Also see thread starting at:
    http://darkwing.uoregon.edu/~llynch/dnsop/msg03465.html


Ed was the last to respond
>
> >>
> >>  #4.4.3  Security Lameness
> >>  #
> >>  #   Security Lameness is defined as what happens when a parent has a DS
> >>  #   RR pointing to a non-existing DNSKEY RR.  During key exchange a
> >>  #   parent should make sure that the child's key is actually configured
> >>  #   in the DNS before publishing a DS RR in its zone.  Failure to do so
> >>  #   could cause the child's zone being marked as Bogus.
> >>
> >>  I think it is dangerous to suggest that the parent check the health of the
> >>  child.  During key rollover, I think the child ought to be looking to see
> >>  when the parent has changed the DS record before changing the 
> >>child's DNSKEYs.
> >
> >Now I am confused. I can imagine you would not like to see the
> >suggestion that the parent checks the health of the child but you not
> >having a DNSKEY before the parent publishes a DS would really break
> >things. It would at least put the "double signature rollover" to the
> >dustbin and registries would then have to deal with multiple DSs in
> >their zone.
> 
> A child can list two KSK's in their zone, ask the parent to DS the 
> new one.  When the new DS is signed, the old KSK is yanked.  There is 
> no need for the parent to see if the requested DS corresponds to any 
> published KSK, the child ought to be indicating that the new KSK is 
> in place by making the request.
> 
> I don't see any reason that the parent has to have multiple DS 
> records (per algorithm).  True, if the child requests a new DS and 
> hasn't put the KSK in the zone, none of the child's data will 
> validate.  In this case, the child feels the pain and the child is 
> the one that can fix this.
> 
> If the parent has to find it - it's like looking for the bent needle 
> in a haystack.  And the parent really can't fix the situation - 
> putting back in the old DS might prolong a vulnerability that 
> prompted the botched rollover.
> 
> >>  If you have the child looking up and the parent looking down, you run the
> >>  risk of a control "loop."  I think the burden ought to be on the child to
> >>  always make sure it is well represented in the parent, to keep the 
> >> attention
> >>  focused in one direction.  Also, a large delegating parent might waste 
> >> time
> >>  on the well-run children instead of helping out the needy kids.
> >>
> >>  Consider too that a child knows better what it's outage (connectivity)
> >>  situation is (than does the parent), which could account for any "missing"
> >>  keys.
> >
> >
> >Does changing the "should" into "could" in the above paragraph address
> >your uneasiness.
> >
> >   "During key exchange a parent could make sure that the child's key is
> >    actually configured"
> 
> Could, yes, but I would add "as part of a comprehensive delegation 
> check."  I don't think we want to say that DNSSEC also incurs higher 
> maintenance just because it can - which is what I read here.


I propose the following text as a result:

4.4.3  Security Lameness

   Security Lameness is defined as what happens when a parent has a DS
   RR pointing to a non-existing DNSKEY RR. When this happens the child's
   zone may be marked as "Bogus" by validating DNS clients.

   As part of a comprehensive delegation check the parent could, at
   key exchange time, verify that the child's key is actually
   configured in the DNS.



--Olaf

---------------------------------| Olaf M. Kolkman
---------------------------------| RIPE NCC
---------------------------------| JID: olaf at jabber.secret-wg.org
.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html

Reply via email to