> On Feb 8, 2024, at 6:41 AM, Edward Lewis <edward.le...@icann.org> wrote:
> 
> ...
> 
> When DNSSEC was designed, the possibility of tags colliding was known.  The 
> validation process was defined to expect that a tag might lead to a 
> non-singleton set of keys.  When it came to key management, and the practice 
> of storing keys in files named K<zone>-<sec_alg>-<key_tag>.public was 
> derived, the lone developer of DNSSEC code (at the time) sidestepped the odds 
> that key tags would collide by deleting the work done when creating a new key 
> pair if the file to be used already existed.  This side-stepping practice was 
> never added to a standards document.  (BTW, the reason for the "K" in the 
> filename was that we developed the protocol using a test root zone, meaning 
> the <zone> would be ".".  A filename starting with "." is hidden in the OS 
> systems we used then, so we needed a prefix.)

This is a mischaracterization of history.

Yes, dnssec-keygen would regenerate a key upon tag collision.  This seemed like 
a reasonable thing to do.

The behavior was never added into any standards document because it has nothing 
to do with the standard.  The standards documents don’t describe how keys are 
stored, nor any tooling around their generation.  If an implementation chooses 
to avoid generating keys which have the same key tag, that is an implementation 
issue, and doesn’t in any way make it noncompliant with the specification.  
There was no reason at the time why allowing for the generation of colliding 
keys would be useful, and I believe that’s still the case.  The fact that no 
one’s updated the tools to allow this in almost 25 years is probably 
significant.

If an implementation doesn’t support multiple keys with the same key tag when 
validating, that would be noncompliant.  That was not the case, though.

Brian

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to