On Fri, Aug 2, 2019 at 2:18 PM Joe Abley <jab...@hopcount.ca> wrote: > On 2 Aug 2019, at 13:24, Witold Krecicki <w...@isc.org> wrote: > > > An implementation won't be able to load a covert RR from a masterfile > > because it won't understand it's TYPE field - it'd either be a specific > > COVERT type (which has to be supported to be loaded) or an opaque > > COVERTNNNNN - as a replacement for RFC3597 TYPENNNNN (it's not in the > > -00, I talked about it during presentation). > > Any implementation that doesn't ascribe special meaning to the range of > code-points you designate as covert will treat them as standard opaque > types. That's the point I'm trying to make. > > Further, loading zone data from a master file is just one (arguably > archaic) source of zone data. Anything that is received over the wire in an > [AI]XFR or an UPDATE is just a wire-format RR, for example, and there's no > useful precedent here for a nameserver having to distinguish between > different RRTypes when generating responses. The range of back-ends in use > today for provisioning RRSets to a master server is also far greater than > "master file", and I don't think it's reasonable to speculate about what > any/some/most/all of them might do. > > > We already have records that cannot be directly queried (NSEC5), > > implementations don't have any problems with not responding to direct > > NSEC5 queries. > > I would suggest that any implementation that doesn't support NSEC5 is in > fact very likely to respond to queries with QTYPE=NSEC5. > > > Thinking this way we should never use DNSSEC (or HTTPS) > > because a bug in implementation can cause private keys to leak. > > Private keys are not published as zone data, which I am suggesting. > > > Also, this mechanism is not backwards compatible - a server not > > supporting COVERT records won't be able, in any way, to serve a zone > > that has COVERT records > > I am suggesting that it will be able to serve those records perfectly > well. That's the crux of my concern, in fact.= > > >> I am not in favour of this proposal, which I think is camel abuse. > > Looking at what's happening recently at DNSOP everyone is abusing > > labeling everything they don't like a 'camel abuse', it's getting > > dangerously close to being just a pure insult... > > I certainly apologise if you took it that way; it was meant to be a > shorthand for describing my concerns and definitely not a cheap way to > discredit an idea. What I intended to mean by "camel abuse" is as follows: > > I think that modifying query-response behaviour with respect to specific > code points is expensive, and if it is to be done it needs to come with > commensurate benefits. I don't see those benefits in this case, as I have > described. For that reason I think the expense is not warranted. > > > Joe >
I am also concerned about data leaking, and special handling by the server. I just had what might be a crazy idea. What if the covert data was encrypted, and could be transferred normally, but only someone with the key could read it? It could then be put in a new record or in TXT records. Requires a tool (script) to read/write it, but no changes to the DNS servers. Does that make any sense? -- Bob Harold
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop