On 2/25/15, 9:03, "Havard Eidnes" <h...@uninett.no> wrote:

>Hmm.
>
>Firstly, isn't this "child-centric resolver" / "parent-centric
>resolver" simply an euphemism papering over the more distinct
>"correctly" and "wrongly" implemented resolver?

That’s my thought exactly.  (But that doesn’t mean the terms needn’t be
given definitions.)

>A correctly
>implemented resolver implements the DNS authority model, and to do
>that requires that the resolver replaces non-authoritative cached data
>with more authoritative data whenever it is obtained.

To put a sharper point on this, this is documented as “trustworthiness” in
“Clarifications to the DNS Specification” [RFC 2181] inside section 5.4.1
on “Ranking Data."

I’ve seen a case of a resolver that favored the parent NS set over a child
NS set (and glue), which led to a cache poisoning event.  A delegation
that was transferred forgot to remove the glue records in the TLD, an
apparently disgruntled employee aware of this left the company, registered
a new domain that made use of the glue record.  (I’m omitting details to
make this quick.)  The net result is that the caches following this model
quickly favored the stale glue over the fresh authoritative answer,
victimizing the registrant.

Nevertheless, giving the practice a name will make it easier to explain to
someone why it’s a bad idea.

>  The perhaps
>most prominent example of non-authoritative data is the copy of the NS
>RRset from the child zone which exists in the parent zone.

And/or the glue.

>>Phantom domain: ...
>
>Again, I'd simply call a resolver allowing this situation to persist
>to be "wrong/buggy".

In operations, you have to deal with the bad a lot - in fact, by the very
nature of the bad being bad, you deal more with the bad than the good.
(The good is hidden under automation.)  Giving names to the bad is very
helpful for that reason.  (Root cause voice call recordings, staff
turnover, these are places where common terminology is helpful regardless
whether the term describes something good or something bad.)

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to