Ondrej,
                A while back i only had 
udrtld.net hosted on a and b.  B
was down and A had a hardware failure.... Despite registering a, b, c,
d, f as records on the root servers, they stopped resolving 
hk.com after
the records expired on the c d and f.  The root server did not give any
IP's for 
udrtld.net and the information they held varied.
Yes I undestand that 
udrtld.net would stop resolving as any authorative
DNS servers but the root server GLUE should have told global resolvers
of the IP of c, d, f... They didn't. The 
udrtld.net domain went down as
fixed it promptly after.  Nothing I did would fix it until a got A back
online.
Moral is don't rely on the root servers for IPs, you can't if you have a
misconfiguration and you better server your own too. Don't assume what a
resolver will do.
| dig 
www.rfc1925.org @pagan.rfc1925.org
I see this work, like on the dns of nic.cz my case is different. In my
case I am have to use one domain to host all the zones we manage and
that domain is different from all the zones.
Maren.
On 2/24/2014 9:11 PM, Ondřej Surý wrote:
 Hi Maren,
 as far as I remember the {a,b,c,d,e,f}.udrtld.net would be ignored by the (good behaving)
recursive servers because they don't come in the bailiwick of the queried zone.
 So, since those records are not used anyway, we are slimming down the responses.
 You may compare responses to:
 dig 
www.sury.org @pagan.rfc1925.org
 - no GLUE since 
pagan.rfc1925.org is not in the bailiwick of 
www.sury.org
 with
 dig 
www.rfc1925.org @pagan.rfc1925.org
 - GLUE added since 
pagan.rfc1925.org is in the bailiwick of (
www.)rfc1925.org and can be
used
 You can read more about cache poisoning attacks, f.e. here:
 
http://www.linuxjournal.com/content/understanding-kaminskys-dns-bug
 Or you can try yourself with unbound recursive server, set the verbosity to 3
(unbound-control verbosity 3), flush the zone cache (unbound-control flush_zone .) and ask
the server, you should be able to observe something like this:
 Feb 24 14:00:52 unbound[16038:0] info: sanitize: removing potential poison RRset:
a.udrtld.net. A IN
 Feb 24 14:00:52 unbound[16038:0] info: sanitize: removing potential poison RRset:
b.udrtld.net. A IN
 Feb 24 14:00:52 unbound[16038:0] info: sanitize: removing potential poison RRset:
c.udrtld.net. A IN
 Feb 24 14:00:52 unbound[16038:0] info: sanitize: removing potential poison RRset:
d.udrtld.net. A IN
 Feb 24 14:00:52 unbound[16038:0] info: sanitize: removing potential poison RRset:
f.udrtld.net. A IN
 in the syslog, and the recursive server will go and resolve the {a,...}.udrtld.net names
itself.
 Ondrej
 --
   Ondřej Surý -- Chief Science Officer
   -------------------------------------------
   CZ.NIC, z.s.p.o.    --    Laboratoře CZ.NIC
   Americka 23, 120 00 Praha 2, Czech Republic
   mailto:ondrej.sury@nic.cz    
http://nic.cz/
   tel:+420.222745110       fax:+420.222745112
   -------------------------------------------