In message <e5ab0a08-0dda-496a-811e-25c1ba276...@nominum.com>, Ted Lemon writes
:
> 
> On Feb 9, 2017, at 8:57 PM, Mark Andrews <ma...@isc.org> wrote:
> > I'm developing software that will be run on private internets with
> > various degrees of compentence from the adminitrators as well as
> > the public Internet.  That private internet may have a ENT for ALT
> > that returns NXDOMAIN.  The server has to work in that environment.
> 
> I don't know what an ENT is.

Empty Non Terminal which is a quite common acronym in this group.

>   In any case, I don't see what this has to do with what we are talking
> about.   It is an absolute fact that if you want ALT queries not to leak
> you need to have a specially-configured recursive resolver,

Pray tell what specially-configured recursive resolver works?

> or else one that is really quite up to date.

Actually one from the future.  We don't have a RFC that say to perform
agressive negative caching.

> If you have one that is really quite
> up to date, a secure denial of existence will do the right thing.

Only if you also validate.

You are putting the "you can play bar" for privacy at the ceiling.

> So we are really just arguing about how to specially configure
> out-of-date resolvers.   This is really out of scope.   There is nothing
> dnsop can do to make sure that these queries do not leak, so we should
> just decide what the right design is assuming that all the moving parts
> are working correctly, and leave it at that.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to