Hi Shumon,

Thanks … your replies to the questions make sense to me.

Brian

> On Jul 30, 2024, at 7:13 PM, Shumon Huque <shu...@gmail.com> wrote:
> 
> On Tue, Jul 30, 2024 at 7:51 PM Brian Weis via Datatracker <nore...@ietf.org 
> <mailto:nore...@ietf.org>> wrote:
>> Reviewer: Brian Weis
>> Review result: Has Nits
> 
> Thank you for your review Brian.
>  
> [... Good summary deleted for brevity ...]
>  
>> Security Considerations also mentions that some security tools rely
>> on particular return codes to detect non-existent domain names, and
>> their current method may be impacted by this change. This is
>> unfortunate, but I suspect that there was no clean way to accommodate
>> those semantics in this design. It is noted that if security tools
>> support this new method that they will be relying on signed data
>> rather than the unsigned header to obtain the same information.
> 
> Yes, that is correct.
>  
>> Also, the document describes an optional header flag which a resolver
>> that returns a different status. This seems to be intended to aid
>> security tools, but perhaps if they’ve updated their tool to send
>> a new header flag they would also be able to update it to accept
>> the main method described in this document.  Is theres another
>> practical reason for this optional feature? Or are the semantics
>> of a resolver understanding both the old and new main methods just
>> complicated and this makes it easier for them?
> 
> The NXDOMAIN response code restoration methods are optional,
> because we expect that not all resolver implementers will want to
> make accommodations for this method (although some do plan to).
> Impacted security tools could indeed be updated to recognize the
> NXNAME signal, but there is some skepticism that this will happen
> quickly because of inertia, unwillingness to do deeper packet
> inspection, or because they are often written by folks without detailed
> familiarity with the DNS protocol. The rcode restoration capability will
> help them, and their users may decide to use resolvers that implement
> this feature. In other words, the spec is providing the capability, and
> we'll let customer demand help sort out where it might get deployed.
>  
>> I’m a little confused by this statement in Section 4 (Response Code
>> Restoration): “For non-existent names, implementations should try
>> wherever possible, to preserve the response code value of 3 (NXDOMAIN).
>> This is generally possible for non-DNSSEC enabled queries,
>> namely those which do not set the DNSSEC_OK EDNS flag (DO bit).” I
>> believe this is describing a case where the response does not include
>> DNSSEC. Based on the name of the document that it was concerned
>> only with a DNSSEC response, so it’s not clear to me why this
>> suggestion needs to be made.
> 
> Yes, your observation is correct. However, there was strong consensus
> in the working group that this document explicitly state that non DNSSEC
> enabled queries for non-existent names return the expected NXDOMAIN
> response code (there are implementations of this protocol in the field for
> example that return NODATA today for non-DNSSEC responses too).
> 
>> One general suggestion is that it might be helpful for the RFC Editor
>> if there was an explicit note somewhere warning them that Section 6.2
>> contains an (RFC TBD) self-reference that they’ll need to resolve.
> 
> If we wanted to get rid of the self-reference we could also only state the
> name of the protocol and omit the RFC#.
> 
> Shumon.
> 

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to