Validating zones as a slave? (Fw: [DNSOP] I-D Action: draft-ietf-dnsop-root-loopback-04.txt)
Shane Kerr
shane at time-travellers.org
Tue Sep 15 06:37:30 UTC 2015
All,
I was looking at the latest revision of the root loopback draft and it
occurred to me that one possible issue is that the BIND 9
authoritative server here has some risk of downloading an invalid root
file.
I realize that the chances are quite slim that any of the IP addresses
would ever provide anything other than the latest version of the root,
but it is not 100% impossible.
If you were to download the root file by hand then you could check the
DNSSEC signatures on it before loading it. For example, you could use
ldns-verify-zone or jdnssec-verify (I don't know of a utility that
ships with BIND 9).
I wonder if it makes sense to add some sort of provision like this to
BIND 9? It seems like it could be generally useful for a slave server
to reject a zone from a master that fails DNSSEC validation.
Cheers,
--
Shane
Begin forwarded message:
Date: Mon, 14 Sep 2015 12:20:46 -0700
From: internet-drafts at ietf.org
To: <i-d-announce at ietf.org>
Cc: dnsop at ietf.org
Subject: [DNSOP] I-D Action: draft-ietf-dnsop-root-loopback-04.txt
A New Internet-Draft is available from the on-line Internet-Drafts
directories. This draft is a work item of the Domain Name System
Operations Working Group of the IETF.
Title : Decreasing Access Time to Root Servers by
Running One on Loopback Authors : Warren Kumari
Paul Hoffman
Filename : draft-ietf-dnsop-root-loopback-04.txt
Pages : 11
Date : 2015-09-14
Abstract:
Some DNS recursive resolvers have longer-than-desired round trip
times to the closest DNS root server. Some DNS recursive resolver
operators want to prevent snooping of requests sent to DNS root
servers by third parties. Such resolvers can greatly decrease the
round trip time and prevent observation of requests by running a copy
of the full root zone on a loopback address (such as 127.0.0.1).
This document shows how to start and maintain such a copy of the root
zone that does not pose a threat to other users of the DNS, at the
cost of adding some operational fragility for the operator.
The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-root-loopback/
There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-dnsop-root-loopback-04
A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-root-loopback-04
Please note that it may take a couple of minutes from the time of
submission until the htmlized version and diff are available at
tools.ietf.org.
Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
_______________________________________________
DNSOP mailing list
DNSOP at ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
More information about the bind-workers
mailing list