On Wed, Jul 26, 2023 at 11:05 PM Edward Lewis <edward.le...@icann.org>
wrote:

> On 7/24/23, 1:55 PM, "DNSOP on behalf of Viktor Dukhovni" <
> dnsop-boun...@ietf.org on behalf of ietf-d...@dukhovni.org> wrote:
> >    2.  That said, there are multiple ways to *distinguish* ENT vs.
> NXDOMAIN
> >        responses:
> >
> >            a.  Sentinel RTYPE for NXDOMAIN with just NSEC + RRSIG for
> ENT.
> >            b.  Sentinel RTYPE for ENT with just NSEC + RRSIG for
> NXDOMAIN.
> >            c.  Distinct sentinel RTYPEs for both ENTs and NXDOMAIN.
> >
> >    Presently, the draft is proposing option "a".  My point is that with
> "a"
> >    we get a response that is promising the existence of an RRset for a
> name
> >    that does not exist:
>
> Launching off this observation (and realizing there's a whole thread
> following it), I wanted to register some discomfort with this approach.
>
> The definition of DNSSEC in RFC 4035 contains this paragraph:
>
> #   An NSEC record (and its associated RRSIG RRset) MUST NOT be the only
> #   RRset at any particular owner name.  That is, the signing process
> #   MUST NOT create NSEC or RRSIG RRs for owner name nodes that were not
> #   the owner name of any RRset before the zone was signed.  The main
> #   reasons for this are a desire for namespace consistency between
> #   signed and unsigned versions of the same zone and a desire to reduce
> #   the risk of response inconsistency in security oblivious recursive
> #   name servers.
>
> What is most significant in that text is the "desire for namespace
> consistency between signed and unsigned versions of the same zone".  With
> this proposal providing an answer that says "yes the name exists but it
> doesn't have what you want" contradicts the unsigned response that would
> indicate NXDOMAIN, there is an inconsistency in what is seen in the signed
> and unsigned zone.
>
> Note: I'm not trying to say "we have to stick to the old rules", I'm
> trying to look at the environment in which the DNSSEC was born and how we
> went from concept to reality (then).
>

Hi Ed,

It might be time to revise the spec to remove this constraint, which I
personally don't find very compelling. And besides, as a practical matter,
resolvers in the field don't appear to enforce this constraint in any way
that I can detect.

Compact DoE, and RFC4470 already appear to violate it for ENT responses.
And it was (arguably) already violated by pre-computed NSEC3 (5155), where
an empty non-terminal name (or rather the hash of it) does solely own an
NSEC3 record.

Shumon.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to