On 3/26/15, 4:31, "Mark Andrews" <ma...@isc.org> wrote:
>Named doesn't do this today and I have no intention
>of making the incremental management of NSEC/NSEC3 constuction /
>destruction do this.  This work is deliberatly broken up to allow
>a server to appear to simultaneously answer queries, to rebuild/destroy
>NSEC/NSEC3 chains in zones and to accept new updates without having
>to rely on the OS supporting threads.

In the same line of reasoning - what about replacement of signatures.  For
zones where signatures are refreshed en mass, is there code-logic that
decides to delete signatures because new ones are being added.

>NSEC3PARAM -> NSEC3 inference you are describing above depends on
>atomicity of changes which just do not happen and cannot be made
>to happen without detremental effects.

One of the ideas I am thinking of is - when DNSSEC was designed there was
little operational reality to draw upon.  Having multiple signatures was
imagined and built into the protocol - for example, you could sign with
RSA-SHA1 for Monday and the next signature for Tuesday, and so on.  (We
didn't consider packet size and we anticipated an air gap between signer
and server.  Life was much different back then.)  So today, the protocol
is more flexible when it comes to having signatures than is needed.  With
the onset of operations a couple of things arise - rarely does anyone have
multiple algorithms and rarely does anyone have multiple active keys, so
usually, its a one-signature affair.

Under that reality one can derive heuristics about what to implicitly
drop.  Heuristics are inherently imperfect, hence some risk they
misbehave.  But given that MIXFR can be designed to be an option to using
AXFR and IXFR, it might work that defining heuristics works here.  I'm not
sold, and it goes against my thoughts we need to simplify rather than
complexify (yes, not a word) the protocol, but its worth a discussion.
Should we include some basic set of heuristic rules for implicitly
deleting records.

In a conversation, it was noted that AXFR is MIXFR in the extreme - it
says "add all this" and implicitly "delete all that."  IXFR is a diff that
explicitly lists the delta.  MIXFR sounds like an intermediate step
between the two, a little of the delta of IXFR and the implicit deleting
of a records from sets.

Or - perhaps MIXFR shouldn't be grafted off IXFR and be grafted off of
dynamic update.  That means a different wire format and instead of
implicit deletes, you get selective deletes according to rules for
matching.  See "Dynamic Updates in the Domain Name System (DNS UPDATE) "
[aka RFC 2136] sections 2.5.2, 2.5.3, and 2.5.4 for what I'm calling
"selective deletes."  At first I didn't like this idea, but when thinking
about the implicit delete situation, perhaps the RFC2136-like semantics
are better.  (Perhaps.)

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to