W dniu 08.07.2019 o 19:20, Wessels, Duane pisze:
> 
> 
>> On Jul 8, 2019, at 9:20 AM, Joe Abley <jab...@hopcount.ca> wrote:
>>
>>
>> As far as this particular idea goes, I mentioned before what had given me 
>> pause: we're talking about taking a protocol where every RRSet in a zone to 
>> date has been public and is made available in DNS responses. Any server that 
>> doesn't implement this new mechanism would presumably treat the new covert 
>> RRTypes as they would any other unknown/opaque type and make the data public.
>>
>> There is hence an operational risk that data will leak (e.g. by 
>> configuration changes, software downgrades that are pragmatic necessities, 
>> side systems that publish zone data in ways other than the DNS).
>>
>> By keeping data that is already exchanged over a (manual) out-of-band 
>> channel separate, and not packaging them up with zone data, the existing 
>> segregation of private vs. public is preserved and the task is simply to 
>> automate a process that is currently manual.
> 
> I share this concern raised by Joe.  I agree that it can be useful to 
> exchange configuration/provisioning data this way, but leaks seem almost 
> inevitable as proposed.

One more thing - this feature is intended for operators, not for regular
users. We should have more tolerance for shootfooting features there.

> With respect to 2.6. Interaction with ZONEMD, I'd think it should follow 
> handling of DNSSEC.  That is, covert types should not be included in a zone 
> digest.

As I understand ZONEMD main purpose is to verify the full content of the
zone, mainly for zone transfer. In that case, I'd include COVERT records
- as the clients who can transfer the zone using XFR will also be able
to transfer COVERT records. (but I'm not stuck to that opinion).

Witold

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to