Hi Vernon,

Thanks for your advice, :-)

Vernon Schryver <v...@rhyolite.com>于2017年8月15日周二 下午2:52写道:

> > From: Lanlan Pan <abby...@gmail.com>
>
> > Don't judy other's motivation with meaningless skeptics. The endless
> > skeptics can also push on your RPZ to DNSSEC.
>
> A significant difference between RPZ and the SWILD is that RPZ does
> not depend on non-participants doing anything.  For example, RPZ works
> fine on a single, isolated resolver.
> (Of course, the owners of the IETF printing presses would have to
> agree to publish anything, but publishing a description is neither
> implementing nor deploying.)
>
> The history of RPZ might suggest a temporary solution.  Why not implement
> SWILD using a private rtype or perhaps even TXT?  An implementation
> and a few 1000 installations might convince some skeptics and render
> many objections moot.
>

Yeah,  TXT is my history plan: Recursive Resolvers that support wildcard
detect method with TXT record
<https://github.com/abbypan/dns_wildcard_on_intermediate_nameservers/blob/a4188548c87b6a10af45aa23575b86d9f33f39ec/draft.txt>

>
>
> > DNSSEC deployment will sharply rise if global nameservers desire *dns
> > security*, but almost impossible because of an addtional wildcards
> feature.
>
> I don't understand that.  My zones have plenty of wildcards, but as
> far as I can tell, no new wildcard features will break my DNSSEC
> signatures.
>
> I don't understand "global nameservers [desiring] dns security".
> Are "global nameservers" resolvers or authorities?

If they are resolvers, then there is absolutely no immediate prospect
> of many (any?) resolvers that might be called "global" dropping
> unsigned DNS data.
>

Both recursives and authoritatives.
I mean more and more recursives and authoritatives enable DNSSEC for dns
query by default configuration, sorry for my poor English.

If they are authorities, then I thought that the reasons why almost
> all com zones are unsigned are well understood, recently listed here,
> and have nothing to do with wildcards.  What am I missing?
> http://scoreboard.verisignlabs.com/
> http://scoreboard.verisignlabs.com/percent-trace.png


The deployment problem is on the Authoritative Nameservers of billions of
second level domains,  not on TLD.
And Recursive must enable DNSSEC validation for dns query by default
configuration.


>
>    .......................
>
> ] From: Mark Andrews <ma...@isc.org>
>
> ] I can't see how you can say push your RPZ to DNSSEC as RPZ breaks
> ] DNSSEC.
>
> I describe the same facts as the opposite, as "either DNSSEC breaks RPZ
> or DNSSEC and RPZ work together perfectly well"  (in either case,
> assuming a trusted path such as (trusted) localhost name or 127.0.0.1
> address to a trusted resolver, where "trusted resolver" includes
> "trusted to rewrite."  Of course, without a trusted path to a trusted
> resolver or a verifying stub, DNSSEC doesn't mean much.)
>
> As Mark Andrews understands but many people don't, the common RPZ
> implementation parameter "BREAK-DNSSEC yes" does NOT mean "RPZ breaks
> DNSSEC", but "RPZ should ignore DNSSEC request bits despite the fast
> that RPZ invalidates and removes signatures and so verifying stubbs
> and verifying downstream resolvers will not accept rewritten answers."
>
> Also, in the two RPZ implementations I've written, the default
> BREAK-DNSSEC value is "no" so that requesting DNSSEC turns off RPZ.
>
>
> Vernon Schryver    v...@rhyolite.com
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
-- 
致礼  Best Regards

潘蓝兰  Pan Lanlan
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to