On 6/28/22 02:56, Paul Wouters wrote:
Does the WG think this is a reasonable thing to pursue?
I think this could be an excellent super short RFC that Updates: 7344.
Reading RFC 7344 more closely, I stumbled upon this paragraph in Section 4.1:
o Signer: MUST be signed with a key that is represented in both the
current DNSKEY and DS RRsets, unless the Parent uses the CDS or
CDNSKEY RRset for initial enrollment; in that case, the Parent
validates the CDS/CDNSKEY through some other means (see
Section 6.1 and the Security Considerations).
This is commonly taken to mean that "Like DNSKEY records, CDNSKEY and CDS records
must be signed by the zone’s KSK"
(https://blog.apnic.net/2020/01/17/sha-1-chosen-prefix-collisions-and-dnssec/).
However, strictly speaking: the above provision allows that the key that signs
CDS/CDNSKEY records is in the DNSKEY rrset, and referenced by a DS record, but
does *not* sign the DNSKEY (i.e. is not a KSK).
This is legal iff the zone has (another) KSK of the same algorithm that is also
referenced in a DS record (see last paragraph of RFC 4035 Section 2.2).
The situation would amount to pre-publishing a spare KSK in DNSKEY and DS
without using it for signing; then, begin its use inside the zone with an RRSIG
over CDS/CDNSKEY. But when making the key available for signing CDS/CDNSKEY, it
could also sign DNSKEY, turning it into a full-fledged KSK. -- It's not clear
to me what could be the motivation for this edge case, where the CDS/CDNSKEY
signing key has a corresponding DS record, but does not sign DNSKEYs.
Perhaps it is just unfortunate phrasing in RFC 7344, and the authors simply
intended to say that CDS/CDNSKEY must be signed by a KSK? (And then, it would
make sense if it were signed by a KSK of each algorithm!)
What do you think about these aspects? In the short update RFC, do you think
they would be worth clarifying?
Thanks,
Peter
--
https://desec.io/
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop