[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: Mike StJohns <Mike.StJohns@nominum.com>, dnssec@cafax.se
From: David Blacka <davidb@verisignlabs.com>
Date: Mon, 10 May 2004 15:48:48 -0400
Content-Disposition: inline
In-Reply-To: <20040510190503.GA1978@atoom.net>
Sender: owner-dnssec@cafax.se
User-Agent: KMail/1.6.2
Subject: Re: dnssec: resolver - application communication

On Monday 10 May 2004 3:05 pm, Miek Gieben wrote:

> I fully agree with what you say here, but right now such a cache does
> not exist, hence a application needs to bypass the current available
> cache and it goes out on the Net to talk to the authoritative servers.

I still don't get this.  It seems to me that "such a cache" *does* exist.  Why 
does the app need to bypass the cache?

> (it is possible to _use_ a cache and try to built the chain of trust
> yourself, but this is really an exercise in "programming around the
> cache", and getting the cache to do the right thing)

I think that there is some confusion as to how, exactly, a SASR works.

It is true that a SASR cannot get away with the brain-dead simple mode of 
operation that a non-SASR can.  Instead of one-call->one-query->one-response, 
the SASR must follow the original response with queries for the other data 
that it needs to do the validation (that is, the chain-of-trust information).  
This isn't so bad, because 99 times out of 100, this information will be 
coming from the full resolver's cache, as the full resolver probably just 
cached it.  If the SASR wants to cache the chain of trust itself, more power 
to it.

But the SASR shouldn't even know *how* to bypass the cache.

AFAIK, the way to get the cache to "do the right thing" is CD=1.

> But reading the rest of the thread, and trying to respond here, it
> seems that:
> o SERVFAIL is too overloaded,

Yes.

> o We need something like the CD-bit, that will return an entire chain
>   of trust, which consists of the RR's you specified above: ALL keys,
>   ALL DSs, ALL RRSIGs, and the RRset,

Why?

> o A library/daemon that can handle this,
> o Standarization of the errors in DNSSEC.
> o ....
>

-- 
David Blacka    <davidb@verisignlabs.com> 
Sr. Engineer    VeriSign Applied Research

Home | Date list | Subject list