Re: [DNSOP] Question on RRtypes in RFC 4034 Section 6.2

Robert Edmonds <edmonds@mycre.ws> Wed, 09 December 2015 20:27 UTC

Return-Path: <edmonds@mycre.ws>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E67461A1B65 for <dnsop@ietfa.amsl.com>; Wed, 9 Dec 2015 12:27:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E33TgVGihAcE for <dnsop@ietfa.amsl.com>; Wed, 9 Dec 2015 12:27:32 -0800 (PST)
Received: from chase.mycre.ws (chase.mycre.ws [70.89.251.89]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2953F1A1B13 for <dnsop@ietf.org>; Wed, 9 Dec 2015 12:27:32 -0800 (PST)
Received: by chase.mycre.ws (Postfix, from userid 1000) id 91B4312C0EB1; Wed, 9 Dec 2015 15:27:31 -0500 (EST)
Date: Wed, 09 Dec 2015 15:27:31 -0500
From: Robert Edmonds <edmonds@mycre.ws>
To: dnsop@ietf.org
Message-ID: <20151209202731.GA18543@mycre.ws>
References: <alpine.LFD.2.20.1512081004020.18633@bofh.nohats.ca> <20151208193856.GA5997@mycre.ws> <alpine.LFD.2.20.1512081440270.27931@bofh.nohats.ca> <20151208203736.3F62F3EF0E88@rock.dv.isc.org> <35C15C68-B6DB-4970-B816-9295C123E8AE@dnss.ec> <20151209105049.779EE3EFB3BE@rock.dv.isc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20151209105049.779EE3EFB3BE@rock.dv.isc.org>
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/yiK-iOLvNo5SYZ5xr56Sk32GiDo>
Subject: Re: [DNSOP] Question on RRtypes in RFC 4034 Section 6.2
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Dec 2015 20:27:34 -0000

Mark Andrews wrote:
> In message <35C15C68-B6DB-4970-B816-9295C123E8AE@dnss.ec>, =?utf-8?Q?=F0=9F=94=92Roy_Arends?= writes:
> > We'd end up adding stuff to a response in order to make it shorter.
> 
> We'd end up changing a 0x00 to a 0x01 in the OPT record.
> 
> > Is there a clear benefit (shorter responses)? Can you show me a few real
> > world examples?
> 
> Every DNSSEC answer would be potentially shorter.  The signer field
> can be compressed as can the domain names in all these types.
> 
> hip ipseckey key lp nsec nxt rrsig sig talink nsap-ptr
> dnskey cdnskey

DNSSEC signer name fields are going to be fairly small for typical
domains (barring outliers under .ip6.arpa).  Isn't this a pretty trivial
savings compared to the size of 1024 or 2048 bit RSA signatures?

E.g., the response to "dig +norec +dnssec @sfba.sns-pb.isc.org
www.isc.org -t A" returns a 1623 byte response (for me) containing 8
RRSIGs, and replacing the uncompressed instances of "isc.org" (9 bytes)
in each RRSIG signer field with a two byte compression pointer saves
(8*9 - 8*2) = 56 bytes.  So that saves you ~3.5% off a 1.6 KB response.
Why bother?  You will get a far larger savings by just turning on
minimal-responses and replacing RSA with ECDSA, no code changes required
:-)

-- 
Robert Edmonds