Re: [dnsext] DS digest downgrade

Mark Andrews <marka@isc.org> Thu, 24 March 2011 06:33 UTC

Return-Path: <marka@isc.org>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CA54C3A6808 for <dnsext@core3.amsl.com>; Wed, 23 Mar 2011 23:33:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SjYsKaY6L0-q for <dnsext@core3.amsl.com>; Wed, 23 Mar 2011 23:33:45 -0700 (PDT)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by core3.amsl.com (Postfix) with ESMTP id CF2573A67EE for <dnsext@ietf.org>; Wed, 23 Mar 2011 23:33:44 -0700 (PDT)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "bikeshed.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id BDE7B5F985D; Thu, 24 Mar 2011 06:35:03 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (drugs.dv.isc.org [IPv6:2001:470:1f00:820:ea06:88ff:fef3:4f9c]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by bikeshed.isc.org (Postfix) with ESMTPSA id 592B2216C22; Thu, 24 Mar 2011 06:35:01 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 8DC31D342F5; Thu, 24 Mar 2011 17:34:57 +1100 (EST)
To: Matt McCutchen <matt@mattmccutchen.net>
From: Mark Andrews <marka@isc.org>
References: <1300934885.2117.219.camel@localhost> <20110324035128.50B9AD2F6ED@drugs.dv.isc.org><1300940324.2117.247.camel@localhost>
In-reply-to: Your message of "Thu, 24 Mar 2011 00:18:44 EDT." <1300940324.2117.247.camel@localhost>
Date: Thu, 24 Mar 2011 17:34:57 +1100
Message-Id: <20110324063457.8DC31D342F5@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] DS digest downgrade
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 06:33:45 -0000

In message <1300940324.2117.247.camel@localhost>, Matt McCutchen writes:
> On Thu, 2011-03-24 at 14:51 +1100, Mark Andrews wrote:
> > The time you get a failure is if there are differing DS algorithm
> > sets for the same DNSKEY algorithm and you are pre-publishing DS
> > and the pre-published DS has a SHA256 DS when the current DS for
> > that algorithm doesn't have a SHA256 DS but has a SHA1 DS.  This
> > will leave you with a SHA256 DS pointing to a non-existing DNSKEY.
> > 
> > If one is not pre-publishing DS records I don't see a failure case.
> 
> Right.  Since an entire set of DNSKEYs is published, there are more
> chances for things to work correctly, compared to DANE where the TLS
> server presents just one of the designated certificates.
> 
> > Treating the zone as insecure is not a failure.
> 
> I disagree.  People are beginning to use DNSSEC to store opt-in
> indications for application-level security mechanisms associated with
> DNS names, such that treating the zone as insecure and allowing the
> indication to be removed would be a security failure.  You might think
> this is a bad idea, but the benefits of these mechanisms are compelling
> and I think it would make more sense to beef up DNSSEC to support them
> than to set up a parallel system.
> 
> What case are you thinking of in which the zone would show up as
> insecure?

Alg A has SHA1,  ALG B has SHA1 + SHA256.  Once you filter the SHA1
DS out you are left with just ALG B.

> -- 
> Matt
> 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org