>> What I envision for the future is an insecure delegation of .alt, and an >> option in future cable modems to enable a local "homenet.alt" domain, which >> would just work, even if some stub resolvers in the house are validating. >> The cable modem is already a recursive resolver or forwarder, and dhcp >> server, so it seems a logical place for the local domain. > >No, it won't just work if a stub is validating, because the validating >stub will want to validate the delegation from the parent, and that >will be a proof of non-existence. ...
Yeah. It seems to me that if we want DNSSEC to work for locally served DNS subtrees, we need some way to distribute trust anchors for the subtrees to those cable modems. While that is probably not an insoluble problem, it is not one that I would plan to solve any time soon, so it's one I would prefer to address separately. >This is part of why I don't want to extend alt this way, and the more >I think about it the less desirable it seems to me. We have a >particular problem: non-DNS-protocol switching for applications that >want to use a DNS-compatible domain name slot (see RFC 5890). Agreed. Say that you can do anything you want with .ALT (duh) but you SHOULD NOT resolve .ALT names via the DNS protocol because of the DNSSEC problems. To minimize leakage, we can use the tools we already have: qname minimization, local mirrors of the root, and special casing in DNS caches as many now do for .onion. R's, John _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop