Re: [DNSOP] [Ext] DNSSEC Strict Mode

Ulrich Wisser <ulrich@wisser.se> Thu, 25 February 2021 11:53 UTC

Return-Path: <ulrich@wisser.se>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B4D163A191E for <dnsop@ietfa.amsl.com>; Thu, 25 Feb 2021 03:53:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=wisser.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yaR2t6t3eyPm for <dnsop@ietfa.amsl.com>; Thu, 25 Feb 2021 03:53:03 -0800 (PST)
Received: from mout-p-202.mailbox.org (mout-p-202.mailbox.org [IPv6:2001:67c:2050::465:202]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 94AC33A191D for <dnsop@ietf.org>; Thu, 25 Feb 2021 03:53:02 -0800 (PST)
Received: from smtp1.mailbox.org (smtp1.mailbox.org [IPv6:2001:67c:2050:105:465:1:1:0]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-202.mailbox.org (Postfix) with ESMTPS id 4DmWPm4hjZzQjgl; Thu, 25 Feb 2021 12:53:00 +0100 (CET)
X-Virus-Scanned: amavisd-new at heinlein-support.de
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=wisser.se; s=MBO0001; t=1614253978; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=mPTDRvEi0ocNQdr3eNj0xVMS5tUlyNl0JzzwIWPRfyA=; b=edkGSLULiggHlH2Ilbnru+4jAEiDg09h1FXwLcMDRzld8y/M0SYoJ0nBIeB5AxSkxR4f0/ xaOOLDBh2jg1qRJtwqpGuouHTYKsRQoWk8N5GyV1QdJchlnb7HBVkuSgwshSnctc6F5rpC PSqGfjkLvObH2AjfClfMYYfSQ9oMSJTbLxTt4Hh8Oec2L6EcW4z7+aCz18JXe+06SyLe+D d6VeNFOz9palYPrNljFg/kob66IeVs4IiIscWg1wL8Cw97Xd1PZWgdiEHo+WFMHiiKucGE F3V0MuFHw+xCgHmhBcK4zZeWyi3REDUYB0yLQpjEgQhwp4O7hVZDAABWT1LCwg==
Received: from smtp1.mailbox.org ([80.241.60.240]) by spamfilter01.heinlein-hosting.de (spamfilter01.heinlein-hosting.de [80.241.56.116]) (amavisd-new, port 10030) with ESMTP id 3xhukx5XvgD9; Thu, 25 Feb 2021 12:52:55 +0100 (CET)
From: Ulrich Wisser <ulrich@wisser.se>
Message-Id: <17704496-1D7E-4891-8ADB-4D6002D070D3@wisser.se>
Content-Type: multipart/alternative; boundary="Apple-Mail=_5D78C00B-5294-4E41-9E3A-4F2FDE6DD161"
Mime-Version: 1.0
Date: Thu, 25 Feb 2021 12:52:53 +0100
In-Reply-To: <57BA9FA0-C16D-4178-B4A8-C9D9B174AC82@isc.org>
Cc: Ben Schwartz <bemasc@google.com>, Paul Hoffman <paul.hoffman@icann.org>, Samuel Weiler <weiler@watson.org>, dnsop <dnsop@ietf.org>
To: Mark Andrews <marka@isc.org>
References: <CAHbrMsBeCiZ-31hjKvet2UPDPFhdVYpgqR6Kw-WWz1ERgeSFoQ@mail.gmail.com> <7BB07063-2CA3-4283-8866-2B19A7AAA9A0@icann.org> <45e3c45-d324-8124-5dae-98acba9dd7cb@watson.org> <CAHbrMsBsG8OnXOXwAFY5eNf-0viQ_e5nKKhp1XVpnpMkGW1L-Q@mail.gmail.com> <02CAFAF2-BD58-48D4-B9CC-DD06EB99357B@wisser.se> <57BA9FA0-C16D-4178-B4A8-C9D9B174AC82@isc.org>
X-MBO-SPAM-Probability:
X-Rspamd-Score: -3.97 / 15.00 / 15.00
X-Rspamd-Queue-Id: 743D7187E
X-Rspamd-UID: 446505
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/g3frEURYG7XAM-Zhrph_LA8x_CI>
Subject: Re: [DNSOP] [Ext] DNSSEC Strict Mode
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Feb 2021 11:53:06 -0000


> On 24 Feb 2021, at 22:44, Mark Andrews <marka@isc.org> wrote:
> 
> 
> 
>> On 25 Feb 2021, at 02:01, Ulrich Wisser <ulrich=40wisser.se@dmarc.ietf.org> wrote:
>> 
>>> 
>>> On 23 Feb 2021, at 17:49, Ben Schwartz <bemasc=40google.com@dmarc.ietf.org> wrote:
>>> 
>>> 
>>> 
>>> On Tue, Feb 23, 2021 at 11:21 AM Samuel Weiler <weiler@watson.org> wrote:
>>> ...
>>> Recognizing that I'm likely biased by my history of working on the 
>>> current "mandatory algorithm rules", I don't buy the need for this 
>>> complexity.  In practice our "weak" algorithms aren't _that_ weak. 
>>> And, if they are, we might as well stop signing with them entirely.
>>> 
>>> I think that was true for a long time, but I'm not sure it's still true, or will stay true.  I'm particularly motivated by the ongoing discussion about adding Algorithms to the registry [1], and a recent overview of Post-Quantum cryptography for DNSSEC [2].  Also, 829-bit RSA was factored last year [3].  Validator update timelines are Very Slow, so we should be thinking about adding features we might need before we need them.
>>> 
>>> Even if we are currently in a state where zone owners feel like they have simple, safe choices, I don't think we should assume that this will remain true indefinitely.
>>> 
>>> This seems like unnecessary further loading of the camel.
>>> 
>>> FWIW, my preference would be to simply remove the lax-validation rule from RFC 6840, which would simplify the standard overall ... but there must have been a good reason for it.  Strict Mode might be a stepping-stone in that direction.
>> 
>> Not only am I in favor of the RFC6840 lax validation, it is in fact necessary for secure DNSSEC operation.
>> In fact I believe the RFC 4035 needs to be updated to explicitly allow algorithms without signatures.
>> At the current state of dnssec RFC definitions it is unclear how you could change DNS operators securely if these operators do not sign the zone with the same algorithm.
> 
> You can’t do that as the logic doesn’t allow it.  Perform algorithm roles to and from mandatory to implement algorithms before and after the move if necessary.
> 

But this is a real world problem, one that is holding DNSSEC back.
If you buy DNS operations the operator will usually tell you what algorithm they use, you have no choice in that.
Now if your new operator doesn’t use the same algorithm you can’t switch without going insecure.
I don’t think this is an acceptable situation.




>>> Ben, if you decide to persist with this idea, I've filed some issues 
>>> in your GH repo.
>>> 
>>> Thanks! 
>>> 
>>> [1] https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-dnssec-iana-cons-00
>>> [2] https://indico.dns-oarc.net/event/37/contributions/811/
>>> [3] https://en.wikipedia.org/wiki/RSA_numbers#RSA-250
>>> _______________________________________________
>>> DNSOP mailing list
>>> DNSOP@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dnsop
>> 
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org <mailto:DNSOP@ietf.org>
>> https://www.ietf.org/mailman/listinfo/dnsop <https://www.ietf.org/mailman/listinfo/dnsop>
> 
> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742              INTERNET: marka@isc.org <mailto:marka@isc.org>