It can be solved with a trust anchor as well, but that relies on there being a 
central validating resolver rather than validating stub resolvers on hosts, and 
personally I don’t find that deployment model very compelling anymore—I think 
that stub resolvers should validate.  If I get my way, then we’re going to see 
these “private” domains start to fail.

Sent from my iPad

> On Jun 18, 2020, at 1:36 PM, Vladimír Čunát <vladimir.cunat+i...@nic.cz> 
> wrote:
> 
> 
>> On 6/18/20 7:22 PM, Ted Lemon wrote:
>>> I suspect it will work like every other locally-served domain or every 
>>> other private namespace that exists today, i.e. just fine with no 
>>> configuration changes expected or required on dependent (downstream) DNS 
>>> clients. And if there are new species of resolver that need to be 
>>> accommodated (e.g. validating, hybrid stub/full service resolvers embedded 
>>> in applications), whatever configuration or auto-discovery mechanisms are 
>>> required to support those other locally-served zones can surely be easily 
>>> extended to these ISO-3166-2 codes if they are used in any particular 
>>> private network.
>> 
>> What I’m getting at is that the secure denial of existence will mean that a 
>> DNSSEC-aware resolver, when asked to look up a name under .xa, for example, 
>> will always return NXDOMAIN.
> Yes, but squatting is usually done at root names already, so the issue isn't 
> new.
> 
> Modifying DNS past the last validator is generally troublesome.  Modifying it 
> inside the last validating resolver can be fine, as the implementation can 
> "prioritize" the modifications over validation and aggressive caching (but as 
> an implementor I still find this troublesome).
> 
> --Vladimir
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to