On Tue, Apr 28, 2020 at 06:26:54PM -0400, John Levine wrote:

> I think we will find that the assumption that TLD zone files are
> delegation-only does not hold up very well in practice, so I am
> wondering how useful a hack to technically enforce it would really be.

There are indeed some TLDs which are not delegation-only.

For example, DeNIC is known for directly serving some small (IIRC ~5
RRsets) child domains directly out of the .DE parent zone with no zone
cut.

But that's just an implementation detail, and could change in the
future, if there was good reason to care.

But there are also some large TLDs that are delegation-only, and could
be a good place to get started.  I don't see ".com" or ".net" on your
list, most of those are brand domains without open registration, and
they are legitimately free to delegate or not delegate whatever they
want.

> 54952 info
> 28012 org
> 6610 pro

Pretty much the the only two or three with non-trivial numbers that
matter on the list.

> Some mystery names:

These two patterns have been around for ages, used for some sort of
automated monitoring, and don't matter.

> monitor-nominet.abogado has address 127.0.0.1
> emt-ns1.emt-t-1070866640-1587743943997-2-ag.aarp has address 198.41.1.167

My .com zone processing code has for many years now being moving right
past these:

    next if (m{^(emt-)?t-[^.]+-[^.]+-[^.]+-}io);

I am sure ways can be found to handle these sentinels (not real
child-domain delegations).  For example, the spec could exclude domain
names that start with "_" or "_sentinel".  And the sentinel names could
then all live there.

-- 
    Viktor.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to