[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: keydist@cafax.se
From: Michael Richardson <mcr@sandelman.ottawa.on.ca>
Date: Sat, 05 Jan 2002 16:48:03 -0500
Delivery-Date: Sat Jan 5 22:49:58 2002
In-reply-to: Your message of "Sat, 05 Jan 2002 13:14:38 +0800." <02d501c195a7$e2f727d0$dd00a8c0@jamessonyvaio>
Sender: owner-keydist@cafax.se
Subject: Re: From whence we came...

-----BEGIN PGP SIGNED MESSAGE-----


>>>>> "James" == James Seng/Personal <jseng@pobox.org.sg> writes:
    James> My first thought is to have a flag in the KEY to specify whether
    James> the KEY is a raw-key or a cert. But it seem pretty redundant since
    James> the cert may contain the key. It is possible for the apps to
    James> extract the key from the cert and ignore that the cert is

  Unnecessary. There is a KEY type which can indicate the format.
  There are only 256 of them, which I'm told has worried some people. I'm not
worried about that problem. 

  The problem of having many keys at the apex of a zone is something that I
understand, but only really affects HTTPS uses in my opinion, and I do not
think they are likely to switch to keys in DNS anytime soon. 

  The problem of sub-typing I recognize - I can't ask for your IPsec KEY
record, I have to ask for all KEY records and sort them later. This has bad
effects on DNS UDP/TCP usage, I agree.
  One answer is to burn RR #s instead. I'm not sure that this is worth it
either. If I name all of the uses that I can HOPE for and imagine for the
next decade, I get:
	1) IPsec
	2) SSH
	3) SMTP+TLS ("STARTTLS")
	4) user key for OpenPGP		(2.6-RSA and OpenPGP-DSA)
	5) user key for S/MIME
	6) some VoIP/RTP/QoS application [key used for authentication for 
					 bandwidth usage. Privacy via IPsec]
        7) HTTPS (eventually maybe...)
	8) a pop-up/message protocol	[assuming IMPP!=SIP]
	9) some SNMP usage		[assuming SNMP security does not go IPsec]

  I'm really stetching here. I spent ten minutes, and I couldn't come up with 
a #10. 

  Multiply by 2 because someone will screw up their format and need to do it
again. 

  Multiple return set by 2 or 3 because of keyrollover and DNS propogation
delay. (If you change keys very often, you may get as many as three keys in
flight. You may have to put tomorrow's key in DNS today to get it to
propogate in time for your usage tomorrow).

  My position is that no new "APPKEY" has any utility. Time to deploy
"APPKEY" is the same as the time to deploy "SSHKEY" or "IPsecKEY" or
"VoIPKEY" format, and I think that we want to avoid subtyping. I'm told that
later bind v8 versions can cope with RRs they don't understand. DJBDNS has a
format for putting in RRs that it doesn't speak. (It doesn't do KEY actually)

  The problem of turning DNS servers into KDCs has been brought up. People
are afraid that one would therefore make DNS servers more interesting targets 
for attacks. DNS servers are not usually as logically and physically secure
as KDCs. [there is a tale about a KDC at some institution, probably MIT, that 
got physically lost. It was in a closet that was walled over, but the box
never crashed, so it never mattered. But it couldn't be found.]
  I don't buy this argument - once you have DNSSEC, you have the KDC
issues anyway. People argue that some of these host/user keys are for more
valuable to crack than name->IP mappings. So be it. But those keys have to be 
served from somewhere. I think that I know a lot more about securing a DNS
server than I do about LDAP servers sitting atop MS-Access databases. 

  Caching only servers are not at risk as the data is internally integral.

  Our immediate requirements for key storage are simple:
  1) we want it easy to deploy. That means already present in shipping
     software.

  2) we have no interest in certificates. We just want keys. Others may want
     certificates, but that is their business.

  3) we would like to avoid multiple round trips (i.e. TCP) for getting the
     keys. We expect to do a lookup per host that is involved in some
     communication per hour. 

     [So if you have 10 hosts which talk to 100 unique web servers each every hour,
     then we would do 1000 lookups/hour] 	   

  4) we would like it easy for end-users to be able to get their info into
     DNS servers' reverse maps - particularly users who have iptelco.net
     accounts. This means pushing DNSUPD/DHCP/PPP(/AAA) cooperation.
	
]       ON HUMILITY: to err is human. To moo, bovine.           |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON    |net architect[
] mcr@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[
] panic("Just another NetBSD/notebook using, kernel hacking, security guy");  [

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: latin1
Comment: Finger me for keys

iQCVAwUBPDd0hIqHRg3pndX9AQF0ogP/b0g337o/zwpXYruW8jmB8yIPqmjd/ioo
tUKvHlEEDzQT6MI4f/KLtrzvCczemZPhghaaJSh1SGU2rih/6cWPyxM5g80WUi+C
Bu55S09J2YcstQ2OVfvM9vMOy9kvnMM+BpPkundV2ivgs1+iDN61e2jfJRHpJAUP
5HPC3xjwFKM=
=m8ks
-----END PGP SIGNATURE-----

Home | Date list | Subject list