<div dir="ltr"><div dir="ltr">On Wed, Apr 17, 2019 at 2:36 PM Dave Lawrence <<a href="mailto:tale@dd.org">tale@dd.org</a>> wrote:<br></div><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Shumon Huque writes:<br>
> ;*.<a href="http://h4ha.net" rel="noreferrer" target="_blank">h4ha.net</a>. IN A<br>
> *.<a href="http://h4ha.net" rel="noreferrer" target="_blank">h4ha.net</a>. RRSIG A 13 2 [...]<br>
> *.<a href="http://h4ha.net" rel="noreferrer" target="_blank">h4ha.net</a>. A 192.155.81.104<br>
> <br>
> Interesting problem. So the wildcard can be queried directly and validates<br>
> properly.<br>
<br>
There's a subtle bit of terminology massaging that is probably<br>
required here. It's not quite the case that the wildcard is being<br>
queried directly, but rather that the * label in the query is hitting<br>
the wildcard expansion and is then replaced by a * label and thus<br>
returning something that looks like the wildcard name but isn't<br>
really. At least that's what's going on in the sense of the DNS<br>
standards;<br></blockquote><div><br></div><div>Yeah, I know! That was my shorthand for your paragraph :-)</div><div><br></div><div>I should have just said the "star label" can be matched! But I guess</div><div>I should expect no less than this level of DNS protocol geekery</div><div>on this list! :-)</div><div><br></div><div>Shumon.</div><div><br></div></div></div>