Re: [dnsext] Clarifying the mandatory algorithm rules

Alfred Hönes <ah@TR-Sys.de> Fri, 10 December 2010 18:52 UTC

Return-Path: <A.Hoenes@TR-Sys.de>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C5BA628C0FA for <dnsext@core3.amsl.com>; Fri, 10 Dec 2010 10:52:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.443
X-Spam-Level:
X-Spam-Status: No, score=-98.443 tagged_above=-999 required=5 tests=[AWL=0.306, BAYES_00=-2.599, CHARSET_FARAWAY_HEADER=3.2, HELO_EQ_DE=0.35, MIME_8BIT_HEADER=0.3, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4PiPCSU95JMp for <dnsext@core3.amsl.com>; Fri, 10 Dec 2010 10:52:01 -0800 (PST)
Received: from TR-Sys.de (gateway.tr-sys.de [213.178.172.147]) by core3.amsl.com (Postfix) with ESMTP id AF58828C0F8 for <dnsext@ietf.org>; Fri, 10 Dec 2010 10:52:00 -0800 (PST)
Received: from ZEUS.TR-Sys.de by w. with ESMTP ($Revision: 1.37.109.26 $/16.3.2) id AA084727189; Fri, 10 Dec 2010 19:53:09 +0100
Received: (from ah@localhost) by z.TR-Sys.de (8.9.3 (PHNE_25183)/8.7.3) id TAA21703; Fri, 10 Dec 2010 19:53:07 +0100 (MEZ)
From: Alfred Hönes <ah@TR-Sys.de>
Message-Id: <201012101853.TAA21703@TR-Sys.de>
To: ogud@ogud.com
Date: Fri, 10 Dec 2010 19:53:07 +0100
X-Mailer: ELM [$Revision: 1.17.214.3 $]
Mime-Version: 1.0
Content-Type: text/plain; charset="hp-roman8"
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Clarifying the mandatory algorithm rules
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Dec 2010 18:52:03 -0000

In his longer message of Fri, 10 Dec 2010 08:59:54 -0500,
Olafur Gudmundsson said:

> [...]  For what it is worth paranoid is what security people are
> more comfortable [...]

... where "paranoid" indicates "validate every signature path
you find and only accept the end signature if they all verify".


I still believe that's a wrong perception, wrt verification of
signatures.

In X.509 / PKIX, a single, fully verified certificate chain
(from a trust anchor to the certificate under consideration)
suffices, as I already have recalled twice in this debate.
So all major "customers" of those certificates, in particular
TLS, certificate-based IKE/IPsec, and CMS / S/MIME are based on
this paradigm.  Please refer to RFC 5280 for the details.

I see no reason why DNSSEC validating resolvers should behave
more "paranoid" than TLS, IKE, and CMS/SMIME implementations do.

In PKIX, any certificate can be revoked by listing it in a CRL,
which needs being looked up in cert path validation for each cert.
The equivalent revocation operation in DNSSEC is withdrawing the DS;
as long as the signer maintains the DS, it considers the signatures
produced by the respective algorithm/key pair as valid and sufficient,
and hence the algorithm as "safe enough for this zone".

Kind regards,
  Alfred.