On 28 May 2015, at 0:21, Mark Andrews wrote:

In message <[email protected]>, "Joe Abley" writ
es:

It's hard to know what you're testing (what gentypereport does), but if
you're looking for TLSA records in the ACCOUNTANT zone above, I'm not
sure why; new gTLD operators are constrained by contract as to the
RRTypes they're allowed to publish, and TLSA isn't one of them. It's not obvious that this is a problem for anybody, though; it's not like you'd
expect to see a TLSA RRSet in there.

genreport tests non meta types including a unknown type (below) and
checks the rcode returned.  For a name that exists the rcode should
be NOERROR.  You can also specify the type list on the command line
which is what I did for tlsa.

OK. I'm still trying to work out how it was that I could get NXDOMAIN/NOERROR+ANSWER=0 responses for TLSA queries when other people seem to struggle. I would have pasted the output at the time if I thought it was so interesting :-)

We have ICANN checking query rates and uptimes but not protocol
basics (like answering all non meta query types) prior to letting
new TLDs go live.

But again, the servers that serve the TLD zones pragmatically only have to serve the record types that are permitted in the zone in order to give end-users reasonable performance. There's no production reason I can think of that would result of a timeout from a query with QTYPE=TLSA to a zone that is certain never to serve a positive response, and which no client would ever expect to be there.

I certainly agree with you in principle that this kind of behaviour is deplorable and bad, but if it was fixed for these particular servers and zones the only noticeable effect would be less mail on this list.

ICANN's pre-delegation checklist includes some requirements for protocol compliance, but not all. I imagine it would have been much easier for them to be comprehensive in that area if there was a clear specification for the DNS and a clear test plan for verifying compliance. Mr Hoffman to the courtesy phone.


Joe
_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to