On Fri, 27 Jul 2018, Warren Kumari wrote:

This can, but does not have, to be built into the nameserver itself.

Those are just more arguments to not have a DNS checksum/sig option.

What I see is that:

We are looking at a way to distribute the root zone, presumably to
make the root servers less mission critical and for enhanced
privacy and reduced NXDOMAIN queries.

We are depening on DNSSEC for integrity of the data, which just misses
glue/NS verification.

we can do AXFR but that would keep the root servers mission critical.

glue/NS verification isn't needed normally, because we would just
need a single working entry to pull the new root zone from one of
the root servers - but then we depend again on the root servers
as critical infrastructure which is something we seem to want to
try and avoid.

maybe this is also useful for non-root zones, so the method was sort
of made to apply generically.


I think the use for non-root zones is quite a different use case, so if
I ignore that, we are looking at specifically the root zone only.


What is the pain of getting a root zone file from an unknown/untrusted
source ?

- transport seurity isn't enough (so no (D)TLS)
- detached sigs like pgp too annoying/hard? (two files instead of one,
  or the one file needs preprocessing before giving it to DNS tools)
- we have to validate it with the known key (so some tooling needed)
- glue/ns could be filtered (either a ddos, or a privacy concern?)
- we cannot depend on finding 1 working root server and then AXFR it
  to confirm, assuming that would be too much load on the existing
  root servers (although load of junk queries would decrease if this
  is deployed)


It seems the way to fix this would be to have well known recursive servers
(8.8.8.8, 1.1.1.1, 4.4.4.4, level3, opendns, etc) also offer the root
zone for AXFR. If you get something that does not work, fall back to
standard recursive root zone queries based on the buildin hints file.

We could also do some /.well-known/root.zone URI to allow for other
https/tls servers for serving the zone without being a public resolver,
eg for enterprise or isp network use only? Maybe a dhcp option to point
to the location?

Additionally, these servers could allow downloads of the root zone via
HTTPS/TLS/etc for those tools that want to write a root zone file to
disk for re-use or for preloading a resolver cache on startup ?

In all of this, I don't see much use in protecting the root zone with
either ZONEMD or XHASH. If the NS/glue is mangled to the point of being
unusable to refresh the root zone, drop the garbage and do traditional
DNS querying from the preloaded hints or previous copy of the root zone.

If ZONEMD or XHASH was a regular record with no special handling, maybe
it could be worth it, but it is a very a-typical RRTYPE and I think
there isn't a very strong case for adding it to the DNS system.

Paul

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to