Re: [dnsext] Clarifying the mandatory algorithm rules

Mark Andrews <marka@isc.org> Mon, 22 November 2010 10:32 UTC

Return-Path: <marka@isc.org>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EEB763A6923 for <dnsext@core3.amsl.com>; Mon, 22 Nov 2010 02:32:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.265
X-Spam-Level: *
X-Spam-Status: No, score=1.265 tagged_above=-999 required=5 tests=[AWL=-1.288, BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, HELO_MISMATCH_ORG=0.611, HOST_EQ_AU=0.327, HOST_MISMATCH_AU=2.444, RCVD_IN_PBL=0.905, RDNS_DYNAMIC=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 296iJu6YOMLw for <dnsext@core3.amsl.com>; Mon, 22 Nov 2010 02:32:36 -0800 (PST)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) by core3.amsl.com (Postfix) with ESMTP id C189D3A6919 for <dnsext@ietf.org>; Mon, 22 Nov 2010 02:32:35 -0800 (PST)
Received: from farside.isc.org (farside.isc.org [IPv6:2001:4f8:3:bb::5]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "farside.isc.org", Issuer "ISC CA" (verified OK)) by mx.ams1.isc.org (Postfix) with ESMTPS id 8F7005F9863; Mon, 22 Nov 2010 10:33:15 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (c211-30-172-21.carlnfd1.nsw.optusnet.com.au [211.30.172.21]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by farside.isc.org (Postfix) with ESMTP id D387DE6030; Mon, 22 Nov 2010 10:33:12 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (Postfix) with ESMTP id F0921702A21; Mon, 22 Nov 2010 21:33:14 +1100 (EST)
To: Matthijs Mekking <matthijs@NLnetLabs.nl>
From: Mark Andrews <marka@isc.org>
References: <alpine.BSF.2.00.1011180553250.83352@fledge.watson.org> <4CE53927.9090203@isc.org> <4CE58E90.6030607@nic.cz> <AANLkTin2H7UkP7FVfz3GN74CKtqn2OKo7MmcKMGOkvNY@mail.gmail.com> <4CE59B3D.5020109@nic.cz> <20101119004134.993F26EB749@drugs.dv.isc.org><AANLkTi=Hp6s4xwLQGyWv3BNtvUf5-SDtgUzHbNKtfCV1@mail.gmail.com> <20101119060416.024456F87CD@drugs.dv.isc.org> <4CE629F1.2090907@isc.org> <20101119131627.E8B616F8F8B@drugs.dv.isc.org> <4CE8F5DC.80406@isc.org> <4CEA2F8E.7060104@nlnetlabs.nl>
In-reply-to: Your message of "Mon, 22 Nov 2010 09:53:34 BST." <4CEA2F8E.7060104@nlnetlabs.nl>
Date: Mon, 22 Nov 2010 21:33:14 +1100
Message-Id: <20101122103314.F0921702A21@drugs.dv.isc.org>
Cc: dnsext@ietf.org
Subject: Re: [dnsext] Clarifying the mandatory algorithm rules
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Nov 2010 10:32:37 -0000

In message <4CEA2F8E.7060104@nlnetlabs.nl>, Matthijs Mekking writes:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi,
> 
> On 11/21/2010 11:35 AM, Jelte Jansen wrote:
> > On 11/19/2010 02:16 PM, Mark Andrews wrote:
> >>>> If a algorithm is insecure then you should remove it from the list
> >>>> of acceptable algorithms in you validator.  That way you get insecure
> >>>> not trusted out of the validator.
> >>>>
> >>>
> >>> If you do that, and the zone(s) do 'normal' pre-publish rollover from
> >>> that broken algorithm to a not-yet-broken one, you'd get bogus, not
> >>> insecure, during the roll
> >>>
> > 
> >> No you don't.  Once a algorithm is marked as invalid the validator
> >> behaves exactly as if the validator doesn't know about the algorithm.
> > 
> >> During the pre-publish period there isn't a trust path into the zone with
> >> a supported algorithm.
> > 
> > 
> > no, but during the DS switch there would be, same problem, just a different
>  level.
> > 
> > If it is the DS set that specifies which algorithms are used, you either ha
> ve to
> > have both algorithms in that set at one point, or have the zone fully signe
> d
> > with both algorithms. But if you have both DS's in there, and the zone itse
> lf
> > signed with only one, it'll be bogus for validators that only support the o
> ther
> > algorithm.
> > 
> > But I now notice that the current draft for 4641bis says not to do pre-publ
> ish
> > rollover when switching algorithms, only double signature, so that's ok :)
> 
> Actually, you cannot even do pre-publish algorithm rollover. In order to
> introduce the new algorithm at the parent, you need to fully sign your
> zone with that algorithm. Effectively, it becomes a double-signature
> rollover.
> 
> > The part about adding signatures first could probably be removed if 4035 is
> > clarified (changed, depending on one's POV ;) ) that it is the DS set and n
> ot
> > the DNSKEY set that one should check for algorithm support.
> 
> You would still need to pre-publish signatures if you want to support
> RFC 5011 (because you have no method to delay adding this trust anchor
> until the zone is fully signed with the new algorithm).

Unless the max zone ttl is greater than the Add Hold-Down timer (min 30 days)
this is a non-issue.

Mark
 
> Matthijs
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
> 
> iQEcBAEBAgAGBQJM6i+NAAoJEA8yVCPsQCW5SnEH/j/gAYWS9xf2+zqgdXHMhTrx
> LHFYQR5HF9SLxmG2gd6HaZ9WpBPge7gTVcnUhP9A7/VLl0LjZdfC83/XFam/X1wZ
> twl4HU6wxwJoVp7xffJKGQkV2by2RUy2Wt+Tz3lY3B0YTGkPC66567Mm/WK/xYT2
> bSUTXaePkrFKuo1d6sg+tM9t14lCBLKoWL79p15UteKm7klIfVCeeVZSm35Rbug0
> XaeSeA3nmlAEAvj24mk1aNCZqZWEjp5zGHKT185Kzrf7sGtxwId5wHto+6y+T58b
> FYEx2f9hBkr6Ww3jMeSNa8DawDx5dUvQKCwwKP8H4//iyg/7SWHb3ksbZ4aHivM=
> =xVvl
> -----END PGP SIGNATURE-----
> _______________________________________________
> dnsext mailing list
> dnsext@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsext
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org