On 3/1/24, 11:13, "pch-b538d2...@u-1.phicoh.com on behalf of Philip Homburg" <pch-b538d2...@u-1.phicoh.com on behalf of pch-dnso...@u-1.phicoh.com> wrote:
I removed a lot of logic, as it seems dead on. But... > This would allow validators to reject any DS or DNSKEY RR set that has a > duplicate key tag. "This" refers to barring keys from having duplicate key tags. My knee-jerk response is that validators are already permitted to reject anything they want to reject. (We used to talk about the catch-all "local policy" statements in the early specs.) You don't have to bar duplicate key tags to allow validators to dump them, validators already have that "right." >Duplicate key tags in RRSIGs is a harder problem I'm not clear on what you mean. I could have RRSIG generated by the same key (binary-ily speaking, not key tag-speaking) that have different, overlapping temporal validities. If you want to draw a malicious use case, I could take an RRSIG resource record signed in January with an expiration in December for an address record that is changed in March, and replay that along with a new signature record, signed in April and valid in December. One would validate and the other not. But this isn't a key tag issue, it's a bad signing process issue. Not completely fictious one. There was a TLD whose signatures always expired on New Year's eve. Not sure if the TLD in question does this anymore, but for a number of years (at least 3), all signatures they generated expired on the next New Year's eve. >But for the simple question, would requiring unique key tags in DNSSEC be >doable without significant negative effects, then I think the answer is yes. Heh, heh, if you make the problem simpler, then solving it is possible. Seriously, while I do believe in the need for a coherent DNSKEY resource record set, there are some multi-signer proposals that do not. If the key set has to be coherent, then someone can guard against two keys being published with the same key tag. The recovery may not be easy as you'd have to determine what key needs to be kicked and who does it and where (physically in HSMs or process-wise). I have some doubt that key tag collisions can be entirely avoided. Even if you could - you still have the probablility that someone intentionally concocts a key tag collision. Not everyone plays by the rules, especially when they don't want to. So - to me - it keeps coming back to - a validator has to make reasonable choices when it comes to using time/space/cpu to evaluate an answer. No matter whether or not the protocol "bars" duplicate key tags and whether or not signers are instructed to avoid such duplication. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop