> On Jul 8, 2018, at 9:35 PM, Mark Andrews <ma...@isc.org> wrote:
> 
> So what if it is not feasible for COM and similarly sized zones?
> 
> At the moment we have one zone where we need a zone signature so that the 
> zone contents can be loaded into every recursive server.
> 
> The question we should be asking is "Is SIG(AXFR) a good fit for the root 
> zone?” not whether is is a good mechanism for all zones because quite frankly 
> there are very few zones that you would want loaded into all recursive 
> servers.
> 
> “.”, “arpa”, “in-addr.arpa” and “ip6.arpa” would be about it.  Does anyone 
> else have any others?  Any zone would necessarily be small. 
> 
> Mark

So the followup question is 
Should we burden the Auth Server implementations with this calculation if the 
usage case if 4 zones ? 
or is this better handled by external tools ?
DNS Camel says ? 

Olafur

>> On 9 Jul 2018, at 10:28 am, Olafur Gudmundsson <o...@ogud.com> wrote:
>> 
>> 
>> 
>>> On Jun 22, 2018, at 6:58 AM, Petr Špaček <petr.spa...@nic.cz> wrote:
>>> 
>>> On 21.6.2018 22:31, Hugo Salgado-Hernández wrote:
>>>> On 22:09 21/06, Shane Kerr wrote:
>>>>>> Dne 1.6.2018 v 12:51 Shane Kerr napsal(a):
>>>>>> 
>>>>>> Hmm, can you share some details about your experience?
>>>>>> Did you find out when the data corruption took place?
>>>>>> a) network transfer
>>>>>> b) implementation bugs (e.g. incorrectly received IXFR)
>>>>>> c) on disk
>>>>>> d) some other option?
>>>>> 
>>>>> I don't know. I have seen incorrectly transferred zone files both in
>>>>> BIND
>>>>> and NSD slaves. IIRC our solution was to include sentinel records in
>>>>> the
>>>>> zone files to spot problems, take the node out of service, and force a
>>>>> re-transfer. This of course won't work if you are slaving zones that
>>>>> you do
>>>>> not control, and it doesn't prevent a small window of time when the
>>>>> servers
>>>>> are operating with broken zones. TSIG was being used.
>>>> 
>>>> We have also seen broken transfers between secondaries. Our solution
>>>> is to dump the zone after transfer, calculate a hash and compare. We
>>>> would benefit from having a ZONEMD record inside the zone.
>>> 
>>> If the zone got broken during TSIG-secured transfer then it was not most
>>> probably not caused by network problem because TSIG would have caught that.
>>> 
>>> Honestly I do not think it is worth the effort because all the
>>> complexity does not help to prevent implementation bugs, I would say it
>>> even increases probability of a bug!
>>> 
>>> What is left is bug on auth and/or slave sides and in that case there is
>>> no guarantee that
>>> a) master did not compute ZONEMD from already broken data
>>> b) slave verification of ZONEMD actually works
>>> 
>>> 
>>> If we wanted to catch problems with implementation we need something
>>> which is outside of the DNS stack we are attempting to check, be is
>>> simple checksum or some fancier crypto.
>>> 
>>> I can easily imagine OPENPGPKEY RR located at _zonefile.apex.example
>>> node and an utility which would extract OPENPGPKEY RR from the zone file
>>> and verify that the zone file signature (either detached or in .gpg
>>> file) can be verified using that key (+ add DNSSEC into the mix if you
>>> wish).
>>> 
>>> -- 
>>> Petr Špaček  @  CZ.NIC
>>> 
>>> _______________________________________________
>>> DNSOP mailing list
>>> DNSOP@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dnsop
>> 
>> 
>> 
>> +1 
>> I spent lots of time earlier this century along with Johan Ihren trying to 
>> figure out how to 
>> secure the transfer of a particular zone (the root) to any resolver. 
>> The only sane way is to not transfer the zone over AXFR as any intermediary 
>> can mess with the zone contents mostly in the case of “glue” records,
>> thus transferring the zone over HTTPS or RSYNC with a PGP signature over the 
>> zone file is the only viable solution going forward. 
>> 
>> 
>> Historical background: SIG(AXFR) was rejected because it required putting 
>> the zone into canonical order and calculating the signature, 
>> in the case of dynamic update this is a real expensive operation, thus we 
>> got rid of it. 
>> 
>> Olafur
>> 
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
> 
> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org
> 

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to