On Nov 8, 2010, at 11:41 PM, Jelte Jansen wrote:

> On 11/09/2010 02:33 AM, Roy Arends wrote:
>>>> 4.2.1 KSK Compromise (2nd paragraph)
>>>> A compromised KSK used by an attacker can also sign data in the zone other 
>>>> than the key set. An attacker does not need to follow the definitions of 
>>>> KSK vs ZSK.
>>> 
>>> I wonder how different implementations handle this case......
>> 
>> I have tested chains of trust (with BIND9 and unbound) in the past and 
>> noticed that its validity did not depend on the SEP bit being clear or set.
>> 
> 
> If they did, they would not follow the spec ;)
> 
> A SEP key can be a ZSK too. The only value of the SEP flag is for operators 
> and/or tools, validators should ignore it.
> 
> Whether or not a key is a ZSK, a KSK, or both, is, from the validator's point 
> of view, defined by whichever signatures you see. So yes, if you can make 
> arbitrary signatures with a compromised key, you can 'change' its KSK/ZSK 
> status, and no validator should be able to notice. But well, you can make 
> arbitrary signatures anyway...

That is exactly what I meant. Apologies if that wasn't clear.

When I tested this, I tested with all possible combos in a single chain: all 
zsk, all ksk, combinations of both, etc.

Roy

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to