Wessels, Duane:
> 
>> On May 25, 2018, at 11:33 AM, 神明達哉 <jin...@wide.ad.jp> wrote:
>>
>> At Wed, 23 May 2018 15:32:11 +0000,
>> "Weinberg, Matt" <mweinberg=40verisign....@dmarc.ietf.org> wrote:
>>
>>> We’ve posted a new version of draft-wessels-dns-zone-digest.  Of note,
>> this -01 version includes the following changes:
>> [...]
>>> We plan to ask for time on the dnsop agenda in Montreal.  Your feedback
>> is welcome and appreciated.
>>
>> I've read the draft.  I have a few high level comments and specific
>> feedback on the draft content:
>>
>> - It was not really clear exactly what kind of problem this digest
>>   tries to solve, especially given that the primarily intended usage
>>   is for the root zone, which is DNSSEC-signed with NSEC.
> 
> Thanks you for the feedback.  We will write a clearer problem statement
> in the introduction for the next version.

As I mentioned, I have seen zones broken during transfer in production,
and having a standard way to check for this seems reasonable.

>> - This digest can't be incrementally updated, that is, you'll need to
>>   calculate the digest over the entire zone even if just a single
>>   record is modified (am I correct?).  That's probably an inevitable
>>   cost for the motivation of providing cryptographically strong
>>   integrity check, but that's a pity for me.  One case I know of where
>>   things like "zone digest" is wanted is to ensure consistency for a
>>   very large zone between primary and secondary servers that are
>>   synchronized using IXFR.  In principle they must be consistent, but
>>   operators may want to have a lightweight (albeit not
>>   cryptographically strong) way to confirm no unexpected events (such
>>   as an implementation bug) quietly broke the consistency.  Perhaps
>>   such usage is just outside the scope of this proposal, but I first
>>   expected I could use it for this kind of purpose it was a bit
>>   disappointing and I wanted to mention it.
> 
> Incremental updates could be supported if the working group feels it is
> important.  We have a working proof-of-concept implementation of this that
> hashes individual RRsets and then XORs them into a final message digest
> (thanks to Roy Arends for the suggestion).
> 
> However, this complicates the implementation.  It almost certainly requires
> more CPU processing but probably not to an extent that matters significantly.
> We could do some simple benchmarks.
> 
> If there is desire to follow this path, then we should discuss whether or
> not to keep having the zone digest algorithms exactly match the DS digest
> algorithms.  For example, digest alg 2 could mean "SHA256 over the zone
> as a whole" while digest alg 3 could mean "SHA-256 digest and XOR individual
> RRsets" to support incremental updates.

As I mentioned in my review of the first version of this document, I
think that inserting digest records periodically throughout the zone
could serve to allow incremental updates (as the recipient can cache
unchanged values) and also allow a degree of parallelism.

I certainly won't push for it. My main concern is that for large-ish
zones with frequent updates digest is basically useless without such a
mechanism.

Cheers,

--
Shane

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to