[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: Paul Hoffman / IMC <phoffman@imc.org>
Cc: keydist@cafax.se
From: Derek Atkins <warlord@MIT.EDU>
Date: 08 Jan 2002 13:56:09 -0500
In-Reply-To: Paul Hoffman / IMC's message of "Tue, 8 Jan 2002 10:18:41 -0800"
Sender: owner-keydist@cafax.se
Subject: Re: Definitions of keys and certs

Paul Hoffman / IMC <phoffman@imc.org> writes:

> At 10:19 PM -0500 1/7/02, Derek Atkins wrote:
> >While technically true, generally 'certificate' implies a single blob.
> >In the case of a 'bare public key that you will only trust if you
> >trust a public key that has signed it', at least in the case of
> >DNSSEC, is not a certificate in the conventional sense of the word
> >because the KEY and SIG are separable blobs.  Which cryptographically
> >this may be considered a certificate, operationally it is far from it.
>
> Right: operationally they are larger and often take two round trips 
> instead of one to deliver. This is a feature?

Why would they take two round trips to deliver?  The DNSSEC spec
states that the SIG (and NXT) records should be returned along
with the original data.  In other words, you make a request for:

sshhost.my.site. IN <KeyrecordType>

and you get back:

sshhost.my.site. IN <KeyrecordType> [KEY DATA]
                 IN SIG [SIG KEYDATA]
                 IN NXT ...
                 IN SIG [SIG NXT]

All this happens in one round-trip.  Where do you see two round trips
(unless it really does need to fall back to TCP, but quite honestly
unless KEY DATA is really huge (like an X.509 certificate!) it should
fit just fine in a single UDP datagram (c.f. KEY records).

> --Paul Hoffman, Director
> --Internet Mail Consortium

-derek

-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
       warlord@MIT.EDU                        PGP key available

Home | Date list | Subject list