APNIC Home
APNIC Home
 

SIG: Reverse DNS

Wednesday 4 September, Kitakyushu International Conference Centre, Kitakyushu, Japan

Minutes

Meeting commenced: 9:05 am

Chair: David Conrad

The Chair introduced the SIG and explained the agenda. He provided general guidelines for the presenters and encouraged a wide range of participation in the discussions.

Contents
  1. Early registration transfer project - status update
  2. A study of DNS lameness
  3. APNIC lame NS measurements
  4. New APNIC DNS generation system
  5. BIND libc vulnerability

  1. Early registration transfer project - status update
  2. [Presentation]

    George Michaelson, APNIC

    This presentation was a status report on the joint RIR activity to transfer registration information from pre-RIR allocations to the appropriate RIRs. The intention of this project is to improve member services by providing more consistent management of resources. The presentation noted that there are some problems with respect to contact information in the early records, but that APNIC has various, mostly manual, procedures in place to try to improve and protect the registration information.

    The presentation described the ASN transfer that has already taken place and outlined the issues that will be involved in, and the schedule for, the IPV4 transfer scheduled to commence later in 2002. In particular, the DNS implications were discussed.

    Questions and discussion

    • No further discussions.

    Action items

    • None

    Top

  3. A study of DNS lameness
  4. [Presentation]

    Ray Plzak, ARIN

    This presentation reported the results of a study conducted by ARIN into DNS lameness. The study arose following discussion in the ARIN region on the issue of cleaning up lame delegations. The presentation also outlined the additional steps to be taken in this study.

    Questions and discussion

    • No further discussions.

    Action items

    • None

    Top

  5. APNIC lame NS measurements
  6. [Presentation]

    George Michaelson, APNIC

    This presentation reported the results of a study of lame DNS conducted by APNIC in the Asia Pacific region. It was noted that the methodology of the APNIC study differs from the ARIN study, and does not seek to consider the full range of issues that ARIN is studying. The presentation noted that the Asia Pacific region appears to have a lower rate of lameness that the other regions.

    This presentation also proposed a course of action to be taken by APNIC to encourage networks with persistently lame domain objects to fix those objects.

    Questions and discussion

    • It was noted that the notification system is highly dependent on the tech-c contact details. The presenter outlined the steps that would be taken to find an appropriate contact. It was proposed that if the various steps failed to find an appropriate contact, then APNIC should consider this to be an operational problem.
    • The presenter sought comment from the SIG as to whether there were any concerns in APNIC following the course of action proposed in the presentation, involving a mass mailing to tech-c contacts regarding DNS lameness.
    • The Chair observed consensus for APNIC to proceed with its proposed course of action.

    Action items

    • None

    Top

  7. New APNIC DNS generation system
  8. [Presentation]

    George Michaelson, APNIC

    This presentation provided an overview of the new DNS generation system developed and deployed in APNIC in August 2002. The new system makes the zone file system more efficient, allows new features to be implemented, and streamlines the entire process. It was noted that this new system will assist in the Early Registration Transfer (ERX) project. The presenter also noted the assistance from ARIN in developing this system.

    Questions and discussion

    • No further discussions.

    Action items

    • None

    Top

  9. BIND libc vulnerability
  10. David Conrad, Nominum

    The presenter outlined the details of CERT advisory CA-2002-19, relating to a buffer overflow in libc component of BIND. The vulnerability can allow an attacker to use DNS lookups to crash a system. The presenter noted that the vulnerability affects a very wide range of operating systems, including embedded systems. He suggested that operators encourage customers to apply appropriate patches. He noted that the bug does not affect the DNS server itself.

    Questions and discussion

    • No further discussions.

    Action items

    • None

    Top

Meeting closed: 9:55 am

Minuted by: Gerard Ross

Open action items
  • None

Top  |  SIGs

Hosted by: JPNIC

© 1999 - APNIC Pty. Ltd. Contact us | Privacy statement