Hi Ondřej,

On 6/24/25 14:53, Ondřej Caletka wrote:
Our implementation first asks a validating resolver for the CDS RRSET of each domain, so 
we get a first pass from a "random" authoritative server. If this CDS RRSET 
already matches the current DS state, then we abort - because even if another 
authoritative server would return a different CDS RRSET it would mean the CDS RRSETs are 
inconsistent anyway.

If the CDS RRSET does indicate a change request to the status quo, we fetch ALL 
IP addresses for each nameserver hostname (from our own delegation data i.e. 
glue records if we have them) and also through a validating resolver. Then we 
ask each of these IPs directly for the CDS RRSET and compare the result to the 
initial answer from the resolver.

This seems to be a sensible approach. It will likely detect multi-signer 
inconsistencies while not being very resource intensive.

Thank you for raising this point in the original post of this thread! Indeed, 
this aspect was underspecified.

It looks like the approach described by Oli is considered reasonable, so I've 
added words along those lines to the draft:

NEW
   In order to determine plausible consistency of CDS/CDNSKEY or CSYNC
   RRsets across the child's nameservers, the Parental Agent MUST fetch
   all IP addresses for each nameserver hostname as listed in the
   Child's delegation from the Parent, using a validating resolver at
   one vantage point, and including glue records if available.  Before
   acting on any CDS/CDNSKEY or CSYNC record for the child, the Parental
   Agent MUST have established plausible consistency by querying all of
   these IP addresses for the record set(s) in question, as per the
   guidelines spelled in the following subsections.

Glad you insisted on this, better late than never! :-)

I'm going to submit a new revision of the draft with this change. Chairs, no 
other changes resulted from WGLC besides this one (and two trivial editorial 
clarifications, which will be evident from the diff).

Cheers,
Peter

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to