[dns-operations] algorithm rollover strategies

Mark Andrews marka at isc.org
Wed Nov 27 22:38:18 UTC 2013


In message <20131127221711.9F444AE4AEB at rock.dv.isc.org>, Mark Andrews writes:
> 
> In message <20131127212453.GB5690 at x28.adm.denic.de>, Peter Koch writes:
> > On Wed, Nov 27, 2013 at 08:48:05AM -0500, Edward Lewis wrote:
> > 
> > > It should be:
> > > 
> > > There MUST be an RRSIG for each RRset using at least one DNSKEY of
> > > each algorithm in the zone apex DNSKEY RRset that is also in the DS RRset
> . 
> >  The apex DNSKEY RRset
> > > itself MUST be signed by each algorithm appearing in the DS RRset
> > > located at the delegating parent (if any).
> > 
> > I disagree.  If you go down that path, the signing should be independent
> > of data present elsewhere, i.e., the description should not depend on
> > a DS RRSet being present, absent, complete, or incomplete.
> > 
> > > The latter is what I thought had been written until I re-read the section
>  a
> >  few weeks ago.
> > > 
> > > It's too late to go back and change implementations that interpreted even
>  t
> > he
> > > as-is text incorrectly.  By "wrong" I mean interpretations of the rule th
> at
> >  were
> > > not in line with the apparently incompletely stated intent of the rule wr
> it
> > ers.
> > 
> > In all fairness, the issue escaped not only the writers but also everybody
> > who reviewed the document, including some of us here in this thread.
> > On the other hand, it has been argued that the "all algorithms" interpretat
> io
> > n
> > was indeed intended to mitigate downgrade attacks.
> > 
> > > In the rear view mirror I can see how a validator might take the above as
>  a
> > > requirement, but it means that they didn't notice that section 2 was "zon
> e 
> > signing"
> > > and 2.2 was in "including RRSIGs in a zone" and not in sections 4 or 5 (r
> es
> > olving and validating).
> > 
> > Well, while that makes sense in part, see above, if there's a MUST on the
> > side that describes the zone/response content, it is OK for the consuming e
> nt
> > ity
> > to verify that the MUST has been followed. The robustness principle explici
> tl
> > y
> > does not preclude this. ("Mum, the other boy has been hitting back first!")
>  
> Firstly there a plenty of cases when MUST on the sender side are
> not to be checked on the receive side in lots of protocols.  Asymetric
> behaviour is not uncommon.
> 
> Secondly it is MUST for a *instance* of the zone.  The validator
> is not, in general, in a position to determine if the response to
> the DNSKEY query comes from the same instance of the zone that the
> covering RRSIGs are from.
> 
> If it wasn't a MUST for a instance of a zone then we would have had
> words like.  You MUST publish signatures <amount of time> before you
> introduce a DNSKEY algorithm.
> 
> Unbound just got it WRONG and should issue a notice to upgrade all
> instances that contain this bug.
> 
> If we want to be able to protect from stripped signatures then the
> list of algorithms used to sign the zone needs to be in the RRSIG
> and be included in the data hash that is signed.  We know how to
> introduce this change in behaviour if we want to.  Something like
> 
>    If the algorithm is greater than x and not ... then the
>    list of dnssec algorithms used to sign the zone along with
>    a length octet is included at the start of the signature.
>    This list is included the hash that is signed.
> 
>    A validator MAY check a response to see if all the algoritms
>    listed in any RRSIG are includes in the response and MAY reject
>    the response if they are not found.

     If the response is to be cached for other validators then
     RRSIGs for all algorithms SHOULD be present as stripped RRSIG
     records represents a denial of service threat to the down
     stream validator.

> One can then decide if one wants to introduce alias for some of the
> existing algorithms or not.
> 
> Mark
> 
> > I would have thought that the previous instance(s) of this discussion had
> > been preserverd somewhere, but I could not find an erratum against 4035.
> > That's probably due to the fact that there was no consensus w.r.t. the Righ
> t 
> > Way.
> > 
> > > So - I wish we could measure the impact of what has been deployed.
> > 
> > -Peter
> > _______________________________________________
> > dns-operations mailing list
> > dns-operations at lists.dns-oarc.net
> > https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> > dns-jobs mailing list
> > https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742                 INTERNET: marka at isc.org
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-jobs mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka at isc.org



More information about the dns-operations mailing list