2011/8/9 Chris Buxton <chris.p.bux...@gmail.com>:
> On Aug 9, 2011, at 10:07 AM, John Williams wrote:
>
>> --- On Tue, 8/9/11, Chris Buxton <chris.p.bux...@gmail.com> wrote:
>>
>>> With a private version of a domain, you should not need to
>>> worry about a DS record in the parent. Just make sure your
>>> internal caching servers not only can find the internal
>>> version of your domain, but also can validate the signatures
>>> therein, most likely using a trusted or managed key specific
>>> to that internal domain.
>>>
>>> I'll not try to get into the specifics of using MS DNS for
>>> this purpose because this is not the right forum.
>>>
>>> Regards,
>>> Chris Buxton
>>> BlueCat Networks
>>
>> Based on your response, I'm wondering how an application such as Exchange 
>> (SMTP, which clearly relies on DNS) will work in this model.  Are there 
>> there any affects of the parent domain (.com, .net, whatever...) not having 
>> the DS records? for the domain?
>
> I don't follow your reasoning.
>
> For SMTP, the DNS-related operation is in looking up the MX and A/AAAA 
> records of other mail servers based on an outgoing message. If you're worried 
> about other mail servers finding your Exchange server, there are two cases:
>
> - External. My comments had nothing to do with external (Internet-facing) DNS 
> records. There, you would want to have DS records put into the parent zone to 
> be able to authenticate the link from parent to child.
>
> - Internal. If you're using MX records internally, you're either very large 
> or misguided. If you are large enough to warrant this, then your caching 
> servers should be able to follow your internal chain of trust, starting at a 
> private trust anchor. This is the point I was getting at.
>
> The use of internal, private namespace should be entirely transparent to any 
> service other than DNS. Your mail server should not need to know about it, 
> and should not be able to detect it (other than watching for private address 
> space and obviously-private domain names like "corp.dom").

As I understood from there -
http://technet.microsoft.com/en-us/library/ee649277(WS.10).aspx -
Chris' scenario should work. But I doubt that it is reasonable to use
DNSSEC for internal domain and, moreover, with such limitations.

>
> Chris Buxton
> BlueCat Networks
> _______________________________________________
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>



-- 
--
AP
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to