[DNSOP] Re: Is .INTERNAL a special use domain name?
Mark Andrews <marka@isc.org> Thu, 13 February 2025 22:38 UTC
Return-Path: <marka@isc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E1E3C1D6203 for <dnsop@ietfa.amsl.com>; Thu, 13 Feb 2025 14:38:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isc.org header.b="g7PoVA/U"; dkim=pass (1024-bit key) header.d=isc.org header.b="hKvWyJp9"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u1dRWjcP3YGw for <dnsop@ietfa.amsl.com>; Thu, 13 Feb 2025 14:38:27 -0800 (PST)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.2.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7BECFC1F588E for <dnsop@ietf.org>; Thu, 13 Feb 2025 14:38:26 -0800 (PST)
Received: from zimbrang.isc.org (zimbrang.isc.org [149.20.2.31]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx.pao1.isc.org (Postfix) with ESMTPS id 348D13AB2E5; Thu, 13 Feb 2025 22:38:25 +0000 (UTC)
ARC-Filter: OpenARC Filter v1.0.0 mx.pao1.isc.org 348D13AB2E5
Authentication-Results: mx.pao1.isc.org; arc=none smtp.remote-ip=149.20.2.31
ARC-Seal: i=1; a=rsa-sha256; d=isc.org; s=ostpay; t=1739486305; cv=none; b=FjCz+wjXugwsx3puTBE7S3R3piixk6Mf4WKlT+iMYmegCi2LfDAtDFxLLACd2BJKrHf2/Y35co7S6gIlcavoFFtleg/x8CxWdBSTRB4b9JdF6t3FDjWjLdBz5uCOBy0QFY/NAAedObxHYtBG5DDbLUnnB1+XA4GusY2ocMf7rPM=
ARC-Message-Signature: i=1; a=rsa-sha256; d=isc.org; s=ostpay; t=1739486305; c=relaxed/relaxed; bh=OFwDxY3i4FZAzdPH9R6+Ln/7zUM3LH/HithoSNZm9DI=; h=DKIM-Signature:DKIM-Signature:Mime-Version:Subject:From:Date: Message-Id:To; b=Bg0ewA1mh3gEYfs4sE8GPN8EFP0TJrVA32Jg3A2vrNVqxjkWtvuAwuM/LTLmKjCYOkqDDw/HqDmc995ARWC6x0Kn9HlszIaWvfv2SVXDeajnQgGtXDx6pvBIyjevy5saTSzAc9nZdJp151lhbb3DMidVqngJpjE6OnRLORybkLY=
ARC-Authentication-Results: i=1; mx.pao1.isc.org
DKIM-Filter: OpenDKIM Filter v2.10.3 mx.pao1.isc.org 348D13AB2E5
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=isc.org; s=ostpay; t=1739486305; bh=kkffnFJmk5Mn/WS6hg4vfdl8B36TPwC23bvYKtr5++s=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=g7PoVA/UjTeQqBEdVwQgapbkEv/MoY+3GXrhPiuS4x0MO7boJKt9+jJv/0fec0y4h uyNEPwbDOWM8UY50s7D5VhqFUJFPDJmPULWs9KJGFSR4lBqADN/zZYKOjaT5p15xnI 74DK1smbcdW2y3NpA4X8eBiZKRFeTtY5ZtROEGVk=
Received: from zimbrang.isc.org (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTPS id 31084EB0C54; Thu, 13 Feb 2025 22:38:25 +0000 (UTC)
Received: from localhost (localhost.localdomain [127.0.0.1]) by zimbrang.isc.org (Postfix) with ESMTP id 0EEAFEB0C5B; Thu, 13 Feb 2025 22:38:25 +0000 (UTC)
DKIM-Filter: OpenDKIM Filter v2.10.3 zimbrang.isc.org 0EEAFEB0C5B
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isc.org; s=05DFB016-56A2-11EB-AEC0-15368D323330; t=1739486305; bh=OFwDxY3i4FZAzdPH9R6+Ln/7zUM3LH/HithoSNZm9DI=; h=Mime-Version:From:Date:Message-Id:To; b=hKvWyJp9P+/Tk8566uZOTx8koDUb5tBwpTBH8pp87pR2EvrvJ98JYSwD/A1Am+Nwb +YB2s5Ka+PzGkGyP8pTwBep+QUR/X1KzASGW8ftHPslVr9O9PexsUPEPjO8+A/Np9k sjZtGcPqqmF2sF1WMR23pd9p6peFtpYeVLM092cM=
Received: from zimbrang.isc.org ([127.0.0.1]) by localhost (zimbrang.isc.org [127.0.0.1]) (amavis, port 10026) with ESMTP id i0QS_LFuc3hw; Thu, 13 Feb 2025 22:38:25 +0000 (UTC)
Received: from smtpclient.apple (n49-187-18-238.bla1.nsw.optusnet.com.au [49.187.18.238]) by zimbrang.isc.org (Postfix) with ESMTPSA id 6F88DEB0C54; Thu, 13 Feb 2025 22:38:24 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.9\))
From: Mark Andrews <marka@isc.org>
In-Reply-To: <m1tifRx-0000NOC@stereo.hq.phicoh.net>
Date: Fri, 14 Feb 2025 09:38:08 +1100
Content-Transfer-Encoding: quoted-printable
Message-Id: <B4A31C97-C30C-45C4-B5B0-3E337A5F1491@isc.org>
References: <3AB732CF-F095-4110-AD1A-077D77AAA05D@iana.org> <3d8096c8-bec1-4dfb-8e02-fa47278f9ede@isc.org> <m1tifRx-0000NOC@stereo.hq.phicoh.net>
To: Philip Homburg <pch-dnsop-6@u-1.phicoh.com>
X-Mailer: Apple Mail (2.3731.700.6.1.9)
Message-ID-Hash: XKIMSXSPWBDEL2LC7DWU2N5O35JJO4EJ
X-Message-ID-Hash: XKIMSXSPWBDEL2LC7DWU2N5O35JJO4EJ
X-MailFrom: marka@isc.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: dnsop@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: Is .INTERNAL a special use domain name?
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/1sj6naSv-ecPHujLQiGmB9WTNC8>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>
> On 14 Feb 2025, at 07:04, Philip Homburg <pch-dnsop-6@u-1.phicoh.com> wrote: > >> Logic behind this proposal follows: >> >> #1 I can't see any difference between the intended use of: >> - 10.in-addr.arpa. >> - internal. >> >> #2 RFC 6761 section 6.1 already established special rules for >> 10.in-addr.arpa. > > The draft has the following: > The "internal" top-level domain provides this purpose in the DNS. Such > domains will not resolve in the global DNS, but can be configured within > closed networks as the network operator sees fit. > > I think that is the difference between .internal and 10.in-addr.arpa. I > expect 10.in-addr.arpa. to resolve in the global DNS. RFC-1918 address do > leak and there is no reason to expect every piece of software to have > filter in place to catch reverse DNS lookups for those addresses. > > There seems to be an argument that for the convenience of DNSSEC, private > domains have to resolve in the global DNS. Maybe we need to actually > say that in some RFC. Or solve this issue in a different way. We do for Locally Served DNS Zones (RFC 6303) even if IANA hasn’t yet organised all of the stub delegations yet. 6. IANA Considerations IANA has established a registry of zones that require this default behaviour. The initial contents of this registry are defined in Section 4. Implementors are encouraged to periodically check this registry and adjust their implementations to reflect changes therein. This registry can be amended through "IETF Review" as per [RFC5226]. As part of this review process, it should be noted that once a zone is added it is effectively added permanently; once an address range starts being configured as a local zone in systems on the Internet, it will be impossible to reverse those changes. IANA should coordinate with the RIRs to ensure that, as DNS Security (DNSSEC) is deployed in the reverse tree, delegations for these zones are made in the manner described in Section 7. 7. Security Considerations During the initial deployment phase, particularly where [RFC1918] addresses are in use, there may be some clients that unexpectedly receive a name error rather than a PTR record. This may cause some service disruption until their recursive nameserver(s) have been re-configured. As DNSSEC is deployed within the IN-ADDR.ARPA and IP6.ARPA namespaces, the zones listed above will need to be delegated as insecure delegations, or be within insecure zones. This will allow DNSSEC validation to succeed for queries in these spaces despite not being answered from the delegated servers. It is recommended that sites actively using these namespaces secure them using DNSSEC [RFC4035] by publishing and using DNSSEC trust anchors. This will protect the clients from accidental import of unsigned responses from the Internet. Special-Use Domain 'home.arpa.’ RFC 8375 has 7. Delegation of 'home.arpa.' In order to be fully functional, there must be a delegation of 'home.arpa.' in the '.arpa.' zone [RFC3172]. This delegation MUST NOT include a DS record and MUST point to one or more black hole servers, for example, 'blackhole-1.iana.org.' and 'blackhole- 2.iana.org.'. The reason that this delegation must not be signed is that not signing the delegation breaks the DNSSEC chain of trust, which prevents a validating stub resolver from rejecting names published under 'home.arpa.' on a homenet name server. Discovery of Designated Resolvers RFC 9462 has by reference that an insecure delegation is required. Note there is an errata for this section. 6.4. Handling Non-DDR Queries for resolver.arpa DNS resolvers that support DDR by responding to queries for _dns.resolver.arpa. MUST treat resolver.arpa as a locally served zone per [RFC6303]. In practice, this means that resolvers SHOULD respond to queries of any type other than SVCB for _dns.resolver.arpa. with NODATA and queries of any type for any domain name under resolver.arpa with NODATA. People are too scared of internal. NS a.root-servers.net. ... internal. NS m.root-servers.net. being added to the root zone. Where the contents of the zone served is just the SOA and NS records and is NOT signed. @ 86400 IN SOA a.root-servers.net. nstld.verisign-grs.com. 1 1800 900 604800 86400 @ 86400 IN NS a.a.root-servers.net. ... @ 86400 IN NS m.a.root-servers.net. The same machines are returning NXDOMAIN for everything under internal. They return a NODATA response for all types other that SOA and NS for “internal”. Root zone politics has got in the way of good management of the DNS in the root zone. If people are expected to use a name locally then there needs to be a clean break in the DNSSEC chain of trust. Mark > _______________________________________________ > DNSOP mailing list -- dnsop@ietf.org > To unsubscribe send an email to dnsop-leave@ietf.org -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: marka@isc.org
- [DNSOP] Is .INTERNAL a special use domain name? Kim Davies
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Wessels, Duane
- [DNSOP] Re: [Ext] Is .INTERNAL a special use doma… Paul Hoffman
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Geoff Huston
- [DNSOP] Re: [Ext] Is .INTERNAL a special use doma… Joe Abley
- [DNSOP] Re: [Ext] Is .INTERNAL a special use doma… Peter Thomassen
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Joe Abley
- [DNSOP] Re: [Ext] Is .INTERNAL a special use doma… Geoff Huston
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Loganaden Velvindron
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Joe Abley
- [DNSOP] Re: [Ext] Is .INTERNAL a special use doma… Peter Thomassen
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Geoff Huston
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Joe Abley
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Bob Harold
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Joe Abley
- [DNSOP] Re: [Ext] Re: Is .INTERNAL a special use … Paul Hoffman
- [DNSOP] Re: [Ext] Is .INTERNAL a special use doma… Mark Andrews
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Geoff Huston
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Philip Homburg
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Tim Wicinski
- [DNSOP] Re: [Ext] Re: Is .INTERNAL a special use … Paul Hoffman
- [DNSOP] Re: [Ext] Re: Is .INTERNAL a special use … Philip Homburg
- [DNSOP] Re: [Ext] Re: Is .INTERNAL a special use … Paul Hoffman
- [DNSOP] Re: [Ext] Re: Is .INTERNAL a special use … Paul Hoffman
- [DNSOP] Re: [Ext] Re: Is .INTERNAL a special use … Philip Homburg
- [DNSOP] Re: [Ext] Re: Is .INTERNAL a special use … Mark Andrews
- [DNSOP] Re: [Ext] Re: Is .INTERNAL a special use … Chris Appleyard - IETF
- [DNSOP] Re: [Ext] Re: Is .INTERNAL a special use … John Levine
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Michael De Roover
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Michael De Roover
- [DNSOP] Re: [Ext] Re: Is .INTERNAL a special use … Kim Davies
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Michael De Roover
- [DNSOP] Re: [Ext] Is .INTERNAL a special use doma… Paul Hoffman
- [DNSOP] Re: Is .INTERNAL a special use domain nam… John Levine
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Warren Kumari
- [DNSOP] Re: Is .INTERNAL a special use domain nam… John Levine
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Roy Arends
- [DNSOP] Re: Is .INTERNAL a special use domain nam… John Levine
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Petr Špaček
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Mark Andrews
- [DNSOP] Re: [Ext] Re: Is .INTERNAL a special use … Paul Hoffman
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Warren Kumari
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Michael De Roover
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Philip Homburg
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Michael De Roover
- [DNSOP] Re: Is .INTERNAL a special use domain nam… Wessels, Duane
- [DNSOP] Re: Is .INTERNAL a special use domain nam… John Levine