The Apple resolver at least clears the cache whenever it detects a network 
transition. So the problem Paul is describing wouldn't happen. Dunno what other 
mobile devices do.

I think its worth documenting this behavior if the working group wants to do 
that work.

> On 6 May 2025, at 22:42, Mark Andrews <ma...@isc.org> wrote:
> 
> While this is an interesting issue how does this differ from what already 
> exists for every mobile device which connects to a network with private names 
> today?  These names resolve it NXDOMAIN or not depending on the attachment 
> point.  
> Traditionally stub resolvers only keep answers for as long as they need them 
> for. That is usually significantly less than the TTL of the returned answer, 
> often milliseconds.   If there is a on device cache it can be partially 
> flushed on SSID changes.  If the device is worried about spoofed answers it 
> can install (additional) trust anchors based on SSID that are  initially 
> added using out of band methods and maintained using RFC 5055. 
> 
> For hardwired devices there are profiles that can be set by the user when 
> they connect.  They flush the local cache today of you have a Mac and other 
> OS have similar capabilities. Trust anchors can be set via that mechanism.  
> 
> Note negative trust anchors are NOT used above. 
> 
> -- 
> Mark Andrews
> 
>> On 7 May 2025, at 04:11, Paul Hoffman <paul.hoff...@icann.org> wrote:
>> 
>> On May 6, 2025, at 09:56, Ted Lemon <mel...@fugue.com> wrote:
>>> 
>>> I think that you're trying to solve two different problems here. The first 
>>> problem is just generally what can you do to avoid causing a validation 
>>> failure? The second problem is, how can you actually validate locally 
>>> served domains?
>>> 
>>> They are both really interesting questions, and I think that it would be 
>>> very useful to consider how we would solve the problem of validating 
>>> locally served domain.
>>> 
>>> However, this is not absolve us of the responsibility to make sure that we 
>>> don't accidentally cause validation failures where they are inappropriate. 
>>> We already have prior art on this. We know how to solve this problem. RFCs 
>>> that solve this problem all solve that and exactly the same way.
>> 
>> ...and that way might not work the way we want, and thus should be defined 
>> in RFCs before we make recommendations about them. In specific, we don't 
>> have any RFCs that deal with insecure delegation for clients that move 
>> around.
>> 
>> Assume that a resolver for a corporate network uses .example as a TLD for 
>> its internal users. A user starts up their laptop when outside the network, 
>> and try to access foo.example.
>> 
>> - If .example is not listed in the root zone, they get a short-lived 
>> NXDOMAIN. When they move on to the corporate network after a short period of 
>> time, and try again, they get the address for foo.example.
>> 
>> - If .example has an insecure delegation, they get a two-day TTL to a 
>> nameserver that will tell them that foo.example doesn't exist.  When they 
>> move on to the corporate network after a short period of time, they still 
>> believe that foo.example doesn't exist because they believe the nameserver 
>> for .example is the one in the insecure delegation at the root.
>> 
>> This can probably be fixed, but we don't currently have such a fix in an 
>> RFC. I suspect there will be strong disagreement about what the fix should 
>> be (I have no opinion, and probably won't later). Saying "We already have 
>> prior art on this" understates what the "this" is.
>> 
>> --Paul Hoffman
>> 
>> _______________________________________________
>> DNSOP mailing list -- dnsop@ietf.org
>> To unsubscribe send an email to dnsop-le...@ietf.org
> 

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to