Hi,
i have performed a little research on the effects of deploying DNSSEC,
which might be interesting to the people of this wg.
you can find it at http://www.nlnetlabs.nl/downloads/dnssec-effects.pdf
------------------------------------------------------------------
Abstract
Ripe NCC recently started signing the zones on their DNS servers. This
document presents a few measurements of the effects (if any) on the
behaviour of the resolvers sending queries to the Ripe nameservers. We
have looked at the rate of queries with the DO bit (’use DNSSEC’) set to
1, compared to those with the DO bit set to 0. We have also looked at
the number of DNS responses that were truncated.
-------------------------------------------------------------------
Jelte Jansen
NLnet Labs
Dear wg,
I have heard from Bill Manning that ARIN has requested removal of their
space from the ip6.int tree, and I'm wondering what the current point of
view is for the RIPE NCC. I would like to see ip6.int dismanteled
'correctly', ie not in the way described below:
I wrote to ipv6-ops(a)lists.cluenet.de:
> I have heard DNS operators are planning on removing ip6.int from their
> resolvers (ie by plugging ip6.int into an empty zone on their recursors).
> What are your thoughts on this? I am considering removing ip6.int also
> in the same way, because I think it can take a long time for the parent
> of .int to remove ip6 delegation (if they are even considering this is
> unknown to me) and for sure it might take a long time for the ip6.int
> folks to remove children from their zone.
>
Bill replied:
| ip6.int is ready to remove zone cuts for ARIN.
| they are the only RIR who has requested delegation removal.
| when/if the other RIRs request delegation removal, it will
| occur.
Has this been discussed before? If so, I'm sorry I missed it :) What
was the outcome in that case? I think it is a very good idea to have
RIPE NCC and APNIC request delegation removal.
--
---------- - - - - -+- - - - - ----------
Pim van Pelt Email: pim(a)ipng.nl
http://www.ipng.nl/ IPv6 Deployment
-----------------------------------------------
Dear Colleagues,
The RIPE NCC Training Services Department invites you to register for
one of our upcoming DNS for LIRs Training Courses:
And
Date: Tuesday 13 June 2006
Time: 0900-1700
Location: Riyadh, Saudi Arabia
Hosted by:ZAJIL International Telecommunications Co. W.L.L.
And
Date: Thursday 13 July 2006
Time: 0900-1700
Location: Munich, Germany
And
Date: Friday 8 September 2006
Time: 0900-1700
Location: Manchester, United Kingdom
And
Date: Friday 29 September 2006
Time: 0900-1700
Location: Amsterdam, Netherlands
The main objective of the DNS for LIRs Training Course is to provide
LIRs with information about the different DNS related services the
RIPE NCC has available for them. It covers reverse DNS procedures and
checks, as well as giving information about DNS Monitoring (DNSMON),
K-Root and anycasting.
The course also covers DNSSEC and the specific procedures set up by
the RIPE NCC to secure the in-addr.arpa zones.
Please note that the DNS for LIRs course focuses on DNS services and
procedures related to being an LIR. The course does: - NOT teach the
basics of DNS - NOT describe how to receive Internet resources from
the RIPE NCC - NOT describe fully how to operate a Local Internet
Registry (LIR)
The course is intended for technical staff of LIRs. It is assumed that
all attendees are familiar with common DNS terminology and have a
practical knowledge of operating DNS servers.
The course is free of charge. We provide lunch and printed training
materials.
We do not cover any of your travel expenses or accommodation. We give
all of our training courses in English.
You can find more information about the course at:
http://www.ripe.net/training/dns
REGISTRATION:
============
To register for this course, please use the LIR Portal or complete the
registration via our website on:
http://www.ripe.net/cgi-bin/trainingform.pl.cgi
If you have any questions please do not hesitate to contact us at
<training(a)ripe.net>.
Kind regards,
Rumy Kanis
Training Services Manager
RIPE NCC
Dear DNS WG,
here's an updated draft agenda for the upcoming meetings on Thursday next week.
Changes include an extra slot for discussion of K-Root anycast. DNSSEC
status updates were merged into the general reports item.
-Peter
# $Id: RIPE52agenda,v 1.6 2006/04/20 11:14:44 pk Exp $
#############################################################################
D R A F T
#############################################################################
DNS-related presentations in the EOF/plenary:
TUE, 2006-04-25:
Reflector Attacks Using DNS Infrastructure (Joao Damas)
DNS amplification attacks (Matsuzaki Yoshinobu)
Security Issues in ENUM (Gerhard Schröder)
WED, 2006-04-26:
Perils of Transitive Trust in the Domain Name System (Emin Gun Sirer)
The Impact of anycast on Root DNS Servers.
The Case of K-root (Lorenzo Colitti)
DNS in Turkey (Attila Ozgit)
#############################################################################
2006-04-27 1100 - 1230, DNS WG slot I [90 min]
#############################################################################
0) Administrivia
[chairs][ 5 min]
- scribe, jabber, minutes
- agenda bashing
1) Status Reports
[][30 min]
- IETF dnsext, dnsop and others
[Olaf Kolkman][18 min]
- IANA Overview
[David Conrad][ 7 min]
- DNSSEC News/Statistics from the NCC
[][ 5min]
2) Action Item Review
[chairs][15 min]
<http://www.ripe.net/ripe/wg/dns/dns-actions.html>
48.1
48.2
49.1
49.2
51.1: see (3) and plenary presentation on K-root
51.2: see (4)
51.3: see also <http://www.ripe.net/news/review-secondary-dns.html>
51.4
51.5: see (6)
3) Anycast on K-Root
[Lorenzo Colitti, RIPE NCC][10 min]
4) IP6.INT phase out
[Andrei Robachevski, RIPE NCC][10 min]
5) Reverse DNS Quality
[Brian Riddle, RIPE NCC][10 min]
6) Proposal to bring ENUM Zone Management in line with the Reverse DNS
[N.N., RIPE NCC][10 min]
#############################################################################
2006-04-27 1600 - 1700, DNS WG slot II [60 min]
#############################################################################
7) Plenaries Followup
[chairs][15 min]
Discussion of details postponed from plenary presentations (see above),
including identification of potential work for the WG
8) ICANN IDN guidelines & IDN Future
[Marcos Sanz][20 min]
<http://www.icann.org/topics/idn/implementation-guidelines.htm>
[may also touch draft-iab-idn-nextsteps-05.txt]
9) Nominet's Dynamic Updates
[Jay Daley][15 min]
X) I/O with other WGs
[chairs][ 4 min]
Y) A.O.B.
[chairs][ 4 min]
Z) Wrap-Up & Close
[chairs][ 2 min]
#############################################################################
Dear WG,
find below the draft agenda for our two sessions during the upcoming meeting
in Istanbul. Please send comments to the chairs.
-Peter
# $Id: RIPE52agenda,v 1.5 2006/04/13 15:06:05 pk Exp $
#############################################################################
D R A F T
#############################################################################
DNS-related presentations in the EOF/plenary:
TUE, 2006-04-25:
Reflector Attacks Using DNS Infrastructure (Joao Damas)
DNS amplification attacks (Matsuzaki Yoshinobu)
Security Issues in ENUM (Gerhard Schröder)
WED, 2006-04-26:
Perils of Transitive Trust in the Domain Name System (Emin Gun Sirer)
The Impact of anycast on Root DNS Servers.
The Case of K-root (Lorenzo Colitti)
DNS in Turkey (Attila Ozgit)
#############################################################################
2006-04-27 1100 - 1230, DNS WG slot I [90 min]
#############################################################################
0) Administrivia
[chairs][ 5 min]
- scribe, jabber, minutes
- agenda bashing
1) Status Reports
[][25 min]
- IETF dnsext, dnsop and others
[Olaf Kolkman][18 min]
- IANA Overview
[David Conrad][ 7 min]
2) DNSSEC Status and Deployment Reports
[][20 min]
- SE Experiences
[][]
- DNSSEC Deployment WG
[][]
- News/Statistics from the NCC
[][]
- Other
3) Action Item Review
[chairs][10 min]
<http://www.ripe.net/ripe/wg/dns/dns-actions.html>
48.1
48.2
49.1
49.2
51.1: see plenary presentation on K-root
51.2: see (4)
51.3: see also <http://www.ripe.net/news/review-secondary-dns.html>
51.4
51.5: see (6)
4) IP6.INT phase out
[Andrei Robachevski, RIPE NCC][10 min]
5) Reverse DNS Quality
[Brian Riddle, RIPE NCC][10 min]
6) Proposal to bring ENUM Zone Management in line with the Reverse DNS
[N.N., RIPE NCC][10 min]
#############################################################################
2006-04-27 1600 - 1700, DNS WG slot II [60 min]
#############################################################################
7) Plenaries Followup
[chairs][15 min]
Discussion of details postponed from plenary presentations (see above),
including identification of potential work for the WG
8) ICANN IDN guidelines & IDN Future
[Marcos Sanz][20 min]
<http://www.icann.org/topics/idn/implementation-guidelines.htm>
[may also touch draft-iab-idn-nextsteps-XX.txt]
9) Nominet's Dynamic Updates
[Jay Daley][15 min]
X) I/O with other WGs
[chairs][ 4 min]
Y) A.O.B.
[chairs][ 4 min]
Z) Wrap-Up & Close
[chairs][ 2 min]
#############################################################################
Hi!
May be a bit offtopic here, but could be interesting ;)
.RU now have a DNSSEC signed view as well as secure delegations. Details are
on the http://www.dnssec.ru/
Now it is beta stage. Any comments/suggestion are wellcome.
BIG THANKS to RIPE and especially RIPE NCC DNS/DNSSEC training courses that
explained me DNSSEC infrastructure and give me an idea to make DNSSEC
signed .RU domain!
--
WBR,
Max Tulyev (MT6561-RIPE, 2:463/253@FIDO)
[Apologies for Duplicates]
Dear Colleagues,
The RIPE NCC changes the Key Signing Keys (KSKs) for its signed zones twice
each year. We have today published new keys for all zones. Old keys will
continue to function until the second stage of the rollover on 3 July 2006.
We recommend that you reconfigure any resolvers to use the new keys before
then. You can download them from:
https://test-www.ripe.net/projects/disi//keys/ripe-ncc-dnssec-keys-new.txt
The DNSSEC Key Maintenance Procedure is available at:
https://test-www.ripe.net/rs/reverse/dnssec/key-maintenance-procedure.html
If you have any questions about this, please send an e-mail to
<ops(a)ripe.net>.
Regards,
Brett Carr
RIPE NCC