On 08/07/2025 16:23, John R Levine wrote:
On Tue, 8 Jul 2025, Paul Wouters wrote:
A better solution would be for resolvers to detect when they are under keytag DoS, and then take counter measures - not for the protocol to be changed and made more complicated.

Exactly.  Malicious (or I suppose buggy) signers can publish colliding keytags, so resolvers have to defend against it.  Changing the spec won't change that.

This is part of computational attacks and resolvers currently defend against it in various ways. Various ways that could give resolution inconsistencies between implementations (I am not considering the actual attack scenario because noone cares about that resolution). That is why this draft could give definitive advice on how to deal with key collisions IMHO.

Best regards,
-- Yorgos

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to