Thanks, Ed, and sorry too late response.
> From: Edward Lewis <[email protected]>
> Date: Fri, 7 Jun 2013 07:33:57 -0400
>
> Yes, this is a problem. But I don't like any of the discussed solutions. I
> don't think that is surprising, I figure they are just ideas and
> unfortunately they all have bad side effects.
I agree. All solutions are not good.
> 4 - Add a dummy DS won't work because that kills opt-out. You can throw
> scaling to 100% out the window.
>
> My thoughts, based on the DNS-OARC presentation, was that this can be better
> treated at the "client" side.
>
> The trouble is we caved in and allowed recursive servers to use the NSEC{3}
> record to infer when they can send back an NXDOMAIN. Instead of allowing a
> cache to only use the NSEC(3) proof for the (name,class,type) - which is what
> it should be for - we allow recursives to make use is the span in the NSEC{3)
> to say that nothing would be there so I'm not going to ask.
>
> What I would suggest is restricting recursive servers to only using the proof
> for the name/class/type and in the case of the DS, in this rare case, boost
> the TTL used for the DS ncache'd answer to that of the NS set. And I mean
> the remaining TTL of the NS set already in the cache (elsewhere).
It is different from DNS/DNSSEC protocol.
Authoritative side cannot control validator implementations.
> Listening to the talk, I quickly realized that we have no degrees of freedom
> on the authority side, this has to be solved on the caching side. In the
> spirit of a quick response, the above is offered as a suggestion, it might
> have holes in it.
So, I happened to have thought dummy DS idea.
It is not good, but may solve this issue without changing DNS/DNSSEC
protocols and existing validators.
I will update the draft to add your suggestion.
Regards,
--
Kazunori Fujiwara, JPRS <[email protected]>
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop