* Stephane Bortzmeyer [2015-04-22 16:16]:
> On Wed, Apr 22, 2015 at 03:12:24PM +0200,
>  Stephane Bortzmeyer <bortzme...@nic.fr> wrote 
>  a message of 30 lines which said:
> 
>> IMHO, all the name servers should reply NXDOMAIN, no?
> 
> Or could it be a "minimum response", intended to prevent zone
> enumeration?

It's not minimal, the hash range is very large (wraparound record from
D9D... to VVV... and 000... to 4DL...), covering the hashes of the query
name, wildcard name and closest encloser.
> d9dhvu2eiln97dgi23tkh43hq2uvh7uq.adult. 829 IN NSEC3 1 1 1 D399EAAB 
> 4DLOEEUR1VQ4LQ6N7QUS62O2MAIUPGRM NS SOA RRSIG DNSKEY NSEC3PARAM

I'd expect NXDOMAIN, too. Apart from an unusual rcode, the response
looks valid. Does this qualify as a protocol violation?

Regards,
Matt

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to