FWIW, this message was spurred by this comic strip [yes, today as I write]: http://dilbert.com/strip/2018-08-09.
"Will the time taken to generate and verify this record add to the security of a zone transfer?" I understand that there is no protection for cut point or glue records now, nor any guarantee for the occluded records and there's a desire to cover them. It would be great to have the whole zone (as a data structure) be subject to source integrity and authenticity protections. But there are already mechanisms for this at the data set level. (This is a "belts and suspenders" style argument.) What if -err- when, in a zone's distribution, the glue records are either forged or simply fat-fingered? That's covered, in a way that is more efficient - in a lazy evaluation way. Mangled glue never referenced needs not be checked, when it is needed there's backup in the authoritative version. If all else fails, DNSSEC will flag whatever response as suspect. I don't know if this is documented, but at one time, prototype authoritative servers would validate all the signatures in a zone upon load (before setting the AD bit). This was discarded as it made zone loading (and reloading) take f-o-r-e-v-e-r. (I recall this mostly because I was on the losing end of the argument.) Today, we assume the server can set the AD as it can trust what it gets from disk or from AXFR {which had better be done with channel security!}. One concern is what or who makes the decision to enable ZONEMD for a zone. We are marching toward more automation in NOCs, so this will be a buried parameter. What happens if a zone grows astronomically over time, in the beginning the ZONEMD is on? (Similarly, zone have had to transition from NSEC to NSEC3 with optout.) File this under "fear, uncertainty or doubt" but it stems from how I see the operations of the DNS evolving. In general, the proposal is more or less fine. I don't know if it is feasible (speed of execution). I don't know that it adds to the safety of the system (DNSSEC already protects at the data set level in the same manner this protects at zone load time). I don't know if the added configuration knob is justified by the benefit (forgotten settings, "trusted-keys"-mania ?). And ... returning to the comic strip ... "Your plan is dumb because it reminds me of something different that didn't work out." ;) "History repeats." And today I am wearing a blue shirt (but it's a Knot DNS shirt!). _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop