On 2010-10-03, at 13:31, Eric Rescorla wrote:

> I'm asking because I'm pretty familiar with cryptography and I know that keys 
> don't suddenly become
> worthless just because they get past their intended use lifetime. The 
> semantics of signature
> security of old keys is a lot more complicated than that.

The context here is the publication of DNSSEC trust anchors for the root zone.

At least some of the cases we're talking about involve signatures necessarily 
made by keys after an emergency key roll which has taken place because the old 
key has been compromised. Such signatures are worthless. In the general case we 
must assume that there will exist a point in the future at which at least one 
prior key roll has been due to a key compromise, and hence we can expect that 
an unbroken chain of trust that involves outgoing keys signing incoming keys 
will not always be available.

If we consider the more usual case to be one where a key was rolled for reasons 
other than a compromise, then a signature made by the outgoing key is useful so 
long as the security of the outgoing key is maintained. Since the procedures 
followed to effect a scheduled key roll would involve the destruction of the 
outgoing private key, we would hope that this was not an issue. As a matter of 
operational pragmatism, however, I have argued that a system that relies upon 
the absolute, secure destruction of all prior keys is more fragile than one 
that does not.

> If there's some particular discussion that you'd like me to review that makes 
> the case that
> this is different, please point me at it.

The conversations were all on this list, relating to the trust-history 
proposal. The paragraphs above are my attempt at a summary of the concerns I 
raised at the time.


Joe

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to