>>>>> On Fri, 9 Apr 2004 08:32:12 +0300 (EEST), 
>>>>> Pekka Savola <[EMAIL PROTECTED]> said:

>> 2.2  Temporary Addresses
>> 
>> but this is not a strong opinion.

> I'd rather keep it in, to make it clearer to not confuse them with 
> non-RFC3041 addresses which just happen to be temporary, but as 
> RFC3041 is to be revised in any case, I think this may be better off 
> from the title, so I've removed it.

Okay.
 
>> >> 4. Section 4.5 (Behaviour of Glue in Mixed IPv4/IPv6 Environments)
>> 
>> For me, adding "name" to "the query" is enough (in fact, I'm not sure
>> what "other reasons" are referring to).  But again, it's not a strong
>> opinion and is up to you.

> Kept as is; "other reasons" may be due to e.g., the number of DNS
> record for the name that would have to be returned (in the
> *authorative* section) to be too large or inclusion of DNSSEC records
> for which either query name or additional records may not be
> appropriate. (However, as I don't know the details, I'm just being
> vague ;-).

Okay.
 
>> >> 6. Section 7.5 (DDNS with Dynamic Prefix Delegation)
>> 
>> (snip)
>> 
>> > The wording "at the site where the prefixes are delegated" seems to be 
>> > unclear.  I've reworded it to "at the site where the prefixes are 
>> > delegated to" to make it clearer.  I've also tried to clarify the 
>> > parentheses by spelling it out:
>> 
>> > 7.5  DDNS with Dynamic Prefix Delegation
>> 
>> >    In cases where a prefix, instead of an address, is being used and
>> >    updated, one should consider what is the location of the server where
>> >    DDNS updates are made. That is, where the DNS server is located:
>> 
>> >    1.  At the same organization as the prefix delegator.
>> 
>> >    2.  At the site where the prefixes are delegated to.
>> 
>> >    3.  Elsewhere, as specified by the delegated site; this is
>> >        security-wise typically equivalent to the previous case.
>> 
>> >    On one hand, securing the DDNS relationship for prefix delegation is
>> >    simpler if DNS server and the prefix delegator are in the same
>> >    administrative domain, and may be more difficult otherwise.
>> 
>> >    On the other hand, if the DNS server resides where the prefixes are
>> >    delegated to, it is easier to manage reverse DNS updates as they can
>> >    be done within a single administrative entity.  Similarly, then
>> >    configuring the reverse DNS is typically simpler as well (e.g., if
>> >    one wanted to insert a wildcard record).
>> 
>> The revised text basically looks okay except for one point: I'm not
>> sure about the rationale of the latter part of case 3: "this is
>> security-wise typically equivalent to the previous case."

> OK, let me try to clarify.  If you delegate the DNS delegation for a
> prefix to someone else, that someone else must configure the DNS
> server to accept such a delegation.  Because they don't just take
> delegations from strangers, we must assume that there is some form of
> relationship between the two.  Such relationship should be easily
> extendable to be a security relationship as well.

Hmm...I'm now feeling that I've been confused from the beginning.  So
before going further, please let me make the scenario.

Let's assume a site is delegated an IPv6 prefix P:x::/48.  Also assume
the prefix delegator has the authority of the DNS reverse tree for
P::/32.  Then,

In the above case 1, the prefix delegator does not delegate P:x::/48
in terms of DNS reverse tree.  Someone in the delegated site might
want to update RRs in the P:x::/48 part of the P::/32 zone at the
delegator.

In the above case 2, the prefix delegator does delegate P:x::/48 to
the (prefix) delegated site in terms of DNS reverse tree, too.
Someone in the delegated site might want to update RRs in the P:x::/48
zone managed in the same site.

In the above case 3, the prefix delegator does delegate P:x::/48 in
terms of DNS revers tree to some different organization which is not
the delegator or the delegated site.  Someone in the delegated site
might want to update RRs in the P:x::/48 zone managed in the different
organization.

Is my understanding correct?

                                        JINMEI, Tatuya
                                        Communication Platform Lab.
                                        Corporate R&D Center, Toshiba Corp.
                                        [EMAIL PROTECTED]
.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html

Reply via email to