Firstly they are HOME.ARPA servers.  Just because they are the same physical 
servers it doesn’t mean that policy for the root zone content has to apply to 
other zones on that server.  Maintaining that distinction is important.  

Secondly a otherwise empty zone on these servers will fulfil the requirements 
to provide a insecure delegation.  Just drop the DNAME from the zone contents 
below.  All the servers involved can serve SOA and NS records and return 
NXDOMAIN for names under HOME.ARPA.

If you need to delegate to a different set of servers create a seperate 
constellation of servers that you control directly or by contract.  Trying to 
re-use AS112 servers will never work reliably as you don’t have agreements with 
*all* the operators.  This also applies to the operators of EMPTY.AS112.ARPA.

As for DNAME, that is a requirement of DNSSEC which, in theory, all the root 
servers support fully.

Mark

> On 12 Dec 2017, at 10:16 am, Kim Davies <kim.dav...@iana.org> wrote:
> 
> Hi Mark,
> 
> Quoting Mark Andrews on Tuesday December 12, 2017:
>> 
>> HOME.ARPA. SOA       A.ROOT-SERVERS.NET. NSTLD.VERISIGN-GRS.COM. 2017121101 
>> 1800 900 604800 86400
>> HOME.ARPA.   NS      A.ROOT-SERVERS.NET.
> ..
>> HOME.ARPA.  DNAME EMPTY.AS112.ARPA.
> 
> It is unclear to me how this avoids having root servers process DNAME
> records. Given the process of consultation, coordination and testing
> support for DNAME records in the root servers (or relocating the .arpa
> authorities) is likely to take longer than is desirable to have home.arpa
> insecurely delegated, the delegation to AS112 was considered as the best
> short-term approach even if it is not without its own difficulties.
> 
> kim

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to