On 8/13/18, 11:50, "John Levine" <jo...@taugh.com> wrote:

>As we may have mentioned once or twice before in this discussion, it lets you 
>do zone transfers over insecure channels and batch verify the zone before 
>using it.

Yes, I see that.  As in no more argument is needed to convince me of that.

>but the obvious consumer is a DNS server.

Maybe, maybe not.  I've seen DNS used in turnkey ways.  Nevertheless, given the 
complexity of DNSSEC validation, a wise implementer should re-use the parts of 
a DNS server for this.

(I.e., there's a lot of wacky stuff out there.  See "DNS Zone Transfer Protocol 
(AXFR)", Definition of Terms section [RFC 5936, Sec. 1.1] definitions of 
"General-purpose DNS implementation" and "Turnkey DNS implementation.  I've run 
across a lot of weird stuff in my studies of responder behavior [shuddering to 
think of these beasts as servers ;) ].)

>it'd be nice to be able to check that the zone is correct and get notified of 
>failure

There are many existing tools for such a set up.  For one, use a VPN or in-band 
channel security, and/or make sure the zone file received matches the zone file 
sent.  (If you use AXFR, which can only run on TCP, make sure the first and 
last resource record are the SOA.  If you use RSYNC, use other filesystem 
checks - like file size for one.)

I think the use case is the "we'll put the zone on some third party server and 
let others [the second party] retrieve it" - that's where you would want an 
end-to-end "secure" set up.

This is where my "belts and suspenders" comment comes in, if whatever uses data 
sets from the zone as transferred will do DNSSEC validation on the sets, what's 
the need for a signed "checksum" of the whole zone?  What is the relying party 
does not do validation?

In essence, what would do DNSSEC validation for the ZONEMD and not for data 
sets within the zone?

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to