OK, thanks for the explanation.  That helps me understand the scenario where 
this would be needed, but it seems like simpler solutions are possible.  For 
example, the resolver could be configured to restrict the use of PRIVATEDNS 
keys to specific subtrees where their usage is known.

This draft effectively turns PRIVATEDNS into a general-purpose extension point 
for _public_ DNSSEC algorithms.  These algorithms could be used interoperably 
in public, so they would be quite different from normal Private Use range 
values in an IANA registry.  That's an interesting idea, but it seems like a 
significant revolution in DNSSEC algorithm registration without an obvious 
motivation.

--Ben
________________________________
From: Mark Andrews <ma...@isc.org>
Sent: Tuesday, July 23, 2024 12:28 PM
To: Ben Schwartz <bem...@meta.com>
Cc: dnsop <dnsop@ietf.org>
Subject: Re: [DNSOP] Fwd: New Version Notification for 
draft-andrews-private-ds-digest-types-00.txt

At the moment you can only have one private algorithm per key type world wide. 
This is all to do with how you prove a zone is to be treated as insecure. If 
example. com is using private. example. com and example. net is using private. 
example. net

At the moment you can only have one private algorithm per key type world wide.

This is all to do with how you prove a zone is to be treated as insecure.   If 
example.com is using private.example.com and example.net is using 
private.example.net how done  validator that knows about private.example.com 
prove that example.net response are to be treated as insecure when there is a 
DS with PRIVATEDNS returned?
--
Mark Andrews

On 23 Jul 2024, at 07:46, Ben Schwartz <bem...@meta.com> wrote:


Two questions I didn't see addressed:

Why would a zone need to be signed with multiple private algorithms?

Why isn't it sufficient to treat all private algorithms as a single algorithm 
for DS purposes, and distinguish by the Key Tag and/or trial hashing?

--Ben Schwartz
________________________________
From: Mark Andrews <ma...@isc.org>
Sent: Monday, July 22, 2024 1:08 PM
To: dnsop <dnsop@ietf.org>
Subject: [DNSOP] Fwd: New Version Notification for 
draft-andrews-private-ds-digest-types-00.txt

This addresses a gap in the DNSSEC specification. DS records need to identify 
specific DNSSEC algorithms rather than a set of DNSSEC algorithms. Begin 
forwarded message: From: internet-drafts@ ietf. org Subject: New Version 
Notification for draft-andrews-private-ds-digest-types-00. txt
This addresses a gap in the DNSSEC specification.  DS records need to identify 
specific DNSSEC algorithms rather than a set of DNSSEC algorithms.

Begin forwarded message:

From: internet-dra...@ietf.org
Subject: New Version Notification for 
draft-andrews-private-ds-digest-types-00.txt
Date: 22 July 2024 at 10:05:24 GMT-7
To: "M. Andrews" <ma...@isc.org>, "Mark Andrews" <ma...@isc.org>

A new version of Internet-Draft draft-andrews-private-ds-digest-types-00.txt
has been successfully submitted by Mark Andrews and posted to the
IETF repository.

Name:     draft-andrews-private-ds-digest-types
Revision: 00
Title:    Private DS Digest Types
Date:     2024-07-22
Group:    Individual Submission
Pages:    5
URL:      
https://www.ietf.org/archive/id/draft-andrews-private-ds-digest-types-00.txt<https://urldefense.com/v3/__https://www.ietf.org/archive/id/draft-andrews-private-ds-digest-types-00.txt__;!!Bt8RZUm9aw!8QIT18AIL9ewonmo3nayaXnt_PX8h4hi70SPJjNzLRWNe6kEEmiVeLvmEm6RBqxGA5SwNi0$>
Status:   
https://datatracker.ietf.org/doc/draft-andrews-private-ds-digest-types/<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-andrews-private-ds-digest-types/__;!!Bt8RZUm9aw!8QIT18AIL9ewonmo3nayaXnt_PX8h4hi70SPJjNzLRWNe6kEEmiVeLvmEm6RBqxG78jzG2E$>
HTMLized: 
https://datatracker.ietf.org/doc/html/draft-andrews-private-ds-digest-types<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-andrews-private-ds-digest-types__;!!Bt8RZUm9aw!8QIT18AIL9ewonmo3nayaXnt_PX8h4hi70SPJjNzLRWNe6kEEmiVeLvmEm6RBqxGSCgFVBk$>


Abstract:

  When DS records where defined the ability to fully identify the
  DNSSEC algorithms using PRIVATEDNS and PRIVATEOID was overlooked.

  This documents specifies 2 DS Algorithm Types which allow the DNSSEC
  algorithm sub type to be encoded in the DS record.



The IETF Secretariat



--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to