On Wed, Jun 20, 2018 at 9:15 PM Shumon Huque <shu...@gmail.com> wrote:

> On Tue, Jun 19, 2018 at 7:15 PM Mukund Sivaraman <m...@mukund.org> wrote:
>
>>
>> There also seems to be a scalability problem with SIG(0) in that
>> generating the signature involves a public-key operation per DNS
>> message.
>>
>> For a zone transfer of the root zone from F, the AXFR contains 79
>> messages in the TCP continuation:
>>
>> ;; XFR size: 22554 records (messages 79, bytes 1335768)
>>
>
> Yup, I realize that. That was one fo the reasons is I mentioned that
> SIG(0) can
> also sign IXFR messages if they are available from the server, which could
> significantly reduce the performance impact. Thinking about it more now
> though,
> I recall that the current root zone management scheme isn't that conducive
> to
> incremental transfer, since the zone is signed monolithically twice a day
> (IIRC).
>

One other comment on this: Getting better performance than this requires
re-inventing
something akin to TLS key exchange, and I was wondering if anyone had
thought of that
during the development of SIG(0). And sure enough, RFC 2930 proposes (among
other
things) SIG(0) authenticated symmetric key establishment using TKEY, either
via
Diffie-Hellman or client chosen key transport.

So, together with AXFR-SIG (i.e. full zone signature), Don Eastlake appears
to have
long ago contemplated most of the design space around this draft and its
problem space!
:-)

Shumon.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to