On Mar 3, 2025, at 04:53, Kazunori Fujiwara <fujiw...@jprs.co.jp> wrote:
> 
> Dear dnsop WG,
> 
> Willem Toorop and I submitted new draft: Clarifications to the DNS Ranking 
> Data
> (draft-fujiwara-dnsop-ranking-data-00.txt).
> 
> Status: https://datatracker.ietf.org/doc/draft-fujiwara-dnsop-ranking-data/
> URL: https://www.ietf.org/archive/id/draft-fujiwara-dnsop-ranking-data-00.txt
> 
> Please review and comment.

I don’t have first hand involvement, but I believe there are still name servers 
that respond authoritatively for some zones and act as recursive servers for 
other zones.  This was central to split DNS set ups (where an enterprise might 
have more hosts in the internal view of their zone than in the external/global 
view of their zone) I used to see.  (I’m thinking of 
https://kb.isc.org/docs/aa-00851.)

(I see section 5 mentions split-horizon, but I don’t think the description is 
fully correct.  Any zone can be “overridden” (in the sense that there’s a 
version that is part of the global public DNS, a local copy may alter the 
zone), but that is per zone.  An overridden zone may delegate back to zones 
that are also part of the global…but this is getting overly complicated and 
might work for a small handful of perhaps overly enthusiastic operators.)

This leads to my issue with the word “merge.”  I don’t think servers merge data 
fed via zone transfers or dynamic updates with data set learned via recursive 
activity.  It might be tempting to “merge” glue this way, but I doubt anyone 
does.  On the other hand servers might merge data when constructing a response 
- choosing data in an answer section might only be from a zone while additional 
(glue) section might pull in data from a cache it might have.  (If it has a 
cache.)  Question - does “merge” mean to combine what is held in memory or what 
is put into a response?

Where does "Aggressive Use of DNSSEC-Validated Cache” (RFC 8198) fit into this? 
 I see that as an example of an “authoritative” denial being picked out of the 
cache.  (The long resistance to that practice was unwillingness to allow 
recursive servers to take on an authoritative task - responding to query, 
without ever passing it on to the authority, as if the recursive were the 
authority.  (This seems to be conflict with Directive #2 in section 4 of the 
draft.)

I’ll nod to other comments as well (RPZ/DNSBL issues, document dependencies, 
etc.).

Is the goal to (I have to use this word) “clarify” the way in which a response 
is constructed?  For example, in any section there ought to be no mixing of 
local configured data (XFR’s, RPZ) and data learned via recursion?  Does DNSSEC 
matter in mixing rules?

I would think how an implementation internally stores data is outside the 
concerns of interoperability, so I’m guessing the goal is to work on how 
responses are constructed.

 
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to