I like it in principle, so I say adopt.

I already see a significant problem, though I expect we can fix it somehow after adoption:

After sending out all requests for SVCB records [...]

My understanding of section 3 implies that an implementing resolver MUST NOT ask any of the nameservers until *all* their SVCBs have been attempted, in the most common case where no encryption is supported by the nameserver-set.  That would *not* scale at all.  Even with 13 NSs it's a rather bad amplification factor, and it reminds me of the recent NXNS attack.

On the whole, if a NS set has (many?) names without encryption support, I'm afraid the corresponding zones may have to do without a guarantee of getting encryption, though glue might help.


On 26/05/2021 15.21, Stephen Farrell wrote:
SVCB in the parent zone will take years to happen

The SVCB glue is just a slight optimization.  I don't think it can even save latency, just a packet per NS (and only in cases where the SVCB exists).


--Vladimir

_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to