On 2/14/24, 09:00, "Havard Eidnes" <h...@uninett.no> wrote:

Not arguing, but to tease out the difficulty of all this:

>One is to line up the signers "behind each other", so that the second one 
>signs an already-signed-by-the-first-signer zone...

The issue is in deciding the order they are lined up.  In one case, I was told 
a backend was changing, the outgoing created the key that led to the collision. 
 (In this case, the outgoing key never signed data, hence no validation issues 
were recorded.)  The solution was to let this go - the collision causing key 
was about to be deleted anyway.

It's difficult to derive a definitive rule.

>Or have I totally misunderstood, and your statement about required time of 
>enforcement is a universal property of all multi-signer scenarios?

I think it is a general protocol design consideration - if you need to 
communicate a piece of data and require some state be maintained because of it, 
you have to have some means to enforce the requirement.

If we were to require that the key tag point to a unique published key, we'd 
have to enforce this via a check on the zone's DNSKEY resource record set.  
Under some visions of multi-signer, different nameservers might publish 
different information based on the operator.  While I don't believe that 
incoherent versions of the DNSKEY resource record set can co-exist peacefully, 
it is possible that the RRSIG resource records may differ from source to 
source.  The problem in all this is - when and how could the protocol ensure 
there is no key tag collision?  Or limit the number of keys with matching key 
tags?

Going back a few messages, I raise the key tag issue in the sense of "let's not 
do this again" and not to try to change what it is now.  Clearly, changing it 
(to avoid collisions) would be difficult.  And, given the relative rarity of 
any problem stemming from it, not worth fixing at this point.  Just don't do it 
again.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to