On 2/14/24, 08:54, "Petr Špaček" <pspa...@isc.org> wrote:
>    How many keytag collisions are you willing to allow & at the same time  
> protect validators from 2023-50387?

Admitting to reading the CVE link after replying: the issue doesn't need there 
to be a collision between keys.  I could tie up validation by posting a data 
set with a lengthy (more than 1? 2? 3?) list of RRSIG resource records, each 
having the same key tag, different but still temporally valid inception, 
expiration time pairs, and falsely generated signatures.  That could tie up a 
validator.  The only reason I mention "same key tag" is that this meltdown 
happens only if there is indeed a key matching - only one is needed, but more 
could be there as well.

The key tag isn’t the culprit here, it's that the process of validation is 
necessarily computationally complex, so falsely triggering a security response, 
which is a known tactic, is the root cause.  Putting time (or resource) limits 
before denying is a reasonable response provided the issue is the result of a 
malicious situation.  The goal is to design out benign causes of this.

Keep in mind, my argument against the key tag is that in ordinary operations, 
the key signing the data will usually be the ZSK unless it is the DNSKEY 
resource record set, where it'll be the KSK.  That's "ordinary", still one can 
twist configurations in all sorts of ways - that is what the designers did in 
the early development - and come up with gnarly situations where the key tag 
can be justified.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to