On 7/29/17, 06:06, "DNSOP on behalf of Shane Kerr" <[email protected] on 
behalf of [email protected]> wrote:

>...
>I'm happy with error codes that are informational, but don't change client 
>behavior. Yes, I realize that users may be tricked, but that's also the case 
>today, right? 

If a receiver can't trust what it gets from the network, you can't run a 
protocol.  Dead in the water.

No matter what, what a receiver does next will depend on what it gets from the 
network (or doesn't get/timeout).  That happens now, in an unmanaged way.  
IMHO, it would be good to address that (the reactions, as opposed to 
elaborating on the error).

If you are worried about having trustable error codes, think of a way to secure 
the channel (like TSIG).  If you are worried and can't secure the channel, then 
it doesn't matter whether RCODES are extended or not - you have nothing 
trustable to act upon.  (See: dead in the water.)

Once you have faith that there's usefulness in the error/response code you do 
receive, then you can design what the reaction is.  (If you are worried, you 
need to do what is necessary to build the faith or this will not be solvable.)

I sent a long message urging that the response indicate the next step, not so 
much indicating what went bad.  I won't belabor that - my motivation comes from 
the observation that many folks are used to "debugging" DNS via query/resposnse 
as they are not the authorized operator of the answering system.  Extending 
RCODEs should be about solving the protocol's needs, not about preserving the 
ability of remote debugging of servers, leave that to the authorized operator.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to