You are wrong if you think the SOA record is only informal. It’s not, see https://www.rfc-editor.org/rfc/rfc2308 for more details.
Then > In a similar way, bind should not object to the SOA mail contect being valid, > as a surprising number of zones actually fail to handle mail to that address mixes things that **are** important to DNS (caches) and those that **aren’t** important to the DNS. You used that as a strawman argument and that never helps to have a useful discussion. Ondřej -- Ondřej Surý — ISC (He/Him) My working hours and your working hours may be different. Please do not feel obligated to reply outside your normal working hours. > On 7. 7. 2023, at 12:35, Jakob Bohm via bind-users <bind-users@lists.isc.org> > wrote: > > On 2023-07-07 12:17, Emmanuel Fusté wrote: >>> Le 07/07/2023 à 11:57, Jakob Bohm via bind-users a écrit : >>> >>> >>> On 2023-06-02 05:02, Jesus Cea wrote: >>>> On 2/6/23 4:25, Mark Andrews wrote: >>>>> Yep, some people just don’t take care with delegations. Complain to >>>>> Huawei. >>>>> Complain to the other companies you list in your followup email. >>>>> >>>>> All it takes to fix this is to change the name of the zone on the child >>>>> servers >>>>> (ns3.dnsv5.com, gns1.huaweicloud-dns.org and ns4.dnsv5.com) from >>>>> “huawei.com” >>>>> to “cloud.huawei.com” and perhaps adjust the NS and SOA records for the >>>>> zone >>>>> if they are fully qualified. If there are other delegations from >>>>> huawei.com >>>>> for other sub zones to these servers they will also need to be >>>>> instantiated. >>>>> >>>>> It’s maybe 10 minute work for each subdomain to fix. It just requires >>>>> someone >>>>> to do the work. >>>> >>>> I sympathize. Expertise and caring for the job is something the world is >>>> losing fast and few people care at all. Complaining to business is not >>>> going to work, because this misconfiguration works fine for 99.9% of their >>>> users, clients of more "lax" DNS resolvers. >>>> >>>> What I get from your reply is that BIND is not expected to do anything >>>> about this. It is a bit disappointed but I agree that BIND is doing the >>>> right thing. Too bad big players don't care. But I need to "solve" this, >>>> so dropping BIND (nooo!) or patching software is on my table now. >>>> >>>>> When people come to you and say that it works with Google, et al. point >>>>> them at >>>>> https://dnsviz.net/d/cloud.huawei.com/dnssec/ which reports this error >>>>> and say >>>>> “Here is a DNS configuration testing site and it reports the zone as >>>>> broken, you >>>>> need to take it up with the company." >>>> >>>> "Whatever, Google works and you don't. You sucks!". Few people care about >>>> doing the right thing if crap works for them. If only 8.8.8.8 cared and >>>> gave back SERVFAIL as it should, everybody would fix her configuration >>>> immediately. Postel law [*] was a mistake (be strict when sending and >>>> forgiving when receiving). Nice advice, awful consequences we will pay >>>> forever. >>>> >>>> https://en.wikipedia.org/wiki/Robustness_principle >>>> >>> >>> The robustness principle isn't the problem here. It is more that parts of >>> the >>> bind code isapparently being strict about receiving out-of-range values in >>> an >>> informational part ofDNS responses, then turning a mostly usable reply from >>> remote servers into a SERVFAIL of binds own making, rather than just >>> filtering >>> out that informational part if bind considers it worth checking at all. >>> >> It is at the core of delegation and trust model of DNS, now possibly >> enforced by DNSSEC. Peer centric resolvers are lax on this checking for all >> but the security of their users. >> So in your opinion it is purely useless, and bad data it better than >> nodata/error. >> > I am saying that the SOA copy in the authority section of responses is purely > informational, unlike the data that provides DNSSEC signatures or even the > data that provides IP addresses for servers in responses to MX queries. > > So from that perspective, if bind code checks that this informal copy of an > SOA record is for the wrong zone, it should simply filter out that SOA > record instead of filtering out the entire response to the actual query. > > In the special case of using that SOA copy to get the negative response TTL, > that special use should only check that the SOA copy was provided in the > same DNS response as the negative response to be cached, not the diagnostic > data about the origin server's zone files. > > In a similar way, bind should not object to the SOA mail contect being valid, > as a surprising number of zones actually fail to handle mail to that address > (I personally had to go through hoops with support people when trying to > coordinate a small change with another zone that I no longer had a business > relationship with, so validating this is useful in a compliance checker, but > not > in a caching resolver). > > Enjoy > > Jakob > -- > Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com > Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 > This public discussion message is non-binding and may contain errors. > WiseMo - Remote Service Management for PCs, Phones and Embedded > > -- > Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from > this list > > ISC funds the development of this software with paid support subscriptions. > Contact us at https://www.isc.org/contact/ for more information. > > > bind-users mailing list > bind-users@lists.isc.org > https://lists.isc.org/mailman/listinfo/bind-users
-- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users