On Sep 11, 2020, at 6:29 PM, Robert Edmonds <edmo...@mycre.ws> wrote:
> 
> Paul Hoffman wrote:
>> The responses will be signed if the zone for which the server is 
>> authoritative is signed, meaning that validating resolvers can get 
>> authenticated information about the server if that would influence how they 
>> treat responses from the server.
> 
> How does the zone signer know the capabilities of the nameservers that
> will serve the zone and what does it do if the capabilities of those
> servers differ?

Because the zone owner wrote an AUTHINFO RR into the zone. This is no different 
than any other record.

> It sounds like this is incompatible with offline
> signing.

Not at all. Offline signing works on RRs.

> Must a primary nameserver exclude AUTHINFO RR's from outgoing AXFRs to
> secondary nameservers?

No.

> Must secondary nameservers fail, filter, or
> replace an incoming AXFR if it contains an AUTHINFO RR?

No.

> By making this
> an RR it seems like it would be easy to inadvertently serve an incorrect
> AUTHINFO RR.

In what case would a secondary have different information than the primary?

> I think this should be an EDNS option rather than an RR and if integrity
> protection beyond that of plain DNS is needed, it can be combined with
> COOKIE, SIG(0), TSIG, DoT, etc.

Again, we're fine with using an EDNS option if people don't want the 
information signed or cached. This seems like a steep limitation for benefits I 
still don't see (as shown above), but if that's what the WG wants, it's an easy 
change to make.

--Paul Hoffman

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to