Re: [dnsext] Clarifying the mandatory algorithm rules

Matthijs Mekking <matthijs@NLnetLabs.nl> Wed, 30 March 2011 20:02 UTC

Return-Path: <matthijs@nlnetlabs.nl>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4953E28C0DE for <dnsext@core3.amsl.com>; Wed, 30 Mar 2011 13:02:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.6
X-Spam-Level:
X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DJgZ5J0J4YPu for <dnsext@core3.amsl.com>; Wed, 30 Mar 2011 13:02:43 -0700 (PDT)
Received: from open.nlnetlabs.nl (open.nlnetlabs.nl [IPv6:2001:7b8:206:1::1]) by core3.amsl.com (Postfix) with ESMTP id 223913A6BBE for <dnsext@ietf.org>; Wed, 30 Mar 2011 13:02:41 -0700 (PDT)
Received: from [IPv6:2001:df8:0:64:215:afff:fed2:e121] ([IPv6:2001:df8:0:64:215:afff:fed2:e121]) (authenticated bits=0) by open.nlnetlabs.nl (8.14.4/8.14.4) with ESMTP id p2UK4JRx088067; Wed, 30 Mar 2011 22:04:19 +0200 (CEST) (envelope-from matthijs@nlnetlabs.nl)
Message-ID: <4D938CC3.1020103@nlnetlabs.nl>
Date: Wed, 30 Mar 2011 22:04:19 +0200
From: Matthijs Mekking <matthijs@NLnetLabs.nl>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.14) Gecko/20110223 Thunderbird/3.1.8
MIME-Version: 1.0
To: Edward Lewis <Ed.Lewis@neustar.biz>
References: <alpine.BSF.2.00.1011180553250.83352@fledge.watson.org> <4CE51293.5040605@nlnetlabs.nl> <a06240801c9101620d463@192.168.128.163> <22284.1290447209@nsa.vix.com> <4CF4D54B.5000407@nlnetlabs.nl> <20110310223438.978E9C0E902@drugs.dv.isc.org> <4D79DDFA.3010006@nlnetlabs.nl> <alpine.BSF.2.00.1103140901170.99213@fledge.watson.org> <20110314213319.A2799C8CA0B@drugs.dv.isc.org> <alpine.BSF.2.00.1103141750530.74870@fledge.watson.org> <a06240800c9a50cf4632a@10.31.200.110> <AANLkTimUUa5zkr+hZH4jR-euENg_n=9EwtRVBN-cxr9_@mail.gmail.com> <a06240802c9a7b6cb4cc3@192.168.1.105> <AANLkTin+hMZ-27VjkQq7_44zNguMiefhxbgGD+-XZxPP@mail.gmail.com> <a06240802c9a7e0807069@10.31.200.117> <AANLkTi=4co5mS3RYhK1BvUMOm54wgNAMeKtk3_Zm0ff1@mail.gmail.com> <a06240802c9a93d762e13@[10.31.200.112]> <a06240803c9a9417e1fe8@[10.31.200.112]>
In-Reply-To: <a06240803c9a9417e1fe8@[10.31.200.112]>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.6 (open.nlnetlabs.nl [IPv6:2001:7b8:206:1::53]); Wed, 30 Mar 2011 22:04:20 +0200 (CEST)
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Clarifying the mandatory algorithm rules
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 20:02:44 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Ok, so let's try to come to a reasonable clarifying text:

- -------------------------------------------------------------------------
Section ?.? Clarifying the validators interpretation regarding multiple
algorithms.

RFC 4035, section 2.2 talks about Zone Signing. It mentions that

 "There MUST be an RRSIG for each RRset using at least one DNSKEY of
  each algorithm in the zone apex DNSKEY RRset".

This is a requirement at the server side, not the client side. In other
words, when a validating resolvers is in the process of validating a
RRset, it SHOULD NOT expect a RRSIG of each algorithm that is in the
zone apex DNSKEY RRset.
- -------------------------------------------------------------------------

This only fixes the misinterpretation on the expectation a validator may
have. It does not deal with algorithm downgrade protection at all (as
some may believe does not exist in DNSSEC). If there is need for
clarifying algorithm downgrade protection, or its non-existence, I
suggest something in the line of:

- -------------------------------------------------------------------------
Section ?.? Algorithm downgrade protection.

The validator could check that there are RRSIG records for each RRset
using at least one DNSKEY of each algorithm in the DS RRset, published
in the parent zone. This ***

*** Choice here
- - is however NOT RECOMMENDED. ['the one signature is enough approach']
- - is OPTIONAL. ['leave the choice to the implementation' approach]
- - is RECOMMENDED behavior. ['algorithm downgrade protection' apprpach]
- -------------------------------------------------------------------------

Best regards,

Matthijs



On 03/18/2011 06:07 PM, Edward Lewis wrote:
> I should add...just because "there's supposed to be X" doesn't mean X
> has to be there.  If I'm looking for X and it's not there, we have a
> failure.  If I'm not looking for X and it is not there, "no harm, no
> foul."  (The latter is the same as not needing X and it's there anyway.)
> 
> At 12:59 -0400 3/18/11, Edward Lewis wrote:
>> At 9:36 -0700 3/18/11, Casey Deccio wrote:
>>
>>
>>> Okay, so the signer sets the expectation of the validator using the
>>> algorithms in the DS RRset.  Now, does this expectation hold for
>>> simply authenticating the DNSKEY RRset or for all zone data?
>>
>> No, the specification sets expectations.  I don't mean to be a pain,
>> but the first words say this: "The reason for the specification is to
>> set the expectation."  I mean that in the strictest sense.  The
>> validator knows there's supposed to be X because the spec says so.
>>
>>> For example:
>>>
>>> - DS RRset has only algorithm 5
>>> - DNSKEY RRset signed by a DNSKEY matching the DS (alg 5)
>>> - DNSKEY RRset contains DNSKEYs with algs 5 and 3
>>> - DNSKEY with alg 3 signs A RRset.
>>>
>>> Is there a valid chain to the A RRset, or is it a protocol failure?
>>
>> Depends.  If the validator knows both 3 and 5, then it can build a
>> chain and it's cool.  If the validator only knows 5, then there's a
>> missing piece.  If the validator only knows 3, there's no chain to the
>> data.
>>
>> In summary:
>> Validator knows 3 & 5 - validates
>> Validator knows only 3 - data is accepted as not-signed.
>> Validator knows only 5 - service failure as *expected* signature is
>> not found*
>> Validator doesn't to 3 & 5 - accepted as not-signed
>> Validator doesn't do DNSSEC - accepted as not-signed
>>
>> *not found = not obtainable, can't get it, ...
>>
>>> Following the principle of "if one chain works, it succeeds", I would
>>> say
>>> that it is valid.  But it's unclear whether this is part of the
>>> expectation
>>> of the signer for the validator, and even the paragraph quoted above
>>> seems
>>> to declare it a protocol failure--although I well understand your
>>> position
>>> on principle.  Whether it is valid or not, I believe it should be
>>> worded explicitly to avoid ambiguity and accurately convey principle.
>>
>> It is always up to the validator to decide if it accepts the data.
>> Local policy and DNSSEC is about protecting the cache.  DNSSEC is NOT
>> designed to enforce proper operations, it is NOT to force the zone
>> admin into doing anything.  Remember, DNSSEC is optional to the
>> protocol, it's the validators that want to pull the data for protection.
>>
>> -- 
>> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
>>
>> Edward Lewis
>> NeuStar                    You can leave a voice message at
>> +1-571-434-5468
>>
>> Me to infant son: "Waah! Waah! Is that all you can say?  Waah?"
>> Son: "Waah!"
>> _______________________________________________
>> dnsext mailing list
>> dnsext@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsext
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJNk4zDAAoJEA8yVCPsQCW502MH/0unZXAo8KqLpwDrXbBBaGps
5rm7eA6rgipU1y99QOMZOggzu5XsI3VVZq8LiTIzKgBB69iufN392v/4afWiEgcW
LGdETtYwQmaif+Rj7+3UhjbSFJj7h2yPUlDvFoT66YOr7HaV+Ow9niYSnTbxmZgV
L/AWNjdpMsfmFoxk9OfJZlYnfgPA2gK4UyUG5YduwybeW1REcqyoQ3V73HnkhZod
SZ5QDHp/mRj4JjlACwSPSg5cQO1hURfp4r43oad0mO2Y1p2cjknp/cF9kcgI2VQu
bBSQ+0oEz55N/8yqzKznfY9tsUWwfsnBmjkMyA8mKD9BuzstScCvXs71K1Dz3SM=
=vrOn
-----END PGP SIGNATURE-----