Re: [DNSOP] Alvaro Retana's No Objection on draft-ietf-dnsop-nsec3-guidance-08: (with COMMENT)

Wes Hardaker <> Tue, 24 May 2022 16:33 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id B1845C1D3507; Tue, 24 May 2022 09:33:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id io7aC1FWyeeX; Tue, 24 May 2022 09:33:31 -0700 (PDT)
Received: from ( []) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by (Postfix) with ESMTPS id D4E1AC1D34F9; Tue, 24 May 2022 09:32:48 -0700 (PDT)
Received: from localhost (unknown []) by (Postfix) with ESMTPA id 3CF032080A; Tue, 24 May 2022 09:32:48 -0700 (PDT)
From: Wes Hardaker <>
To: Alvaro Retana via Datatracker <>
Cc: The IESG <>, Alvaro Retana <>,,,,
References: <>
Date: Tue, 24 May 2022 09:32:48 -0700
In-Reply-To: <> (Alvaro Retana via Datatracker's message of "Tue, 10 May 2022 08:37:40 -0700")
Message-ID: <>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <>
Subject: Re: [DNSOP] Alvaro Retana's No Objection on draft-ietf-dnsop-nsec3-guidance-08: (with COMMENT)
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: IETF DNSOP WG mailing list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 24 May 2022 16:33:31 -0000

Alvaro Retana via Datatracker <> writes:

> Should this document formally Update RFC5155?  Besides providing "guidance on
> setting NSEC3 parameters", there is also Normative language that seems similar
> to what is in rfc5155, but not the same.  For example:
> In §3.2 this document says:
>    Validating resolvers MAY return an insecure response to their clients
>    when processing NSEC3 records with iterations larger than 0.  Note
>    also that a validating resolver returning an insecure response MUST
>    still validate the signature over the NSEC3 record to ensure the
>    iteration count was not altered since record publication (see
>    [RFC5155] section 10.3).
> I couldn't find text in rfc5155 about how returning insecure responses is
> optional, but I did find this in §10.3 that seems related to the validation
> requirement:
>    A resolver MAY treat a response with a higher value as insecure,
>    after the validator has verified that the signature over the NSEC3
>    RR is correct.
> Reading further, §3.2 does say that "this specification updates [RFC5155]", but
> there's no indication in the header or anywhere else.

As discussed in other threads, the replacement version will update 5155.

And yes, I agree that the returning of insecure for large values is not
spelled out in a really strong way (and is one of the reasons I think
the DNSOP WG thinks our document is a good update as we specify this
with greater clarity).
Wes Hardaker