Hi Ulrich, dnsop, thank you for your effort in improving DNS.
This is a follow-up to your proposal on easing the requirements by RFC4035, which say, in short, that if there's a DS of an algorithm, there must be a complete DNSKEY set of that algorithm, and if there is a DNSKEY of an algorithm, the whole zone must be signed by RRSIGs of that algorithm.
The counter-proposal is to only require at least one valid DS-DNSKEY-RRSIG path to sign each RR in the zone. I understand how this would enable multi-signer setups with the signers supporting different algorithms, which in turn is beneficial to enable smooth transitions between such signers.
Let's suppose we go this way. How do we specify the validator behaviour when there are algorithm A and B DNSKEYs, just algorithm B RRSIGs, and the validator only understands algorithm A, but not B? I guess BOGUS will be no longer proper here, we would probably stick at INSECURE. Am I correct?
Now a different scenario. There are algorithm A and B DNSKEYs, the whole zone is also signed by both alg A and B RRSIGs, and the validator only understands alg A. Some man-in-the-middle attacker intercepts the answers by fiddling with the records, while removing algorithm A RRSIGs from the packets. The validator ends up with INSECURE and lets the attacker poison some cache...
With current DNSSEC requirements, it is enough for security if there is any intersection between the algorithms which the zone is signed by, and the algorithms supported by the validator, respectively. With your proposal, it would be required that the validator supports all the algorithms, which the zone is signed by.
I agree that in case the zone is signed by just one algorithm (occasionally being rolled-over to just one different one), these conditions are equivalent. Fortunately, it did not happen yet (or I'm not aware of), that the existence of different validators with distinct sets of supported algorithms forced signers to permanently sign zones with two algorithms in parallel. The question is, if it remains so for the future. I can't imagine what would happen in case of a "post-quantum apocalypse", maybe it wouldn't be a problem, but it might.
It would also cause the paradox and indeed creepy security quirk, that if you sign your zone with one more algorithm, which is cryptographically strong but poorly adopted (perhaps experimental), it will result in _less_ security. Hardly anyone does this, but if they do, they will be surprised, I think.
Just to be clear, I don't want to fight against your ideas. I'm just pointing at possible problems that could emerge.
Thanks, Libor _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop