On Jul 8, 2019, at 1:27 PM, Michael J. Sheldon <mshel...@godaddy.com> wrote:
> I agree it's somewhat legit to answer for it, but it's a literal
> maintenance nightmare when you're dealing with a very large number of
> zones. Things like that tend to get put in place, then never removed.

Right, but as I said, it’s dead easy to automate.   It’s only a maintenance 
nightmare because you haven’t done that automation.   I could write you a 
python script to do it in a week.   And registrations cost money, which means 
that they will go away on their own.

> And it still leaves the issue that recursives should not just keep
> hammering the lame delegations when they've gotten a REFUSED response.
> That is a definitive legitimate response, and should be honored for a
> reasonable period of time.

That’s not a solvable problem.  The right solution to this problem is actually 
to set up a way that the operator of an auth server can signal to the registrar 
that the delegation is refused.   If you want to spend some effort on process, 
that’s the place I’d suggest putting it.   Getting every resolver on the 
Internet to stop doing something that every resolver on the Internet currently 
does is not likely to actually change what you experience as an operator in the 
relatively short term.

Also, of course, you mentioned that it didn’t seem legit to respond 
authoritatively, but if we take REFUSED as an authoritative answer, then that’s 
not legit either.

BTW, it would also be perfectly legitimate for an authoritative server that 
doesn’t provide recursion to respond with NXDOMAIN for any query within a 
domain that’s delegated to it, and this would be quite easy to implement, 
although perhaps harder than my python script.   Just do the lookup for the 
delegation, and if it points to you, respond authoritatively.

Although now that I think about this, another problem we’d face here is that 
DNSSEC would break this completely.   If you have a secure delegation, but 
don’t have the ability to sign the zone, you can’t respond authoritatively even 
if the delegation is pointing at your server.   So here the only real fix is at 
the registrar.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to