<div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On 24 January 2017 at 12:00, Viktor Dukhovni <span dir="ltr"><<a href="mailto:ietf-dane@dukhovni.org" target="_blank">ietf-dane@dukhovni.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">On Tue, Jan 24, 2017 at 11:40:53AM -0800, Matthew Pounsett wrote:<br>
<br>
> > I don't see why a list of poor DNS implementations should be limited to<br>
> > malformed packets, and exclude well formed bad data.<br>
><br>
> Because that's not a problem with the implementation, it's a problem with<br>
> the data.<br>
<br>
</span>Actually, on the contrary, the problem is almost always with the<br>
implementation. It constructs incorrect denial of existence. The<br>
solution is upgrading or otherwise fixing bugs in the DNS servers.<br><br></blockquote><div><br></div><div>Ah, I see. It sounded like you were talking about bad input data, rather than a failure of the implementation to correctly construct data for the response. </div><div><br></div><div>I'd agree that anything that is the fault of the DNS software, not just the operator of the software, should be included in such a list.</div></div></div></div>