I think that you're trying to solve two different problems here. The first 
problem is just generally what can you do to avoid causing a validation 
failure? The second problem is, how can you actually validate locally served 
domains?

They are both really interesting questions, and I think that it would be very 
useful to consider how we would solve the problem of validating locally served 
domain. 

However, this is not absolve us of the responsibility to make sure that we 
don't accidentally cause validation failures where they are inappropriate. We 
already have prior art on this. We know how to solve this problem. RFCs that 
solve this problem all solve that and exactly the same way. What has been 
proposed here is that we do the same thing for the internal domain.

I think if you want to do something different for the internal domain, you need 
to actually propose a technical reason why we should do something different and 
not simply say that what we did previously was incorrect. Absent any such 
technical reason I think we should do the same thing for internal that we've 
done for home.arpa and for the RFC 1918 reverse look up domains. The fact that 
the delegation would be from the route may change precisely how we request such 
a delegation. But this doesn't change the technical situation.

So I think if the IETF is not allowed to tell ICANN what to do here that's OK. 
ICANN has already taken action on this. What we should do is reflect back to 
ICANN what is required in order to implement the decision that they have taken. 
That would mean that we would tell them that we think they should put an 
insecure denial of existence for internal in the root. I think precisely how to 
phrase this request is really up to the IESG. We need not concern ourselves 
with that question. We should simply say what we think should happen. 

> On 6 May 2025, at 18:46, John R Levine <jo...@taugh.com> wrote:
> 
> On Tue, 6 May 2025, Philip Homburg wrote:
>> Adding an insecure delegation is a good way to tell validators that there is
>> going to be an insecure zone. It is a practical mechanism that is proven to
>> work.
>> 
>> I have no clue how to design a protocol where a mobile device can attach
>> to an unknown network and get (negative) trust anchors without potentially
>> compromising the entire security of DNSSEC.
>> 
>> If you have an idea what such a protocol could look like, maybe you can share
>> it.
> 
> For devices that move from one network to another, probably some variety of 
> TOFU, the first time you start up a device you do it on your home network and 
> it fetches the anchors.  After that they don't change, or maybe the old key 
> signs the new one like for root key rolls.
> 
> For devices that stay put, the same thing could work, or they could just 
> believe their local cache.
> 
> I realize this is not bulletproof, but it seems less bad than, well,
> there's a negative anchor at the root so anything goes.
> 
> R's,
> John
> 
> _______________________________________________
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-le...@ietf.org

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to