Skip to content

Latest commit

 

History

History
124 lines (97 loc) · 4.1 KB

meeting-agenda-template-markdown.md

File metadata and controls

124 lines (97 loc) · 4.1 KB
title description published date tags editor dateCreated
WG meeting agenda template
WG meeting agenda template in markdown
true
2021-12-14 00:02:22 UTC
markdown
2021-12-14 00:02:20 UTC

Notes about using this template The following values provdie some placeholders: "NNN" = IETF meeting number "NAME" = Full working group name "WGNAME" = WG Acronym

{.is-highlight}

WG Meeting agenda : Markdown template

(IETFNNN or "Interim") WGNAME WG Session Agenda

About the Working Group NAME (WGNAME)

Materials, Charter, Documents

WGNAME Chairs & Area Director

  • AD: (AD name)
  • Chairs: (Chair 1 name), (Chair 2 name)

Session link, minutes, jabber

IETF NNN WGNAME Session Times

Add has a single 2hr session: Friday July 30, 12:00-14:00 PDT (UTC-7) 1900-2100 UTC


ADD Agenda (Start time)-(End time) (TZ) (Day)


Welcome

  • 5 minutes
  • NOTE WELL
  • Scribe selection
  • Agenda bashing

Drafts

Meeting Materials

  • IETF NNN WGNAME Presentions Link

1. ITEM 1

2. ITEM 2

3. ITEM 3

4. Split-Horizon DNS Configuration

5. Discovery of Encrypted DNS Resolvers: Deployment Considerations

Other Discussion Topics

6. Private IPs, DDR, and PR#11

Question posed by EKR for discussion:

The general assumption for the DDR threat model so far is that:

  1. (presumably because DHCP is secure in some way). If that's not true, then I think we can agree that DDR does not provide much additional security benefit because the attacker can just substitute their own resolver [0].

  2. Either the home network or the ISP network is insecure, otherwise you don't need DoX.

OPPORTUNISTIC MODE So, first, its not entirely clear to me what the Opportunistic mode of S 4.2 provides. In this scenario, presumably the client will be doing TLS to the CPE (because otherwise the IP address would be the resolver's public address), which means that we are concerned with the attacker controlling the home network. So, in this scenario, we are only getting value if you have a network in which:

  1. The attacker can see traffic not destined for their IP address (otherwise there's not much point in encrypting).
  2. The attacker cannot forge traffic from another IP address> (otherwise they can just impersonate the CPE because there is no certificate).

Are there an appreciable number of networks with these properties? If so, can we write down where that happens and put it in Security Considerations? If not, we should consider removing this mode.


Planning & Wrap up

  • 5 min - Wrap up + Future Planning

As Time Permits