On the other hand, do you know any zones that permanently (other than active roll-over) sign with two algorithms in parallel? AFAIK this is _not_ the usual way how new algorithms are being rolled out. I guess new algorithms would continue to be adopted in the same way: first wide enough support in validators, second adoption (exclusive) by some pioneering zones who "risk" being insecure for older validators, third general adoption. I don't think it would be so huge an issue, but still a bit of an issue, as I described in the first e-mail.

Libor

Dne 21. 03. 22 v 10:32 Ben Schwartz napsal(a):
I'm concerned about this.  Concretely, this seems like it would raise a major barrier to rolling out new algorithms.  For example, any zone that offers ECDSA and RSA signatures would be insecure for any RSA-only resolvers.  It's hard to see how new algorithms could be adopted at scale if this rule were in place.

On Sun, Mar 20, 2022 at 4:42 PM libor.peltan <libor.peltan=40nic...@dmarc.ietf.org> wrote:

    Hi Ulrich, dnsop,
    thank you for your effort in improving DNS.

    This is a follow-up to your proposal on easing the requirements by
    RFC4035, which say, in short, that if there's a DS of an algorithm,
    there must be a complete DNSKEY set of that algorithm, and if
    there is a
    DNSKEY of an algorithm, the whole zone must be signed by RRSIGs of
    that
    algorithm.

    The counter-proposal is to only require at least one valid
    DS-DNSKEY-RRSIG path to sign each RR in the zone. I understand how
    this
    would enable multi-signer setups with the signers supporting
    different
    algorithms, which in turn is beneficial to enable smooth transitions
    between such signers.

    Let's suppose we go this way. How do we specify the validator
    behaviour
    when there are algorithm A and B DNSKEYs, just algorithm B RRSIGs,
    and
    the validator only understands algorithm A, but not B? I guess BOGUS
    will be no longer proper here, we would probably stick at
    INSECURE. Am I
    correct?

    Now a different scenario. There are algorithm A and B DNSKEYs, the
    whole
    zone is also signed by both alg A and B RRSIGs, and the validator
    only
    understands alg A. Some man-in-the-middle attacker intercepts the
    answers by fiddling with the records, while removing algorithm A
    RRSIGs
    from the packets. The validator ends up with INSECURE and lets the
    attacker poison some cache...

    With current DNSSEC requirements, it is enough for security if
    there is
    any intersection between the algorithms which the zone is signed
    by, and
    the algorithms supported by the validator, respectively. With your
    proposal, it would be required that the validator supports all the
    algorithms, which the zone is signed by.

    I agree that in case the zone is signed by just one algorithm
    (occasionally being rolled-over to just one different one), these
    conditions are equivalent. Fortunately, it did not happen yet (or I'm
    not aware of), that the existence of different validators with
    distinct
    sets of supported algorithms forced signers to permanently sign zones
    with two algorithms in parallel. The question is, if it remains so
    for
    the future. I can't imagine what would happen in case of a
    "post-quantum
    apocalypse", maybe it wouldn't be a problem, but it might.

    It would also cause the paradox and indeed creepy security quirk,
    that
    if you sign your zone with one more algorithm, which is
    cryptographically strong but poorly adopted (perhaps
    experimental), it
    will result in _less_ security. Hardly anyone does this, but if
    they do,
    they will be surprised, I think.

    Just to be clear, I don't want to fight against your ideas. I'm just
    pointing at possible problems that could emerge.

    Thanks,
    Libor

    _______________________________________________
    DNSOP mailing list
    DNSOP@ietf.org
    https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to