On Fri, 19 Apr 2013, Tony Finch wrote:
The lifetime of this kind of compromise is limited by the expiry time of the KSK's RRSIG over the DNSKEY RRset. The attacker with the compromised ZSK can't extend this since they can't re-sign the DNSKEYs in a way that will be authenticated by the DS.
Which is why the ZSK should never be trusted for a RRSIG over CDS to update the DS recors, because then it could cycle the existing KSK out of the DNSKEY RRset. Paul _______________________________________________ DNSOP mailing list [email protected] https://www.ietf.org/mailman/listinfo/dnsop
