On Tue, Mar 28, 2023 at 10:01 AM Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:

> [ Multi-response to four upthread messages. ]
>
> -------
>
> On Fri, Mar 03, 2023 at 06:23:11PM -0500, Shumon Huque wrote:
>
> > Thanks for your comments. We've posted an updated draft (-01):
> >
> >
> https://datatracker.ietf.org/doc/html/draft-huque-dnsop-compact-lies-01
>
> [ Copied from today's dns-operations post on the same general topic. ]
>
> A possibly inconvenient question, just to make sure we're not ignoring
> the obvious sceptical position:
>
> * How compelling is compact DoE?
>
> The reason to ask is that both the original and now modified protocols
> involve non-trivial complexity, and would likely require resolvers to
> respond differently to queries with the DO bit set (pass them the NODATA
> "truth" along with the NXNAME signal) vs. queries that don't request
> validated answers (pass them the inferred NXDOMAIN).
>
> The savings vs. actual by-the-book NSEC responses appear to be a 2x
> reduction in the number of signatures to compute (the SOA RRSIG is
>
>
>     presumably easily cached) and a 1.5x reduction in the number of
> signatures to transmit (SOA + 1 NSEC, vs. SOA + 2 NSEC).
>
> Do the CPU and packet size reductions justify the additional protocol
> complexity?
>

I'll also regurgitate my message here from the dns-operations@ list thread:

That's a reasonable question, and perhaps best directed to the originators
of the scheme at Cloudflare. I don't know if there have been any
measurement studies or analyses of the cost benefits vs by-the-book DNSSEC.
There are currently 3 large commercial DNS providers that have had it
deployed for a while now, so I suspect that it is here to stay.

Note that one other provider (UltraDNS) does support traditional NSEC White
"Lies" that give by-the-book DNSSEC proofs for NXDOMAIN, so apparently they
are bearing the additional costs just fine.

One other point -- without the additional rcode substitution schemes under
discussion, Compact Answers can cause additional work for authority
servers, since NODATA responses may lead to follow-on queries by DNS client
applications (e.g. the common AAAA followed by A pattern; note: most DNS
resolution API functions don't do happy eyeballs today). So, the
per-response crypto & size reductions need to also be weighed against the
cost of these additional queries.

> But the main change is to move from the ENT distinguisher RR type
> > to an explicit one for NXDOMAIN (with mnemonic NXNAME).


> The draft fails to explain how queries for the proposed new RRtype are
> to be handled by authoritative servers and resolvers.
>

Since this is a "meta" type for which we don't expect normal applications
to ever issue queries, its behavior could be undefined I suppose. But it's
probably better to explicitly say what the response should be. Maybe NODATA
for an existing name, and NODATA + NXNAME NSEC bitmap sentinel for
non-existent names? Sending FORMERR or SERVFAIL might invoke unwanted
additional follow-on queries by resolvers (or their downstreams), although
I suppose SERVFAIL + a new EDE value might be a possibility.

Shumon.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to