----- Original Message ----- 
From: "W.C.A. Wijngaards" <wou...@nlnetlabs.nl>
To: <dnsop@ietf.org>
Sent: Thursday, June 24, 2010 11:38 AM
Subject: Re: [DNSOP] That key size argument...was Re: The case for single 
active key


> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi George,
> 
> On 06/24/2010 11:59 AM, George Barwood wrote:
>> It could also note that validators SHOULD NOT check the RRSIG for a DNSKEY 
>> RRset
>> where all the keys are validated by DS records.
> 
> This is not possible, and Casey thought similarly, so here is text:  The
> RRSIG from a DNSKEY identified by a DS record must validate.  You must
> do this to ensure that you have obtained all DNSKEY RRs.  And thus know
> all of the algorithms in use.  And thus know which algorithms MUST have
> signatures over the zone content.  This is from RFC4035.

Ok, I see your point. 

However counter-examples seem to depend on having multiple keys for the same 
algorithm, e.g.

Zone signing is with 1024-bit RSA and GOST.
There are DS records for the 2048-bit RSA and 1024-bit RSA, but no DS for GOST.

Here there is a down-grade attack where the attacker chops the GOST key.

So maybe the optimisation can still be done under the additional condition that 
there is only 1 key for each algorithm. Can you see a problem with that?

George
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to