>> As I understand it, this changes DNS caches so that for the root zone
>> its behavior is somewhere between a cache and a secondary master.  
>
>The cache remains precisely a cache.

I understand that it's still a cache in the DNS hierarchy, but in
operation, it's much more like a secondary master.  Like a secondary,
it bulk fetches the zone, answers all queries about that zone from its
own copy, and uses the SOA times to decide when to fetch again.
Unlike a secondary master, its answers don't have AA set, and if a
refetch fails, it falls back to being an ordinary cache rather than
continuing to serve what it has.  It also doesn't have anything like
notify or ixfr.

>> The reason I ask is that I have suggested in the past
>> that for DNSBLs or DNSWLs, which tend to have a lot of queries to
>> names that don't exist, a DNSSEC-aware cache could synthesize the
>> answers to reduce the load on the authoritative servers.  The response
>> from the dnsop crowd could politely be described as dismissive.
>
>Synthesizing positive answers in a signed zone is completely different than 
>sending NXDOMAIN.

No, I'm talking about synthesizing NXDOMAIN.  If a cache has A and C
with DNSSSEC info, then gets a request for B and it sees the NSEC link
A->C, it doesn't have to ask whether there is a B.  Like I said, the
reactions were at best dismissive.  When the cache verifies the zone I
presume it checks that it has the full chain of NSEC or NSEC3, so it's
doing the same thing, just as a batch check up front.

>> If you could cache in-addr.arpa, that would automagically do a
>> lot of what's in RFC 6303.  
>
>The number of bogus queries for in-addr.arpa has not been seen as a big issue.

It must have been at some point, since we have advice for caches to
locally intercept 10.in-addr.arpa and such.

>> Or the servers at various parts of the Foo
>> company could profitably cache foo.com, particularly if it's less
>> administrative and technical hassle than setting up a local shadow
>> master.
>
>Verisign could do this if they wanted.

No, not .com, foo.com, the organization's own 2LD zone.  An
organization's own 2LD is likely to be small, and to be heavily used
within its own organization.

>> the normal place.  These zones typically aren't DNSSEC signed for
>> various reasons, but it occurs to me that the issues are different
>> from the root, and allowing unsigned non-root zones could be OK.
>
>Could be OK, could also be an attack vector. For this document, which is about 
>the root, we want as much safety as we can muster.

I understand the security issues about the root, but wouldn't the
mechanism be exactly the same for any other zone?

R's,
John

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to