[Attribution of the following quotes to Joe and Petr omitted...]
> > However, I think the more general idea that queries for internal names > > should be leaked towards unknown AS112 operators is problematic. As an > > end-user I would prefer my leaked queries to be jealously hoarded by one > > of twelve root server operators than an inbound number of anonymous and > > potentially ephemeral AS112 operators. > > > > The potential for complete data collection at the root servers goes down > > as resolvers implement aggressive NSEC caching. In the case of a > Unfortunatelly aggressive use of NSEC will not help because the name > will exist (either with NS or DNAME). Isn't .internal already a relatively non-trivial thing for users/admins to implement? Potential leakage only occurs if someone actively does ".internal" usage. Thusly: Perhaps guidance on how to minimize leakage (to zero) would be appropriate? Things that come to mind: - Use a benign SLD, such as internal, so the suffix of any name would be ".internal.internal" - plus - QNAME minimization and/or aggressive NSEC, to prune anything below .internal.internal ever resulting in anything other than synthesized NXDOMAIN (and thus not leaking)? - and/or locally running an AS112 instance - and/or locally installing the namespace of AS112 or its name server names If the only thing any AS112 operator ever saw was "internal.internal" queries, the issue is mostly moot/mute. Brian
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop