> On 21 Feb 2024, at 01:58, Edward Lewis <edward.le...@icann.org> wrote: > > That’s where I’m heading as well… > 1) Benign collisions aren’t major headaches, except perhaps for the key > manager (because rare events are headaches) > 2) Validator resource consumption is a general issue, not tied to key tag > collisions
Validator resource consumption (CPU) *is* is tied to tags. Without tags the cost of verification increases and the number of cache misses that can be handled decreases as the number of keys per algorithm increase. A tag collisions undoes the value of the tag for the keys that collide. 1 -> 1 2 -> 1.5 3 -> 2 4 -> 2.5 > My kicking this off was not the KeyTrap issue, a report of a potential > maliciously abused vulnerability. My kickoff was the report that a TLD “went > down in DNSSEC” because they published the wrong key in a key tag collision > set. That’s why I keep raising the key management angle. > From: Ted Lemon <mel...@fugue.com> > Date: Tuesday, February 20, 2024 at 09:48 > To: Edward Lewis <edward.le...@icann.org> > Cc: Mark Andrews <ma...@isc.org>, Paul Wouters <p...@nohats.ca>, > "dnsop@ietf.org" <dnsop@ietf.org> > Subject: Re: [DNSOP] Detecting, regeneration and avoidance was Re: [Ext] > About key tags > Sorry, I did not mean that the attack isn't a serious problem. I mean that > insisting that there be no key hash collisions in a verification attempt is > not as hard a problem as you were suggesting. The main issue is that it would > require a flag day, but the number of affected zones in the wild is probably > small enough that this could be managed. My point was that the keying and > signing of large, sensitive zones should not be an impediment to having it be > the rule that key hash collisions aren't allowed. Like, I'm not saying there > aren't problems, but this is not an insurmountable problem. > On Tue, Feb 20, 2024 at 9:41 AM Edward Lewis <edward.le...@icann.org> wrote: >> >> >> From: Ted Lemon <mel...@fugue.com> >> Date: Tuesday, February 20, 2024 at 09:05 >> To: Edward Lewis <edward.le...@icann.org> >> Cc: Mark Andrews <ma...@isc.org>, Paul Wouters <p...@nohats.ca>, >> "dnsop@ietf.org" <dnsop@ietf.org> >> Subject: Re: [DNSOP] Detecting, regeneration and avoidance was Re: [Ext] >> About key tags >> >This seems like an implementation detail. >> I don’t want to brush this off that quickly. >> >The random likelihood of the root and com key hashes colliding seems >> pretty small. >> This is very true - in nature. The scare raise here is that someone may >> intentionally concoct a situation, intending to cause havoc. I do have a >> dose of skepticism when use case is discovered academically as opposed to >> being seen in operational packet flows, but that doesn’t mean the >> vulnerability is irrelevant. Probably there are lots of holes remaining in >> the protocol design, not yet discovered, so long as they aren’t being they >> aren’t operationally impactful. >> The KeyTrap issue is resource consumption/depletion attack and it mentions >> key tag collisions as an ingredient, which is driving the urgency of this >> discussion. My read of the paper is that, at heart, this is a general >> resource exhaustion problem which stems from the agility of the DNS protocol >> to find an answer no matter how hard it is to find. Key tag collisions help >> in hiding intent of a malicious configuration by lowering the number of >> signature records needed. >> >And while com is rather large, computes aren't as expensive as they were >> when y'all invented the ritual. I suspect that if you just always pick two >> keys and sign the zones twice, this problem becomes so improbable that we >> never have to fall back to actually re-doing the ceremony. But if we did >> have to fall back once in a blue moon and re-do the ceremony, that might be >> quite a bit cheaper than allowing key hash collisions in situations where >> it's actually a problem. I think it would be completely reasonable to insist >> that if there is a key collision between e.g. com and fugue.com [fugue.com], >> that fugue.com [fugue.com] could be obligated to regenerate its key rather >> than com. >> In validation, key tag collisions are a problem when there is malicious >> intent and no more than a nuisance in a benign collision. >> If an operator had two active ZSKs, there would be two signatures and two >> keys. With non-colliding key tags, it would be easier to line them up - and >> recall the rule that it only takes one successful operation to declare >> success. With a collision, there’s a 50% chance of a misalignment at first, >> which is what leads to the 1.5 signature verification operations per >> instance comes from. Given the low probability of a collision (it’s rare!) >> that 1.5 isn’t a big deal. (No one as suggested a 3-key collision, which >> would be rarer, especially as most operators never exceed two keys of the >> same role per DNS security algorithm.) >> Nevertheless, in a malicious case (no more need be said) … this makes me >> think the appropriate solution is for validators implement self-protection >> (timeouts) and not try to avoid collisions. >> ‘Course, collisions still are a problem for the key managers, but that is a >> local problem. Unless they publish the wrong key in the collision set. -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop