On 8/3/2025 15:12, Paul Wouters wrote:


On Aug 3, 2025, at 12:38, Michael StJohns <[email protected]> wrote:


Hi - apologies, I wasn't paying attention as I thought this would have been a simple and clean document.

Mukund's note made me take a quick look a this.  I think the document is incomplete or ambiguous.

Please add a reference to RFC 4035.

That is a partial reference to DNSSEC. It should be RFC 9364 (or BCP 237)

Nope - that document doesn't contain the text that needs to be referenced below. (E.g. 4035 section 4.3).  4034 is already in the references, but doesn't define the set of terms we use when talking about secure/insecure/bogus/unknown (indeterminate)



Please add a sentence or two that says something like "Insecure, with respect to DNSSEC,  has the meaning given to it per [RFC4035], section 4.3." if that's what you mean by "insecure".  I'm not sure if you meant that or Bogus.

Bogus is never the same as insecure. Bogus represses the Answer Section content, while insecure does not.

You know that, and I know that, but this document uses "insecure" without explaining what that means in DNSSEC terms.  Given the other Paul's comments, if you've got an AUTH48 period (and given that the current doc status is "Version changed, review needed", you may want to add just this.    The rest of this was more seeking a clearer way of saying things, but is probably technically correct with this clarification.



Should a SHA1 signature over a DS record be treated differently than a signature over other records?  E.g. Is a SHA1 signature in a signed zone over a DS record bogus, or can it be treated as if it weren't present?   If the latter, is the subordinate zone securely insecure, or bogus?

It should either be validated or treated as not existing (aka insecure). It MUST NOT cause bogus.

Yup - document doesn't say that in so many words.


The RSASHA1 [RFC4034] and RSASHA1-NSEC3-SHA1 [RFC5155] algorithms
    MUST NOT be used when creating DS records.  \
This is fine.  But instead perhaps.:

    The RSASHA1, and RSASHA-NSEC3-SHA1 algorithms MUST NOT be used
    when creating DS records; authoritative servers MUST NOT serve DS
    RRSets containing these records;


You don’t want to define a new code path where an auth server is going to filter out part of the zone file it is given.

This is the thing that I keep saying - humans are not protocol elements and enforcing MUST NOT be used... is really pointing at the data creation process.  Code ought to do the enforcement, not assume the human creating the zone information is doing it correctly.   All I mean by the above, is that there ought to be some automated enforcement point PRIOR to the records making it to the server, not just trusting people to do the right thing.




     Also records aren't secure or insecure, RRSets and validations
    results are secure or insecure. A DS RRSet containing both SHA1
    and non SHA1 delegations signed by a non-SHA1 algorithm is secure
(assuming a chain of trust) for example.

Yes, agreed.

Paul

I'll pay more attention... thanks - Mike

_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to