On 08/07/2025 17:42, John Levine wrote:
It appears that Yorgos Thessalonikefs  <yor...@nlnetlabs.nl> said:
Various ways that could give resolution inconsistencies between
implementations (I am not considering the actual attack scenario because
noone cares about that resolution).

Different resolvers allow different lengths of CNAME chains before they give up.
I think that's much more likely to make a practical difference, but we've been
living with it for decades and dnsop has never provided definitive advice on
how to deal with it.

Why is this any more urgent?
For me it is the same issue. Both need to be solved coherently.
There is actually https://datatracker.ietf.org/doc/draft-fujiwara-dnsop-dns-upper-limit-values/ that tries to address such inconsistencies but it is off topic for this thread.

For CNAMEs specifically there is a rollercoaster of changed default values between implementations, configuration options so that users can shoot their own feet and still we get user issues because of CNAME abuse in CDNs. The standard allows anything so picking a value as a zone author/operator/maintainer needs prior knowledge of current default options in available resolves and possible well known installations with their own set values.

Btw, an honest question to the working group, is it more desirable for such issues, as the key tag collision we are discussing here and the CNAME chain length for example, to be addressed with a flag day or a standard document?

Best regards,
-- Yorgos

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to