[dnsop] draft DNSOP minutes for IETF 62

David Meyer <dmm@1-4-5.net> Thu, 17 March 2005 18:59 UTC

Received: from darkwing.uoregon.edu (root@darkwing.uoregon.edu [128.223.142.13]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06811 for <dnsop-archive@lists.ietf.org>; Thu, 17 Mar 2005 13:59:06 -0500 (EST)
Received: from darkwing.uoregon.edu (majordom@localhost [127.0.0.1]) by darkwing.uoregon.edu (8.13.3/8.13.3) with ESMTP id j2HHkbIF016729; Thu, 17 Mar 2005 09:46:37 -0800 (PST)
Received: (from majordom@localhost) by darkwing.uoregon.edu (8.13.3/8.13.3/Submit) id j2HHkbPk016728; Thu, 17 Mar 2005 09:46:37 -0800 (PST)
Received: from m106.maoz.com (m106.maoz.com [205.167.76.9]) by darkwing.uoregon.edu (8.13.3/8.13.3) with ESMTP id j2HHkax3016708 for <dnsop@lists.uoregon.edu>; Thu, 17 Mar 2005 09:46:36 -0800 (PST)
Received: from m106.maoz.com (localhost.localdomain [127.0.0.1]) by m106.maoz.com (8.13.2/8.13.2) with ESMTP id j2HHkXET005250; Thu, 17 Mar 2005 09:46:33 -0800
Received: (from dmm@localhost) by m106.maoz.com (8.13.2/8.12.11/Submit) id j2HHkV4m005249; Thu, 17 Mar 2005 09:46:31 -0800
X-Authentication-Warning: m106.maoz.com: dmm set sender to dmm@1-4-5.net using -f
Date: Thu, 17 Mar 2005 09:46:31 -0800
From: David Meyer <dmm@1-4-5.net>
To: dnsop@lists.uoregon.edu
Cc: sra@isc.org
Subject: [dnsop] draft DNSOP minutes for IETF 62
Message-ID: <20050317174631.GA5236@1-4-5.net>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="vtzGhvizbBRQ85DL"
Content-Disposition: inline
User-Agent: Mutt/1.4.1i
X-public-key: http://www.1-4-5.net/~dmm/public-key.asc
X-gpg-fingerprint: 2409 8B50 B389 A307 BA5C 2A16 3918 03D6 A099 D8A7
X-philosophy: "I find your lack of faith disturbing." -- Darth Vader, Star Wars Episode IV.
Sender: owner-dnsop@lists.uoregon.edu
Precedence: bulk
Reply-To: David Meyer <dmm@1-4-5.net>

	Thanks again to Johan for serving as scribe.

	Dave & Rob


---
Domain Name System Operations (dnsop) Minutes

MONDAY, March 7, 2005 (1930-2200)
=====================================

CHAIR(s): David Meyer <dmm@1-4-5.net>
          Rob Austein <sra@isc.org>

AGENDA

 o Administriva						 5 minutes

   - Mailing list: majordomo@lists.uoregon.edu
     subscribe dnsop

   - Scribe(s)?
      Jabber
      Other 

   - Blue Sheets

 o Agenda Bashing					 5 minutes
   Meyer                                           

 o Review and status of work items			 

   Active Drafts
   -------------
   draft-ietf-dnsop-bad-dns-res-03.txt			 5 minutes
     Larson/Barber
   draft-ietf-dnsop-dnssec-operational-practices-03.txt	 5 minute	
     Kolkman, et. al
   draft-ietf-dnsop-inaddr-required-06.txt		 8 minutes
     Senie
   draft-ietf-dnsop-key-rollover-requirements-02.txt	 5 minutes
     Guette, et al.
   draft-ietf-dnsop-ipv6-dns-configuration-05.txt	 2 minutes
     Jeong, et al..

   Expired Drafts
   --------------
   draft-ietf-dnsop-respsize				 2 minutes
     Vixie/Kato
   draft-kato-dnsop-local-zones				 2 minutes
     Vixie/Kato
   draft-ietf-dnsop-serverid-02.txt                      5 minute
     Wolfe

   Potential WG Items
   ------------------
    To publish, or not to publish,...			 5 minutes
     draft-durand-dnsop-dont-publish-00.txt
     Durand

   6to4 Reverse DNS Delegation				 5 minutes
     draft-huston-6to4-reverse-dns-03.txt
     Huston

   Split-View DNSSEC Operational Practices		 8 minutes
     draft-krishnaswamy-dnsop-dnssec-split-view-00.txt
     Krishnaswamy

   Provisioning data needed for DNSSEC			10 minutes
     draft-hollenbeck-epp-secdns-06.txt
     Hollenbeck

   DNS authoritative server misconfiguration             10 minutes
     draft-fujiwara-dnsop-bad-dns-auth-02.txt
     Fujiwara, et al

   DNS transport issues	                                 10 minutes
     draft-fujiwara-dnsop-dns-transport-issue-00.txt
     Fujiwara

   A Practical Approach for DNS server specification	 5 minutes
     draft-yasuhiro-dnsop-increasing-dns-server-02.txt
     Morishita



   Other Issues
   -------------

   Tunnel end-point discovery using DNS			10 minutes
     draft-palet-v6ops-tun-auto-disc-03.txt (Section 3.2)
     Savola

   The DNS Phase In Problem				10 minutes
     Koch 

   Technical pieces for DNSSEC deployment		 7 minutes
      Krishnaswamy



Status of Active Drafts
-----------------------

         draft-ietf-dnsop-bad-dns-res-00: ready to push out

         draft-ietf-dnsop-dnssec-operational-practices-00: slightly
                 rearranged, one changed definition

         draft-ietf-dnsop-inaddr-required-06: enough people seem to
                 care to make it worthwhile to push this forward
		 in the present direction

         draft-ietf-dnsop-key-rollover-requirements-02: comments solicted

         draft-ietf-dnsop-ipv6-dns-configuration-05:

Status of Expired Drafts
-------------------------

         draft-ietf-dnsop-respsize:
             bill manning: this is an important document that
	     should be moved forward. Also important because it
	     is directly referenced to by ICANN documents
             moussen soussi: this draft has been and will be very
	     useful to TLDs computing the consequences of adding
	     v6 glue 

	     rob austein: will go to last call

         draft-kato-dnsop-local-zones:
             akira kato: concerns significant additional traffic
	     hitting roots 
        
             bill manning: I don't like it, step towards incoherency

         draft-ietf-dnsop-serverid-02:
             suzanne woolf: intended as a replacement for
	     hostname.bind, not enough comments so it expired 
             rob austein: don't wait for comments, this is ready
	     for LC 

Potential WG Items
-------------------

         draft-durand-dnsop-dont-publish-00.txt
             goals: restart talk on what should be published or
	     not in DNS. issues: ambiguity, unreachability, new
	     v6 stuff: transition phase, globally unique local
	     addrs recommendation: when publishing multiple
	     addresses take care to not publish at the same time
	     addrs designed to be globally unique and addrs that
	     are not 

             ed lewis: when solving this problem don't let the
	     public net suffer from what you want to do
	     internally 
             bill manning: keep your grubby hands out of my
	     zone. reachability is in the eye of the beholder 
             lars-johan liman: the interesting thing is not the
	     publishing (in DNS) but rather what the domain names
	     are being used for *after* they have been published
             rob austein: there are costs (to others) associated
	     with having unreachable stuff in the DNS. that ought
	     to be documented
             keith moore: if you're seeing limited scope
	     addresses published in DNS then that's a sign of
	     other problems and it is not DNS' task to solve
	     these 
             john schnizlein: split-DNS is ...
             rob austein: I declare split-DNS out of topic for
	     this one 
             rob austein: i hear interest in this draft

         draft-??-ipv6-dns-configuration (?)

             david kessens: no question, answers for you: this
	     document has been considered by the iesg and there
	     are a number of comments. It is possible to go
	     forward even without addressing all the comments
	     given some sort of "warning label".
             rob austein: the problem is that we've failed to
	     reach consensus on this issue for a number of years
	     and it is time to stop trying and just move on. This
	     document represents a lot of effort in documenting
	     the various issues involved.
             pekka savola: ought to be possible to publish this
	     document without the iesg warning label 
             rob austein: this document was never intended to
	     reach consensus 
             david kessens: next step is to publish asap

         draft-huston-6to4-reverse-dns-03:

             geoff huston: ...self-service style cafeteria webpage...
             bill manning: as the existing maintainer of 2002:: i
	     strongly support this as I'm tired of maintaining it
	     mark andrews: we could do this all in dns, no need
	     to go to http 
             geoff huston: ...or we could go out and do something
             bill manning: don't make this a wg item, instead
	     just ship it
             geoff huston: may benefit from a round in DNSOP, but
	     I'm fine either way 

         draft-krishnaswamy-dnsop-split-view...

             suresh krishnaswamy: documents a way to config
	     split-DNS with DNSSEC. This document is not about
	     information hiding. split-views and DNSSEC may seem
	     mutually conflicting. 

             keith moore: example doesn't show apps
             rob austein: were not here to debate split dns in
	     general, this is limited to DNSSEC applied to split
	     DNS given that split DNS will be used regardless
             ed lewis: split-view is essential, good to get it
	     documented 
             sam weiler: disagree with keith
             bill manning: advance it. the philosophical issues
	     are not a topic for this WG
             russ mundy: important to get modern documents on how
	     to get DNSSEC working in present environments 

         draft-hollenbeck-epp-secdns-06.txt

             scott: last remaining question:
                 DS publish start and end
                 DS TTL
                 DS signing interval
                 RRSIG(DS) lifetime

             ed lewis: this is what I came here for. DS is unique in
                 the sense it is the only RR that is only available at
                 the parent. Important that the parent doesn't tell to
                 much about the child.
             ed lewis: RRSIG(DS) lifetime is crucial in the case
	     where the childs key is compromised. Even if the
	     child replaces the key quickly it is still possible
	     for the attacker to generate new RRSIGs (with the
	     compromised key) that will be accepted as valid if
	     the RRSIG(DS) is still out there.
             ogud: drop the ttl, the reason for it is too weak
             marka: concur
             ed lewis: if we set the signature that will cap the
	     ttl too, and that's perhaps sufficient

         draft-fujuwara-dnsop-bad-dns-auth-01:

             Highlights details. Transport issues ripped out into
	     separate doc:  
         draft-fujuwara-dnsop-dns-transport-issue-00
                 Rewrite needed and will be done. Issues over
		 EDNS0 and TCP need more exposure. 

         draft-yasuhiro-dnsop-increasing-dns-server-02.txt

     Pekka Savola: Tunnel end-point discovery:
         draft-palet-v6ops-tun-auto-disc-03.txt
             ...forward tree. May be issues here.
             ...reverse tree. Assumes pre-population of whole reverse
                 tree, including the rfc1918 space.
             Must work through unmodified NAT-boxes.
         Wants comments on feasibility of assuming pre-population ok.
         Whether using DNS search path can be on the table.

         keith moore: upside down approch having yet another
	 network layer service depend on DNS. DHCP would seem
	 more appropriate and better to solve the issues with a
	 DHCP approach.
         mark andrews: If you go to a different suffix (i.e. not
	 in-addr.arpa) then you can pre-populate with wildcards. 

     Peter Koch: DNS Phase In
         New feature discovered/implemented. Need lookup
	 service. Use DNS. Initial deployment: existence of FOO
	 means YES, absence means NO or don't care. Want a !FOO
	 to be able to distinguish between NO and "don't
	 care". Problem does occur. One example is ENUM (or
	 perhaps structured name spaces in general)

         alain durand+mark andrews+rob austein: Discussion on
	 whether there is a real need. 
         sam weiler: poorly defined problem