Authors,

While reviewing this document during AUTH48, please resolve (as necessary) the 
following questions, which are also in the XML file.


1) <!-- [rfced] This document updates RFCs 4034 and 4035. Please review
the errata reported for these RFCs. We do not believe that any are
relevant to the content of this document, but please confirm.

https://www.rfc-editor.org/errata_search.php?rfc=4034
https://www.rfc-editor.org/errata_search.php?rfc=4035
-->


2) <!-- [rfced] Abstract: Will readers understand "Such answers" in the second
sentence below? Answers are not mentioned in the first sentence (but
"response" is).

Original:
   This document describes a technique to generate a signed DNS response
   on demand for a non-existent name by claiming that the name exists
   but doesn't have any data for the queried record type.  Such answers
   require only one minimally covering NSEC or NSEC3 record, allow
   online signing servers to minimize signing operations and response
   sizes, and prevent zone content disclosure.

Perhaps ("This technique"):
   This document describes a technique to generate a signed DNS response
   on demand for a non-existent name by claiming that the name exists
   but doesn't have any data for the queried record type.  The technique
   requires only one minimally covering NSEC or NSEC3 record, allows
   online signing servers to minimize signing operations and response
   sizes, and prevents zone content disclosure.

Or ("Such responses"):
   This document describes a technique to generate a signed DNS response
   on demand for a non-existent name by claiming that the name exists
   but doesn't have any data for the queried record type.  Such responses
   require only one minimally covering NSEC or NSEC3 record, allow
   online signing servers to minimize signing operations and response
   sizes, and prevent zone content disclosure.
-->


3) <!-- [rfced] We do not see "White Lies" mentioned in RFC 4470 (though NSEC 
and
online signing are mentioned). Are any updates needed?

Original:
   In the online
   signing model, described in NSEC and NSEC3 "White Lies" [RFC4470]
   [RFC7129], they are used to dynamically compute an epsilon function
   around the queried name.

Perhaps:
   In the online
   signing model, described in [RFC4470] and
   [RFC7129], they are used to dynamically compute an epsilon function
   around the queried name.

Or:
   In the online
   signing model, described for NSEC in [RFC4470] and for NSEC3 White Lies in
   [RFC7129], they are used to dynamically compute an epsilon function
   around the queried name.
-->


4) <!-- [rfced] Please review "at the name" and "at the same name" in these 
sentences. Are
these correct as it, or should these be updated to "for the name" and "for the
same name" (or something else)?

Original:
   A "Type Bit Maps" field in the data of the
   NSEC or NSEC3 record asserts which resource record types are present
   at the name.
   ...
   Tools that need to
   accurately identify non-existent names in responses cannot rely on
   this specific type bitmap because Empty Non-Terminal (ENT) names
   (which positively exist) also have no record types at the name and
   will return exactly the same Type Bit Maps field.
   ...
   The Type
   Bit Maps field lists the available Resource Record types at the name.
   ...
   can cause such functions to issue another query at
   the same name for an A record.
-->


5) <!-- [rfced] This text indicates that the technique described in this 
document
has two names ("Compact Denial of Existence" or "Compact Answers"), and
we see both used in the document. Would it be helpful to use one name
throughout the document? It seems that "Compact Denial of Existence" is
more common (and included in the document title). Let us know your
thoughts.

Original:
   This document describes an alternative technique, "Compact Denial of
   Existence" or "Compact Answers", to generate a signed DNS response on
   demand for a non-existent name by claiming that the name exists but
   has no resource records associated with the queried type, i.e., it
   returns a NODATA response rather than an NXDOMAIN response.
-->


6) <!-- [rfced] The first sentence below uses "has no resource records" while 
the
other two use "has no resource record sets" (note "sets"). Should these
be consistent?

Original:
   This document describes an alternative technique, "Compact Denial of
   Existence" or "Compact Answers", to generate a signed DNS response on
   demand for a non-existent name by claiming that the name exists but
   has no resource records associated with the queried type, i.e., it
   returns a NODATA response rather than an NXDOMAIN response.
   ...
   When the authoritative server receives a query for a name that
   exists, but has no resource record sets associated with the queried
   type, it generates a NODATA response, with a dynamically constructed
   signed NSEC record in the Authority Section.
   ...
   An Empty Non-Terminal is a special subset of this category, where the
   name has no resource record sets of any type (but has descendant
   names that do).
-->


7) <!-- [rfced] In the sentence below, is "next name field" correct? We see
"Next Hashed Owner Name field" and "Next Domain Name field" elsewhere in
the document.

Original:
   Unlike Compact Denial of Existence with NSEC, no special form of the
   next name field for unsigned referrals is needed.
-->


8) <!-- [rfced] We do not see "DNSSEC_OK" in past RFCs. The IANA registry at
<https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#dns-parameters-13>
uses "DNSSEC answer OK". May we update this sentence in one of the
following ways?

Original:
   This is
   generally possible for non-DNSSEC enabled queries, namely those which
   do not set the DNSSEC_OK EDNS flag (DO bit).

Perhaps:
   This is
   generally possible for non-DNSSEC enabled queries, namely those that
   do not set the EDNS header flag "DNSSEC answer OK" (DO bit).

Or:
   This is
   generally possible for non-DNSSEC enabled queries, namely those that
   do not set the DO bit ("DNSSEC answer OK") in the EDNS0 OPT header.
-->


9) <!-- [rfced] Will "signed NXNAME enhanced NODATA response" be clear to
readers?

Original:
   When this flag is sent in a query by a resolver, it indicates that
   the resolver will accept a signed NXNAME enhanced NODATA response for
   a non-existent name together with the response code field set to
   NXDOMAIN (3).

Perhaps:
   When this flag is sent in a query by a resolver, it indicates that
   the resolver will accept a NODATA response with a signed NXNAME for
   a non-existent name together with the response code field set to
   NXDOMAIN (3).
-->


10) <!-- [rfced] Please review "a Compact Denial authoritative server". Is the
intended meaning "an authoritative server implementing Compact Denial of
Existence"?

Original:
   In responses to such queries, a Compact Denial authoritative server
   implementing this signaling scheme, will set the Compact Answers OK
   EDNS header flag, and for non-existent names will additionally set
   the response code field to NXDOMAIN.

Perhaps:
   In responses to such queries, an authoritative server
   implementing both Compact Denial of Existence and this signaling scheme
   will set the Compact Answers OK
   EDNS header flag and, for non-existent names, will additionally set
   the response code field to NXDOMAIN.
-->


11) <!-- [rfced] We updated the following sentences to avoid using RFC number or
citation as an adjective. Specifically, we updated the following phrases:
"Happy Eyeballs [RFC8305] style", "RFC 8198 style", and "RFC 8020
style". Please review to ensure that the updates accurately convey the
intended meaning.

Original:
   Note that this
   is less of a concern with Happy Eyeballs [RFC8305] style of
   connection functions that typically issue back to back DNS queries
   without waiting for individual responses.
   ...
   In general, no online signing scheme that employs minimally covering
   NSEC or NSEC3 records (including this one) permits RFC 8198 style
   NXDOMAIN or wildcard response synthesis. Additionally, this protocol
   also precludes RFC 8020 style NXDOMAIN synthesis for DNSSEC enabled
   responses.

Updated:
   Note that this
   is less of a concern with connection functions like Happy Eyeballs
   [RFC8305] that typically issue back-to-back DNS queries without
   waiting for individual responses.
   ...
   In general, no online signing scheme that employs
   minimally covering NSEC or NSEC3 records (including this one) permits
   NXDOMAIN or wildcard response synthesis in the style described in
   [RFC8198].  Additionally, this protocol also precludes NXDOMAIN
   synthesis for DNSSEC-enabled responses in the style described in
   [RFC8020].
-->


12) <!-- [rfced] Should the instances of "Type Bit Maps" in the following
sentences be updated to "Type Bit Maps field"? Or are these correct as
they are?

Original:
   Note: as a practical matter, no known resolver insists that pseudo-
   types must be clear in the NSEC Type Bit Maps, so this restriction
   (prior to its revision) has posed no problem for the deployment of
   this mechanism.
   ...
   ...for responses to Empty Non-
   Terminals, they synthesized the NSEC Type Bit Maps to include all
   record types supported except for the queried type.
-->


13) <!-- [rfced] We use the <blockquote> element for OLD/NEW text. We have
included both the first paragraph and the note below within the <blockquote>
element. Please confirm that this is correct. If the note should not be
part of the updated text, we will adjust the <blockquote> element
accordingly.

Original:
   *  Bits representing pseudo-types MUST be clear, as they do not
      appear in zone data.  If encountered, they MUST be ignored upon
      being read.  There is one exception to this rule for Compact
      Denial of Existence (RFC TBD), where the NXNAME pseudo-type is
      allowed to appear in responses to non-existent names.

   Note: as a practical matter, no known resolver insists that pseudo-
   types must be clear in the NSEC Type Bit Maps, so this restriction
   (prior to its revision) has posed no problem for the deployment of
   this mechanism.
-->


14) <!-- [rfced] Table 1 and 3 are identical, as are Tables 2 and 5. We suggest
removing Tables 1 and 2 (and leaving the tables in the IANA section) and
updating the text in Sections 2 and 3.5 as follows. Would this be acceptable?

Current (Section 2)
   This specification defines the use of a synthetic resource record
   type to signal the presence of a non-existent name.  The mnemonic for
   this RR type is NXNAME, chosen to clearly distinguish it from the
   response code mnemonic NXDOMAIN.

Perhaps:
   This specification defines the use of NXNAME (128), a synthetic resource 
record
   type to signal the presence of a non-existent name. See Section 9. The 
mnemonic for
   this RR type is NXNAME, chosen to clearly distinguish it from the
   response code mnemonic NXDOMAIN.

Current (Section 3.5):
   Optionally, a DNS server MAY also include the following Extended DNS
   Error (EDE) code [RFC8914] in the response:

Perhaps:
   Optionally, a DNS server MAY also include the following Extended DNS
   Error (EDE) code [RFC8914] in the response: 30 (Invalid Query Type). See 
Section 9.
-->


15) <!-- [rfced] We updated <artwork> to <sourcecode> for the following:

Original:
  a.example.com. 3600 IN NSEC \000.a.example.com. RRSIG NSEC NXNAME

  sub.example.com. 3600 IN NSEC sub\000.example.com. NS RRSIG NSEC

    H64KFA4P1ACER2EBPS9QSDK6DNP8B3JQ.example.com. IN NSEC3 1 0 0 - (
                      H64KFA4P1ACER2EBPS9QSDK6DNP8B3JR NXNAME )


Please review whether the "type" attribute should be set for sourcecode
elements in the XML file. If the current list of preferred values for "type"
(https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types) does not
contain an applicable type, then feel free to suggest a new one.  Also, it is
acceptable to leave the "type" attribute not set.
-->


16) <!-- [rfced] Terminology

a) FYI - We updated the following forms to "Meta-TYPEs" per usage in RFCs 5155
and 6895 (normatively referenced in this document):

meta type
Meta-Type
meta-type


b) We see the following forms in the document. We updated to the latter. Let us
know any concerns.

Hashed Next Owner Name vs. Next Hashed Owner Name
  Note: Per RFC 5155.

Owner Name vs. owner name
  Note: Per RFCs 4034 and 4035.


c) We see the following forms in the document. Are any updates needed for
consistency?

Type Bit Maps field
NSEC Type Bit Maps field


d) If no objections, we will remove the hyphen from "non-existent" per the
Merriam Webster dictionary 
(https://www.merriam-webster.com/dictionary/nonexistent).
-->


17) <!-- [rfced] Abbreviations

a) FYI - We have added expansion(s) for the following abbreviation(s)
per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
expansion in the document carefully to ensure correctness.

Delegation Signer (DS)


b) The following are used throughout the document. If no objections, we will
update to use the abbreviation after the expansion upon first use.

Empty Non-Terminal
empty non-terminal
ENT


c) We see instances of both "queried name" and "QNAME" in the document, with
one instance of QNAME as the abbreviation of "queried name" (see below). Would 
it
be helpful to update all instances of "queried name" to "QNAME"? We note that
QNAME is defined in RFC 9499, but "queried name" is not.

Original:
   When the authoritative server receives a query for a non-existent
   name in a zone that it serves, a NODATA response (response code
   NOERROR, empty Answer section) is generated with a dynamically
   constructed NSEC record with the owner name matching the queried name
   (QNAME) placed in the Authority section.
-->


18) <!-- [rfced] Please review the "Inclusive Language" portion of the online 
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed.  Updates of this nature typically
result in more precise language, which is helpful for readers.

For example, please consider whether the following should be updated: 
term A, term B, term C, etc.

White Lies
Black Lies

In addition, please consider whether the two instances of "traditional" should
be updated for clarity.  While the NIST website
<https://web.archive.org/web/20250214092458/https://www.nist.gov/nist-research-library/nist-technical-series-publications-author-instructions#table1>
indicates that this term is potentially biased, it is also ambiguous.
"Traditional" is a subjective term, as it is not the same for everyone.

Original:
   However, an existing implementation of
   traditional NSEC3 online signing migrating to Compact Denial of
   Existence may find it simpler to do so with NSEC3 than implementing
   NSEC from scratch.
   ...
   If the motivating aspects of this specification (minimizing response
   size and computational costs) are not a concern, DNSSEC deployments
   can opt for a different method (e.g., traditional online signing or
   pre-computed signatures), and avoid imposing the challenges of
   NXDOMAIN visibility.
-->


Thank you.

RFC Editor/rv



On Jul 31, 2025, at 5:02 PM, rfc-edi...@rfc-editor.org wrote:


*****IMPORTANT*****

Updated 2025/07/31

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and 
approved by you and all coauthors, it will be published as an RFC.  
If an author is no longer available, there are several remedies 
available as listed in the FAQ (https://www.rfc-editor.org/faq/).

You and you coauthors are responsible for engaging other parties 
(e.g., Contributors or Working Group) as necessary before providing 
your approval.

Planning your review 
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

  Please review and resolve any questions raised by the RFC Editor 
  that have been included in the XML file as comments marked as 
  follows:

  <!-- [rfced] ... -->

  These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors 

  Please ensure that you review any changes submitted by your 
  coauthors.  We assume that if you do not speak up that you 
  agree to changes submitted by your coauthors.

*  Content 

  Please review the full content of the document, as this cannot 
  change once the RFC is published.  Please pay particular attention to:
  - IANA considerations updates (if applicable)
  - contact information
  - references

*  Copyright notices and legends

  Please review the copyright notice and legends as defined in
  RFC 5378 and the Trust Legal Provisions 
  (TLP – https://trustee.ietf.org/license-info).

*  Semantic markup

  Please review the markup in the XML file to ensure that elements of  
  content are correctly tagged.  For example, ensure that <sourcecode> 
  and <artwork> are set correctly.  See details at 
  <https://authors.ietf.org/rfcxml-vocabulary>.

*  Formatted output

  Please review the PDF, HTML, and TXT files to ensure that the 
  formatted output, as generated from the markup in the XML file, is 
  reasonable.  Please note that the TXT will have formatting 
  limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email using ‘REPLY ALL’ as all 
the parties CCed on this message need to see your changes. The parties 
include:

  *  your coauthors

  *  rfc-edi...@rfc-editor.org (the RPC team)

  *  other document participants, depending on the stream (e.g., 
     IETF Stream participants are your working group chairs, the 
     responsible ADs, and the document shepherd).

  *  auth48archive@rfc-editor.org, which is a new archival mailing list 
     to preserve AUTH48 conversations; it is not an active discussion 
     list:

    *  More info:
       
https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc

    *  The archive itself:
       https://mailarchive.ietf.org/arch/browse/auth48archive/

    *  Note: If only absolutely necessary, you may temporarily opt out 
       of the archiving of messages (e.g., to discuss a sensitive matter).
       If needed, please add a note at the top of the message that you 
       have dropped the address. When the discussion is concluded, 
       auth48archive@rfc-editor.org will be re-added to the CC list and 
       its addition will be noted at the top of the message. 

You may submit your changes in one of two ways:

An update to the provided XML file
— OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit 
list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem
beyond editorial in nature, e.g., addition of new text, deletion of text, 
and technical changes.  Information about stream managers can be found in 
the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email stating
that you approve this RFC for publication.  Please use ‘REPLY ALL’,
as all the parties CCed on this message need to see your approval.


Files 
-----

The files are available here:
  https://www.rfc-editor.org/authors/rfc9824.xml
  https://www.rfc-editor.org/authors/rfc9824.html
  https://www.rfc-editor.org/authors/rfc9824.pdf
  https://www.rfc-editor.org/authors/rfc9824.txt

Diff file of the text:
  https://www.rfc-editor.org/authors/rfc9824-diff.html
  https://www.rfc-editor.org/authors/rfc9824-rfcdiff.html (side by side)

Alt-diff of the text (allows you to more easily view changes 
where text has been deleted or moved):
  https://www.rfc-editor.org/authors/rfc9824-alt-diff.html

Diff of the XML: 
  https://www.rfc-editor.org/authors/rfc9824-xmldiff1.html


Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
  https://www.rfc-editor.org/auth48/rfc9824

Please let us know if you have any questions.  

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC9824 (draft-ietf-dnsop-compact-denial-of-existence-07)

Title            : Compact Denial of Existence in DNSSEC
Author(s)        : S. Huque, C. Elmerot, O. Gudmundsson
WG Chair(s)      : Benno Overeinder, Ond?ej Surý

Area Director(s) : Mohamed Boucadair, Mahesh Jethanandani

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to