> On 20 Jul 2018, at 10:37 pm, George Michaelson <g...@algebras.org> wrote: > > The intent (to me at least) is to be able to use exterior fetch, *not* > DNS, to source this as a file. curl. wget. ncftp. rsync.
Nothing in this proposal stops these transport mechanisms. > the "thing" is a file object. It almost certainly is in near-canonical > sort order already. Its a stream of characters, probably in > bind-normal form. Which is basically DNSSEC order. > If you can compute the path through the labels and the chain of NSEC > regions and the expected hadda-yadda-dadda.. you don't *need* a > digest. The difference between METAMD and XHASH is that you do XHASH in smaller chunks on such a ordered zone and verify each chunk as you go through. > If you have a digest, and its already in near canonical order, then > *cost* to compute "is the file exactly as the publisher wrote it" is > low. And, since its a signature under the ZSK, its not just "its as > the publisher said" its "the publisher knows the ZSK" which is strong > enough to say: "just load it" > > So, I ask: is this incremental method applicable to this model? Yes > Sure, works for giant zone. What about a root zone? Do I need this? Yes, it works for the root zone. > Also.. glue. Yes it hashes glue and delegating NS record. > -G > > On Fri, Jul 20, 2018 at 6:31 AM, Mark Andrews <ma...@isc.org> wrote: >> Rather than having a full zone hash this can be done as a chain >> of hashes (XHASH). >> >> The XHASH would include all records at a signed name (where a signed >> name is NOT an NSEC3 name) up until the next signed name (where a >> signed name is NOT a NSEC3 name) in DNSSEC order similar to ZONEMD. >> If there is a NSEC3 record and its RRSIGs in this range it is included >> in the hash computation. Where a NSEC3 record matches the name of a >> record that exists in the zone it is hashed with that name. The record >> type appears at both top and bottom of zone similar to NS. >> >> The chain is only deemed to be complete if there is a hash record at >> the zone apex. This allows for incremental construction and destruction >> of the XHASH chain similar to the way the presence of NSEC at the zone >> apex indicates that chain is complete. >> >> If there are records that are not at or under the zone apex they are included >> in the final XHASH of the zone sorting from the zone apex to the end of the >> namespace then from the start of the namespace to the zone apex. Such records >> at not normally visible to queries other than AXFR/IXFR. AXFR/IXFR permit >> such >> records. >> >> XHASH would allow for UPDATE to incrementally adjust the chain without >> having to hash the entire zone at once. >> >> XHASH would allow for a slave server to verify a zone is still complete >> after a IXFR by just checking the areas of the zone impacted by the IXFR. >> >> e.g. >> >> example.com SOA >> example.com NS ns.example.com >> example.com DNSKEY … >> example.com NSEC a.example.com NS SOA RRSIG NSEC DNSKEY XHASH >> example.com XHASH … >> >> a.example.com NS ns.a.example.com >> a.example.com NSEC b.example.com NS RRSIG NSEC XHASH >> a.example.com XHASH … >> ns.a.example.com A … >> >> b.example.com NS ns.b.example.com >> b.example.com NSEC ns.example.com NS RRSIG NSEC XHASH >> b.example.com XHASH … >> ns.b.example.com A … >> >> ns.example.com A … >> ns.example.com AAAA … >> ns.example.com NSEC example.com A AAAA RRSIG NSEC XHASH >> ns.example.com XHASH … >> >> Each of the groupings shows which records plus RRSIGs that are >> included in the XHASH calculation. >> >> To prevent removal/introduction of RRSIGs of XHASH records a DNSKEY >> flag bit is be needed to indicate which RRSIG(XHASH) should/should not >> be present once the chain is complete. The same applies to RRSIG(ZONEMD). >> >> Verification of a AXFR would be slightly slower than with ZONEMD as there >> are more RRSIG records to be processed, >> >> >> -- >> Mark Andrews, ISC >> 1 Seymour St., Dundas Valley, NSW 2117, Australia >> PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org >> >> _______________________________________________ >> DNSOP mailing list >> DNSOP@ietf.org >> https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop