On 4 Jan 2017, at 9:33, Nicholas Weaver wrote:
Any system which prevents zone enumeration requires online signing, https://www.cs.bu.edu/~goldbe/papers/nsec5faq.html
That statement isn't really supported by the text on the page. Depending on the zone, using pre-signed NSEC3 prevents varying amounts of enumeration, depending on what's in the attacker's dictionary and what's in the zone.
But NSEC5 is almost certainly not going to be adopted, simply because of the partial deployment problem.
Yes.
NSEC3 lies work today, but people worry that NSEC3 might have server compromise compromise the ZSK.
NSEC3 lies can also be created with pre-computing, but at a cost of greatly increasing the size of the zone.
So why not simply add a new DNSKEY record flag: NSEC3-only. This flag means that the key in question can only be used to sign an NSEC* record when presenting NXDOMAIN.
This could be done if there are enough people who care about zone enumeration against the current NSEC3 capabilities. Are there such people? Have we heard what their problem statements are and what they have tried with pre-computed NSEC3 lies?
--Paul Hoffman _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop