BIND 10 #1176: RRSIG support in new data source

BIND 10 Development do-not-reply at isc.org
Thu Aug 25 06:02:29 UTC 2011


#1176: RRSIG support in new data source
-------------------------------------+-------------------------------------
                   Reporter:         |                 Owner:  jinmei
  jinmei                             |                Status:  assigned
                       Type:  task   |             Milestone:
                   Priority:  major  |  Sprint-20110830
                  Component:  data   |            Resolution:
  source                             |             Sensitive:  0
                   Keywords:         |           Sub-Project:  DNS
            Defect Severity:  N/A    |  Estimated Difficulty:  0
Feature Depending on Ticket:         |           Total Hours:  0
        Add Hours to Ticket:  0      |
                  Internal?:  0      |
-------------------------------------+-------------------------------------

Comment (by jinmei):

 Replying to [comment:3 vorner]:

 > Anyway, this ticket can be understood two ways in this context. In one
 context, all the work here is already done and the only change that is
 needed for DNSSEC here is rendering or not rendering the RRSIGs into the
 answer packet in auth server.
 >
 > The other way is [...]
 >
 > So, which way should I understand it? What is the intended usage? Should
 I just check the in-memory wildcard case and close it, or do the option?

 My intent when I created this ticket was the former.  At that time I
 didn't know (or fully realized) the current implementation of find()
 would already have some basic level of RRSIG support.  I also didn't
 intend to update the in-memory part at all this time - which would be
 a separate set of tasks.

 I guess we'll still need a signal to indicate whether DNSSEC is
 desired to support negative response cases, but this may not have to
 be done within the ticket.

 Another thing I'd like to note using this opportunity is that I
 personally don't think the current design of storing RRSIGs in RRset
 is really clean.  I'd eventually (in not so far future) like to
 revisit the design on this point, but that's definitely out of scope
 of this ticket.

 To summarize, what I'd now envision in this ticket are:

 - in the auth query class, add code to handle the DNSSEC case (for
   positive results only)
 - do not touch in-memory implementation
 - if necessary, update the database finder code to handle the wildcard
   RRSIG case
 - may or may not update the find() interface to signal the need for
   DNSSEC records (but even if we do this, I'd not change the current
   code to explicitly remove RRSIGs when it's "false")

-- 
Ticket URL: <http://bind10.isc.org/ticket/1176#comment:4>
BIND 10 Development <http://bind10.isc.org>
BIND 10 Development


More information about the bind10-tickets mailing list