Hi Ulrich,

please see below..

Libor

Dne 24. 02. 21 v 16:01 Ulrich Wisser napsal(a):

On 23 Feb 2021, at 17:49, Ben Schwartz <bemasc=40google....@dmarc.ietf.org <mailto:bemasc=40google....@dmarc.ietf.org>> wrote:



On Tue, Feb 23, 2021 at 11:21 AM Samuel Weiler <wei...@watson.org <mailto:wei...@watson.org>> wrote:
...

    Recognizing that I'm likely biased by my history of working on the
    current "mandatory algorithm rules", I don't buy the need for this
    complexity.  In practice our "weak" algorithms aren't _that_ weak.
    And, if they are, we might as well stop signing with them entirely.


I think that was true for a long time, but I'm not sure it's still true, or will stay true.  I'm particularly motivated by the ongoing discussion about adding Algorithms to the registry [1], and a recent overview of Post-Quantum cryptography for DNSSEC [2].  Also, 829-bit RSA was factored last year [3].  Validator update timelines are Very Slow, so we should be thinking about adding features we might need before we need them.

Even if we are currently in a state where zone owners feel like they have simple, safe choices, I don't think we should assume that this will remain true indefinitely.

    This seems like unnecessary further loading of the camel.


FWIW, my preference would be to simply remove the lax-validation rule from RFC 6840, which would simplify the standard overall ... but there must have been a good reason for it.  Strict Mode might be a stepping-stone in that direction.

Not only am I in favor of the RFC6840 lax validation, it is in fact necessary for secure DNSSEC operation.
I think lax validation is not necessary for secure DNSSEC operation. DNSSEC can be operated securely in the strict mode completely, including algorithm roll-overs.
In fact I believe the RFC 4035 needs to be updated to explicitly allow algorithms without signatures.

I believe the lax validation needs to be denied completely in order to not support RFC4035 (and 6840) non-compliant signers.

At the current state of dnssec RFC definitions it is unclear how you could change DNS operators securely if these operators do not sign the zone with the same algorithm.
IMHO it's pretty clear: it's simply not possible at all.


    Ben, if you decide to persist with this idea, I've filed some issues
    in your GH repo.


Thanks!

[1] https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-dnssec-iana-cons-00 <https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-dnssec-iana-cons-00> [2] https://indico.dns-oarc.net/event/37/contributions/811/ <https://indico.dns-oarc.net/event/37/contributions/811/> [3] https://en.wikipedia.org/wiki/RSA_numbers#RSA-250 <https://en.wikipedia.org/wiki/RSA_numbers#RSA-250>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org <mailto:DNSOP@ietf.org>
https://www.ietf.org/mailman/listinfo/dnsop


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to