⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-dnsext-not-existing-rr-01.txt

📁 bind-3.2.
💻 TXT
📖 第 1 页 / 共 3 页
字号:
   Also, to prove there are no wildcard records for baz.example.org.,   NO records for possible wildcard expansions are returned.  A client   should similarily calculate hash values of possible wildcards and   compare them to the authority section.   Of course, if the zone was generated with the more advanced NO   creating entity, only the NO record from the previous section would   have to be returned.3.13.5 Resolver Query for Non-existing Type At Existing Domain   Consider a client looking up TXT records for the existing domain   "www.example.org.", again, using the same zone file as previous.  A   server would reply with an authority section like the following:   839ebd4386c0b26d81f147421b5b7036e61438cf._no.example.org.   		IN NO A 0x906a0ad5e604b1905828499dc8672ecb8de73e2f   839ebd4386c0b26d81f147421b5b7036e61438cf._no.example.org. IN SIG NO   The resolver verifies the signature and make sure   SHA-1("bar.example.org.") hashes correctly.Josefsson                 Expires May 25, 2001                 [Page 12]Internet-Draft               The NO Record                 November 20004. Comparing NO and NXT   To ease comparison between NXT and NO records, this section   summarize (mis-)features of the NXT and the NO record formats. The   intent here is to address all operational differences between NO and   NXT records.4.1 Denial Of Existence Of Non-Existing Names   Both NXT and NO provide strong data non-existance for non-existing   names.   NXT records authenticate data non-existance up to the probability of   finding a collision in the signature algorithm (1 in 2^64 for   RSA/MD5).  NO records authenticate data non-existance up to the   probability of finding a collision in the signature algorithm (1 in   2^64 for RSA/MD5) and the NO record hash value (varies due to   truncation).  If the RSA/MD5 scheme is used, hash values in NO   records may be truncated to 64 bits.4.2 Denial Of Types Of Existing Names   Both NXT and NO provide strong data non-existance of types for   existing names.  The previous discussion also apply here.4.3 Information disclosure (chain problem)   NXT records make it possible to collect all names (and records) in a   zone.  NO records prohibit this.4.4 Delegation problem   NXT records require a special case where two different RRsets exist   at the same owner name, class and type.  NO records does not have   this problem.4.5 Zone size (Bytes)   The size difference is due to changing complete domain names with   hash values (SHA1 20 bytes).  Without truncation, NO records are   probably larger than most NXT records.  With truncation, NO records   uses a few byte per hash value instead of the (possibly compressed)   complete owner name.4.6 Zone size (Number Of Records)   When NO compression is not used, NXT and NO uses the same number of   records.Josefsson                 Expires May 25, 2001                 [Page 13]Internet-Draft               The NO Record                 November 2000   However, NO compression can greatly reduce the number of records.    As an example, considering a zone with records of 100.000 different   names.  NXT uses 200.000 records (NXT+SIG). Using NO compression   with 10 hash values on each reduce this number to 20.000 records   (NO+SIG).4.7 Zone size (Number Of Owner names)   NO uses twice the amount of owner names as NXT.   However, NO compression can be used to reduce this to a fraction of   the normal amount.  From the previous example with 10 hash values   per NO record, it will uses 10.000 additional owner names in a zone   with 100.000 names4.8 SIG Labels field and Wildcard records   It is marginally faster to verify signatures for NXT records when   wildcard records are involved -- the SIG "Label fields" hints can be   used to determine the canonical name. With NO records this hint   cannot be used, because it relies on knowing the full name whereas   only the hash is available. One need to try a few SHA1 hashes to   find the correct canonical name.  The number of hashes required to   try depend on the number of labels in the name, and scale linearly.   N.B.  This penalty only apply to wildcard records.4.9 Dynamic Updates   Resigning dynamically updated records is required both with NXT and   NO records.   However, when NO truncation and compression is used, the additional   penalty of re-hashing might also be required.Josefsson                 Expires May 25, 2001                 [Page 14]Internet-Draft               The NO Record                 November 20005. Security Considerations   Chaining through all NO records is still technically possible,   altough it cannot be used to collect names and/or records in the   zone (other than NO records themself).   The security of NO record hash values is dependent on the security   of the SHA-1 hash functions used.  Truncation may affect this, but   the birthday-paradox argument does not apply. One must find a hash   collision given an existing hash value -- not simply find any hash   collision.  It is thus reasonably to truncate NO records to half the   hash length used in the signature scheme (this would mean 64 bits in   the RSA/MD5 case).   It should be pointed out that given this scheme, it is easy to   estimate the number of records within a zone, considering hash   values are supposed to be equally distributed.  This can be foiled   by adding any number of bogus records in the zone.   The authentication of NO records is provided by DNS SIG records, as   specified in RFC 2535. The security considerations of RFC 2535 is   not affected by this document, and should also be considered.6. IANA Considerations   The NO RR type number should be selected by the IANA from the normal   RR type space.   The meaning of a zero hash length value can only be assigned by a   standards action.Acknowledgement   The idea of encrypting names, that later evolved into just hashing   them, was originally proposed by Jonas Holmerin in private   discussions about DNS Security.  Magnus Nystr鱩 proposed truncating   the hash values.   Thanks to John Linn and Magnus Nystr鱩 for comments on a early   version of this draft.   Olafur Gudmundsson pointed out delegation point issues, suggested   the use of a "_no" subdomain, and suggested replacing the type bit   map field with a sorted list.  From the namedroppers mailing list,   I'd like to thank Alan Barrett, Andrew Draper, Andreas Gustafsson,   Peter Koch and Brian Wellington for comments and suggestions.  Ed   Lewis noted that truncation to shortest unique prefix would not work.Josefsson                 Expires May 25, 2001                 [Page 15]Internet-Draft               The NO Record                 November 2000References   [1]  Eastlake, D., "Domain Name System Security Extensions", RFC        2535, March 1999.   [2]  Eastlake, D. and O. Gudmundsson, "Storing Certificates in the        Domain Name System (DNS)", RFC 2538, March 1999.   [3]  Eastlake, D. and A. Panitz, "Reserved Top Level DNS Names", RFC        2606, June 1999.   [4]  NIST, , "Secure Hash Standard", FIPS PUB 180-1, April 1995.   [5]  Massey, D., Lehman, T. and E. Lewis, "DNSSEC Implementation in        the CAIRN Testbed.", I.D. draft-ietf-dnsop-dnsseccairn-00.txt,        October 1999.   [6]  Josefsson, S.A. (editor), "Base 64, 32 and 16 Encodings", I.D.        draft-josefsson-base-encoding-00.txt, August 2000.   [7]  Wellington, B, "Domain Name System Security (DNSSEC) Signing        Authority", I.D. draft-ietf-dnsext-signing-auth-01.txt, May        2000.Author's Address   Simon Josefsson   RSA Security   Arenav刧en 29   Stockholm  121 29   Sweden   Phone: +46 8 7250914   EMail: sjosefsson@rsasecurity.comJosefsson                 Expires May 25, 2001                 [Page 16]Internet-Draft               The NO Record                 November 2000Full Copyright Statement   Copyright (C) The Internet Society (2000). All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph   are included on all such copies and derivative works. However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement   Funding for the RFC editor function is currently provided by the   Internet Society.Josefsson                 Expires May 25, 2001                 [Page 17]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -