> On 8 Aug 2023, at 10:58, Shumon Huque <shu...@gmail.com> wrote:
> 
> On Wed, Jul 26, 2023 at 11:05 PM Edward Lewis <edward.le...@icann.org> wrote:
> On 7/24/23, 1:55 PM, "DNSOP on behalf of Viktor Dukhovni" 
> <dnsop-boun...@ietf.org on behalf of ietf-d...@dukhovni.org> wrote:
> >    2.  That said, there are multiple ways to *distinguish* ENT vs. NXDOMAIN
> >        responses:
> >
> >            a.  Sentinel RTYPE for NXDOMAIN with just NSEC + RRSIG for ENT.
> >            b.  Sentinel RTYPE for ENT with just NSEC + RRSIG for NXDOMAIN.
> >            c.  Distinct sentinel RTYPEs for both ENTs and NXDOMAIN.
> >
> >    Presently, the draft is proposing option "a".  My point is that with "a"
> >    we get a response that is promising the existence of an RRset for a name
> >    that does not exist:
> 
> Launching off this observation (and realizing there's a whole thread 
> following it), I wanted to register some discomfort with this approach.
> 
> The definition of DNSSEC in RFC 4035 contains this paragraph:
> 
> #   An NSEC record (and its associated RRSIG RRset) MUST NOT be the only
> #   RRset at any particular owner name.  That is, the signing process
> #   MUST NOT create NSEC or RRSIG RRs for owner name nodes that were not
> #   the owner name of any RRset before the zone was signed.  The main
> #   reasons for this are a desire for namespace consistency between
> #   signed and unsigned versions of the same zone and a desire to reduce
> #   the risk of response inconsistency in security oblivious recursive
> #   name servers.
> 
> What is most significant in that text is the "desire for namespace 
> consistency between signed and unsigned versions of the same zone".  With 
> this proposal providing an answer that says "yes the name exists but it 
> doesn't have what you want" contradicts the unsigned response that would 
> indicate NXDOMAIN, there is an inconsistency in what is seen in the signed 
> and unsigned zone.
> 
> Note: I'm not trying to say "we have to stick to the old rules", I'm trying 
> to look at the environment in which the DNSSEC was born and how we went from 
> concept to reality (then).
> 
> Hi Ed,
> 
> It might be time to revise the spec to remove this constraint, which I 
> personally don't find very compelling. And besides, as a practical matter, 
> resolvers in the field don't appear to enforce this constraint in any way 
> that I can detect.
> 
> Compact DoE, and RFC4470 already appear to violate it for ENT responses. And 
> it was (arguably) already violated by pre-computed NSEC3 (5155), where an 
> empty non-terminal name (or rather the hash of it) does solely own an NSEC3 
> record.

You can’t query for NSEC3 records.  NSEC3 names do not prevent wildcard matches 
nor are NSEC3 records or their RRSIGs returned for * queries at the hashed 
name.  They are pure metadata.  NSEC3 records and their RRSIGs exist in their 
own namespace.

> Shumon.
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop


-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to