On Tue, Aug 25, 2015 at 11:02 PM, Shane Kerr <sh...@time-travellers.org>
wrote:

> Paul,
>
> On Tue, 25 Aug 2015 18:15:02 -0400 (EDT)
> Paul Wouters <p...@nohats.ca> wrote:
>
> > On Tue, 25 Aug 2015, Ólafur Guðmundsson wrote:
> >
> > > This is a proposed update the CDS/CDNSKEY processing to address the
> omission in RFC7344.
> > > Comment please,
> >
> > As you state, it was an omission on purpose. The document wanted to
> > ensure the security state was never changed from insecure <-> secure.
> > I believe it is useful to specify a method for those who can or are
> > willing to use it to do so.
>
> I agree completely.
>
> Perhaps we can add blinking red letters of warning to the draft for
> users? ;)


>
> Going from insecure to secure does not have the same property. You can
> bootstrap trust, but it is from a different kind of thing. IIRC, Joao
> added code to the soon-to-be-expired DLV registry which used a nonce
> TXT record to confirm that the person adding to DLV could add TXT
> records to the domain. But there are several attacks which could be
> made that allow this (not likely, but also not possible). DNSSEC trust
> is not the same as "ability to update a zone".
>


I think writing a document on acceptable ways to establish trust  a useful
document but that at this point has no protocol implications for
CDS/CDNSKEY that I can see, thus I prefer to not include that in this
simple protocol document.
Establishing the initial trust is one of the goals of the auto-DS work that
some of us are experimenting with.


> To be clear, I fully support adding such a way to bootstrap DNSSEC
> trust, just pointing out that it is not the same as *removing* DNSSEC
> trust.
>
>
> I would also add a note that if you lose the private key, this document
> > does not help you go insecure, as an out-of-band method will have to be
> > used to signal that.
>
> True. Seems obvious but probably worth a note. :)
>
> Will add a note to that extent basically list cases in where you can not
use this to go unsigned.


> > IANA would also need to update the algo number 0 from "RESERVED" to
> > something else - eg "NO DIGEST".
>

You are right I need to update the document to reflect the use of 0 as
digest algorithm in DS as the examples stand, not
just the DNSKEY algorithm number.

I guess we could say "CDS 0 0 X" where X is the algorithm in the current DS
record, but that makes limited sense.
Q: is it better to use DNSKEY algorithm 0 as:  DELETE flag in CDS/CDNSKEY
or should we reserve a different Algorithm code that for that?

 Olafur
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to