Moin!

On 28 Feb 2024, at 22:44, John R Levine wrote:

> On Thu, 29 Feb 2024, Mark Andrews wrote:
>>> If it is forbidden in the protocol, it might still happen.
>>
>> Ed, your reasoning is off.  The point of forbidding is to allow the 
>> validator to safely stop as soon as possible when it is under attack.
>
> We're going in circles here.  You want to stop at 2 some time in the future 
> after we've changed the spec.

I think that is wrong. Bind and and other servers (egg Akamai Cacheserve)  
already stop/fail when having more then two keys with a colliding key tag 
today. I think what at least I want is that every key a validator has to 
consider has a unique key tag, so that we don’t need to do any additional 
cryptographic work for figuring out if the signature is correct.


> Ed and Shumon and I want to stop at, say, 10, right now.  I've never written 
> a DNSSEC validator so I don't know how different those are in practice but 
> I'd be surprised if it were very much.

There are two problems. With more colliding keys we give the attacker a larger 
multiplier for the cryptographic work he can force on a validator. The second 
is that we have to have a code path at all that uses more than one 
cryptographic operation to validate a signature.

DNSSEC validators are very very complex, so everything we can do to make them 
simpler is a win. I only test and use validators, but I’ve seen often enough 
that a small benign change in that code caused a whole array of other 
“cornercases” to fail and had to be reverted/rethought.

So long
-Ralf
——-
Ralf Weber

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to