Re: [dnsext] Clarifying the mandatory algorithm rules

Jelte Jansen <jelte@isc.org> Mon, 22 November 2010 09:32 UTC

Return-Path: <jelte@isc.org>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 758173A6889 for <dnsext@core3.amsl.com>; Mon, 22 Nov 2010 01:32:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.288
X-Spam-Level:
X-Spam-Status: No, score=-102.288 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HOST_MISMATCH_NET=0.311, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CjkqMm+SB3kX for <dnsext@core3.amsl.com>; Mon, 22 Nov 2010 01:31:59 -0800 (PST)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by core3.amsl.com (Postfix) with ESMTP id E79033A6A7A for <dnsext@ietf.org>; Mon, 22 Nov 2010 01:31:58 -0800 (PST)
Received: from farside.isc.org (farside.isc.org [IPv6:2001:4f8:3:bb::5]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "farside.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id D0EF05F984C; Mon, 22 Nov 2010 09:32:38 +0000 (UTC) (envelope-from jelte@isc.org)
Received: from [192.168.8.11] (vhe-520087.sshn.net [195.169.221.157]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by farside.isc.org (Postfix) with ESMTP id 54BB7E6030; Mon, 22 Nov 2010 09:32:36 +0000 (UTC) (envelope-from jelte@isc.org)
Message-ID: <4CEA38B3.3050406@isc.org>
Date: Mon, 22 Nov 2010 10:32:35 +0100
From: Jelte Jansen <jelte@isc.org>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.12) Gecko/20101027 Lightning/1.0b2 Thunderbird/3.1.6
MIME-Version: 1.0
To: Matthijs Mekking <matthijs@NLnetLabs.nl>
References: <alpine.BSF.2.00.1011180553250.83352@fledge.watson.org> <4CE53927.9090203@isc.org> <4CE58E90.6030607@nic.cz> <AANLkTin2H7UkP7FVfz3GN74CKtqn2OKo7MmcKMGOkvNY@mail.gmail.com> <4CE59B3D.5020109@nic.cz> <20101119004134.993F26EB749@drugs.dv.isc.org><AANLkTi=Hp6s4xwLQGyWv3BNtvUf5-SDtgUzHbNKtfCV1@mail.gmail.com> <20101119060416.024456F87CD@drugs.dv.isc.org> <4CE629F1.2090907@isc.org> <20101119131627.E8B616F8F8B@drugs.dv.isc.org> <4CE8F5DC.80406@isc.org> <4CEA2F8E.7060104@nlnetlabs.nl>
In-Reply-To: <4CEA2F8E.7060104@nlnetlabs.nl>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Clarifying the mandatory algorithm rules
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Nov 2010 09:32:01 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/22/2010 09:53 AM, Matthijs Mekking wrote:
> 
>> If it is the DS set that specifies which algorithms are used, you either have to
>> have both algorithms in that set at one point, or have the zone fully signed
>> with both algorithms. But if you have both DS's in there, and the zone itself
>> signed with only one, it'll be bogus for validators that only support the other
>> algorithm.
> 
>> But I now notice that the current draft for 4641bis says not to do pre-publish
>> rollover when switching algorithms, only double signature, so that's ok :)
> 
> Actually, you cannot even do pre-publish algorithm rollover. In order to
> introduce the new algorithm at the parent, you need to fully sign your
> zone with that algorithm. Effectively, it becomes a double-signature
> rollover.
> 

That's what I was saying; for algorithm rolls: pre-publish bad, double sig good.


>> The part about adding signatures first could probably be removed if 4035 is
>> clarified (changed, depending on one's POV ;) ) that it is the DS set and not
>> the DNSKEY set that one should check for algorithm support.
> 
> You would still need to pre-publish signatures if you want to support
> RFC 5011 (because you have no method to delay adding this trust anchor
> until the zone is fully signed with the new algorithm).
> 

I was trying to carefully tread around the trust-anchor thing until the point
above was cleared out :) But I'm not sure at all why this is (or should be)
different (except that it could take longer)

Jelte
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkzqOLIACgkQ4nZCKsdOncXCjACgxq14jNd90u1BfwGXdRZefxiJ
35gAnA3XZHAVFDKriFQWXDwqrQ/f+UIP
=dHsn
-----END PGP SIGNATURE-----