Re: [dnsext] Clarifying the mandatory algorithm rules

Mark Andrews <marka@isc.org> Sun, 21 November 2010 22:31 UTC

Return-Path: <marka@isc.org>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 276263A6AB6 for <dnsext@core3.amsl.com>; Sun, 21 Nov 2010 14:31:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.766
X-Spam-Level:
X-Spam-Status: No, score=-1.766 tagged_above=-999 required=5 tests=[AWL=0.833, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k-iLchbTArB6 for <dnsext@core3.amsl.com>; Sun, 21 Nov 2010 14:31:13 -0800 (PST)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by core3.amsl.com (Postfix) with ESMTP id AC2423A6AB7 for <dnsext@ietf.org>; Sun, 21 Nov 2010 14:31:12 -0800 (PST)
Received: from farside.isc.org (farside.isc.org [IPv6:2001:4f8:3:bb::5]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "farside.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id B8625C941E for <dnsext@ietf.org>; Sun, 21 Nov 2010 22:31:56 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (drugs.dv.isc.org [IPv6:2001:470:1f00:820:ea06:88ff:fef3:4f9c]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by farside.isc.org (Postfix) with ESMTP id 3C703E6030; Sun, 21 Nov 2010 22:31:56 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id 955AE6FFA3B; Mon, 22 Nov 2010 09:31:52 +1100 (EST)
To: Jelte Jansen <jelte@isc.org>
From: Mark Andrews <marka@isc.org>
References: <alpine.BSF.2.00.1011180553250.83352@fledge.watson.org> <4CE53927.9090203@isc.org> <4CE58E90.6030607@nic.cz> <AANLkTin2H7UkP7FVfz3GN74CKtqn2OKo7MmcKMGOkvNY@mail.gmail.com> <4CE59B3D.5020109@nic.cz> <20101119004134.993F26EB749@drugs.dv.isc.org><AANLkTi=Hp6s4xwLQGyWv3BNtvUf5-SDtgUzHbNKtfCV1@mail.gmail.com> <20101119060416.024456F87CD@drugs.dv.isc.org> <4CE629F1.2090907@isc.org> <20101119131627.E8B616F8F8B@drugs.dv.isc.org> <4CE8F5DC.80406@isc.org>
In-reply-to: Your message of "Sun, 21 Nov 2010 11:35:08 BST." <4CE8F5DC.80406@isc.org>
Date: Mon, 22 Nov 2010 09:31:52 +1100
Message-Id: <20101121223152.955AE6FFA3B@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Clarifying the mandatory algorithm rules
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Nov 2010 22:31:14 -0000

In message <4CE8F5DC.80406@isc.org>, Jelte Jansen writes:
> On 11/19/2010 02:16 PM, Mark Andrews wrote:
> >>> If a algorithm is insecure then you should remove it from the list
> >>> of acceptable algorithms in you validator.  That way you get insecure
> >>> not trusted out of the validator.
> >>
> >> If you do that, and the zone(s) do 'normal' pre-publish rollover from
> >> that broken algorithm to a not-yet-broken one, you'd get bogus, not
> >> insecure, during the roll
> >>
> > 
> > No you don't.  Once a algorithm is marked as invalid the validator
> > behaves exactly as if the validator doesn't know about the algorithm.
> > 
> > During the pre-publish period there isn't a trust path into the zone with
> > a supported algorithm.
> >  
> 
> no, but during the DS switch there would be, same problem, just a different
> level.
> 
> If it is the DS set that specifies which algorithms are used, you either have
> to have both algorithms in that set at one point, or have the zone fully
> signed with both algorithms. But if you have both DS's in there, and the
> zone itself signed with only one, it'll be bogus for validators that only
> support the other algorithm.

To roll from one algorithm to another you need to add the new
DNSKEY(s) and sign.  Wait max zone ttl (for all the RRSIGs with
only one set of signatures to clear caches).  Change DS set to
remove the old algorthm and add the new algorith.  Wait DNSKEY TTL
(so there is now no longer a secure path to the zone in any cache).
Removed old algorithm DNSKEY(s) and any signatures made with them.

This is the fastest way to roll from one algorithm to another without
going insecure at somepoint for some validators that support both
algorithms.

You can shorten it (by removing the old DS earlier) but there will
be a time when the zone is insecure for validators that support
both algorithms.

However while this is all happening the validator can be configured
to ignore the old algorithm.  The zone goes immediately to insecure as
far as that validator is concerned on the presumption that insecure is
better than a false secure.

> But I now notice that the current draft for 4641bis says not to do pre-publis
> h
> rollover when switching algorithms, only double signature, so that's ok :)
> 
> The part about adding signatures first could probably be removed if 4035 is
> clarified (changed, depending on one's POV ;) ) that it is the DS set and not
> the DNSKEY set that one should check for algorithm support.
> 
> Jelte
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
> 
> iEYEARECAAYFAkzo9dwACgkQ4nZCKsdOncUYfACgokIBu/FP7JTJr1CiPbzHYpvF
> N8MAnihCFpMwL73cWY+/VFl6E+SdqnoI
> =QPR7
> -----END PGP SIGNATURE-----
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org