In message <86ac48c0-4dff-4286-a9b1-2a6be3d14...@hopcount.ca>, Joe Abley writes:
>
> On 13 Aug 2014, at 20:16, Mark Andrews <ma...@isc.org> wrote:
>
> >     Can we please move on this.
> >
> >     The reverse address are not yet insecurely delegated as
> >     would be required for RFC 6598 compliance.  This is starting

                correction RFC 6303

> >     to cause operational problems for ISP's that validate DNS
> >     responses as they can't deploy local IN-ADDR.ARPA zones
> >     until that insecure delegation is done.
> >
> >     Also should I add a reminder to the IANA Considerations that
> >     the insecure delegation needs to be performed?
> >
> >     e.g.
> >
> >     "IANA is reminded that a insecure delegation for these zones
> >     is required for compliance with RFC 6598 to break the DNSSEC
> >     chain of trust."
>
> I'm confused. We're talking about 100.64.0.0/10, I think. The only
> delegation under IANA's control is 100.in-addr.arpa to nameservers
> operated by ARIN, which is (and should be, I think) a secure delegation.
> What are you asking IANA to do? Make a request of ARIN? Something else?

The assignements go:

        0.0.0.0/0 IANA          (IN-ADDR.ARPA)
        100.0.0.0/8 ARIN        (100.IN-ADDR.ARPA)
        100.64.0.0/10 IANA      (64.100.IN-ADDR.ARPA through
                                 127.100.IN-ADDR.ARPA)

The 100.64/10 address range is assigned to IANA.  IANA has not yet
setup IN-ADDR.ARPA zones and servers for this range.  IANA needs
to tell ARIN to delegate them to somewhere insecurely.  A logical
place to delegate them to is the same servers that serve 100.IN-ADDR.ARPA
if ARIN is will to set up the zones on them otherwise IANA will
need to find a different set of servers to delegate to.  In either
case this will change the answer returned from a secure NXDOMAIN
from 100.IN-ADDR.ARPA to a insecure NXDOMAIN from 64.100.IN-ADDR.ARPA
for the reverse of 100.64.x.y.  Repeat for the other 63 zones in
the range.

This will break the DNSSEC chain of trust the same way as the
insecure delegation of 10.IN-ADDR.ARPA and the rest of the RFC 1918
reverse zones to the AS112 servers does.

RFC 6598 effectively says answer these locally with "don't forward
to the global internet".  This cannot currently be done if you are
validating answers as the only answer that will validate is a
NXDOMAIN response from 100.IN-ADDR.ARPA.  Once the insecure delegation
is in place these queries can be answered locally because the
validator will be told securely that there isn't a DS for
64.100.IN-ADDR.ARPA through 127.100.IN-ADDR.ARPA.

> More generally, if you are asking the chairs to facilitate the process of
> adoption of this draft by the dnsop wg, it might be as well to say so
> clearly (it's not obvious from your message above).

The draft is adopted. Went to last call then stalled. drc started
worrying about if there were other registries to be updated.

> Joe


-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to