Matthijs,

On Jan 15, 2015, at 5:13 AM, Matthijs Mekking 
<matth...@pletterpet.nl<mailto:matth...@pletterpet.nl>> wrote:

IXFR with DNSSEC is suddenly not so small anymore. Do you recognize
this? Olafur and I have some ideas on keeping those zone transfers
small. Your feedback is appreciated.

 http://www.ietf.org/internet-drafts/draft-mekking-mixfr-01.txt

I support this draft.  Steps that can improve the efficiency of DNS are good in 
my mind (where reduced packet size is to me being efficient).

In the Security Considerations section you are asking what you should include 
in there.  I think what you say about using MIXFR over a secure channel and 
with TSIG is a good recommendation.

The question would really be to me - can an attacker do anything different with 
MIXFR than with IXFR?  Could an attacker, for instance, use MIXFR to delete 
RRSIGs so that portions of a zone were then unsigned?   Could multiple MIXFR 
records be sent at the same time to create confusion?  Could a MIXFR be used 
for a DoS attack?

And is any of that different from IXFR?  (Or should you then just reference the 
Security Considerations for IXFR?)

I don’t know the answers… but those are the kinds of things I think would be 
good to discuss in the Security Considerations area.

Dan



--
Dan York
Senior Content Strategist, Internet Society
y...@isoc.org<mailto:y...@isoc.org>   +1-802-735-1624
Jabber: y...@jabber.isoc.org<mailto:y...@jabber.isoc.org>
Skype: danyork   http://twitter.com/danyork

http://www.internetsociety.org/deploy360/



_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to