want to be sending this to the DKIM WG mailing list,=
 not the DNSEXT WG mailing list. DNS doesn't care about this.

--Paul Hoffman

From drc@virtualized.org  Thu Oct 27 08:57:28 2011
Return-Path: <drc@virtualized.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A4A3421F8BD3 for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 08:57:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gDPkvCCg54AG for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 08:57:28 -0700 (PDT)
Received: from trantor.virtualized.org (trantor.virtualized.org [IPv6:2607:fc50:1000:9700::dead:beef]) by ietfa.amsl.com (Postfix) with ESMTP id 4A0BF21F8ACE for <dnsext@ietf.org>; Thu, 27 Oct 2011 08:57:28 -0700 (PDT)
Received: from [192.168.2.147] (unknown [173.245.57.22]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: drc) by trantor.virtualized.org (Postfix) with ESMTPSA id C020E1704E; Thu, 27 Oct 2011 15:57:26 +0000 (UTC)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=us-ascii
From: David Conrad <drc@virtualized.org>
In-Reply-To: <CB0E2C24-5389-46A2-81C7-C52FFD544036@vpnc.org>
Date: Thu, 27 Oct 2011 08:57:24 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <33C052A1-2C95-42B7-A547-2160C566D1CB@virtualized.org>
References: <A32A045574615B4FAB96C4952BA5768BB78866EC28@EXCHANGE.sei.cmu.edu> <CB0E2C24-5389-46A2-81C7-C52FFD544036@vpnc.org>
To: Paul Hoffman <paul.hoffman@vpnc.org>
X-Mailer: Apple Mail (2.1251.1)
Cc: "dnsext@ietf.org" <dnsext@ietf.org>
Subject: Re: [dnsext] RFC 4408 question
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Oct 2011 15:57:28 -0000

Hmm.  I suspect whether the DNS cares about the syntax of RDATA depends =
on what you consider the DNS.

However, to answer Alex's question, in this particular case I suspect =
the "be liberal in what you accept" recommendation would be applicable: =
since tab is generally considered to be in the set of "white space" and =
its use is unlikely to break anything, I would imagine accepting it =
would be the most interoperable choice.

Regards,
-drc

On Oct 27, 2011, at 8:26 AM, Paul Hoffman wrote:

> I strongly suspect you want to be sending this to the DKIM WG mailing =
list, not the DNSEXT WG mailing list. DNS doesn't care about this.
>=20
> --Paul Hoffman
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext


From paul.hoffman@vpnc.org  Thu Oct 27 08:59:31 2011
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E098E21F8C41 for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 08:59:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.579
X-Spam-Level: 
X-Spam-Status: No, score=-102.579 tagged_above=-999 required=5 tests=[AWL=0.020, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1v9Xm4vJ5CyP for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 08:59:31 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 5DD2421F8C40 for <dnsext@ietf.org>; Thu, 27 Oct 2011 08:59:31 -0700 (PDT)
Received: from [10.20.30.103] (50-0-66-4.dsl.dynamic.fusionbroadband.com [50.0.66.4]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id p9RFxSk0021399 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 27 Oct 2011 08:59:28 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1251.1)
Content-Type: text/plain; charset=us-ascii
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <A32A045574615B4FAB96C4952BA5768BB78866ECFC@EXCHANGE.sei.cmu.edu>
Date: Thu, 27 Oct 2011 08:59:27 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <7A179248-10A0-4A2E-9FA7-188E03B68DBA@vpnc.org>
References: <A32A045574615B4FAB96C4952BA5768BB78866EC28@EXCHANGE.sei.cmu.edu> <CB0E2C24-5389-46A2-81C7-C52FFD544036@vpnc.org> <A32A045574615B4FAB96C4952BA5768BB78866ECFC@EXCHANGE.sei.cmu.edu>
To: Alex Nicoll <anicoll@cert.org>
X-Mailer: Apple Mail (2.1251.1)
Cc: "dnsext@ietf.org" <dnsext@ietf.org>
Subject: Re: [dnsext] RFC 4408 question
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Oct 2011 15:59:32 -0000

On Oct 27, 2011, at 8:39 AM, Alex Nicoll wrote:

> I apologize if the post is off topic, though after your note I checked =
out the DKIM list.  I honestly don't think they'd care either, as =
they're more concerned with making sure DKIM gets off the ground than =
fixing a slightly competing standard.

However, most of the SPF folks are still active on, or at least =
following, the DKIM work.

>  I couldn't find a ietf-spf list, and yet again I cannot reach =
openspf.org for some odd reason.  Do you know of another, more relevant =
place to post?  DNSOP?

Hopefully DNSOP also doesn't care about the internals of such an RRtype. =
Try the DKIM folks and, if you get silence, you can always ask the =
authors of RFC 4408.

--Paul Hoffman


From ogud@ogud.com  Thu Oct 27 09:54:08 2011
Return-Path: <ogud@ogud.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6965A21F8B57 for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 09:54:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0r3obGcAvn6S for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 09:54:08 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by ietfa.amsl.com (Postfix) with ESMTP id B787221F8AD8 for <dnsext@ietf.org>; Thu, 27 Oct 2011 09:54:07 -0700 (PDT)
Received: from [IPv6:::1] (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p9RGs6ig050841 for <dnsext@ietf.org>; Thu, 27 Oct 2011 12:54:06 -0400 (EDT) (envelope-from ogud@ogud.com)
Message-ID: <4EA98CA8.8050507@ogud.com>
Date: Thu, 27 Oct 2011 12:54:00 -0400
From: Olafur Gudmundsson <ogud@ogud.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: dnsext@ietf.org
References: <A32A045574615B4FAB96C4952BA5768BB78866EC28@EXCHANGE.sei.cmu.edu>
In-Reply-To: <A32A045574615B4FAB96C4952BA5768BB78866EC28@EXCHANGE.sei.cmu.edu>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
X-Scanned-By: MIMEDefang 2.72 on 10.20.30.4
Subject: Re: [dnsext] RFC 4408 question
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Oct 2011 16:54:08 -0000

On 10/27/2011 11:18 AM, Alex Nicoll wrote:
> Folks –
>
> I was trying to ensure my parser for SPF records was up to snuff, when I
> realized that it doesn’t parse tabs as white space, and some folks are
> using tabs as white spaces. I wasn’t sure if that was part of the spec
> or not, so I went back to RFC 4408 and checked. The RFC specifies
> (section 7) that e-mail header information should use folding white
> space as per RFC2822, but it does not specify that for TXT/SPF records.
> All other references in the document only refer to “spaces”.

This is an real interesting question in particular if we consider it in 
the wider context of what is a "white space" in a Text-like DNS record.

>
> So – Is there a n RFC out there that specifies what a valid
> “white-space” character is for SPF? Should I just use RFC 2822’s FWS? Is
> there an IETF document which explains that “white space” === “Ascii
> 0x09, 0x20, …..”?

I do not think that FWS is the right definition in the DNS context,
as I worry what will happen to various implementation if someone
wants to use CR/LF as a separator in SPF or TXT record :-)

As David Conrad says implementations should be able to deal with both as 
separators thus, feel free to file an errata on RFC4408 clarifying that 
"space" and "tab" are both valid separators, and nothing else.

>
> Thanks in advance for putting up with my noob-ish-ness!
>

Again an excellent question that was too oblivious for anyone to have 
the guts to ask.

> -Alex
>
> Alex Nicoll
>

	Olafur

From johnl@iecc.com  Thu Oct 27 15:11:48 2011
Return-Path: <johnl@iecc.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 222B41F0C56 for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 15:11:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.332
X-Spam-Level: 
X-Spam-Status: No, score=-110.332 tagged_above=-999 required=5 tests=[AWL=0.867, BAYES_00=-2.599, HABEAS_ACCREDITED_SOI=-4.3, RCVD_IN_BSP_TRUSTED=-4.3, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0i55T-Ixxx-D for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 15:11:47 -0700 (PDT)
Received: from leila.iecc.com (leila6.iecc.com [IPv6:2001:470:1f07:1126:0:4c:6569:6c61]) by ietfa.amsl.com (Postfix) with ESMTP id 6A7101F0C41 for <dnsext@ietf.org>; Thu, 27 Oct 2011 15:11:37 -0700 (PDT)
Received: (qmail 92257 invoked from network); 27 Oct 2011 22:11:36 -0000
Received: from gal.iecc.com (64.57.183.53) by mail2.iecc.com with SMTP; 27 Oct 2011 22:11:36 -0000
Received: (qmail 59870 invoked from network); 27 Oct 2011 22:11:36 -0000
Received: from leila.iecc.com (64.57.183.34) by mail1.iecc.com with QMQP; 27 Oct 2011 22:11:36 -0000
Date: 27 Oct 2011 22:11:14 -0000
Message-ID: <20111027221114.96972.qmail@joyce.lan>
From: "John Levine" <johnl@iecc.com>
To: dnsext@ietf.org
In-Reply-To: <CB0E2C24-5389-46A2-81C7-C52FFD544036@vpnc.org>
Organization: 
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 7bit
Cc: paul.hoffman@vpnc.org
Subject: Re: [dnsext] RFC 4408 question
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Oct 2011 22:11:48 -0000

> I strongly suspect you want to be sending this to the DKIM WG
> mailing list, not the DNSEXT WG mailing list.  DNS doesn't care
> about this.

I wouldn't do that, unless you want snarky responses pointing out that
DKIM is not SPF.

Both of the authors of RFC 4408 are still around.  Is there some reason
not to write to them and ask?

I don't ever recall seeing a tab in an SPF record, but I also can't
think of any reason not to treat tabs the same as spaces.

R's,
John

From sm@resistor.net  Thu Oct 27 19:46:51 2011
Return-Path: <sm@resistor.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB0141F0C43 for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 19:46:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.531
X-Spam-Level: 
X-Spam-Status: No, score=-102.531 tagged_above=-999 required=5 tests=[AWL=0.068, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eSmVhYCtR7Us for <dnsext@ietfa.amsl.com>; Thu, 27 Oct 2011 19:46:50 -0700 (PDT)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id D23C21F0C42 for <dnsext@ietf.org>; Thu, 27 Oct 2011 19:46:50 -0700 (PDT)
Received: from SUBMAN.resistor.net (IDENT:sm@localhost [127.0.0.1]) by mx.elandsys.com (8.14.4/8.14.5) with ESMTP id p9S2kSGa018329; Thu, 27 Oct 2011 19:46:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1319769999; bh=vwoDEG5QHxaZqZLklVBwbLlGA5Arv9H7GDIROb6alr0=; h=Message-Id:Date:To:From:Subject:Cc:In-Reply-To:References: Mime-Version:Content-Type; b=GbYk8SPi6Ri0POcy2b73EHL5ZOpxLkA3Z5AOKa/lD8NixPu/Uj6/wkx5gLBtzNPyh Wz0OaSI/EpN47UKgMggNCWtNWem8CFaCdzdENiX4Dtx+sfniAI3o12roUKNaUxlpx2 ouWOFoXrEGmt6P4SJu6CedyOlRNjiPlhqhWlS6Ss=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=resistor.net; s=mail; t=1319769999; bh=vwoDEG5QHxaZqZLklVBwbLlGA5Arv9H7GDIROb6alr0=; h=Message-Id:Date:To:From:Subject:Cc:In-Reply-To:References: Mime-Version:Content-Type; b=GkJszp3tdgiRvUIEuDTlyDwrS07M92F2J4SUg3QaISRSWrOaK2YDVWnPKwbxuLujV PTs+8Y5GEwhznV7pKFLbtU8Tgz1kLtPRPaSJbrvRjxCKYr3g0zWehROGwe3eRDv54n VO1VeSpWrn+Uc7hvd24L2D4dBmypEDQJlLNxNMFo=
Message-Id: <6.2.5.6.2.20111027192349.0b5bcda8@resistor.net>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Thu, 27 Oct 2011 19:45:59 -0700
To: Alex Nicoll <anicoll@cert.org>
From: SM <sm@resistor.net>
In-Reply-To: <A32A045574615B4FAB96C4952BA5768BB78866ECFC@EXCHANGE.sei.cm u.edu>
References: <A32A045574615B4FAB96C4952BA5768BB78866EC28@EXCHANGE.sei.cmu.edu> <CB0E2C24-5389-46A2-81C7-C52FFD544036@vpnc.org> <A32A045574615B4FAB96C4952BA5768BB78866ECFC@EXCHANGE.sei.cmu.edu>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Cc: dnsext@ietf.org
Subject: Re: [dnsext] RFC 4408 question
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Oct 2011 02:46:52 -0000

Hi Alex,
At 08:39 27-10-2011, Alex Nicoll wrote:
>I apologize if the post is off topic, though after your note I 
>checked out the DKIM list.  I honestly don't think they'd care 
>either, as they're more concerned with making

I don't think that it would be relevant as it has nothing to do with DKIM.

>  sure DKIM gets off the ground than fixing a slightly competing 
> standard.  I couldn't find a ietf-spf list, and yet again I cannot 
> reach openspf.org for some odd reason.  Do you know of another, 
> more relevant place to post?  DNSOP?

It's more of a RFC 4408 question.  DNSOP might not consider it as on topic.

The question seems to be about the term evaluation which uses ANBF 
(RFC 4234 in this case).  As it is about ABNF, you can try 
apps-discuss.  There are also a few people on the list that may help 
with RFC 4408 questions.

Regards,
-sm 


From sm@resistor.net  Fri Oct 28 00:21:51 2011
Return-Path: <sm@resistor.net>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BE7521F8B5D for <dnsext@ietfa.amsl.com>; Fri, 28 Oct 2011 00:21:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.537
X-Spam-Level: 
X-Spam-Status: No, score=-102.537 tagged_above=-999 required=5 tests=[AWL=0.062, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cHqq4JouuZS2 for <dnsext@ietfa.amsl.com>; Fri, 28 Oct 2011 00:21:49 -0700 (PDT)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CC5C21F8B5E for <dnsext@ietf.org>; Fri, 28 Oct 2011 00:21:48 -0700 (PDT)
Received: from SUBMAN.resistor.net (IDENT:sm@localhost [127.0.0.1]) by mx.elandsys.com (8.14.4/8.14.5) with ESMTP id p9S7Le2e005398; Fri, 28 Oct 2011 00:21:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1319786506; bh=rMzzAyv1e2q/bZWyvBi7PX3MsP/cHNYYh+Cxy3+YVFk=; h=Message-Id:Date:To:From:Subject:Cc:In-Reply-To:References: Mime-Version:Content-Type; b=iU2hEjhTGsVl/8FF7nc3WuzeL8/suB/tHTZB0qbiGs9v7AgUlLRbcSqQ23WWOZ++z /2xjFEEmp0leDCydDoRXD+8/Z5x2ch2KZnxtUN16Dn96ZMsJ91pFpLiIvVKjeZDP6b CbEQ3b9PWY8fmigLazglztpJH7Z8X6cCdtY48mXs=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=resistor.net; s=mail; t=1319786506; bh=rMzzAyv1e2q/bZWyvBi7PX3MsP/cHNYYh+Cxy3+YVFk=; h=Message-Id:Date:To:From:Subject:Cc:In-Reply-To:References: Mime-Version:Content-Type; b=QkFFxbjQ/1rvj1eUbK4++2kdjDtD02b1fWFRQV5A6T5vBWpLX8+eQlVxzuIJaCSwO hjFSQ/IiLgbqWav3yiucU8Dq6sm64CYoGcNcDxCsVbPA38ERr1wv4ZRpBJgGwlSnET HtKU1hvH5OOtwpS3kUa1gojdZ1gFrPOThevWZBWw=
Message-Id: <6.2.5.6.2.20111027234152.0652a2c8@resistor.net>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Thu, 27 Oct 2011 23:52:36 -0700
To: Olafur Gudmundsson <ogud@ogud.com>
From: SM <sm@resistor.net>
In-Reply-To: <4EA98CA8.8050507@ogud.com>
References: <A32A045574615B4FAB96C4952BA5768BB78866EC28@EXCHANGE.sei.cmu.edu> <4EA98CA8.8050507@ogud.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Cc: dnsext@ietf.org
Subject: [dnsext] DNS TXT record (was: RFC 4408 question)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Oct 2011 07:21:51 -0000

Hi Olafur,
At 09:54 27-10-2011, Olafur Gudmundsson wrote:
>I do not think that FWS is the right definition in the DNS context,
>as I worry what will happen to various implementation if someone
>wants to use CR/LF as a separator in SPF or TXT record :-)

On a tangent, CVE-2002-0906 and CVE-2008-2469 might be a of interest 
as a security consideration for some specifications using DNS TXT records.

Regards,
-sm 

