Hi Ondřej,

On 7/11/25 17:35, Peter Thomassen wrote:
The appendix A.1. describes an impossible failure scenario, considering that 
Section 6.2 of RFC 7344 says that:

 >  The Parental Agent MUST ensure that previous versions of the CDS/
 >  CDNSKEY RRset do not overwrite more recent versions.

With this MUST in place, the scenario described in A.1. just cannot happen. It 
is not a big deal, but seeing it written like this is implying that this risk 
was not considered when writing RFC 7344, which is not the case.

You are correct. That failure scenario only occurs when not tracking "previous" vs. 
"new" CDS/CDNSKEY RRset. And I've just checked: there's at least one registry that makes 
a reasonable attempt at this sort of tracking.

I thus agree with you that Appendix A.1 can then be removed. I'll note that 
down for the next update after the submission window opens again.
[...]
The cross-nameserver consistency checks from this can catch such replication 
issues (but also things beyond, such as multi-signer misalignment). With 
consistency checks in place, I'm thus wondering whether inception/serial state 
tracking on the parent side adds much value, or can be relaxed from MUST to 
SHOULD or MAY. What do you think?

I thought about this again, and realized that there's nothing to change in RFC 
7344, because the consistency checks actually fulfill the MUST of RFC 7344 
Section 6.2. It's just another way of doing it, and the particular way of doing 
it is not covered by the MUST: the method proposed there is specifically MAY.

I thus retract my proposal update this aspect of RFC 7344.

As for removing Appendix A.1, I think it's worth pointing out that this draft 
is one way of handling this problem, with RFC 7344's requirement in mind. I'm 
thus proposing to change the language as follows:

OLD
   be deployed in an alternating fashion.  The zone maintainer, having
   detected that the DS deployment was successful, may then confidently
   remove the old DNSKEY from the zone, only to find out later that the
   DS RRset has been turned back, breaking the delegation's DNSSEC chain
   of trust.

   Checking for consistency minimizes this risk.  In case the parent
   reports consistency errors downstream, it can also help detect the
   replication issue on the child side.

NEW
   be deployed in an alternating fashion and without the awareness of
   the zone maintainer, who may then inadvertently break the chain of
   trust by prematurely removing a DNSKEY still referenced by a (stale)
   CDS/CDNSKEY RRset.

   While foreseen in [RFC7344] Section 6.2, the solution suggested there
   requires parents to keep state on CDS/CDNSKEY RRsets.  This document
   achieves the same without this burden, and in case the parent reports
   consistency errors downstream, can also help detection of the child-
   side replication issue by the operator.

Please let me know in case that doesn't work for you, or if you have any other 
thoughts/suggestions.

I'm planning to upload the a revision at the end of the week.

Best,
Peter

_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to