In message <5ca637ee-c0b6-4e5c-a446-a84431176...@fugue.com>, Ted Lemon writes: > > On Feb 7, 2017, at 11:45 AM, Warren Kumari <war...@kumari.net> wrote: > > I don't think I've seen a good argument for NOT doing the above -- why > > (other thabn the sunk time / effort) don't we do two? > > Right, this just seems obvious to me. If we do two, we can tailor each > solution to the need it is intended to fill, rather than trying to come > up with some compromise that isn't ideal for either case.
Because we want to prevent the names leaking any further than we have to and to not have the leaked names get SERVFAIL the solution to both is the same. The delegation properties are driven by privacy and the DNS protocol which includes DNSSEC because that is where the leaked names are being looked up. If you really do want to spend the time and effort to create two delegations when only one is needed the only difference is does the recursive server always instantiate the local empty zone or not. i.e. is it recursing rather than iterating to get answers for *.alt. The delegation in the root zone needs the same properties in both cases. For RFC 1918 zones named only instantiates the empty zone when the recursive server will iterate for answers. If it always forwards to another recursive server then the instantiation is blocked. You will note that 10.in-addr.arpa has a insecure delegation in the global dns namespace like every other locally served zone. They have such a delegations so that recursive server can give answers which can be validated regardless of whether the RFC 1918 address space is in use or not. We did good engineering for locally served zones (RFC 6303). Lets follow the good engineering there rather that religiously demand that the delegation be signed because the later does not work. The E in IETF is for ENGINEERING. Mark -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop