zuop...@cnnic.cn wrote on 2024-01-06 22:59:
...

Aggressive NSEC (RFC 8198) is useful against to NXNSAttack –like attack, because it allows a DNSSEC-validating resolver to generate negative answers within a range. ...

have you looked at dns rrl?

... But if a NSEC3 RR has an Opt-Out flag, it can’t be used for aggressive negative caching.  In addition, DNSSEC adoption rate remains low in some area and this situation may not change significantly over a long period of time for policy reasons.

i think as long as we keep adding features that are only necessary because dnssec lacks certain features or is not universally deployed or both, then dnssec will lack certain features or not be universally deployed or both. please be careful what you wish for.

Compared to DNSSEC, the draft is relatively simple, it uses OPT RR option to confirm NS record only when a resolver is requesting address (Glue record) of delegation points. And it is compatible with current DNS protocol.

it will always be within our powers to add complexity. google for "dns camel" to find out one author's thoughts about how to use that power more wisely.

--
P Vixie

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to