Another reason for an rr count number in the rrtype. 

Sent from my phone

> On Jul 28, 2018, at 08:47, Florian Weimer <f...@deneb.enyo.de> wrote:
> 
> * John R. Levine:
> 
>>>>> that the served zone is too large.  Otherwise, the receiver has to
>>>>> download the entire zone before it can determine that the hash does
>>>>> not match. ...
>> 
>>> On the other hand, clients will likely have a pretty good idea for the
>>> size of the zone, so they could transfer it twice: ...
>> 
>> Now I'm really confused.  To avoid downloading the whole zone you download 
>> it twice?
>> 
>> Could you explain in simple terms why you can't download the zone, check 
>> the digest and signature, and either use it or discard it?
> 
> A malicious server might never stop sending data, or claim that the
> transfer is ridiculously large.  If the zone digest does not include
> information about the amount of data, this can only be detected after
> the server ended transmission, at which time the ZONEMD digest can be
> compared.  But at this point, the client may already have filled its
> storage with garbage data, unless the double transfer trick is used.
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to