I answered the question that you asked. Other people are weighing in on the root and stand by keys.

Mike



On 8/3/2017 5:05 PM, Aanchal Malhotra wrote:
Hi Mike,

On Thu, Aug 3, 2017 at 10:47 PM, Michael StJohns <m...@nthpermutation.com <mailto:m...@nthpermutation.com>> wrote:

    On 8/3/2017 3:01 PM, Aanchal Malhotra wrote:
    A DNSKEY RRset with pre-published KSK is signed by the old (now
    compromised) KSK. When the resolver uses RFC 5011 for the trust
    anchor update, the attacker can inject a new KSK (signed by the
    compromised KSK). Which KSK is now the new T/rust Anchor /for the
    resolver?

    The resolver trust point trust anchor set contains both the old
    and pre-published stand-by key.   When the old KSK is compromised,
    you set the revoke bit on the old KSK, and sign the DNSKEY RRSet
    with both the revoked KSK and the standby KSK.   The stand by key
    does not trace its trust through the old key except during the
    process of being added.   The attempt to inject the new KSK is
    foiled by revoking the old KSK and publishing the revocation
    before the hold-down time expires for the resolver(s).


I understand and agree to what you say. And even RFC 5011 explicitly states that this approach works only if there is a backup/standby/pre-published (whatever name we like) and the assumption that both active and stand-by keys are not compromised at the same time. The point is again, as Warren mentioned, that one needs two trust anchors in this case. And the issues ensue.... Also, I am not sure if there is any implementations that are actually doing standby-keys (not that I am aware of).

What I am trying to say is that we do not have a solution to this problem without a back-up key set?


    At some point - ideally quickly after the old KSK revocation - you
    publish a new standby KSK long enough to inject it as a new trust
    anchor.

    Mike



    _______________________________________________
    DNSOP mailing list
    DNSOP@ietf.org <mailto:DNSOP@ietf.org>
    https://www.ietf.org/mailman/listinfo/dnsop
    <https://www.ietf.org/mailman/listinfo/dnsop>



_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to