In message <e0a42577-0984-4add-8658-91413cbe7...@fugue.com>, Ted Lemon writes: > > On Feb 8, 2017, at 1:02 AM, Mark Andrews <ma...@isc.org> wrote: > > Which assumes agggressive negative caching. I'm going to make a > > realistic assumption that it will take 10+ years for there to be > > meaningful (>50%) deployment of aggressive negative caching. > > First of all, this probably isn't true, since most of the caches we care > about are run by network operators, who tend to update more frequently > for obvious reasons. But the solution you propose, which causes a > SERVFAIL, involves a specially-prepared resolver. So if you get to > _create_ the problem with a specially-prepared resolver, I get to solve > it with a differently specially-prepared resolver. If you want queries > to .alt not to leak, you have to preload your cache with a proof of > nonexistence for .alt, and you have to keep it up to date. This is not > terribly difficult to arrange. > > >> Leaking a query to .alt is harmless. > > > > Is it? What reports are we going to see over the next 20 year of > > DITL data on *.alt. > > How is that relevant? Suppose we don't create .alt, and instead people > just pick random top-level domains for their experiments, as they do now. > Will the number of bogus queries to the root be greater, or fewer? > Furthermore, queries for .alt are legitimate, in just the same way that > queries for .com are. They just have a different answer.
Me, I'm trying to prevent the SERVFAIL issues the IETF has created for .onion. In particular this from RFC7686 4. Caching DNS Servers: Caching servers, where not explicitly adapted to interoperate with Tor, SHOULD NOT attempt to look up records for .onion names. They MUST generate NXDOMAIN for all such queries. Without .onion being a insecurely delegation this results in SERVFAIL or BOGUS being returned for .onion named when validation is performed by any validating software that is not RFC7686 aware. Nameserver vendors have a choice. Follow RFC7686 and have their clients get a answer that they know cannot be validated or ignore this clause and pretend that RFC7686 has never been written so that their client get a validatable answer. Should the IETF have put Nameserver vendors in this position? At this stage we have not yet implemented this clause in BIND. We are aware of RFC7686 and at some point someone will complain that we don't implement this. At that point we will point out to them that this results in SERVFAIL or bogus being returned. Note all through the debate about .onion I raise this issue. Go look at the archives. Now draft-ietf-dnsop-alt-tld-07 has almost identical wording 4. Caching DNS servers SHOULD recognize these names as special and SHOULD NOT, by default, attempt to look up NS records for them, or otherwise query authoritative DNS servers in an attempt to resolve these names. Instead, caching DNS servers SHOULD generate immediate negative responses for all such queries. This clause results in BOGUS or SERVFAIL being returned to the DNS application if there is a validator in the return DNS path between the caching DNS server and the application. Mark -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop