> On 2 Mar 2021, at 12:55, Mark Andrews <ma...@isc.org> wrote:
> 
> 
> 
>> On 2 Mar 2021, at 22:52, Ulrich Wisser <ulr...@wisser.se> wrote:
>> 
>> @Håvard No, that isn’t sufficient. A resolver could have the old DNSKEY set 
>> in cache but get signatures from the new servers. This can be solved by 
>> cross signing the ZSK -> put the ZSK of the other provider in the respective 
>> DNSKEY set, no need to exchange private keys, only the DNSKEY records. Then 
>> you will always have a validation path.
>> 
>> @Mark, that is exactly what I am talking about, a forced algorithm change 
>> can only work, when both operators cooperate and if we insist on 
>> lax-validation. We need both!
> 
> It doesn’t even work then as there the signatures of the non DNSKEY records 
> are of the wrong algorithm.

Why would the signatures of the non DNSKEY RRset need to be of the same 
algorithm as the KSK?
Lax-validation says that “any validation path” should be accepted. 

example.com. DS 123 8 2 xxx

example.com <http://example.com/>. DNSKEY 257 3 8 xxx
Example.com. DNSKEY 256 3 8 yyy
example.com <http://example.com/>. DNSKEY 256 3 13 zzz
example.com <http://example.com/>. RRSIG DNSKEY 8 …

www.example.com <http://www.example.com/>. TXT “example”
www.example.com. RRSIG TXT 13 …

In my eyes there is a clear validation path to the www rr.



> 
>> Cooperation is of course another problem.There is no incentive for the 
>> “losing” operator to cooperate. And because today moving a secure domain is 
>> a complex manual task, no-one is interested in helping out. We could make 
>> this much easier with the right support in protocol and software. Shumon and 
>> I will talk on this next week.
>> 
>> /Ulrich
>> 
>> 
>>> On 1 Mar 2021, at 20:58, Mark Andrews <ma...@isc.org> wrote:
>>> 
>>> Throw a forced algorithm change in on top where neither provider is willing 
>>> to sign with the other providers algorithm. 
>>> 
>>> -- 
>>> Mark Andrews
>>> 
>>>> On 2 Mar 2021, at 06:55, Havard Eidnes <he=40uninett...@dmarc.ietf.org> 
>>>> wrote:
>>>> 
>>>> 
>>>>> 
>>>>> - Switching providers while staying secure requires
>>>>> inter-provider cooperation, including publishing ZSKs from
>>>>> both providers in the DNSKEY RRSET served by both providers.
>>>> 
>>>> What?
>>>> 
>>>> Maybe I just don't understand the context or conditions here, but
>>>> ...
>>>> 
>>>> Isn't it possible to stand up a new signing and publishing setup
>>>> with new ZSKs and new KSKs, and have both the old DS record
>>>> pointing to the old setup's KSK and a new DS record pointing to
>>>> the KSK of the new setup registered in the parent zone, and then
>>>> change the actual delegation (NS records), while still retaining
>>>> both the two DS records for a while until the data from the old
>>>> setup has timed out?
>>>> 
>>>> There is then no need to share the secret part of the KSKs or the
>>>> ZSKs between the old and the new providers, or to include both
>>>> the new and the old ZSKs in the zone.
>>>> 
>>>> Regards,
>>>> 
>>>> - Håvard
>>>> 
>>>> _______________________________________________
>>>> DNSOP mailing list
>>>> DNSOP@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dnsop
>>> 
>>> _______________________________________________
>>> DNSOP mailing list
>>> DNSOP@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dnsop
>> 
> 
> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org
> 

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to