On Fri, 19 Apr 2013, Tony Finch wrote:

The lifetime of this kind of compromise is limited by the expiry time of
the KSK's RRSIG over the DNSKEY RRset. The attacker with the compromised
ZSK can't extend this since they can't re-sign the DNSKEYs in a way that
will be authenticated by the DS.

Which is why the ZSK should never be trusted for a RRSIG over CDS to
update the DS recors, because then it could cycle the existing KSK out
of the DNSKEY RRset.

Paul
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to