On Tue, Jul 25, 2023 at 11:28 AM Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:

> On Tue, Jul 25, 2023 at 10:43:25AM -0700, Shumon Huque wrote:
>
> > Ok, yes, I understand now, thanks. An NXNAME ignorant validator
> > will treat a response to a query for the NXNAME type specifically
> > as bogus, and could spray a bunch of follow-on queries to other
> > servers for the zone before giving up and returning SERVFAIL.
> >
> > If the Compact DoE authority is specially defined to return only
> > "NSEC RRSIG" in the type bitmap for explicit NXNAME queries
> > for a non-existent name, doesn't that solve the problem?
>
> Yes, that could solve the problem, though NXNAME-aware resolvers would
> need a somewhat tricky cache state, that holds and returns:
>
>     - The NSEC record with the "NSEC RRSIG NXNAME" bitmap for most
>       RTYPEs
>     - The "NSEC RRSIG" bitmap if explicitly asked for NXNAME.
>
> The draft should describe the behaviour expected from auth servers,
> and validating resolvers, including their responses upstream.
>

Yes, we could certainly do that.


> To me a single signed record that proves NXDOMAIN regardless of the
> query RTYPE sure looks simpler!  The above is noticeably kludgier.
>

My preference would be to try to make this issue irrelevant by having
DNS servers treat meta-types specially and return an error, or at least,
in the case of resolvers, not cache any responses received for them.

One challenge is that there isn't a unique range that identifies metatypes.
Range 128 - 255 seems to unfortunately be for both meta-types  and q-types.
I did a quick test of BIND and Unbound just now - they return FORMERR
for almost all of this range, but respond to specific q-types they support
(IXFR/AXFR/*).

And then, there is the issue of the period of time where we are using
private RR type codes. There is no meta-type subset range in there that
is treated differentially.

Viktor - your original suggestion was to only define the ENT sentinel
instead of NXNAME. How would that solve the problem of systems and
applications needing to precisely obtain the NXDOMAIN signal. Resolvers
won't then be able to tell whether a NOERROR bitmap of "NSEC RRSIG"
is a normal ENT response  from a non Compact DoE implementation, or an
NXDOMAIN response from a Compact DoE implementation.


> Especially simple would be using just distinct combinations of
> "NSEC" and "RRSIG" for NXDOMAIN vs ENT, with no new sentinel
> types, provided resolvers can gracefully handle bare-bones
> bitmaps that include a proper subset of "NSEC RRSIG".
>

I think that suggestion would need detailed testing and also possible
arguments with DNSSEC protocol correctness people. The NSEC
record is designed to prove its own existence and is required to have
NSEC and RRSIG in its type bitmap if I recall.

Shumon.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to