Re: [dnsext] zone cut semantics

Olafur Gudmundsson <ogud@ogud.com> Mon, 21 February 2011 04:56 UTC

Return-Path: <ogud@ogud.com>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2A5EB3A6EC0 for <dnsext@core3.amsl.com>; Sun, 20 Feb 2011 20:56:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XQaw1cmPqzG7 for <dnsext@core3.amsl.com>; Sun, 20 Feb 2011 20:56:00 -0800 (PST)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by core3.amsl.com (Postfix) with ESMTP id D16C63A6E28 for <dnsext@ietf.org>; Sun, 20 Feb 2011 20:55:59 -0800 (PST)
Received: from [IPv6:::1] (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p1L4vDTP011576 for <dnsext@ietf.org>; Sun, 20 Feb 2011 23:57:13 -0500 (EST) (envelope-from ogud@ogud.com)
Message-ID: <4D61F085.5010606@ogud.com>
Date: Sun, 20 Feb 2011 23:56:37 -0500
From: Olafur Gudmundsson <ogud@ogud.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: dnsext@ietf.org
References: <20110219210716.72943A5602B@drugs.dv.isc.org> <11263.1298150425@nsa.vix.com> <20110220072916.GA3505@vacation.karoshi.com.> <30899A4A-833B-42EF-9850-AFEE8B8DBE02@dotat.at> <AANLkTimNujeo6KiJ4wqUU-b3qyjozVmDvR8M3XNsfmKx@mail.gmail.com> <EBAC7E2F-FE70-497E-9C6C-DE4D2180CF7F@rfc1035.com>
In-Reply-To: <EBAC7E2F-FE70-497E-9C6C-DE4D2180CF7F@rfc1035.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.68 on 10.20.30.4
Subject: Re: [dnsext] zone cut semantics
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Feb 2011 04:56:03 -0000

On 20/02/2011 3:44 PM, Jim Reid wrote:
> On 20 Feb 2011, at 20:14, Brandon Black wrote:
>
>> Isn't this really a matter of semantics?
>
> Yes: zone cut semantics, not language semantics.
>
>> The parent zone is
>> authoritative for everything beneath itself, even if it choses to use
>> that power of authority to give a delegation response. e.g. the .com
>> servers are authoritative for www.example.com, but they choose to
>> delegate that answer to the NS for example.com.
>
> Nope. Query the .com name servers for the NS records for example.com.
> They correctly return a non-authoritative answer. It's only the name
> servers for example.com that are authoritative for example.com and will
> authoritatively answer that query. In other words, it's the child that's
> responsible for the zone's authoritative NS RRset, not the parent. Which
> is how things should be when you consider what delegation actually
> means: crossing an administrative boundary from one authority to another.
>
> Please think again about what you posted. The inference of what you say
> is that the root servers are authoritative for everything. That's
> clearly not true.
>

In RCF103x with RFC2181 clarification the  world it was simple:
Parent zone is authoritative for the existence of delegation, child 
servers are authoritative for content.

==> Everything but the presence of NS records is hint/glue in parent 
servers.


But we could not keep it simple forever in the DNSSEC world thus this 
amendment:
Parent is Authoritative for the contents DS record and NSEC/NSEC3 
records at delegation that prove if the delegation exists and if there 
is a trust path from parent to child.

	Olafur