On Jul 25, 2024, at 17:34, Shumon Huque <shu...@gmail.com> wrote:
> 
> Folks,
> 
> For discussion ...
> 
> Mark Andrews, Elias Heftrig, and I have a new draft on collision free key 
> tags in DNSSEC. This topic has been in the air since the Keytrap 
> vulnerability disclosure -- and IETF120 hallway track conversations this week 
> prompted us to write up a rough initial proposal for this. Will need much 
> more fleshing out of details etc, but we hope this can serve as a starting 
> point ...
> 
>     https://datatracker.ietf.org/doc/html/draft-huque-dnsop-keytags-00 
> [datatracker.ietf.org]

The problems are listed as:

Colliding key tags impose additional work on a validating resolver, which then 
has to check signatures for each of the candidate set of keys identified by the 
Key Tag. Furthermore, they open up resolvers to computational denial of service 
attacks by adversaries deploying specially crafted zones with many 
intentionally colliding key tags [KEYTRAP].

The main part of the proposed solution is listed as:

DNSKEY algorithms MUST have DNSKEY RRsets that do not have colliding key tags

There is a mismatch here. If the worry is an attacker creating colliding key 
tags to cause more work, that attacker is simply going to ignore the MUST 
requirement.

--Paul Hoffman

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to