Resolution latency is only affected initially when the resolver must fetch the confkey record, after that initial fetch (until TTL expires) there are no additional packets introduced into the query/response exchange.
Zone file size is not an issue - adding a single key record to support confidential operations is not likely to have a meaningful impact to zone file size based on the impact of DNSSEC adoption. If every name server adopted support for confidential DNS there would be an impact - this is an inevitable cost of adding a feature like this. Some of the additional considerations include performance impacts to large scale name servers (both recursive and authoritative). I agree that this has an impact to the DNS ecosystem, however I suspect that the impact is nearly as low as possible. An alternative such as implementing TLS would have a far more severe impact on the high volume name servers and would still require client side changes. On Nov 28, 2013, at 9:09 AM, Guangqing Deng wrote: > Though bringing privacy protection to the DNS query and response, this method > may bring many other negative impacts on DNS system. The DNS resolution > latency will be increased due to fetching so-called ENCRYPT RR which makes > the DNS zone file bigger. Not onlay the DNS server but also the DNS client > have to support encrypt algorithms, which is not a good thing for DNS system. > Maybe more considerations are needed to figure out what will happen if this > methood is choesn. > > Guangqing Deng > CNNIC > > From: W.C.A. Wijngaards > Date: 2013-11-28 21:25 > To: dnsop > Subject: [DNSOP] confidentialdns draft > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Hi, > > I also heard that this is the place to discuss DNS privacy. > > This draft is a protocol, and represents an (interesting) point in the > solution space. I would refer to Borzmeyer's draft and Koch's draft > for problem space analysis. > > http://tools.ietf.org/html/draft-wijngaards-dnsop-confidentialdns-00 > > It supports opportunistic encryption, i.e. try to encrypt but fallback > to insecure. This supports deployment immensely, because clean DNS > paths are uncommon. > > It supports stateless operation. It uses UDP. > > It supports encryption for stub-to-cache and cache-to-authority. > > Best regards, > Wouter > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.15 (GNU/Linux) > Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ > > iQIcBAEBAgAGBQJSl0RiAAoJEJ9vHC1+BF+NbOcP/03f76fPIp8rkKtjYdjTHbZ7 > qoMFVsIbZ6GqoB77U2w2dtVEirfqLkcBQ5gE1LzLGL/AS4aKVBg7GLAY/qv1o+BM > YIvoecRd+P+/mzZZtROJbpe3Pp3ktsL9+A4SaChpWBWPR7qCUKGh2R0YWq6hHj0h > btIOFROGnt/QH0Pho7/0N9UfNBVlc6By8BSwON2kiR9bD+oyCDGxJQ85N03p8FJo > kVIZM6PtsUHQxhX4rhQec5t/LBu1oXVq5tdVSzjiIYZAcUI9lLfv7f7o1QccAIUF > YZ/u1OvIp3l6iKNK3eLrimXRu7dFR09aqUcbYD0LNci6g4AY0awPYk2TE5OtQ1Ll > SHpil/QzKA0V4QPANfZNBV/wL5SitnQuS6fLYkKnsjSED8AUINNLqYttSo+wPEMs > ReCPI51pyuvL0E/ZkfiKRsfb8qiuFh1OkCLFgJZMVzecLcOvrVfxxf4SNe8Z8i7F > IzSNikgqSzIK/hQSEMVjk9O+f97/muQw0fCiqGbIS9hUntEwJ90/Ji20dxlz2aj7 > V7nuC4wz53VWHtIYhiDMP2P9Twbh40TmdIf9yWFZzkayryBVwH5gTuU1ZqL2sVc6 > qMolnaKQdTFnM4jAMzfYBuHyUzFTRqG1u9IXLskmBl0tDAOH0cRV4bD6oH8BZd+X > v//pHQiVWuyMbndChPrm > =PdRr > -----END PGP SIGNATURE----- > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop