The point is that the current policy for the root precludes an
unsecure delegation.

On Sun, Nov 20, 2016 at 9:20 PM, Mark Andrews <ma...@isc.org> wrote:
>
> In message 
> <capt1n1kchdzvo+w0jyzx9+ozyi6t-dwuwq7-bz9smuumxsm...@mail.gmail.com>, Ted 
> Lemon writes:
>> Which do you want?   TLSA, or delegation?  You can't have both.
>
> From a technical perspective a insecure delegation for .localhost
> back to the root servers to break the DNSSEC chain of trust.  You
> can then populate a local .localhost how ever you see fit and have
> the answers validate as secure / insecure depending on whether the
> validator has a trust anchor for .localhost.
>
> As for the rest, we should not inflict the broken security model
> used here on every other use of domain names in this namespace.  It
> does not belong to just one service.  It the web want a namespace
> that is has these properties it can request one.  It shouldn't
> highjack an existing space.
>
> Mark
>
>> On Fri, Nov 18, 2016 at 6:52 AM, Mark Andrews <ma...@isc.org> wrote:
>> >
>> > As I said on the sunset4 mailing list this goes too far.
>> >
>> > I don't know about you but I want to be able to lookup TLSA records,
>> > SRV and other records types for foo.localhost and localhost.
>> >
>> > And by the way this also requires a insecure delegation in the root
>> > zone for DNSSEC to work with validating client.
>> >
>> > This isn't a good idea.
>> >
>> > Mark
>> > --
>> > Mark Andrews, ISC
>> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
>> > PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org
>> >
>> > _______________________________________________
>> > DNSOP mailing list
>> > DNSOP@ietf.org
>> > https://www.ietf.org/mailman/listinfo/dnsop
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to