Okay, but if they are not going to the authoritative  servers to get the chain 
of trust, they are going to the local full-service resolver or some public 
third-party resolver. And so if there is an insecure delegation, that resolver 
can make up an answer, and it will “validate” correctly as insecure. But if the 
delegation is securely denied, that can’t happen. That’s why it’s important for 
there to be an insecure delegation to a black hole name server. 

On Thu, May 1, 2025, at 5:05 PM, Joe Abley wrote:
> On 1 May 2025, at 22:57, Ted Lemon <mel...@fugue.com> wrote:
> 
> > If validating stubresolvers all go to the root, we get no benefit from 
> > caching. That seems bad if at some point they become commonplace, although 
> > of course it’s fine now. 
> 
> I think validating stub resolvers need to go to the root in a namespace 
> sense. They need to retrieve sufficient generations of parental data to be 
> able to validate an RRSet attached to a child. This data might well be cached 
> at a node in the resolver graph close to the stub. 
> 
> I don't think validating stub resolvers need to send queries to root servers.
> 
> I think we are overloading the word "root" and the result is some mild 
> confusion.
> 
> 
> Joe
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to