On 2/9/24, 20:37, "Wellington, Brian" <bwell...@akamai.com> wrote:
>The behavior was never added into any standards document because it has 
>nothing to do with the standard.

True - but still it created a situation where operators could get snagged on 
something.

>If an implementation doesn’t support multiple keys with the same key tag when 
>validating, that would be noncompliant.  That was not the case, though.

Also true, this is the reason why "colliding" key tags have not resulted in 
operational events (until, allegedly - assuming the English translation of the 
report I saw is accurate - the RU outage).

But validation (and signing for that matter) is not the entirety of where 
DNSSEC operational gaffs can happen - it can happen in the handling of the 
keys, namely, inserting or deleting the wrong key when two or more have the 
same key tag.

The issue is - by relying only on the 5-digit, easy to read, key tag, an 
operator may wind up including/excluding the wrong key.  With the set of keys 
in operation at any time being 3-5, the benefit of having a key tag (to select 
a subset) isn't great enough to justify this risk.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to