> The ANRW talk "Protocol Fixes for KeyTrap Vulnerabilities this
> afternoon by Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael
> Waidner is proposing that there is a type roll for DS and DNSKEY.
> I dont think this is needed.  The only change actually need is to
> add a new requirement that says that new DNSKEY algorithms MUST
> have DNSKEY RRsets that do not have colliding key tags.  Validators
> can then depend on this behaviour with new key DNSKEY algorithms.
> The only question is do we add aliases for the existing key types.

I can see 3 problems with this approach:
1) we are only safe when the last algorithm that allows colliding keys
   has been deprecated. That may be many decades from now. We are nowhere
   near deprecating algorithms that use SHA-1.
2) Some operators expressed concerns about prohibiting colliding keys,
   especially in multi-signer setups. Delaying the deprecation of current
   algorithms.
3) My own analysis shows that for reasonable zones there is no need to
   tolerate more than 1 signature verification failure per RRset. So
   the gains are no all that high.

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to