In message 
<capt1n1kchdzvo+w0jyzx9+ozyi6t-dwuwq7-bz9smuumxsm...@mail.gmail.com>, Ted Lemon 
writes:
> Which do you want?   TLSA, or delegation?  You can't have both.

>From a technical perspective a insecure delegation for .localhost
back to the root servers to break the DNSSEC chain of trust.  You
can then populate a local .localhost how ever you see fit and have
the answers validate as secure / insecure depending on whether the
validator has a trust anchor for .localhost.

As for the rest, we should not inflict the broken security model
used here on every other use of domain names in this namespace.  It
does not belong to just one service.  It the web want a namespace
that is has these properties it can request one.  It shouldn't
highjack an existing space.

Mark

> On Fri, Nov 18, 2016 at 6:52 AM, Mark Andrews <ma...@isc.org> wrote:
> >
> > As I said on the sunset4 mailing list this goes too far.
> >
> > I don't know about you but I want to be able to lookup TLSA records,
> > SRV and other records types for foo.localhost and localhost.
> >
> > And by the way this also requires a insecure delegation in the root
> > zone for DNSSEC to work with validating client.
> >
> > This isn't a good idea.
> >
> > Mark
> > --
> > Mark Andrews, ISC
> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org
> >
> > _______________________________________________
> > DNSOP mailing list
> > DNSOP@ietf.org
> > https://www.ietf.org/mailman/listinfo/dnsop
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to