Hi Matthew & Paul,

Good question, :-)

SWILD is a feature just for recusive cache optimization, only dealing with
the wildcard subdomain issue (with no nodes below).
DNSSEC + NSEC aggressive is security feature, with cryptographic contents
such as KSK/ZSK/NSEC/NSEC3/NSEC5/...

My assumption is: *we can give recursive server an alternative solution for
wildcard subdomain cache issue, not need to depend on DNSSEC.*
Authoritative server just simply add one SWILD RR, not much deploy cost.
Recursive server can add SWILD support if it has an interest in wildcard
subdomain cache optimization,  it is OPT-IN.

*I don't expect implementers would adopt SWILD 100% before adopting
DNSSEC+NSEC aggressive. Just give an alternative choice, implementers can
decide adopting or not, before or after, we won't pre-select for them.*
Even if both Authoritative server and Recursive server support DNSSEC+NSEC
aggressive, when will they configure default dns query with dnssec ? (for
NSEC agreesive cached deduced wildcard)

As old features, why DNSSEC + NSEC is not forthcoming global deployed ?
(maybe an old question, tired of discussing)
Both Authoritative server and Recursive server consider about the DNSSEC
validation cost / DDoS.
Authoritative's Zone Enumeration risk, NSEC -> NSEC3 -> NSEC5 -> ???
other reasons...
For example, Google likes to support some optimized protocols/features,
such as QUIC, SPDY, ...
dig @ns1.google.com xxxxxxxx.google.com +dnssec ,  only return NXDOMAIN.

Matthew Pounsett <m...@conundrum.com>于2017年8月11日周五 下午10:39写道:

> On 11 August 2017 at 01:02, Lanlan Pan <abby...@gmail.com> wrote:
>

>
>>> We can get even better behavior from aggressive NSEC use. Here are
>>> advantages of aggressive NSEC use:
>>> - does not require changes to existing authoritatives or signed zones
>>> - less fragile (if we consider manual SWILD specification as an option)
>>> - supports wildcards with nodes below it
>>>
>>
>> Yes, aggressive NSEC use has advantages if:
>> 1) AUTH give NSEC RR.
>> 2) Every Intermediate Resolver supports DNSSEC validating and the NSEC
>> aggressive use.
>>
>
> It sounds like you're assuming that SWILD would be supported by caching
> servers that do not support DNSSEC or NSEC aggressive use.  Why do you
> expect implementers would adopt SWILD before adopting these much older
> features?
>
>
>
>>
>> Yes, the aggressive NSEC is limited to DNSSEC-signed zones. I think that
>>> is okay: New features are provided only by the latest version of
>>> the protocol.
>>>
>> But:
>> 1) many wildcards occupy the Resolver cache, with no nodes below them.
>> 2) many wildcards AUTH not give NSEC RR.
>> 3) many resolvers not support DNSSEC validating, not to mention NSEC
>> aggressive use.
>>
>> On the view of new feature, SWILD can be an alternative simpler choice to
>> deploy.
>>
> --
致礼  Best Regards

潘蓝兰  Pan Lanlan
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to