Ok, Stephen, John and myself have talked this over a bit now and this is how we 
feel about the issue of standby keys and whether to keep them or not.

Johan

1. DNSSEC key management is a history of manual failure about to be replaced by 
software success.

Some of us have played with DNSSEC for a Long Time(tm). We've been jumping 
through hoops, run ugly scripts and in general dealt with an amount of 
operational complexity that is simply not suited for any reasonable amount of 
manual operations. All the while we've been chanting the mantra "there will be 
software in the future that deals with this". 

Given that history we're really concerned when we see statements like 

        "Our idea: The support of standby keys in OpenDNSSEC can be deprecated, 
because it
         can be handled outside the system."

because to us, that sounds very much like going back to square one. I.e. if 
there is a use for standby keys, then we'd very much prefer to have opendnssec 
deal with that, rather than opt out for simplicity just to push the problem 
elsewhere.

2. Is there a use for standby keys?

Yes, there is. Being able to plan for trouble and be prepared to roll keys 
"immediately" has a use. As far as I can tell that is mostly agreed upon. 
However, at present, it appears that there is less than good understanding of 
how this actually works. Both Jakob and Rickard have explained to me that users 
seem to believe that just "adding a standby key" more or less by magic makes 
the zone more secure, which is of course not true. So, clearly, there exists 
what we'd refer to as a pedagogical issue with standby keys and we do 
understand that the people working with opendnssec may feel that not to be 
their primary focus. On the other hand, we argue that there are *many* 
pedagogical issues with DNSSEC and the need for lots of work in that area, 
which is quite separate from the need for software development. However, if the 
software doesn't even support something, then any form of educational effort 
will be completely wasted and pointless.

3. Doesn't the standby key typically get compromised at the same time as the 
other keys in the HSM?

No, not necessarily. That is a question both of the design of the actual HSM 
and the policy of whether to use a single HSM or several separate HSMs, both of 
which are choices that should not be made by opendnssec, but by the users of 
opendnssec.

4. Wouldn't removal of support for standby keys lead significant simplification 
of the code?

Personally, I really don't know, because I have not worked on the opendnssec 
code. But we are convinced that when talking about the complexity of the code 
to support standby keys very little is about standby keys as such and almost 
all the complexity regards support for multiple HSMs, some of which may be 
offline while still containing keys. We believe that opendnssec will have to 
support offline key storage regardless of the standby keys issue (just think 
"smartcards") and hence we do not believe that in the long run there will be a 
significant simplification gained from removing support for standby keys.

Given support for keys stored in offline HSMs, supporting standby keys becomes 
if not trivial at least not a daunting task.

I'll post part #2 in a minute, which contains some thoughts on how to support 
standby keys in opendnssec  assuming that HSMs containing keys may be offline.

Regards,

Johan

_______________________________________________
Opendnssec-user mailing list
[email protected]
https://lists.opendnssec.org/mailman/listinfo/opendnssec-user

Reply via email to