> On 29 Oct 2019, at 23:04, Paul Wouters <[email protected]> wrote:
>
> On Tue, 29 Oct 2019, Neil Cook wrote:
>
>> FWIW, I've previously stated a preference for dropping the use of
>> ".well-known" entirely, and using draft-00's "resolver-info.arpa" name
>> instead of reverse-IP, in order to improve support for
>> passive forwarders. I understand this was changed in the hope of
>> offering some kind of security here with DNSSEC, but I think it's unlikely
>> to work in practice, and we're better off keeping
>> things simple.
>> I completely agree. I’d much rather see something like "resolver-info.arpa"
>> instead of reverse-IP.
>
> Throwing DNSSEC under the bus for a "simpler" name seems rather
> excessive. I for one would like to see DNSSEC in the reverse
> support when possible. For a future where not everything is
> chained to a single all-powerful LetsEncrypt root CA.
>
I’m certainly not against DNSSEC per-se. I do question what it’s actually being
used for in this situation and if it could actually work the way it is
currently specified. I’ve included my original comments on this below:
- For the DNS method, given that a resolver never knows if DNS proxies are
being used (in CPEs or elsewhere) or indeed what IP addresses are being used
behind those proxies, I would imagine that at a minimum it would need to answer
RESINFO queries for *all* RFC1918 addresses. This does then lead to the
question, why include the IP address in the query at all? I assume the answer
is “DNSSEC”, but see below for some more questions/comments on that.
- There is an acknowledgement "Erik Kline suggested using
"<reverse-ip>.{in-addr,ip6}.arpa" as the
domain name to allow for the possibility of DNSSEC-signed responses.”
I think it’s worth noting that RESINFO queries for private IP addresses will
never be able to generate DNSSEC-signed responses. Also given the restriction
"Authoritative servers MUST NOT answer queries that are defined in this
protocol.” it seems unlikely that many resolvers would be capable of generating
DNSSEC-signed responses, especially given that resolvers and authoritative
servers tend to be completely separate entities these days.
This also begs the question, why create that restriction at all? Why must
Authoritative Servers not answer those queries? The draft also states that "if
the resolver can be configured to also be authoritative for some zones, it can
use that configuration to actually be authoritative for the addresses on which
it responds.” Which seems to contradict the previous MUST NOT - surely this is
an implementation detail that should not be mentioned in an IETF draft?
Neil
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop