[dns-operations] Google (formerly also CF) public DNS sometimes forwards incomplete subset of NSEC RRs
Viktor Dukhovni
ietf-dane at dukhovni.org
Mon Sep 21 00:00:14 UTC 2020
On Sun, Sep 20, 2020 at 11:41:31AM -0700, Brian Somers wrote:
> In this case however, the presentation of *.runbox.com as an RR
> also implies that runbox.com has an NSEC. As that NSEC is not
> otherwise required, that’s enough. One record supplies the
> closest encloser and the proof that an applicable wildcard exists
> that doesn’t include the TLSA type.
Yes, we know that "runbox.com" exists, but where's the proof that
the requested qname does not exist, required to make the wildcard
response applicable?
> > Thanks! Looks much better now. Now it is Google's turn. I still see
> > an incomplete NSEC3 RRset from 8.8.8.8:
> >
> > $ hsdig -n8.8.8.8 -D -t tlsa _25._tcp.mx.runbox.com
> > _25._tcp.mx.runbox.com. IN TLSA ? ; NoError AD=1
> > runbox.com. IN SOA dns61.copyleft.no. hostmaster at copyleft.no. 3000008499 14400 3600 1296000 3600
> > runbox.com. IN RRSIG SOA 13 2 86400 20200930104345 20200916091345 18202 runbox.com. <sig>
> > *.runbox.com. IN NSEC _acme-challenge.runbox.com. A MX RRSIG NSEC
> > *.runbox.com. IN RRSIG NSEC 13 2 3600 20200930104345 20200916091345 18202 runbox.com. <sig>
Here there's only proof of the existence of the wildcard, the
non-existence of any of:
1. _25._tcp.mx.runbox.com.
2. _tcp.mx.runbox.com.
3. mx.runbox.com.
is not established, without which the the wildcard response is bogus...
--
Viktor.
More information about the dns-operations
mailing list