Matthjis,

On Wed, 27 Jul 2011 18:03:30 +0200 (CEST), Matthijs Mekking 
<matth...@nlnetlabs.nl> said:

> On Wed, 27 Jul 2011, Alexander Gall wrote:

>>> I don't understand which corner case this is supposed to cover. The
>>> relevant section of RFC4035 quoted in the draft says
>>> 
>>> There MUST be an RRSIG for each RRset using at least one DNSKEY of
>>> each algorithm in the zone apex DNSKEY RRset.  The apex DNSKEY RRset
>>> itself MUST be signed by each algorithm appearing in the DS RRset
>>> located at the delegating parent (if any).
>>> 
>>> My understanding of this is that there is no requirement for the
>>> existence of the signature over the DNSKEY RRset by K_2 until the end
>>> of the step "new DNSKEY", because up to that point, the DS doesn't
>>> refer to algorithm 2 yet.

> My understanding of this paragraph is that there MUST be an RRSIG for
> each RRset using at least one key of each algorithm in the DNSKEY RRset.
> So that includes the DNSKEY RRset itself. *In addition*, the DNSKEY RRset 
> MUST be signed with the algorithms appearing in the DS RRset.

Ok, so the snippet from 4035 alone appears to be ambigous to me.  Is
this clarified somewhere?

> The corner case tries to make clear that a DNSKEY RRset can be
> treated as part of the chain of trust, but also can be treated as zone
> content. In the latter case you want to make sure that the signatures
> of the new algorithm are propagated before introducing the new DNSKEY.

I sort of understand the intention.  But how *exactly* would it work?
Note that the "pre-published" signature in zone SOA_1 will differ from
that in zone SOA_2, because the DNSKEY RRset is not the same (this is
different from pre-published signatures by the ZSK, because the RRsets
themselves do not change). Suppose a validator happens to fetch the
DNSKEY RRset from SOA_2 but still has RRSIG_K_2(DNSKEY) from SOA_1 in
its cache.  I guess this is one of the corner cases, right? However,
wouldn't the validator be unable to verify that RRSIG because it
covers a different DNSKEY RRset (the one without Z_2 and K_2)?

It seems like to cover this case, you'd have to pre-publish the
signature of the DNSKEY RRset that will appear in SOA_2.  It's not
obvious to me whether this doesn't create problems of its own.

-- 
Alex
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to