Hi Olafur,

For an RD=0 query to a name server authoritative for the "." zone the client 
would send 12345, 23456.

For an RD=0 query to a name server authoritative for the evil.example zone, the 
client would send 9666, 6669.

For RD=1 queries, I propose that the client send key tags for the trust anchor 
whose name has the longest match to the query name.  So for an RD=1 query for 
verisign.com it would send 12345, 23456.  For 
www.evil.example<http://www.evil.example> it would send 9666, 6669.  Certainly 
I suppose the "." trust anchor could still validate the 
www.evil.example<http://www.evil.example> response but the client will have 
other queries that would result in the "." trust anchor being sent upstream.

DW

________________________________
From: Olafur Gudmundsson [o...@ogud.com]
Sent: Wednesday, July 29, 2015 9:19 PM
To: Wessels, Duane
Cc: IETF DNSOP WG
Subject: Re: [DNSOP] The EDNS Key Tag Option


On Jul 29, 2015, at 8:09 PM, Wessels, Duane 
<dwess...@verisign.com<mailto:dwess...@verisign.com>> wrote:

Seeing Warren's recent draft on updates of DNSSEC trust anchors encouraged
me to finish and submit what I think may be a better method for tracking
trust anchor updates.  I've described an edns-key-tag option, which puts
trust anchor key tags in the EDNS OPT record.  It is modeled after RFC
6975, which is a way that clients can signal to servers the DNSSEC algorithms
that they support.

https://datatracker.ietf.org/doc/draft-wessels-edns-key-tag/

Feedback would be welcomed.

Duane W.


Duane,

Question:
Validator has following TA’s configured
. 12345  and 23456
evil.example    9666 6669

The if the query is for
verisign.com<http://verisign.com>  what TA”S are returned
if the query is for
www.evil.example<http://www.evil.example>.   What TA’s are returned ?

Olafur


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to