70 likes | 160 Vues
draft-ietf-dnsext-nsec3-02. Ben Laurie Roy Arends DNSEXT@ 63 nd IETF. Changes from -01. Lesser salt requirement. “all salt values must be equal” to “must at least be one salt value which is the same for all NSEC3 records”
E N D
draft-ietf-dnsext-nsec3-02 Ben Laurie Roy Arends DNSEXT@ 63nd IETF
Changes from -01 • Lesser salt requirement. • “all salt values must be equal” to “must at least be one salt value which is the same for all NSEC3 records” • Clarified that the wireformat of the next hashed ownername is binary and not base32 (like the ownername). • Better algorithm description for constructing NSEC3 records. • Rewrote section 6.2: now uses proper labels and simpler wording • Rewrote section 6.4: the crypto text represents reality better then the last version
Changes from -01 • Signalling hash truncation: simply truncate the hashed ownername and its corresponding next hashed ownername. • Clarified DoS issues when using a high iterations value. • Included an example zone, example responses and corresponding clarifying text.
Input from WG • the lack of specification of a signaling mechanism for indicating nsec3 rather than nsec • See –trans and –ter • Will include pointers in version -03 • which hash algorithms are required / mandatory • 0 (identity), 1 (sha-1) and possibly a new (sha-256-trunc). • We acknowledge current concerns about sha-1. • We understand the downgrade attack vector when using ‘optional’ hash algorithms or ‘future’ hash algorithms
Input from WG • Rolling from nsec to nsec3 and vice-versa • Will be addressed in version -03
Tools • NSEC3 capable signer exist, • based on Net::DNS and Net::DNS::SEC • Includes a lib for NSEC3 • NSEC3 capable server exist, • Authoritative server built from scratch • Built for testing extreme corner cases • Tools are ment for protocol testing • Patches for BIND are in the make.
Further work • nsec-nsec3 rollover • Signalling mechanism • Required hash algs • More tools