On 2023-03-28 06:41, Shumon Huque wrote:
On Tue, Mar 28, 2023 at 10:01 AM Viktor Dukhovni <ietf-d...@dukhovni.org> wrote:

    [ Multi-response to four upthread messages. ]

    -------

    On Fri, Mar 03, 2023 at 06:23:11PM -0500, Shumon Huque wrote:

    > Thanks for your comments. We've posted an updated draft (-01):
    >
    >
    https://datatracker.ietf.org/doc/html/draft-huque-dnsop-compact-lies-01

    [ Copied from today's dns-operations post on the same general topic. ]

    A possibly inconvenient question, just to make sure we're not ignoring
    the obvious sceptical position:

    * How compelling is compact DoE?

    The reason to ask is that both the original and now modified protocols
    involve non-trivial complexity, and would likely require resolvers to
    respond differently to queries with the DO bit set (pass them the
    NODATA
    "truth" along with the NXNAME signal) vs. queries that don't request
    validated answers (pass them the inferred NXDOMAIN).

    The savings vs. actual by-the-book NSEC responses appear to be a 2x
    reduction in the number of signatures to compute (the SOA RRSIG is
    presumably easily cached) and a 1.5x reduction in the number of
    signatures to transmit (SOA + 1 NSEC, vs. SOA + 2 NSEC).

    Do the CPU and packet size reductions justify the additional protocol
    complexity?


I'll also regurgitate my message here from the dns-operations@ list thread:

That's a reasonable question, and perhaps best directed to the originators of the scheme at Cloudflare. I don't know if there have been any measurement studies or analyses of the cost benefits vs by-the-book DNSSEC. There are currently 3 large commercial DNS providers that have had it deployed for a while now, so I suspect that it is here to stay.

Compact DoE should be seen through the lens of online signing and that changes the perspective quite a bit for large providers. That the answer is compact is a clear benefit but reducing the amount of work the authoritative server has to perform is more important. The server does not need to know the contents of the full zone, just that either the name or the type in question does not exists. No need to lookup closest enclosers etc. Depending on how you've designed the internals of your server this reduction in the work you have to perform is likely substantial. The proposal for Compact DoE is also of benefit to validating resolvers for normal workloads as less signatures have to be validated. On the flip side there is the question of a random prefix attacks and RFC 8198,  but then again "white-lies" and NSEC3 opt-out was kind of the needle to that balloon so this (Compact DoE) is not making that situation any worse.

/Christian
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to