Thanks for the support for the doc; I hope others chime in as well.

On Jan 9, 2024, at 08:33, Paul Wouters <p...@nohats.ca> wrote:
> 
>     there are 13 root servers.
> 
> I would really like to see this changed. We keep trying to tell people
> that are not DNS insiders that the world does not depend on just 13
> physical machines. This will cause that confusion to strengthen again.

Good catch; fixed.

>> It is in DNS master file format
>> 
>> Maybe use "zone file presentation format" instead of "master file format"
> 
> This still stands as well.

Agree; fixed.

> Perhaps a recommendation could be to check with ZONEMD and do an AXFR,
> eg recomend implementing RFC 8806 - "Running a Root Server Local to a 
> Resolver".
> Comes with added bonuses on top of a signature on all the root glue.
> 
> I still think this would also still be good to mention.

This would be a very comfusing mention because the resolver isn't really 
"priming" at that point, it's using a complete root zone. I'll cover this with 
an addition to the Security Considerations section:

<t>This document does not cover the use of (or the need for) priming when
serving a copy of the full root zone on the same server as the resolver,
such as is described in <xref target="RFC8806"/>.
In such a setup, the resolver never really primes its cache because the
cache is full as soon as the resolver pulls down a new complete root zone.</t>

(Suggestions for better wording are welcome!)

> 
>> [[ This section talks about sending the DO bit, but does not actually
>>    talk about validating the response to the priming query.  This became
>>    important after the root KSK rollover in 2018 because some resolvers
>>    apparently were validating and only had the old KSK, but were still
>>    sending RFC 8145 telemetry even after failing to validate their
>>    priming response. ]]
> 
> I said before:
> 
> Nothing much can be done here other than advising implementers to check
> if the obtained DNSKEY RRset no longer contains any KSK that is
> configured as part of the software, and then doing some kind of
> exponential back-off to slow down the query rate?
> 
> The comment was removed but no text was added for this ? Should there be?

I'm not seeing what adding this would solve. The only possible attack is that 
the old key was compromised by the machine-in-the-middle attacker, but that is 
a completely separate issue from priming because the priming response is not 
(currently) signed.

> I also wrote before:
> 
> So now I do think the document is ready, but I think it would be nice to
> mention ZONEMD and local root configurations as methods to protect
> against spoofed glue.

See above.

--Paul Hoffman
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to