Re: [DNSOP] Mirja Kühlewind's No Objection on draft-ietf-dnsop-dnssec-roadblock-avoidance-04: (with COMMENT)

"Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net> Sat, 09 July 2016 13:16 UTC

Return-Path: <ietf@kuehlewind.net>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6506912B047 for <dnsop@ietfa.amsl.com>; Sat, 9 Jul 2016 06:16:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.328
X-Spam-Level:
X-Spam-Status: No, score=-3.328 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.426, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ODLU4chYcxNl for <dnsop@ietfa.amsl.com>; Sat, 9 Jul 2016 06:16:22 -0700 (PDT)
Received: from kuehlewind.net (kuehlewind.net [83.169.45.111]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 292EF12B044 for <dnsop@ietf.org>; Sat, 9 Jul 2016 06:16:21 -0700 (PDT)
Received: (qmail 23906 invoked from network); 9 Jul 2016 15:16:19 +0200
Received: from p5dec28f0.dip0.t-ipconnect.de (HELO ?192.168.178.33?) (93.236.40.240) by kuehlewind.net with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 9 Jul 2016 15:16:19 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
In-Reply-To: <0l4m7zwyqj.fsf@wjh.hardakers.net>
Date: Sat, 09 Jul 2016 15:16:18 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <E652CD95-BC25-4AB1-A7E3-A899FF28AA3C@kuehlewind.net>
References: <20160704130029.2538.66335.idtracker@ietfa.amsl.com> <0l4m7zwyqj.fsf@wjh.hardakers.net>
To: Wes Hardaker <wjhns1@hardakers.net>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/G0tUNj-BxqjaD0OChzhQsCDworA>
Cc: tjw.ietf@gmail.com, dnsop@ietf.org, draft-ietf-dnsop-dnssec-roadblock-avoidance@ietf.org, dnsop-chairs@ietf.org, The IESG <iesg@ietf.org>
Subject: Re: [DNSOP] Mirja Kühlewind's No Objection on draft-ietf-dnsop-dnssec-roadblock-avoidance-04: (with COMMENT)
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jul 2016 13:16:24 -0000

Hi Wes,

thanks! See below.

> Am 09.07.2016 um 00:28 schrieb Wes Hardaker <wjhns1@hardakers.net>:
> 
> "Mirja Kuehlewind" <ietf@kuehlewind.net> writes:
> 
>> 1) Shouldn't/can't section 3.1.13. (UDP size limits) also specify a
>>   real test?
> 
> I don't think it's possible to easily test this, sadly, without a target
> set containing different deterministic response sizes.  We could
> probably strike the section and simply state that resolvers MUST support
> TCP (which actually is stated elsewhere). 

In this case it probably make sense to not have an own section but mention somewhere else that the packet size can have an influence.

> 
>> 2) To follow up with the tsv-art review: To avoid network as well as
>> server overload, would it be useful to provide further guidance, when and
>> how often these tests should be performed?
> 
>      <t>These tests should be performed when a resolver determines
>      its network infrastructure has changed.  Certainly a resolver
>      should perform these tests when first starting, but MAY also
>      perform these tests when they've detected network changes
>      (e.g. address changes, or network reattachment, etc).</t>
> 
> FYI, I don't think even with a lot of boxes starting at the same time it
> would cause significant overload.  Specifically, those resolver boxes
> are serving many more clients that will be issuing significant more
> traffic once the resolver is operational than these tests actually
> require.

Thanks text sounds good. I’m not worried but it always better to give some guidance otherwise the weirdest implementations might show up.

> 
>> 3) In section 6.1.  (What To Do): maybe also list logging as an option in
>> cases where no user is directly involved but a human might check later.
> 
> Good point.  I've changed it to:
> 
> 	<t>If Host Validator detects that DNSSEC resolution is not
> 	possible it SHOULD log the event and/or SHOULD warn user. In
> 	the case there is no user no reporting can be performed thus
> 	the device MAY have a policy of action, like continue or
> 	fail. </t>

Great! Thanks!

Mirja


> h
> -- 
> Wes Hardaker
> Parsons
>