On 03/12/2015 11:15 AM, Jan Včelák wrote:
> On Wednesday, March 11, 2015 09:52:55 AM Nicholas Weaver wrote:
>> Why not just do something simpler?  The only thing NSEC5 really differs in a
>> way that counts is not in the NSEC record but really just the DNSKEY
>> handling, having a separate key used for signing the NSEC* records.
>>
>> So why define NSEC5 at all.
>>
>> Instead, just specify a separate flag for the DNSKEY record, "NSEC-only",
>> sign the NSEC3 dynamically, bada bing, bada boom, done!
> 
> This would not work. Anyone holding the NSEC-only private key could fake 
> denying answers for the zone. So if your zone is slaved by a less-trusted 
> party, they could still manipulate your zone. This is not possible with NSEC5.

They can still respond with SERVFAIL instead of supplying a signed
answer, achieving roughly the same result.

A better argument would be support for opt out, where signatures from
the online key could introduce unauthorized positive answers.  It's
still not a very strong argument, admittedly.  The DNS software itself
is likely signed by a key which is kept online (more or less).  Online
keys are less threatening than they used to be, and we aren't even
talking about long-term keys baked into software, but short/medium-term
keys which are easily replaced.

And does anyone actually use opt out with NSEC3?

-- 
Florian Weimer / Red Hat Product Security

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to