On Sun, Mar 17, 2024 at 9:08 AM John Levine <jo...@taugh.com> wrote:

> It appears that Dave Lawrence  <t...@dd.org> said:
> >Stephane Bortzmeyer writes:
> >> > One current implementation does not differentiate DO=0 vs 1 and gives
> the
> >> > same NODATA answer for both cases.
> >>
> >> Yes. I see no practical problem with that but, from a philosophical
> >> point of view, it disturbs me. Naive clients may make wrong
> >> conclusions from the NODATA answer.
> >
> >Very much so, and not just naive programmatic clients but also
> >non-naive real-life human clients.  I myself have been misled by
> >noerror/nodata where nxdomain would have been correct.  It's
> >frustrating.
> >
> >nxdomain is usefully distinct and auth servers really ought to be
> >strongly encouraged to return it where applicable.
>
> We have an entire RFC 8020 about the difference and why it's important.
>

Yes, I agree with this of course.

Compact Denial intentionally broke the NXDOMAIN signal. One of the
main thrusts of this draft was to bring back the non-existence signal
in the form of an authenticable record in the payload.

The draft allows (but does not proscribe) NXDOMAIN to be inserted into
the Rcode for non DNSSEC enabled responses. I guess the main reason
for not being proscriptive was what I mentioned - there were deployments
in the field that didn't. But I'm amenable to tightening up the language if
there
is consensus for it (and I'll also chat with the implementers). Since we
also
support signaled restoration of the NXDOMAIN RCODE field for DNSSEC
enabled  queries, I'm persuaded that we should probably close this
divergence
for non DNSSEC too.

Shumon.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to