> On 2 Mar 2021, at 23:06, Ulrich Wisser <ulr...@wisser.se> wrote: > > > >> On 2 Mar 2021, at 12:55, Mark Andrews <ma...@isc.org> wrote: >> >> >> >>> On 2 Mar 2021, at 22:52, Ulrich Wisser <ulr...@wisser.se> wrote: >>> >>> @Håvard No, that isn’t sufficient. A resolver could have the old DNSKEY set >>> in cache but get signatures from the new servers. This can be solved by >>> cross signing the ZSK -> put the ZSK of the other provider in the >>> respective DNSKEY set, no need to exchange private keys, only the DNSKEY >>> records. Then you will always have a validation path. >>> >>> @Mark, that is exactly what I am talking about, a forced algorithm change >>> can only work, when both operators cooperate and if we insist on >>> lax-validation. We need both! >> >> It doesn’t even work then as there the signatures of the non DNSKEY records >> are of the wrong algorithm. > > Why would the signatures of the non DNSKEY RRset need to be of the same > algorithm as the KSK? > Lax-validation says that “any validation path” should be accepted. > > example.com. DS 123 8 2 xxx > > example.com. DNSKEY 257 3 8 xxx > Example.com. DNSKEY 256 3 8 yyy > example.com. DNSKEY 256 3 13 zzz > example.com. RRSIG DNSKEY 8 … > > www.example.com. TXT “example” > www.example.com. RRSIG TXT 13 … > > In my eyes there is a clear validation path to the www rr.
It leads to bogus in a server that *only* support algorithm 8 because THERE IS NOT AN RRSIG OF WITH ALGORITHM 8 >>> Cooperation is of course another problem.There is no incentive for the >>> “losing” operator to cooperate. And because today moving a secure domain is >>> a complex manual task, no-one is interested in helping out. We could make >>> this much easier with the right support in protocol and software. Shumon >>> and I will talk on this next week. >>> >>> /Ulrich >>> >>> >>>> On 1 Mar 2021, at 20:58, Mark Andrews <ma...@isc.org> wrote: >>>> >>>> Throw a forced algorithm change in on top where neither provider is >>>> willing to sign with the other providers algorithm. >>>> >>>> -- >>>> Mark Andrews >>>> >>>>> On 2 Mar 2021, at 06:55, Havard Eidnes <he=40uninett...@dmarc.ietf.org> >>>>> wrote: >>>>> >>>>> >>>>>> >>>>>> - Switching providers while staying secure requires >>>>>> inter-provider cooperation, including publishing ZSKs from >>>>>> both providers in the DNSKEY RRSET served by both providers. >>>>> >>>>> What? >>>>> >>>>> Maybe I just don't understand the context or conditions here, but >>>>> ... >>>>> >>>>> Isn't it possible to stand up a new signing and publishing setup >>>>> with new ZSKs and new KSKs, and have both the old DS record >>>>> pointing to the old setup's KSK and a new DS record pointing to >>>>> the KSK of the new setup registered in the parent zone, and then >>>>> change the actual delegation (NS records), while still retaining >>>>> both the two DS records for a while until the data from the old >>>>> setup has timed out? >>>>> >>>>> There is then no need to share the secret part of the KSKs or the >>>>> ZSKs between the old and the new providers, or to include both >>>>> the new and the old ZSKs in the zone. >>>>> >>>>> Regards, >>>>> >>>>> - Håvard >>>>> >>>>> _______________________________________________ >>>>> DNSOP mailing list >>>>> DNSOP@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/dnsop >>>> >>>> _______________________________________________ >>>> DNSOP mailing list >>>> DNSOP@ietf.org >>>> https://www.ietf.org/mailman/listinfo/dnsop >>> >> >> -- >> Mark Andrews, ISC >> 1 Seymour St., Dundas Valley, NSW 2117, Australia >> PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org >> > -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop