Hi Ted, On Jun 18, 2020, at 17:15, Ted Lemon <mel...@fugue.com> wrote:
> If we use these ccTLDs as squatting domains, that means that we’re going to > see a lot of traffic at the root trying to find nonexistent name servers, > right? And these ccTLDs provably do not exist, right? RFC 8198 was implemented in BIND9.12 and Unbound 1.7.0 and I think in other implementations too, although I don't have references immediately to hand. I thought I had seen the results of some experiments that tried to measure the effectiveness of aggressive negative caching but I can't seem to find anything obvious, so maybe I was mistaken. However, I would expect that as the deployment of 8198 increases in the resolver population (it defaults on in BIND9 and I think Unbound too) the extra traffic observed at the root should trend downwards. I think it's possible that if the question you pose is still a concern, it's at least a concern that is tending to decrease over time. > Contrariwise, home.arpa has an un-signed delegation. [As an aside, I have some concerns about RFC 8375 and I wish I was paying more attention at the time it was discussed. Although I can understand some of the technical arguments for the delegation, I'm not especially convinced by them in practice, and the decision to make the unsigned delegation also a *lame* unsigned delegation whilst simultaneously directing all leaked queries with potential information about private networks to be sent to nameservers that by design are intended to have anonymous operators is a poor one, I think. I note that the security considerations section doesn't even address the potential for information leakage.] > Also, what do you think the operational effect of this will be? Given that > these domains are currently provably nonexistent, this means that a resolver > looking up names in these domains will have to special-case them. I suspect it will work like every other locally-served domain or every other private namespace that exists today, i.e. just fine with no configuration changes expected or required on dependent (downstream) DNS clients. And if there are new species of resolver that need to be accommodated (e.g. validating, hybrid stub/full service resolvers embedded in applications), whatever configuration or auto-discovery mechanisms are required to support those other locally-served zones can surely be easily extended to these ISO-3166-2 codes if they are used in any particular private network. This draft describes an existing consequence of existing policy. It may be that Ed and Roy are the first ones to think about using them to anchor private namespaces, but in some sense any corner cases that need special handling today also needed special handling before this draft was written; we just didn't know it yet. Joe _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop