On 23. 02. 21 16:08, Ben Schwartz wrote:
Inspired by some recent discussions here (and at DNS-OARC), and hastened by the draft cut-off, I present for your consideration "DNSSEC Strict Mode": https://datatracker.ietf.org/doc/html/draft-schwartz-dnsop-dnssec-strict-mode-00 <https://datatracker.ietf.org/doc/html/draft-schwartz-dnsop-dnssec-strict-mode-00>

Abstract:
Currently, the DNSSEC security of a zone is limited by the strength of its weakest signature algorithm.  DNSSEC Strict Mode makes zones as secure as their strongest algorithm instead.

The draft has a long discussion about why and how, but the core normative text is just three sentences:

The DNSSEC Strict Mode flag appears in bit $N of the DNSKEY flags field.  If this flag is set, all records in the zone MUST be signed correctly under this key's specified Algorithm.  A validator that receives a Strict Mode DNSKEY with a supported Algorithm SHOULD reject as Bogus any RRSet that lacks a valid RRSIG with this Algorithm.

Hi Ben,

I would appreciate more information about threat model you work with.

This
Abstract

   Currently, the DNSSEC security of a zone is limited by the strength
   of its weakest signature algorithm.  DNSSEC Strict Mode makes zones
   as secure as their strongest algorithm instead.

is IMHO gravely imprecise: DNSSEC security is as strong as weakest link in (any permissible) chain of trust.

In other words, if my parent TLD has 1024 bit RSA and my "secure" zone has 1024 bit RSA + a fancy ECC alg with the new bit set, it still means nothing security-wise. Attacker can get better return on investment by attacking the parent zone.

I think it needs discussion if it is worth approaching this problem with single-zone granularity.

--
Petr Špaček

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to