On Apr 19, 2021, at 7:17 AM, Andrew McConachie <and...@depht.com> wrote:
> 
> 
> 
> On 16 Apr 2021, at 17:18, Paul Hoffman wrote:
> 
>> On Apr 16, 2021, at 5:31 AM, Andrew McConachie <and...@depht.com> wrote:
>> 
>>> If I understand section 4.3 correctly, DNSSEC validating stub resolvers 
>>> SHOULD NOT resolve these names. Is that the intention of Section 4.3?
>> 
>> No, definitely not. The text says:
>>   3.  Name resolution APIs and libraries SHOULD NOT recognise these
>>       names as special and SHOULD NOT treat them differently.  Name
>>       resolution APIs SHOULD send queries for these names to their
>>       configured caching DNS server(s).
>> Not recognizing them as special means to treat them like any other name. 
>> There is no mention of DNSSEC.
>> 
> 
> I realize now my question was unclear. My understanding is that a DNSSEC 
> validating stub SHOULD attempt to validate these names, which will fail. 
> Therefore a DNSSEC validating stub cannot use these names.

That's correct, as it would be for any private-use TLD. In fact, it's not just 
about validating stubs: an organization wanting to use a private-use TLD cannot 
have validating stub resolvers or validating recursive resolvers anywhere in 
the organization.

--Paul Hoffman

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to