[dnsext] [Technical Errata Reported] RFC4592 (5119)

RFC Errata System <rfc-editor@rfc-editor.org> Thu, 21 September 2017 10:54 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 55B7013421A for <dnsext@ietfa.amsl.com>; Thu, 21 Sep 2017 03:54:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id HLVv1alH26V7 for <dnsext@ietfa.amsl.com>; Thu, 21 Sep 2017 03:54:27 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D5B5132D45 for <dnsext@ietf.org>; Thu, 21 Sep 2017 03:54:27 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id C6A89B81F0B; Thu, 21 Sep 2017 03:54:06 -0700 (PDT)
To: ed.lewis@neustar.biz, suresh.krishnan@gmail.com, terry.manderson@icann.org, ogud@ogud.com, ajs@anvilwalrusden.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: K.Koymans@uva.nl, dnsext@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20170921105406.C6A89B81F0B@rfc-editor.org>
Date: Thu, 21 Sep 2017 03:54:06 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsext/_o-nX7HyYbJFyf1S3fGqU-n5WdU>
Subject: [dnsext] [Technical Errata Reported] RFC4592 (5119)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsext/>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Sep 2017 10:54:29 -0000

The following errata report has been submitted for RFC4592,
"The Role of Wildcards in the Domain Name System".

You may review the report below and at:

Type: Technical
Reported by: Karst Koymans <K.Koymans@uva.nl>

Section: 4.7

Original Text
4.7.  NSEC RRSet at a Wildcard Domain Name

   Wildcard domain names in DNSSEC signed zones will have an NSEC RRSet.
   Synthesis of these records will only occur when the query exactly
   matches the record.  Synthesized NSEC RRs will not be harmful as they
   will never be used in negative caching or to generate a negative
   response [RFC2308].

Corrected Text
4.7.  NSEC RRSet at a Wildcard Domain Name

   Wildcard domain names in DNSSEC signed zones will have an NSEC RRSet.
   NSEC RRSets must not be synthesized from this wildcard NSEC.

Synthesizing these records would destroy the semantics of the NSEC chain and could be very harmful if implementations would cache them and use them for "Aggressive Use of DNSSEC-Validated Cache" (RFC 8198).

This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
can log in to change the status and edit the report, if necessary. 

RFC4592 (draft-ietf-dnsext-wcard-clarify-11)
Title               : The Role of Wildcards in the Domain Name System
Publication Date    : July 2006
Author(s)           : E. Lewis
Category            : PROPOSED STANDARD
Source              : DNS Extensions
Area                : Internet
Stream              : IETF
Verifying Party     : IESG