Re: [DNSOP] One Chair's comments on draft-wessels-dns-zone-digest

Paul Wouters <paul@nohats.ca> Thu, 02 August 2018 19:14 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D6031292AD for <dnsop@ietfa.amsl.com>; Thu, 2 Aug 2018 12:14:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n73mb_z24x15 for <dnsop@ietfa.amsl.com>; Thu, 2 Aug 2018 12:14:22 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [IPv6:2a03:6000:1004:1::68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C6321127B92 for <dnsop@ietf.org>; Thu, 2 Aug 2018 12:14:21 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 41hKbt1XL3zKLZ; Thu, 2 Aug 2018 21:14:18 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1533237258; bh=H9KNwN+WTU9JEWzckplf5/P/dMHhEFg8Bs/DbDjSfUY=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=d4pcnhhvDbQGWBV5U2qb+LqCTuB3lgi40qjhWSeyscpm4jAizKeAu8ADbRj0GigNT 1VKcbWsXOxEjQo+1J0V0Q4XyuBuIuQSiMM/i7y+yyJQTxezhr5CDeL98O3oWQ0vma3 FM6tHpru8/hl19Eg1Hz9JL8fDbxhRxXh0/ZeKuMA=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id ZfNTHRIO-5cs; Thu, 2 Aug 2018 21:14:16 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Thu, 2 Aug 2018 21:14:15 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id 836841FEE2; Thu, 2 Aug 2018 15:14:14 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 bofh.nohats.ca 836841FEE2
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 78D6040D37FB; Thu, 2 Aug 2018 15:14:14 -0400 (EDT)
Date: Thu, 02 Aug 2018 15:14:14 -0400
From: Paul Wouters <paul@nohats.ca>
To: Matt Larson <matt@kahlerlarson.org>
cc: dnsop <dnsop@ietf.org>
In-Reply-To: <E10B9DE1-091E-45DF-9C23-380455113A21@kahlerlarson.org>
Message-ID: <alpine.LRH.2.21.1808021512160.1415@bofh.nohats.ca>
References: <CADyWQ+HizOJsE9EZ=VEvrbnnyPwaG_yBRg7fP5VvUNTdnidXZA@mail.gmail.com> <ybl4lgg6ztm.fsf@w7.hardakers.net> <m1fkRCk-0000GTC@stereo.hq.phicoh.net> <E10B9DE1-091E-45DF-9C23-380455113A21@kahlerlarson.org>
User-Agent: Alpine 2.21 (LRH 202 2017-01-01)
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/wKOTKuj8lTVyotp8wvXYFK0Fn8E>
Subject: Re: [DNSOP] One Chair's comments on draft-wessels-dns-zone-digest
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Aug 2018 19:14:24 -0000

On Tue, 31 Jul 2018, Matt Larson wrote:

> For all those reasons, I think a checksum in the zone file itself that can be verified with DNSSEC is the best option for this use case, and I like the ZONEMD solution.

Note that the checksum in this case must be at least as
cryptographically strong as the signature algorithm used
in the individual RRSIGs/DNSKEYs. This would have to be
enforced by software/RFC to prevent a downgrade attack.

Paul