> On Apr 8, 2016, at 11:08 AM, Ray Bellis <r...@bellis.me.uk> wrote:
> 
> 
> 
> On 08/04/2016 11:39, Edward Lewis wrote:
>> I can't find a draft to cite for this talk, so this refers to the slides
>> presented.
>> 
>> "DNSSEC Protocol Modifications"
>> (http://www.rfc-editor.org/rfc/rfc4035.txt) has an explicit prohibition on
>> names owning only NSEC and RRSIG.
>> 
>> Yeah.
>> 
>> I'm not holding this up as a royal edict.  But it's there in plain text.
>> 


>> Fortunately there's a rationale why the requirement language is there, so
>> there's a starting point to "work on this.”

Ed, 
So the draft document needs to update RFC4035 
thanks for pointing that out 
At one point we contemplated adding a bit to the NSEC signaling this was
a forged NSEC record, just to get around the text in RFC4035 :-) 

> 
> If you treat Cloudflare's implementation as a virtual wildcard record
> where every owner name implicitly exists, then IMHO the rationale in RFC
> 4035 (below) doesn't apply:
> 
> "That is, the signing process MUST NOT create NSEC or RRSIG RRs for
>  owner name nodes that were not the owner name of any RRset before the
>  zone was signed. The main reasons for this are a desire for namespace
>  consistency between signed and unsigned versions of the same zone
>  and  a desire to reduce the risk of response inconsistency in security
>  oblivious recursive name servers."
> 
> That said, Cloudflare's implementation appears to assert that the
> wildcard doesn't exist either - I've asked Olafur to check out the
> implications of that.

Ray 
Yes, we check for wild card match before generating the NSEC. 

Olafur


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to