Hi,

since draft-fregly-dnsop-slh-dsa-mtl-dnssec-02 and 
draft-harvey-cfrg-mtl-mode-03 have
been published now, I would like to discuss something I noticed when this was 
first brought
to my attention during IETF in Prague.

The Section 6.2 says:

> As described in 9.2 of [I-D.harvey-cfrg-mtl-mode], when a verifier receives a 
> condensed signature,
> the verifier determines whether any of the MTLs it has previously verified 
> includes a rung that is
> compatible with the authentication path in the condensed signature. If not, 
> then the verifier requests
> a new signed ladder. 
[...]
> Accordingly, a resolver SHOULD first query a name server without the 
> mtl-mode-full option, and then,
> if needed, re-issue the query with the mtl-mode-full option. Since responses 
> to queries with
> the mtl-mode-full option are expected to be large, it is RECOMMENDED that 
> queries with
> the mtl-mode-full option be issued over transports (e.g., TCP, TLS, QUIC) 
> that support large
> responses without truncation and/or fragmentation.

I have pointed out that a malicious zone operator can return a different run 
effectively making the resolver
request a new signed ladder every time. This effectively removes any benefit 
that the resolvers gain from
using the MTL mode.

Again, if I am understanding the protocol correctly, it should be even possible 
to pre-generate the different
answers and just mess with the resolver by invalidating the previously received 
response by using low TTL
numbers and providing different answers every time.

Please correct me if I am wrong.

Cheers,
Ondrej
--
Ondřej Surý (He/Him)
ond...@isc.org

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to