[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: <keydist@cafax.se>, "Michael Richardson" <mcr@sandelman.ottawa.on.ca>
From: "James Seng/Personal" <jseng@pobox.org.sg>
Date: Mon, 7 Jan 2002 12:58:01 +0800
Delivery-Date: Mon Jan 7 06:00:59 2002
Sender: owner-keydist@cafax.se
Subject: Re: From whence we came...

There is a differences between what you and me talking:

You believe that DNS should distribute raw keys and only raw-keys. "we
have no interest in certificates. We just want keys. Others may want
certificates, but that is their business."

I believe keys distribution cannot be discussed separately with certs.
Rawkeys can be distribute as it-is or can be distributed signed in cert.
There is no such thing as "us" or "their" problem here. Both are
problems within the IETF, altho from areas, both needs to be resolved
eventually, one way or the other, now or later.

If the requirements is only how to distributed raw-key over DNS (and
therefore, implicitly decided to trust the DNSSEC hierarchy for all
keys), then your mail is probably the right follow up to that line of
discussion.

If the requirements is one that we hope to keys, either in raw-keys or
in certs, then my mail is probably the right follow up to this line of
discussion.

So lets choose: which one is our requirement?

-James Seng

----- Original Message -----
From: "Michael Richardson" <mcr@sandelman.ottawa.on.ca>
To: <keydist@cafax.se>
Sent: Sunday, January 06, 2002 5:48 AM
Subject: Re: From whence we came...


> -----BEGIN PGP SIGNED MESSAGE-----
>
>
> >>>>> "James" == James Seng/Personal <jseng@pobox.org.sg> writes:
>     James> My first thought is to have a flag in the KEY to specify
whether
>     James> the KEY is a raw-key or a cert. But it seem pretty
redundant since
>     James> the cert may contain the key. It is possible for the apps
to
>     James> extract the key from the cert and ignore that the cert is
>
>   Unnecessary. There is a KEY type which can indicate the format.
>   There are only 256 of them, which I'm told has worried some people.
I'm not
> worried about that problem.
>
>   The problem of having many keys at the apex of a zone is something
that I
> understand, but only really affects HTTPS uses in my opinion, and I do
not
> think they are likely to switch to keys in DNS anytime soon.
>
>   The problem of sub-typing I recognize - I can't ask for your IPsec
KEY
> record, I have to ask for all KEY records and sort them later. This
has bad
> effects on DNS UDP/TCP usage, I agree.
>   One answer is to burn RR #s instead. I'm not sure that this is worth
it
> either. If I name all of the uses that I can HOPE for and imagine for
the
> next decade, I get:
> 1) IPsec
> 2) SSH
> 3) SMTP+TLS ("STARTTLS")
> 4) user key for OpenPGP (2.6-RSA and OpenPGP-DSA)
> 5) user key for S/MIME
> 6) some VoIP/RTP/QoS application [key used for authentication for
> bandwidth usage. Privacy via IPsec]
>         7) HTTPS (eventually maybe...)
> 8) a pop-up/message protocol [assuming IMPP!=SIP]
> 9) some SNMP usage [assuming SNMP security does not go IPsec]
>
>   I'm really stetching here. I spent ten minutes, and I couldn't come
up with
> a #10.
>
>   Multiply by 2 because someone will screw up their format and need to
do it
> again.
>
>   Multiple return set by 2 or 3 because of keyrollover and DNS
propogation
> delay. (If you change keys very often, you may get as many as three
keys in
> flight. You may have to put tomorrow's key in DNS today to get it to
> propogate in time for your usage tomorrow).
>
>   My position is that no new "APPKEY" has any utility. Time to deploy
> "APPKEY" is the same as the time to deploy "SSHKEY" or "IPsecKEY" or
> "VoIPKEY" format, and I think that we want to avoid subtyping. I'm
told that
> later bind v8 versions can cope with RRs they don't understand. DJBDNS
has a
> format for putting in RRs that it doesn't speak. (It doesn't do KEY
actually)
>
>   The problem of turning DNS servers into KDCs has been brought up.
People
> are afraid that one would therefore make DNS servers more interesting
targets
> for attacks. DNS servers are not usually as logically and physically
secure
> as KDCs. [there is a tale about a KDC at some institution, probably
MIT, that
> got physically lost. It was in a closet that was walled over, but the
box
> never crashed, so it never mattered. But it couldn't be found.]
>   I don't buy this argument - once you have DNSSEC, you have the KDC
> issues anyway. People argue that some of these host/user keys are for
more
> valuable to crack than name->IP mappings. So be it. But those keys
have to be
> served from somewhere. I think that I know a lot more about securing a
DNS
> server than I do about LDAP servers sitting atop MS-Access databases.
>
>   Caching only servers are not at risk as the data is internally
integral.
>
>   Our immediate requirements for key storage are simple:
>   1) we want it easy to deploy. That means already present in shipping
>      software.
>
>   2) we have no interest in certificates. We just want keys. Others
may want
>      certificates, but that is their business.
>
>   3) we would like to avoid multiple round trips (i.e. TCP) for
getting the
>      keys. We expect to do a lookup per host that is involved in some
>      communication per hour.
>
>      [So if you have 10 hosts which talk to 100 unique web servers
each every hour,
>      then we would do 1000 lookups/hour]
>
>   4) we would like it easy for end-users to be able to get their info
into
>      DNS servers' reverse maps - particularly users who have
iptelco.net
>      accounts. This means pushing DNSUPD/DHCP/PPP(/AAA) cooperation.
>
> ]       ON HUMILITY: to err is human. To moo, bovine.           |
firewalls  [
> ]   Michael Richardson, Sandelman Software Works, Ottawa, ON    |net
architect[
> ] mcr@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/
|device driver[
> ] panic("Just another NetBSD/notebook using, kernel hacking, security
guy");  [
>
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3ia
> Charset: latin1
> Comment: Finger me for keys
>
> iQCVAwUBPDd0hIqHRg3pndX9AQF0ogP/b0g337o/zwpXYruW8jmB8yIPqmjd/ioo
> tUKvHlEEDzQT6MI4f/KLtrzvCczemZPhghaaJSh1SGU2rih/6cWPyxM5g80WUi+C
> Bu55S09J2YcstQ2OVfvM9vMOy9kvnMM+BpPkundV2ivgs1+iDN61e2jfJRHpJAUP
> 5HPC3xjwFKM=
> =m8ks
> -----END PGP SIGNATURE-----


Home | Date list | Subject list