> On Feb 23, 2021, at 1:08 PM, Ben Schwartz <bem...@google.com> wrote: > > The DNSSEC Strict Mode flag appears in bit $N of the DNSKEY flags field. > If this flag is set, all records in the zone MUST be signed correctly under > this key's specified Algorithm. A validator that receives a Strict Mode > DNSKEY with a supported Algorithm SHOULD reject as Bogus any RRSet that > lacks a valid RRSIG with this Algorithm.
This would harden DNSSEC against downgrade attacks in the scenario that some widely supported algorithm loses its shine, and all the alternatives are too new and are not yet broadly adopted. The weak algorithm would have to still be sufficiently strong to bother to keep publishing, thus able to withstand attacks by attackers of modest means, and succumb only to nation-state level resources and non-trivial costs even for these. We should also keep in mind that DNSSEC use of algorithms is for signatures only, and so need only resist attacks while the key is in use. There's no need to remain secure 30+ years after the fact. Thus, while on the face of it, downgrade-resistance is a sensible goal, and the proposed mechanism is reasonably simple, it is not clear that it addresses a sufficiently "dire" problem. Our practical algorithm difficulties are: * ~95% of domains use 0-bit keys (no DNSSEC at all) * ~8K out of the 14.2 million signed domains are using 512-bit RSA keys * ~2 million domains are using RSA-SHA1 (algorithm 7 primarily with 27k using 5) * ~1.8 million domains have SHA1 DS RRs * ~120k domains are using "unreasonably large" 4096-bit RSA keys, also futile given 2048-bit keys in the root zone. * ~130k domains have 1024-bit RSA KSKs, these should be at least 1536, BCP 2048-bits. They should be rolled more often. * RSA ZSKs are predominatly (~7.3 million) 1024-bit, BCP is 1280. They should be rolled more often. And of course we need registrars/registries that support CDS/CDNSKEY, more attention to registrar account security, ... So downgrade issues are quite a long way down the list of priorities. When (and if) the quantum crypto apocalypse is more realistically in our near future, we'll probably need to be doing DNS over QUIC to transport large public keys and signatures over a new transport that can effectively handle them. That may be the time to consider whether we need to guard against plausible downgrades from PQC to legacy PK cryptography with many resolvers and/auth servers not yet ready to do the new thing. Thus I look at DoQ not as a dprive mechanism, but as a hedge against scalable QCs. In that context it may some day make sense to be concerned about downgrades, but I think there are more immediate issues to be addressed. -- Viktor. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop