mailman.ripe.net
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

dns-resolver-tf

Thread Start a new thread
Download
Threads by month
  • ----- 2025 -----
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
dns-resolver-tf@ripe.net

March 2023

  • 2 participants
  • 2 discussions
Draft Minutes - DNS Resolver Best Common Practice Task Force - 8 March 2023
by Boris Duval 22 Mar '23

22 Mar '23
Dear TF members, Here are the minutes from our first call. Cheers, Boris *** Wednesday, 8 March 2023 18:00 (UTC+1) Attendees: Farzaneh Badii, Marco Davids, Paul Ebersman, Gaurav Kansal, Shane Kerr, Tim Wicinski, János Zsakó Scribe: Boris Duval 1. Welcome and Administrivia Shane welcomed everyone to the meeting and acknowledged that the task force had a slow start but hoped that they would now pick up pace and have a draft ready for RIPE 86. He also announced that Tim agreed to co-chair the task force with him, and that Boris will be taking minutes. 2. Finalising the Task Force’s Charter Shane asked if anyone had any comments or concerns about the latest version of the charter that was shared via the mailing list. As there were no comments, the final version of the charter was approved and was updated on the website. 3. How to Get Things Done Shane proposed using the public mailing list for official discussions and private channels such as Mattermost for other types of discussions to spare the list all the logistical details. Marco pointed out that it would be better not to share the Zoom links via the mailing list for security reasons. Shane proposed to use GitHub to work on the document. The task force agreed. 4. Target Audience and Scope The task force discussed the target audience and scope of the document. Shane reminded the task force that the main reason for the paper was that the EU was concerned about the centralisation of Internet services, mainly by US companies, and wanted to see these services managed by more European operators. Shane suggested that the document should target organisations based in Europe who want to be responsible public resolver operators. However, he also mentioned that it might be too narrow, and that the task force might also want to consider enterprises, governments, academic institutions and others who want to run public resolvers. Shane proposed to clarify who the document is for, asking whether it should be for anyone who operates a resolver or just for those who operate a public resolver. He also suggested that the task force consider the different relationships between the resolver operator and the users, such as ones completely anonymous, ones where you need an account and ones where it is for employees or students at a university. The task force proposed to divide the scope of the document and to draft it for public resolver operators as well as for closed user groups such as universities or governments. Farzaneh said that she would like to launch a collective action with public resolvers set up by non-for-profit organisations such as CCTLDs to help solve the consolidation problem. She mentioned that the role of the task force was to come up with best practices to help with encryption for example and provide non-for-profit organisations a more cost-effective way to run a public resolver. The task force also discussed the legal aspects of blocking content on public resolvers, citing the recent Quad 9 case as an example. Regarding this case, Farzaneh brought up concerns about intellectual property and blocking practices, noting that some public resolvers do not block unless legally mandated. János mentioned that he was not aware of any intention to block DNS in Hungary but noted that ISPs have an obligation to block certain IPs, which are proven by the court. Shane mentioned that the task force should not be afraid to take an opinionated approach to privacy issues and intellectual content blocking and come up with recommendations. He also added for transparency that his company was recently acquired by IBM, which is the number one sponsor of Quad 9. Tim nominated Farzaneh to lead the section on legal issues such as GDPR. Farzaneh accepted. 5. Terminology Shane briefly mentioned that he preferred the term "public resolver" to "open resolver", as the latter might have bad connotations from the days when you installed a Unix box and it had an open resolver by default. 6. Review of draft list of recommendation topics Shane shared a list of topics to be considered when writing the document. He also mentioned that he would encourage the use of existing work where relevant so as not to reinvent the wheel. a) Capacity Shane mentioned that in the DNS world, CPU and networking would be the two limiting factors and that memory will not be such an issue due to modern memory sizes. He also mentioned that it would be good to determine what to recommend for caching. For example, running each resolver separately to do its own caching, or using multilayer caching, etc. b) Resilience Shane mentioned that in terms of resilience, it will be good to consider what kind of DNS software is used, what are the physical locations, and where those sit on the network. He also noted that most people will not have their own data centres, with the possible exception of some ISPs, so some issues may be relevant to some user groups but not to others. He mentioned a lot of other factors that can influence resiliency such as peering, single transit network, legal frameworks and filtering. He mentioned that all of this can probably be found in existing documentation about security best practices and could be drawn upon to build this section about resilience. c) Anycasting Shane added anycasting to the list because it is the only tool that currently exists in DNS to distribute a geographic service, since everything is configured with an IP address. Marco proposed to write some lines about monitoring in the context of anycasting. Shane agreed and added that the task force should also address inefficient paths and other aspects of anycast monitoring. d) Software Consideration. Marco mentioned that it might be good to encourage the use of open source in the document and briefly discussed licensing. Shane agreed and mentioned that the task force should also consider addressing supporting software as well. e) Knobs to tweak in the DNS The task force discussed several points regarding various topics such as DNS over HTTPS (DoH) or DNS over TLS (DoT), platform diversity, CPU pinning, setting maximum and minimum TLDs, running a local TLD, certificate management, and other technical details. Shane mentions the possibility of making custom tweaks such as CPU pinning but was unsure if they were necessary. János suggested platform diversity as a means of increasing resilience and avoiding an entire system being taken down by a zero-day exploit. He also recommended running the service on different flavors of Linux and BSD to reduce risks. The issue of adding IP addresses to the X509 certificate of the DoH server, as observed in Cloudflare, was also raised. The task force discussed the importance of adding IP addresses to the certificate and the challenges they faced in doing so. There was also a discussion on setting maximum and minimum TLDs and the potential benefits of running a local TLD. 7. Next Meeting Shane thanked all participants and proposed to organise another meeting in a few weeks. He also indicated that in the meantime the task force can continue its work via GitHub and Mattermost.
1 0
0 0
Invitation to first online meeting of DNS Resolver Task Force
by Shane Kerr 07 Mar '23

07 Mar '23
Dear Colleagues, The least-bad time-slot for our first online meeting is tomorrow evening. Below find the Zoom invitation. (This meeting is only for task force members; we'll publish minutes to this list shortly after for everyone else.) The date/time for the meeting: 2023-03-07 17:00 UTC That's tomorrow, 8 March at 18:00 CET, for folks who don't like RFC 3339 formatting for date and time. 😉 Topic: DNS Resolver Best Common Practice Task Force Time: This is a recurring meeting Meet anytime Join Zoom Meeting https://ripe.zoom.us/j/99624893128?pwd=Q2t1b2JiZnc2M1R6UFZKUEZUazlEZz09 Meeting ID: 996 2489 3128 Passcode: 246309 One tap mobile +31207946519,,99624893128# Netherlands +31207946520,,99624893128# Netherlands Dial by your location +31 20 794 6519 Netherlands +31 20 794 6520 Netherlands +31 20 794 7345 Netherlands +31 707 006 526 Netherlands +31 20 241 0288 Netherlands +31 20 794 0854 Netherlands +1 719 359 4580 US +1 253 205 0468 US +1 253 215 8782 US (Tacoma) +1 301 715 8592 US (Washington DC) +1 305 224 1968 US +1 309 205 3325 US +1 312 626 6799 US (Chicago) +1 346 248 7799 US (Houston) +1 360 209 5623 US +1 386 347 5053 US +1 507 473 4847 US +1 564 217 2000 US +1 646 558 8656 US (New York) +1 646 931 3860 US +1 669 444 9171 US +1 669 900 9128 US (San Jose) +1 689 278 1000 US Meeting ID: 996 2489 3128 Find your local number: https://ripe.zoom.us/u/acJI1RXsgD Join by SIP 99624893128(a)zoomcrc.com Join by H.323 162.255.37.11 (US West) 162.255.36.11 (US East) 115.114.131.7 (India Mumbai) 115.114.115.7 (India Hyderabad) 213.19.144.110 (Amsterdam Netherlands) 213.244.140.110 (Germany) 103.122.166.55 (Australia Sydney) 103.122.167.55 (Australia Melbourne) 149.137.40.110 (Singapore) 64.211.144.160 (Brazil) 149.137.68.253 (Mexico) 69.174.57.160 (Canada Toronto) 65.39.152.160 (Canada Vancouver) 207.226.132.110 (Japan Tokyo) 149.137.24.110 (Japan Osaka) Meeting ID: 996 2489 3128 Passcode: 246309 -- Cheers, Shane
1 1
0 0

HyperKitty Powered by HyperKitty version 1.3.10.