Shumon,

On 1/21/20 4:05 PM, Shumon Huque wrote:
> Hi Matthijs,
> 
> Sorry, I did miss your original note on this point. Now that I've seen
> it, I'm copying back dnsop@ietf.org <mailto:dnsop@ietf.org> to see if
> there are other comments on your proposal.
> 
> When the Algorithm Considerations section was originally written, I
> intentionally did not prohibit the use of multiple algorithms across
> providers (even though we recommended against it) for a very
> pragmatic reason: I was actually working with 2 DNS providers that
> supported disjoint algorithms (one RSASHA256 and the other ECDSAP256),
> and was seriously contemplating deploying such a multi-signer
> configuration in production. It would be a bit strange to deploy a
> configuration on the one hand, and at the same time write a document
> that explicitly forbid that configuration.
> 
> You mention that authoritative servers cannot simply ignore the rule
> that they must sign all RRsets in the zone with every algorithm in the
> DNSKEY RRset. However, in practice it is clearly being ignored. Neither
> .SE or .BR double signed their zone data during their algorithm
> rollovers and there are other cases.

If so, then technically they were not conform the RFC, but but I am not
sure how they executed the algorithm rollover precisely. Particularly,
were there ever two DS records in the root zone with different
algorithms for these zones?

>From what I could find, both rollovers did actually sign with double
algorithms though:

See https://static.ptbl.co/static/attachments/179548/1529933472.pdf:

    Aug 20 .br Algorithm Rollover Begin (all times UTC)at 06:00 Zones
    double signed with old and new algorithm

And on this blog
https://www.sidnlabs.nl/en/news-and-blogs/keep-m-rolling-monitoring-ses-dnssec-algorithm-rollover
it looks like .SE was following the RFC 6781 approach.

Please correct me if I am reading this wrong.


> As it turns out, the provider that only supported RSASHA256 exited the
> managed DNS provider business, and the only vendors we are working with
> currently all support our preferred algorithm (ECDSAP256) in common.
> Hence, I am now open to updating the document to prohibit it. But will
> such text cause aggravation for other potential deployers that may run
> into a similar situation with other providers, and do we care?
> 
> This also begs the question: should we (in another document) update RFC
> 4035, Section 2 (last paragraph) to relax or eliminate the rule, if in
> fact it is being ignored?
> 
> Frankly, I've always been a bit perplexed by this text, since it has no
> accompanying rationale. The only compelling rationale I see is downgrade
> protection - to detect that someone hasn't stripped away the signatures
> of a stronger algorithm and forced a validator to authenticate only the
> weaker signatures. But that implies that validators have a documented
> procedure to rank algorithms, which I haven't yet seen. Is a 3072-bit
> RSASHA256 key stronger or weaker than an ECDSAP256SHA256 key for
> example, or Ed25519 vs ECDSAP256SHA256?

Yes, this is exactly the rationale, and it is a valid one. And this is
how unbound works, see
https://nlnetlabs.nl/documentation/unbound/info-algo/ for more information.

Best regards,

Matthijs



> Shumon.
> 
> On Tue, Jan 21, 2020 at 3:59 AM Matthijs Mekking <matth...@pletterpet.nl
> <mailto:matth...@pletterpet.nl>> wrote:
> 
>     Hi Shumon,
> 
>     On 1/20/20 9:21 PM, Shumon Huque wrote:
>     >     4: The document uses one inceanse of RFC2119 language
>     (RECOMMENDED) -
>     >     please either drop this, or add the 2119 / 8174 boilerplate.
>     >
>     >
>     > Ok, I'm inclined to lowercase it, since we don't use 2119/8174
>     keywords
>     > anywhere else in this document.
> 
>     Did you see my mail related to this? If you are going with the lowercase
>     approach, please use the word "must" instead of "should".
> 
>     Best regards,
> 
>     Matthijs
> 
> 
>     -------- Forwarded Message --------
>     Subject: Re: [DNSOP] Working Group Last Call for
>     draft-ietf-dnsop-multi-provider-dnssec
>     Date: Mon, 13 Jan 2020 09:57:50 +0100
>     From: Matthijs Mekking <matth...@pletterpet.nl
>     <mailto:matth...@pletterpet.nl>>
>     To: dnsop@ietf.org <mailto:dnsop@ietf.org>
> 
>     Late to the party, I am sorry.
> 
>     I am positive about this document, and support publication. I do have
>     one comment on the document, requesting an update.
> 
>     In section 4 it is said it is RECOMMENDED that providers use a common
>     signing algorithm.  I think this is too weak and it must be a MUST.
> 
>     The reason given for RECOMMENDED is that the "liberal approach" works.
>     The liberal approach says that authoritative zones MUST sign RRsets with
>     every algorithm in the DNSKEY RRset, but validating resolvers don't have
>     to enforce this requirement. However, that does not mean the
>     authoritative server can simply ignore this rule.
> 
>     Also, if two different providers are using different algorithms, that
>     means two DS records with different algorithms are distributed to the
>     parent. And now the algorithm is signaled in the parent and a validator
>     may execute the multiple algorithms protection check, expecting both
>     chain of trusts to work.
> 
>     In other words, please adapt section 4 to be more strict when it comes
>     to multiple algorithms. If you agree, I am happy to provide the
>     suggested text.
> 
>     Again my apologies for bringing this up so late.
> 
>     Best regards,
> 
>     Matthijs
> 
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
> 

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to