On 03 Dec 2013, at 10:06, Tony Finch <d...@dotat.at> wrote:

> Mark Andrews <ma...@isc.org> wrote:
>> Tony Finch <d...@dotat.at> wrote:
>>> Roy Arends <r...@dnss.ec> wrote:
>>> 
>>>> If that succeeds, only then validation makes sense.
>>> 
>>> Why? Why not validate the chain of referrals as you follow them? The
>>> protocol is designed to support that otherwise it would not include the DS
>>> in the referral.
>> 
>> It's more because we havn't coded for it yet, especially the non
>> existence case, than anything else.
> 
> Yes, and that's perfectly fine :-) I'm just puzzled why Roy thinks it
> doesn't make sense to reduce validation latency.

I said "I agree there is some room for optimisation, using previously obtained 
information (like the DS record and its signature) to complete the validation 
chain, which has a complexity cost as well.”

The additional complexity hasn’t been added yet, and I highlighted some of the 
corner cases that comes with it, if it would be added.

i.e. I never said that it doesn’t make sense to reduce validation latency. On 
the contrary.

I also said that it makes sense to complete the delegation chain first, then 
complete the validation chain. To be clear, I’m all for reducing validation 
latency. Hence if there is stuff to validate and the keys are there, go for it. 
If the keys (or DS records) are not yet present, I’d prioritise getting the 
records in for the delegation chain before getting the records for the 
validation chain. If there is no complete delegation chain (something is lame), 
SERVFAIL early on it. The client might not care about validation (CD=1). 

> I'm also wondering what the advantages are to bottom-up validation. It
> gets really knotty when the leaf records have broken signatures - you
> have to keep walking up the tree to see if there's an insecure delegation
> to work out whether to return bogus or insecure.

I don’t think it actually matters, (bottom-up vs top-down). It is simply a 
chain of TA-DNSKEY-(DS-DNSKEY)-ANSWER. Since DNSKEYs have to be explicitly 
queried for (and sometimes DS records), just fill them in. You can issue a set 
of queries for all the missing DNSKEYs in parallel (not waiting for one to 
finish before issuing the second missing DNSKEY/DS). It is then either complete 
or not. If not, all bets are off. I personally don’t like the effect of 
querying all authoritative servers for a single zone in order to get a proper 
validation path, and then backtracking to get an alternative delegation path. 
That leads to the “Rollover and Die” issues we saw a couple of years ago.

Roy

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to