Colleagues, my apologies for the delay in getting the agenda prepared and distributed for next week. At long last, here it is.
Please note one or two items have not get been confirmed, so there may be some changes between now and next Wednesday. Although I don't expect there will be any, it would be unwise to make life-changing decisions on the assumption that the V1.4 agenda remains unchanged.
Hope to see most of you in Warsaw next week.
#
# $Id: agenda,v 1.4 2014/05/07 11:00:29 jim Exp $
#
PROVISIONAL AGENDA: RUNNING ORDER, TIMES & EVEN CONTENT MAY CHANGE
[0] Usual Administrivia 5 mins
Agenda bashing
Minutes of previous meeting
Review of Action Items
[1] NCC Report 15 mins
Stuckee, RIPE NCC
[2] DDoS Forensics 25 mins
Curon Davies, JISC RSC Wales
As a result of daily attacks against a Further Education College in
Wales, a connection was noticed between changing DNS entries and the
attacked IP address. Using innovative DNS responses inspired by GeoDNS
and logging all requests to the authoritative server, it has been
possible to trace the source of DDoS and spoofed flood attacks.
[3] Measuring DNSSEC validation deployment 15 mins
Nicolas Canceill, NLnet Labs
We have executed a research in which the RIPE Atlas measurement
network was utilized to quantify the amount/percentage of resolvers
that do DNSSEC validation. We were not only able to identify which
resolvers do DNSSEC validation, but also which resolvers are
security-aware (and to which level). Moreover, during the research
some particular cases have been found: the existence of insecure
fallbacks in case of missing signatures, and a troublesome issue with
secure wildcard records.
[4] Measuring DNSSEC from the end user perspective 30 mins
Geoff Huston, APNIC
The presentation explores the technique of measuring the
characteristics of the DNS and its performance by posing a set of DNS
questions to end users and observing the queries that occur at the
authoritative servers in response. Using online advertising channels
the tests can be undertaken at a level of high volume and broad spread
across the Internet. The presentation will describe the use of this
technique in measuring DNSSEC validation, DNS over TCP, DNS
performance and similar.
LUNCH
[5] Report from Ad-hoc ccTLD group 10 mins
Peter Koch, DENIC
[6] Registry Infrastructure Transformation 20 mins
Michael Daly, Nominet
In the past 24 months Nominet the UK Registry have completely
transformed the infrastructure that is used to deliver the UK Registry
services. The infrastructure has been moved to be much more agile and
highly available. This presentation will detail some of the choices we
made and methods we used to deploy and manage our infrastructure.
[7] Google DNS hijacking in Turkey 30 mins
Stephane Bortzmeyer, AFNIC
In March 2013, the Turkish government decided to prevent access to
Twitter. It used some well-known techniques but also one which have
not been documented in the real world before: using routing to hijack
DNS resolvers such as Google Public DNS. What exactly happened and
what could be done to prevent that?
[8] DNSMON Developments 10 mins
Stuckee, RIPE NCC
[9] DNS Monitoring Common Practices/APIs Panel Session 15 mins
To be confirmed
[10] AOB 5 mins