> On 2 Mar 2021, at 13:46, Mark Andrews <ma...@isc.org> wrote:
> 
> 
>> On 2 Mar 2021, at 23:06, Ulrich Wisser <ulr...@wisser.se> wrote:
>> 
>> 
>> 
>>> On 2 Mar 2021, at 12:55, Mark Andrews <ma...@isc.org> wrote:
>>> 
>>> 
>>> 
>>>> On 2 Mar 2021, at 22:52, Ulrich Wisser <ulr...@wisser.se> wrote:
>>>> 
>>>> @Håvard No, that isn’t sufficient. A resolver could have the old DNSKEY 
>>>> set in cache but get signatures from the new servers. This can be solved 
>>>> by cross signing the ZSK -> put the ZSK of the other provider in the 
>>>> respective DNSKEY set, no need to exchange private keys, only the DNSKEY 
>>>> records. Then you will always have a validation path.
>>>> 
>>>> @Mark, that is exactly what I am talking about, a forced algorithm change 
>>>> can only work, when both operators cooperate and if we insist on 
>>>> lax-validation. We need both!
>>> 
>>> It doesn’t even work then as there the signatures of the non DNSKEY records 
>>> are of the wrong algorithm.
>> 
>> Why would the signatures of the non DNSKEY RRset need to be of the same 
>> algorithm as the KSK?
>> Lax-validation says that “any validation path” should be accepted. 
>> 
>> example.com. DS 123 8 2 xxx
>> 
>> example.com. DNSKEY 257 3 8 xxx
>> Example.com. DNSKEY 256 3 8 yyy
>> example.com. DNSKEY 256 3 13 zzz
>> example.com. RRSIG DNSKEY 8 …
>> 
>> www.example.com. TXT “example”
>> www.example.com. RRSIG TXT 13 …
>> 
>> In my eyes there is a clear validation path to the www rr.
> 
> It leads to bogus in a server that *only* support algorithm 8 because THERE 
> IS NOT AN RRSIG OF WITH ALGORITHM 8 

I understand that RRSIGs are missing, but what does “bogus in a server” mean? 

> 
>>>> Cooperation is of course another problem.There is no incentive for the 
>>>> “losing” operator to cooperate. And because today moving a secure domain 
>>>> is a complex manual task, no-one is interested in helping out. We could 
>>>> make this much easier with the right support in protocol and software. 
>>>> Shumon and I will talk on this next week.
>>>> 
>>>> /Ulrich
>>>> 
>>>> 
>>>>> On 1 Mar 2021, at 20:58, Mark Andrews <ma...@isc.org> wrote:
>>>>> 
>>>>> Throw a forced algorithm change in on top where neither provider is 
>>>>> willing to sign with the other providers algorithm. 
>>>>> 
>>>>> -- 
>>>>> Mark Andrews
>>>>> 
>>>>>> On 2 Mar 2021, at 06:55, Havard Eidnes <he=40uninett...@dmarc.ietf.org> 
>>>>>> wrote:
>>>>>> 
>>>>>> 
>>>>>>> 
>>>>>>> - Switching providers while staying secure requires
>>>>>>> inter-provider cooperation, including publishing ZSKs from
>>>>>>> both providers in the DNSKEY RRSET served by both providers.
>>>>>> 
>>>>>> What?
>>>>>> 
>>>>>> Maybe I just don't understand the context or conditions here, but
>>>>>> ...
>>>>>> 
>>>>>> Isn't it possible to stand up a new signing and publishing setup
>>>>>> with new ZSKs and new KSKs, and have both the old DS record
>>>>>> pointing to the old setup's KSK and a new DS record pointing to
>>>>>> the KSK of the new setup registered in the parent zone, and then
>>>>>> change the actual delegation (NS records), while still retaining
>>>>>> both the two DS records for a while until the data from the old
>>>>>> setup has timed out?
>>>>>> 
>>>>>> There is then no need to share the secret part of the KSKs or the
>>>>>> ZSKs between the old and the new providers, or to include both
>>>>>> the new and the old ZSKs in the zone.
>>>>>> 
>>>>>> Regards,
>>>>>> 
>>>>>> - Håvard
>>>>>> 
>>>>>> _______________________________________________
>>>>>> DNSOP mailing list
>>>>>> DNSOP@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/dnsop
>>>>> 
>>>>> _______________________________________________
>>>>> DNSOP mailing list
>>>>> DNSOP@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/dnsop
>>>> 
>>> 
>>> -- 
>>> Mark Andrews, ISC
>>> 1 Seymour St., Dundas Valley, NSW 2117, Australia
>>> PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org
>>> 
>> 
> 
> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org
> 

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to