On 16. 02. 24 16:19, Joe Abley wrote:
Hi Jim,

On 16 Feb 2024, at 14:50, Jim Reid <j...@rfc1035.com> wrote:

The latest patches to mitigate the keytrap vulnerability are welcome and much 
appreciated. Though IMO they’re a short-term fix. A long-term solution would be 
implementation guidelines as outlined above or to hard-fail validation whenever 
there’s a key tag collision.

I'm not sure why this is true.

Resolvers are routinely managed in order to safeguard local resources, harden 
themselves against attacks, etc. Not every query gets answered. Seems to me 
that limiting the time a validating resolver spends churning its organs over a 
particular RRSIG and causing it to fail to validate if the indigestion gets too 
bad is just another example of sensible local policy.

While I think some centralised guidance about how to harden your resolver against this 
attack (or any attack) is useful (and similarly guidance to avoid duplicate key tags 
seems like a great idea for signers) I am struggling to see any of this as a problem with 
the protocol or a fundamental weakness in DNSSEC that needs a "long-term 
solution".

If a zone's signatures and keys are constructed and published in such a way 
that it causes indigestion in validators, and as a consequence validators fail 
to return responses for data in that zone, that's a self-inflicted problem and 
the zone administrator surely has every incentive to fix the problem. If the 
tools the zone administrator is using make the problem hard to make, then so 
much the better.

The DNS is filled with misconfigurations and junk. Things get fixed if they 
need to when things break. Sometimes things break in painful ways and so we 
make changes to mitigate or avoid the pain. How is this not just another day on 
the Internet?

I think you describe it accurately, but people who implement resolvers in this thread (me, Ralf, Brian W.) apparently disagree where the pain should land - should resolvers suffer from more complex code & work, or should signers suffer if they do something very unusual?

--
Petr Špaček
Internet Systems Consortium

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to