[arin-ppml] Encouraging IPv6 Transition (was: Clarify /29 assignment identification requirement)
marka at isc.org
Mon May 21 08:38:45 EDT 2012
In message <6ABCC1C0-6DB6-403E-B8D8-78D688CF8F14 at delong.com>, Owen DeLong write
> On May 16, 2012, at 10:12 AM, William Herrin wrote:
> > On 5/16/12, Owen DeLong <owen at delong.com> wrote:
> >> On May 16, 2012, at 8:11 AM, Michael Richardson wrote:
> >>> But, I didn't say it was risk of collision with ULA-R that was the
> >>> main problem, it is lack of reverse DNS and lack of whois that is the
> >>> problem.
> >> Why do you need non-local RDNS and/or WHOIS for local-only addresses?
> > Hi Owen,
> > Configuring split-horizon DNS coordinated between multiple
> > interconnected organizations has always been a bit of an intractable
> > problem, especially when some parts are connected to some other parts
> > but not all parts are connected to all other parts. You could
> > sometimes get around it with an interior root but DNSSEC blows that
> > out of the water. An exterior NS record back to the interior
> > authoritative server could potentially help a lot.
> Which makes the situation you describe more ideally suited to GUA with
> appropriate filtration of routes and packets.
ULA space is supposed to be within insecure delegation to break the
chain of trust, see RFC 6303. Currently isn't which should be
6. IANA Considerations
IANA has established a registry of zones that require this default
behaviour. The initial contents of this registry are defined in
Section 4. Implementors are encouraged to periodically check this
registry and adjust their implementations to reflect changes therein.
This registry can be amended through "IETF Review" as per [RFC5226].
As part of this review process, it should be noted that once a zone
is added it is effectively added permanently; once an address range
starts being configured as a local zone in systems on the Internet,
it will be impossible to reverse those changes.
IANA should coordinate with the RIRs to ensure that, as DNS Security
(DNSSEC) is deployed in the reverse tree, delegations for these zones
are made in the manner described in Section 7.
7. Security Considerations
During the initial deployment phase, particularly where [RFC1918]
addresses are in use, there may be some clients that unexpectedly
receive a name error rather than a PTR record. This may cause some
service disruption until their recursive nameserver(s) have been
As DNSSEC is deployed within the IN-ADDR.ARPA and IP6.ARPA
namespaces, the zones listed above will need to be delegated as
insecure delegations, or be within insecure zones. This will allow
DNSSEC validation to succeed for queries in these spaces despite not
being answered from the delegated servers.
It is recommended that sites actively using these namespaces secure
them using DNSSEC [RFC4035] by publishing and using DNSSEC trust
anchors. This will protect the clients from accidental import of
unsigned responses from the Internet.
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: marka at isc.org
More information about the ARIN-PPML