[DNSOP] Re: on the more general problem of delegating to other namespaces in the DNS
Joe Abley <jabley@strandkip.nl> Mon, 23 June 2025 10:21 UTC
Return-Path: <jabley@strandkip.nl>
X-Original-To: dnsop@mail2.ietf.org
Delivered-To: dnsop@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 79CB33839E47 for <dnsop@mail2.ietf.org>; Mon, 23 Jun 2025 03:21:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=strandkip.nl
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YCz1QTPi2gyZ for <dnsop@mail2.ietf.org>; Mon, 23 Jun 2025 03:21:54 -0700 (PDT)
Received: from dane.soverin.net (dane.soverin.net [185.233.34.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 275B93839E3A for <dnsop@ietf.org>; Mon, 23 Jun 2025 03:21:54 -0700 (PDT)
Received: from smtp.soverin.net (unknown [10.10.4.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by dane.soverin.net (Postfix) with ESMTPS id 4bQkdr6bQ0z1Hv4; Mon, 23 Jun 2025 10:21:52 +0000 (UTC)
Received: from smtp.soverin.net (smtp.soverin.net [10.10.4.100]) by soverin.net (Postfix) with ESMTPSA id 4bQkdr4XmPzML; Mon, 23 Jun 2025 10:21:52 +0000 (UTC)
Authentication-Results: smtp.soverin.net; dkim=pass (2048-bit key; unprotected) header.d=strandkip.nl header.i=@strandkip.nl header.a=rsa-sha256 header.s=soverin1 header.b=TND2O79k; dkim-atps=neutral
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=strandkip.nl; s=soverin1; t=1750674112; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=CGqRnjU9pAN3mia8CsJgTNZ1XOi71+0nlU2HBLGEUDo=; b=TND2O79kauJvRJlKCkqnhFX+xWiUsiFHJFjoDIFjbjdekhRSmiN5O4npislX7xdjxZBA2j uT05db3O9H8sfoQm1cqVboCKPk1XQcmNj+0At5+oE/K4nQkcDs9vgRNLqCAcfka4WACdGc RFiZslNK/TytQe67TAjNsDm2VGDKkAyG1YwtHVlAELU+/LAfa/htUn1OtaD2lX8ozEvQzo ipohKntIXXj7iB8dH7MVTcevo5hmfraiv+izeTh9zLm7PIay8E1Hl1YDk0UCS/WAOIc7Kf yuRXfJZtSf1sxDry5pJOP0g55Y6dtxh4LePZbTOfhIJ6FaLTeRHebn5M431odA==
X-CM-Analysis: v=2.4 cv=I7afRMgg c=1 sm=1 tr=0 ts=68592ac0 a=KaXi7uwHYDnmObjPXf2OxQ==:617 a=SxxV3wn7I6doZDQ4:21 a=xqWC_Br6kY4A:10 a=IkcTkHD0fZMA:10 a=pafVdeRGAAAA:8 a=1t46xTWFaZo8mm4UWZUA:9 a=QEXdDO2ut3YA:10 a=3hrdv27JUtpGZagksXwW:22 a=ADiJHLWpjGBBXEl7-v_j:22
X-CM-Envelope: MS4xfH3BAI/oQmL9fPQkdOykZnHH/wU7CZKSD89Lnw/5d61dCV3sQZLqdIDyY0U0rnxj1deM+6MpKBx1E4BzKDyVLkILPZ13KQkqM75N1AusMe6KOhdFVcC4 sbS70JaKq0xt2YzhLoEtLVbqyq1TztthD7ePi/aeyt0uyRBV8YK+l1LLnIxZ6H0Ddi4+FtXufoGf9NaEXcuK1IPpiJCaQ6gaHzSUrLhx9D7HU/wkcfDvATN5 I7m3u/0qKn4uCjsQxeUsPVogaZhwhcfkZnHj2pGplH9JWAWDVyW+KGnl9NTipmr1ewR6oPNLQWFsxlXsp5hPiHlpXbXO/9jw1mf/OkWr208=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: Joe Abley <jabley@strandkip.nl>
Mime-Version: 1.0 (1.0)
Date: Mon, 23 Jun 2025 12:21:42 +0200
Message-Id: <D60A06A4-DC62-49A6-9351-BB7EE6323D05@strandkip.nl>
References: <33857674-E1AC-48E7-A4E5-B6953535A86F@depht.com>
In-Reply-To: <33857674-E1AC-48E7-A4E5-B6953535A86F@depht.com>
To: Andrew McConachie <andrew@depht.com>
X-Spampanel-Class: ham
Message-ID-Hash: OQAMLUGHNNOZ7L2CSG2QUPYMJOMD3AIR
X-Message-ID-Hash: OQAMLUGHNNOZ7L2CSG2QUPYMJOMD3AIR
X-MailFrom: jabley@strandkip.nl
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Joe Abley <jabley=40strandkip.nl@dmarc.ietf.org>, dnsop <dnsop@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: on the more general problem of delegating to other namespaces in the DNS
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/8KVa2vELvxj0ZWWh1CxZMrqgBQE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>
Hi Andrew, This seems like a clarifying question rather than the kind of rehashing of an old question that our esteemed chairs would prefer to be put on hold, and hence seems very reasonable to me. If I have misunderstood the chairs' preference here I am sure one of them will tell us :-) On 23 Jun 2025, at 11:34, Andrew McConachie <andrew@depht.com> wrote: > I’ve read through the draft as well as the messages on list, but I still don’t understand the use case for this draft. Why is creating a delegation to nowhere better than doing nothing? In practice, people have been using internal namespaces, with and without DNSSEC validation on mobile devices, for long enough that I am not convinced there is a widespread problem to solve. This, I think, is John Levine's pragmatic perspective, which the chairs would like us to stop going on and on an about regardless of whether we agree with John or not. However, the point of the draft (if I'm right and it has one) is that having a signed proof of non-existence for a (QNAME, QCLASS, QTYPE) from one set of nameservers and answers for the same (QNAME, QCLASS, QTYPE) from a different set of nameservers does introduce ambiguity. I think we could probably all come up with scenarios where believing the non-existence is the right thing to do (e.g. protection from bogus responses), and also other scenarios where believing the responses is the right thing to do (e.g. my local networks, my local rules). The difference in behaviour between (a) do nothing and (b) zone cut to nowhere is that (a) necessarily leaves the door open to ambiguous responses and (b) does not. The way that (b) avoids ambiguity is that it deliberately sabotages resolution in the case where there is no definitive answer to give, e.g. in the case where the root servers cannot say whether a name under INTERNAL should exist given the circumstances of a particular device that is asking. This means the device cannot cache an answer that would cause ambiguity because no such answer can be found. You either can't get an answer at all, or you can get an answer that has local significance. As a bonus, this mechanism allows answers of local significance to be signed in a way that can be validated The trade-off may be that there is some operational consequence of the lame delegation to a server that does not exist, e.g. problematic levels of unwanted traffic sent to root servers or query storms or other worrisome effects from resolvers that are dreadfully surprised by the empty hostname. This is the science that Wes is currently stirring in his cauldron. > One interpretation of the draft could be that its purpose is to provide documentation for human consumption. Is this an intended interpretation? No, not really. > Or are zone cuts to nowhere also useful information for machines? Yes. > If so, how SHOULD a resolver on the private side of split-horizon dns behave when it encounters a zone cut to nowhere? A resolver that provides responses from a private namespace will not encounter a zone cut to nowhere for that namespace. Such a resolver will have access to DNS data that it can use to return responses, e.g. by being configured to respond authoritatively to zones corresponding to the internal-use namespace, or by having explicit "forwarder" configuration so they know which authoritative nameservers to consult. A resolver that is not configured like that or which encounters a zone cut to nowhere for some namespace that it doesn't care about will behave the same as it would when encountering a referral response to servers that can't be resolved. It will fail, hopefully in a predictable way. Joe
- [DNSOP] on the more general problem of delegating… Joe Abley
- [DNSOP] Re: on the more general problem of delega… Ted Lemon
- [DNSOP] Re: on the more general problem of delega… Joe Abley
- [DNSOP] Re: on the more general problem of delega… Ted Lemon
- [DNSOP] Re: [Ext] on the more general problem of … Paul Hoffman
- [DNSOP] Re: [Ext] on the more general problem of … John Levine
- [DNSOP] Re: [Ext] on the more general problem of … Joe Abley
- [DNSOP] Re: [Ext] on the more general problem of … Paul Hoffman
- [DNSOP] Re: [Ext] on the more general problem of … Joe Abley
- [DNSOP] Re: [Ext] on the more general problem of … Libor Peltan
- [DNSOP] Re: DNSOP[Ext] on the more general proble… Wes Hardaker
- [DNSOP] Re: on the more general problem of delega… Andrew McConachie
- [DNSOP] Re: on the more general problem of delega… Joe Abley
- [DNSOP] Re: on the more general problem of delega… Andrew McConachie
- [DNSOP] Re: on the more general problem of delega… Peter Thomassen
- [DNSOP] Re: on the more general problem of delega… Joe Abley
- [DNSOP] Re: on the more general problem of delega… Petr Špaček
- [DNSOP] Re: on the more general problem of delega… Ted Lemon
- [DNSOP] Re: on the more general problem of delega… Joe Abley
- [DNSOP] Re: on the more general problem of delega… Peter van Dijk
- [DNSOP] Re: on the more general problem of delega… Peter van Dijk