> And how is this different to migrating to IDKEY?  The validator
> would need to support DS + IDDS + DNSKEY + IDKEY for a significant
> period.  One can turn off support for algorithms without the new
> semantics.  As for *SHA-1 many validators already treat those
> algorithms as unsupported.

I'm not here to defend IDKEY. As far as I know that is not even a draft.
What I'm saying is that we should avoid creating additional DNS protocol
code points to deal with collisions.

> > 2) Some operators expressed concerns about prohibiting colliding keys,
> >   especially in multi-signer setups. Delaying the deprecation of current
> >   algorithms.
> 
> There are several easy ways to address this.  IDKEY would require
> this to be addressed.  Nothing different here.

Again I'm not defending IDKEY. Avoiding collisions was discussed earlier
this year. As far as I remember there was no consensus among the
signing community to have hard requirements against collisions.

I don't know if anything has changed in the mean time. But that seems a
good place to start.

> > 3) My own analysis shows that for reasonable zones there is no need to
> >   tolerate more than 1 signature verification failure per RRset. So
> >   the gains are no all that high.
> 
> One failure is one too many.  IDKEY and this are about removing
> the need to have to process duplicate key ids when validating.
> 
> We have done stuff like this before with the introduction of NSEC3.
> It is achievable.

NSEC3 was actually desired by people with secure zones. I don't see any
desire in that community to avoid collisions.

And the gains are just not there.

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to