I'm concerned about this.  Concretely, this seems like it would raise a
major barrier to rolling out new algorithms.  For example, any zone that
offers ECDSA and RSA signatures would be insecure for any RSA-only
resolvers.  It's hard to see how new algorithms could be adopted at scale
if this rule were in place.

On Sun, Mar 20, 2022 at 4:42 PM libor.peltan <libor.peltan=
40nic...@dmarc.ietf.org> wrote:

> Hi Ulrich, dnsop,
> thank you for your effort in improving DNS.
>
> This is a follow-up to your proposal on easing the requirements by
> RFC4035, which say, in short, that if there's a DS of an algorithm,
> there must be a complete DNSKEY set of that algorithm, and if there is a
> DNSKEY of an algorithm, the whole zone must be signed by RRSIGs of that
> algorithm.
>
> The counter-proposal is to only require at least one valid
> DS-DNSKEY-RRSIG path to sign each RR in the zone. I understand how this
> would enable multi-signer setups with the signers supporting different
> algorithms, which in turn is beneficial to enable smooth transitions
> between such signers.
>
> Let's suppose we go this way. How do we specify the validator behaviour
> when there are algorithm A and B DNSKEYs, just algorithm B RRSIGs, and
> the validator only understands algorithm A, but not B? I guess BOGUS
> will be no longer proper here, we would probably stick at INSECURE. Am I
> correct?
>
> Now a different scenario. There are algorithm A and B DNSKEYs, the whole
> zone is also signed by both alg A and B RRSIGs, and the validator only
> understands alg A. Some man-in-the-middle attacker intercepts the
> answers by fiddling with the records, while removing algorithm A RRSIGs
> from the packets. The validator ends up with INSECURE and lets the
> attacker poison some cache...
>
> With current DNSSEC requirements, it is enough for security if there is
> any intersection between the algorithms which the zone is signed by, and
> the algorithms supported by the validator, respectively. With your
> proposal, it would be required that the validator supports all the
> algorithms, which the zone is signed by.
>
> I agree that in case the zone is signed by just one algorithm
> (occasionally being rolled-over to just one different one), these
> conditions are equivalent. Fortunately, it did not happen yet (or I'm
> not aware of), that the existence of different validators with distinct
> sets of supported algorithms forced signers to permanently sign zones
> with two algorithms in parallel. The question is, if it remains so for
> the future. I can't imagine what would happen in case of a "post-quantum
> apocalypse", maybe it wouldn't be a problem, but it might.
>
> It would also cause the paradox and indeed creepy security quirk, that
> if you sign your zone with one more algorithm, which is
> cryptographically strong but poorly adopted (perhaps experimental), it
> will result in _less_ security. Hardly anyone does this, but if they do,
> they will be surprised, I think.
>
> Just to be clear, I don't want to fight against your ideas. I'm just
> pointing at possible problems that could emerge.
>
> Thanks,
> Libor
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to