On Tue, Apr 6, 2021 at 12:51 PM Shumon Huque <shu...@gmail.com> wrote: > > On Tue, Apr 6, 2021 at 3:03 PM Murray S. Kucherawy <superu...@gmail.com> > wrote: >> >> On Tue, Apr 6, 2021 at 11:48 AM Shumon Huque <shu...@gmail.com> wrote: >>> >>> Without DNSSEC, there is no current way to provide an indication about the >>> longest ancestor of the name that did exist. With DNSSEC, the NSEC or NSEC3 >>> records in the response can do this (as well as providing cryptographic >>> proof of this assertion with their signatures). >> >> >> Thanks, this (and the others) is helpful. >> >> Focusing on "no current way", could the process described in RFC 8020 >> theoretically be amended to do so? It's fine if the answer is "no", but I'd >> love to understand why if that's the case. > > > I suspect the most common answer to your question will be "No, just deploy > DNSSEC". I'm sure one could devise a new protocol enhancement that an > authoritative server could use to convey this information, but I'm not sure > it is worth complicating the protocol to do so. > > Also, even with 8020, there have been concerns raised that resolvers > implementing it, could be vulnerable to spoofing adversaries easily pruning > entire subtrees from their caches (rather than having to spoof many > individual names). Unbound, for example, implements 8020 only for signed > zones.
Murray, an organization we both know very well, do not implement ENT/RFC8020 for instance... In the case of DNSSEC you get proper coverage with NSEC even if at best you use White (RFC4470) and Black (https://tools.ietf.org/html/draft-valsorda-dnsop-black-lies-00) lies. Manu _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop