--- Begin Message ---
Victor,

> On Jan 19, 2021, at 10:53 AM, Viktor Dukhovni <[email protected]> wrote:
> 
> 
> Indeed for .COM the NSEC3PARAM RR does not match the actual policy, it
> shows the opt-out bit off.
> 
>    com. IN NSEC3PARAM 1 0 0 -
> 
> while actual DoE proofs carry the opt-out bit:
> 
>    CK0POJMG874LJREF7EFN8430QVIT8BSM.com. IN NSEC3 (
>        1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A
>        NS SOA RRSIG DNSKEY NSEC3PARAM )
> 
> It seems that the authoritative servers know to use opt-out via
> some other mechanism.

Please read RFC 5155 Section 4.1.2.  OK, I'll quote it here and save folks some 
time (note that section 4 is about the NSEC3PARAM record itself):

"4.1.2.  Flag Fields


   The Opt-Out flag is not used and is set to zero.

   All other flags are reserved for future use, and must be zero.

   NSEC3PARAM RRs with a Flags field value other than zero MUST be
   ignored."

IIRC, setting the "Opt-Out" bit in the NSEC3PARAM record is a BIND-ism needed 
to tell the inline signer to use Opt-Out.  It isn't officially part of the 
standard, though.

The use of Opt-Out does not define a new NSEC3 chain, unlike changing the hash 
algorithm, salt, or iterations.   While is generally makes no sense to do so, 
you could mix Opt-Out and non-Opt-Out NSEC3 records in a single zone and still 
comply with the standard.

Also note that NSEC3PARAM records have no use to recursive servers -- in no 
case does a DNSSEC validator use NSEC3PARAM.  They are intended to be consumed 
by authoritative servers so they can pick a NSEC3 chain.

--
David Blacka                      <[email protected]> 
Verisign Fellow            Verisign Product Engineering



--- End Message ---
_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Reply via email to