Mark Andrews <ma...@isc.org>于2017年8月15日周二 下午1:14写道:
> > In message < > canljsvwyo0nbisjgsqhrh33evbcuflnzcjceahj-l89fa+e...@mail.gmail.com> > , Lanlan Pan writes: > > > > Hi Paul, > > > > Don't judy other's motivation with meaningless skeptics. The endless > > skeptics can also push on your RPZ to DNSSEC. > > I can't see how you can say push your RPZ to DNSSEC as RPZ breaks > DNSSEC. > Just for compare example, I mean that I also can't see how Paul can say SWILD is to reduce DNSSEC deployment. Not depend on, is not equal to , reducing deployment. > > As an network engineer, I think good faith is face to the realistic > > internet world, try my best to offer a better solution to technology > > problem. > > > > If we anticipated the subdomain wildcard scenario when designing wildcard > > years ago, *make Authoritative give more precise wildcard information to > > Recursive* (SWILD) is natually. > > SWILD is not starting from "desire", not to mention "reducing DNSSEC > > deployment". > > > > *1) I believe, reduce solution interdependence between different problem > > areas is comfortable.* > > > > Subdomain wildcard cache issue solution is not need to bind with security > > issue, in natural. > > Only if you believe spoofed responses can't be delivered. > Everyone knows spoofed response can be delivered, that is why DNSSEC exists. SWILD can work with DNSSEC validation, and save validation cost. DNSSEC-enabled Recursive only need validate SWILD RR one time, not need calculate/match NSEC3/NSEC5/... for yyy/zzz/.foo.com range. > > > *2) I believe, design an alternative solution to an existed problem is > > ordinary.* > > > > IPv4/IPv6 Migration can use Tunnel, NAT, ... > > And that is a problem for router vendors and OS developers because > they end up having to implement them all. Part of the reason there > aren't lots of CPE Routers today that support IPv6 is that the > vendors have to spend lots of $$$$$$ implemententing and testing > all the different transition mechanisms. If they don't want to > spend lot of $$$$$$ then there is no real guidance on what mechanisms > to discard. > > > Subdomain wildcard cache optimization can use NSEC aggressive wildcards, > > SWILD, ... > > > > You can oppose to SWILD, but wish you not oppose to the alternative > > solution designing. > > > > *3) I believe, network protocol / feature deployment progress is decided > > by the key function, not because of additional function.* > > > > IPv6 deployment will sharply rise mostly because of *IPv4 addresses > > exhaustion*, but almost impossible because of any improved IPv6 featue > > that IPv4 not have, such as MTU detect, auto addressing, built in IPsec, > ... > > DNSSEC deployment will sharply rise if global nameservers desire *dns > > security*, but almost impossible because of an addtional wildcards > feature. > > > > That is why I say "SWILD has no influnence on reducing DNSSEC > deployment", > > going further, "NSEC aggressive wildcard has no influnence on rising > > DNSSEC deployment". > > > > Repeat the Google example, as far as I can see: > > - Google has expert on NSEC aggressive wildcard. > > - Google likes to support some optimized protocols/features, such as > QUIC, > > SPDY, ... > > > > Nowadays: dig @ns1.google.com xxxxxxxx.google.com +dnssec, only return > > NXDOMAIN. > > Sum it up, I believe Google will deploy DNSSEC because of DNS SECURITY > NEED > > in future, more probability than because of NSEC aggressive wildcards. > > Google validates answers on its recursive servers so Google has already > partially deployed DNSSEC. > My example is Google's Authoritative Server, ns1.google.com. > > Mark > -- > Mark Andrews, ISC > 1 Seymour St., Dundas Valley, NSW 2117, Australia > PHONE: +61 2 9871 4742 <+61%202%209871%204742> INTERNET: > ma...@isc.org > -- 致礼 Best Regards 潘蓝兰 Pan Lanlan
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop