On Nov 8, 2021, at 5:45 AM, Wes Hardaker <wjh...@hardakers.net> wrote:
> 
> Folks, can we boil this down to a concrete suggestion.  Section 3.1
> already says this:
> 
>   First, if the operational or security features of NSEC3 are not
>   needed, then NSEC SHOULD be used in preference to NSEC3.  NSEC3
>   requires greater computational power for both authoritative servers
>   and validating clients.  Specifically, there is a non trivial
>   complexity in finding matching NSEC3 records to randomly generated
>   prefixes within a DNS zone.  NSEC mitigates this concern, and if
>   NSEC3 must be used then selecting a low iterations count will help
>   alleviate this computational burden.  Note that deploying NSEC with
>   minimally covering NSEC records [RFC4470] also incures a cost, and
>   zone owners should measure the computational difference in deploying
>   both RFC4470 or NSEC3.
> 
> Which is fairly strong (SHOULD [use NSEC]) with reasoning behind the
> statement already.  How do you think we should specifically change that
> text?

Instead of "low iterations count", maybe "low iterations count (preferably 0)"?

--Paul Hoffman



Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to