On Mon, May 11, 2015 at 12:10 PM, 神明達哉 <jin...@wide.ad.jp> wrote:
> At Sat, 9 May 2015 18:50:28 +0000, > Evan Hunt <e...@isc.org> wrote: > > > Actually, weirdly enough, after I implemented NTA's in BIND, one of the > > very first applications somebody came up with for them was to temporarily > > disable DNSSEC validation by setting an NTA for ".". This was seen as > > better than "rndc validation off" because he didn't have to send "rndc > > validation on" afterward; it would just quiety switch itself back on > > after a minute. It's... actually a pretty clever hack, and I don't > > really want to disable it. > > > > May I suggest: "An NTA placed at a node where there is a configured > > positive trust anchor takes precendence over that trust anchor, > effectively > > disabling it. Implementations MAY issue a warning when this occurs." > > Does this mean: > > A: All implementations that conform to this document should prefer the > NTA over the positive anchor in such a case, or > B: This is implementation-dependent, but if an implementation allows > the coexistence of positive and negative anchors, it should prefer > the NTA, or > C: something else? > > I don't have a strong opinion between A and B, but I'd like this > document to be clear on this. And, if it means A, I'd use an RFC2119 > keyword (it's probably a SHOULD). > > -- > JINMEI, Tatuya > I think "A" is the right answer. Otherwise you run into situations where you need an NTA, but it won't work. I am not even sure there is a good reason for a warning. The zone is supposed to be signed, but the signing is broken, and the resolver operator has determined that it is due to a mistake, and decided to apply an NTA, same as any other situation. Whether the signing comes from the root or a positive anchor seems irrelevant to me. -- Bob Harold
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop