> On 5 Nov 2020, at 15:49, fujiw...@jprs.co.jp wrote:
> 
>> From: Mark Andrews <ma...@isc.org>
>> One problem with DiS is that assumes that address records in the additional
>> section *always* come from the delegating zone (see how the hash is created).
>> This is not how DNS works.  Address records can, correctly, come from other
>> sources, even when the name is *below* the zone cut.
>> 
>> Take a server that serves example.net and sub.child.example.net.  That A 
>> record
>> comes from sub.child.example.net not example.net when the name of the server 
>> is
>> a.sub.example.net.
>> 
>>      child.example.net NS a.sub.example.net
>>      a.sub.example.net A 1.2.3.4
>> 
>> Mark

I ment
        child.example.net NS a.sub.child.example.net
        a.sub.child.example.net A 1.2.3.4

(which should have been obvious from the paragraph above)

> 
> "a.sub.example.net" is not a "in-domain" glue. (it is "sibling" glue).
> Then, DiS RR for child.example.net will be generated
> from "child.example.net NS a.sub.example.net".
> 
> Authoritative server of "child.example.net" responds
>  child.example.net NS a.sub.example.net in authority section
>  with/without a.sub.example.net A 1.2.3.4 as a glue in additional section.
> 
> Sibling glue "a.sub.example.net A 1.2.3.4" is not a target of DiS RR
> for "child.example.net NS".
> Validator can validate "child.example.net NS a.sub.example.net".
> 
> Validating resolver can accept the sibling glue "a.sub.example.net A 1.2.3.4".
> Or,
> validating resolver may reject the sibling glue "a.sub.example.net A 1.2.3.4",
> and treat it similar to out-of-bailing domain name,
> then, resolve "a.sub.example.net" A/AAAA from root (or child.exapmle.net).
> 
> Then I think the idea works.
> 
> --
> Kazunori Fujiwara, JPRS <fujiw...@jprs.co.jp>
> 
>>> On 4 Nov 2020, at 15:31, fujiw...@jprs.co.jp wrote:
>>> 
>>> I submitted draft-fujiwara-dnsop-delegation-information-signer-00.
>>> 
>>> Name:               draft-fujiwara-dnsop-delegation-information-signer
>>> Revision:   00
>>> Title:              Delegation Information (Referrals) Signer for DNSSEC
>>> Document date:      2020-11-03
>>> Group:              Individual Submission
>>> Pages:              6
>>> URL:            
>>> https://www.ietf.org/archive/id/draft-fujiwara-dnsop-delegation-information-signer-00.txt
>>> 
>>> DNSSEC does not have a function to validate delegation information.
>>> I think it is a large missing peace of DNSSEC.
>>> 
>>> I have a question why we did not include signature validation function
>>> to delegation information ?
>>> 
>>> Probably, because it is non-authoritative information.
>>> Or, because it was difficult to define the necessary and sufficient
>>> delegation information.
>>> 
>>> It is now widely agreed (although not explicitly documented) that the
>>> delegation information is the information used for name resolution and
>>> does not result in name resolution.
>>> 
>>> We have a word "in-domain" glue which is the necessary and sufficient glue.
>>> 
>>> And the idea may offer the signature for root priming data.
>>> 
>>> If someone interested the document, I would like time slot at dnsop WG
>>> meeting.
>>> 
>>> Regards,
>>> 
>>> --
>>> Kazunori Fujiwara, JPRS <fujiw...@jprs.co.jp>
>>> 
>>> _______________________________________________
>>> DNSOP mailing list
>>> DNSOP@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dnsop
>> 
>> -- 
>> Mark Andrews, ISC
>> 1 Seymour St., Dundas Valley, NSW 2117, Australia
>> PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org
>> 
>> 

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to