On Wed, Mar 22, 2017 at 4:50 PM, Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:

>
> > On Mar 22, 2017, at 10:56 AM, Melinda Shore <
> melinda.sh...@nomountain.net> wrote:
> >
> > The draft could definitely benefit from
> > additional review.
>
> I find it ironic that section 4 includes:
>
>    The components of the authentication chain are built by starting at
>    the target record set and its corresponding RRSIG.  Then traversing
>    the DNS tree upwards towards the trust anchor zone (normally the DNS
>    root), for each zone cut, the DNSKEY and DS RRsets and their
>    signatures are added.  If DNS responses messages contain any domain
>    names utilizing name compression [RFC1035], then they must be
>    uncompressed.
>
> while at the same time there is ongoing discussion of *adding* compression
> of the server certificate chain (as a TLS 1.3 extension).  Would the
> compression of server certificates also cover compression of the DNSSEC
> chain extension?  If so, perhaps this would be a belated moral victory
> for DJB[1]. :-)
>

I think the reason for the last sentence quoted above is that DNS name
compression is defined in terms of an offset from the beginning of the
DNS message, and the draft as currently written uses a sequence of RRsets
rather than a complete DNS message. I sympathesize with djb's critique.
If DNS wasn't designed in the early 80's then perhaps we would have had
something different.

I supposed we could redefine name compression for this draft to use an
offset from the beginning of the chain data.

Does the proposed compression of certificate chains include extensions
in the Certificate message also? If so, the DNSSEC chain extension would
automatically be covered. Generally speaking, I would not be opposed to
compressing the DNSSEC chain extension with a normal compression algorithm.
Perhaps some empirical measurements might be useful to determine
whether it yields significant enough savings. Large parts of the dnssec
chain (signatures and keys) probably aren't terribly compressible, although
I guess the same issue exists for certificate chains, and if it's worth it
for
the latter ..

-- 
Shumon Huque
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to