On Tue, Aug 8, 2023 at 10:45 AM Ben Schwartz <bemasc= 40meta....@dmarc.ietf.org> wrote:
> Hi DNSOP, > > draft-ietf-dnsop-compact-denial-of-existence currently says the following > about RFC 4470: > > The response for a non-existent name requires up to 2 signed NSEC > records or up to 3 signed NSEC3 records (and for online signers, the > associated cryptographic computation), to prove that (1) the name did > not explicitly exist in the zone, and (2) that it could not have been > synthesized by a wildcard. > > However, it seems to me that the wildcard response is extremely cacheable, > so in practice online signing with RFC 4470 only requires one signature > (even during a cache-busting attack), i.e. the same computational cost as > draft-ietf-dnsop-compact-denial-of-existence. This leaves response packet > size as the primary advantage over RFC 4470. Is this a fair assessment? > Yes, the wildcard at the closest encloser name is certainly amenable to pre-computation and caching. Perhaps at a certain scale or under duress, there would be operational issues. The wildcard non-existence proof also requires knowledge of zone structure, which I'm told some DNS implementations have challenges with. Even with only a hash table of names though, this only requires a quick upward search and stripping off a few leading labels, so I'm not convinced this is a practical impediment. There is another case where things can't be pre-computed though. A wildcard "match" in 4470 needs a dynamically generated NSEC covering non-existent labels, which could be randomly posed by an adversary. Compact DoE prevents this by pretending there is an exact match (I'm not sure if that was a design goal though). At any rate, as I've remarked before, I'm not convinced that the optimizations offered in Compact DoE were actually necessary as an operational matter. But I'll leave it to our colleagues at Cloudflare to argue that case. My interest in publishing this spec is (1) to officially record one of the now dominant implementations of DNSSEC amongst the commercial online DNS signers, and (2) to restore more precise NXDOMAIN visibility. Shumon.
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop