[dns-operations] [Ext] Re: Checking for signatures of a certain DNSKEY within a zone

Edward Lewis edward.lewis at icann.org
Wed Jul 14 13:59:22 UTC 2021


On 7/6/21, 12:15 PM, "dns-operations on behalf of Tony Finch" <dns-operations-bounces at dns-oarc.net on behalf of dot at dotat.at> wrote:

>    If it is one of your zones then your key management software should ensure
>    that all the key IDs are different, i.e. if there is an ID collision when
>    generating a key, throw it away and regenerate it. This is important for
>    verification performance (and, I would guess, less risk of encountering
>    bugs).

FWIW, I've seen one (emphasize just one) example of concurrent, active, colliding key tags among the TLDs over the past 10 years.  When it happened, it seemed to persist for a month, with the operator rolling one of the keys.  This happened in 2018, I didn't notice it until last month while trolling through historical data, so I bet there was never any interruption.

The protocol ought not be fooled by it, but you can never tell about the quality of a validator.  I.e., such code may not realize that asking for a key tag out of a DNSKEY set might need to be a list and not a single value.

This started out as a convention, key generation tools would not produce a key that key-tag-collided, but as with any other tool or environment, it might occur.

Where I ran across the issue is in some analytical code I'm working on, a collision might foul up other monitoring and visualization code, but it should not be operationally impacting.





More information about the dns-operations mailing list