Hi Jim, On 16 Feb 2024, at 14:50, Jim Reid <j...@rfc1035.com> wrote:
> The latest patches to mitigate the keytrap vulnerability are welcome and much > appreciated. Though IMO they’re a short-term fix. A long-term solution would > be implementation guidelines as outlined above or to hard-fail validation > whenever there’s a key tag collision. I'm not sure why this is true. Resolvers are routinely managed in order to safeguard local resources, harden themselves against attacks, etc. Not every query gets answered. Seems to me that limiting the time a validating resolver spends churning its organs over a particular RRSIG and causing it to fail to validate if the indigestion gets too bad is just another example of sensible local policy. While I think some centralised guidance about how to harden your resolver against this attack (or any attack) is useful (and similarly guidance to avoid duplicate key tags seems like a great idea for signers) I am struggling to see any of this as a problem with the protocol or a fundamental weakness in DNSSEC that needs a "long-term solution". If a zone's signatures and keys are constructed and published in such a way that it causes indigestion in validators, and as a consequence validators fail to return responses for data in that zone, that's a self-inflicted problem and the zone administrator surely has every incentive to fix the problem. If the tools the zone administrator is using make the problem hard to make, then so much the better. The DNS is filled with misconfigurations and junk. Things get fixed if they need to when things break. Sometimes things break in painful ways and so we make changes to mitigate or avoid the pain. How is this not just another day on the Internet? Joe _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop