@Håvard No, that isn’t sufficient. A resolver could have the old DNSKEY set in 
cache but get signatures from the new servers. This can be solved by cross 
signing the ZSK -> put the ZSK of the other provider in the respective DNSKEY 
set, no need to exchange private keys, only the DNSKEY records. Then you will 
always have a validation path.

@Mark, that is exactly what I am talking about, a forced algorithm change can 
only work, when both operators cooperate and if we insist on lax-validation. We 
need both!

Cooperation is of course another problem.There is no incentive for the “losing” 
operator to cooperate. And because today moving a secure domain is a complex 
manual task, no-one is interested in helping out. We could make this much 
easier with the right support in protocol and software. Shumon and I will talk 
on this next week.

/Ulrich


> On 1 Mar 2021, at 20:58, Mark Andrews <ma...@isc.org> wrote:
> 
> Throw a forced algorithm change in on top where neither provider is willing 
> to sign with the other providers algorithm. 
> 
> -- 
> Mark Andrews
> 
>> On 2 Mar 2021, at 06:55, Havard Eidnes <he=40uninett...@dmarc.ietf.org> 
>> wrote:
>> 
>> 
>>> 
>>>  - Switching providers while staying secure requires
>>>  inter-provider cooperation, including publishing ZSKs from
>>>  both providers in the DNSKEY RRSET served by both providers.
>> 
>> What?
>> 
>> Maybe I just don't understand the context or conditions here, but
>> ...
>> 
>> Isn't it possible to stand up a new signing and publishing setup
>> with new ZSKs and new KSKs, and have both the old DS record
>> pointing to the old setup's KSK and a new DS record pointing to
>> the KSK of the new setup registered in the parent zone, and then
>> change the actual delegation (NS records), while still retaining
>> both the two DS records for a while until the data from the old
>> setup has timed out?
>> 
>> There is then no need to share the secret part of the KSKs or the
>> ZSKs between the old and the new providers, or to include both
>> the new and the old ZSKs in the zone.
>> 
>> Regards,
>> 
>> - Håvard
>> 
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to