[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: RJ Atkinson <rja@extremenetworks.com>
cc: Keith Moore <moore@cs.utk.edu>, keydist@cafax.se
From: Keith Moore <moore@cs.utk.edu>
Date: Tue, 26 Mar 2002 15:02:37 -0500 (EST)
In-reply-to: (Your message of "Tue, 26 Mar 2002 13:28:50 EST.") <516ED7B8-40E7-11D6-BFF7-00039357A82A@extremenetworks.com>
Sender: owner-keydist@cafax.se
Subject: Re: My take on the BoF session

> > as I see it, there are three major problems with this approach:
> >
> > 1. unconditionally representing this as a security improvement and not
> >    informing the user about the limitations of this approach - and in
> >    particular, about the degree of trust that this invests in the
> >    root and higher-level zones.
> 
> It does NOT necessarily invest more trust in the root zone.
> 
> Example:  inet.org could use its own key to sign DNS records
>           under inet.org and could distribute the authentication key
>           for inet.org's records via out-of-band/non-DNS methods.
>           Parties having that authentication key could use DNS to
>           validate the specific entries obtained via DNS (with DNSsec)
>           without having to place ANY additional trust in the root
>               or ORG zones.

that's fine, as long as applications support the ability to utilize
and recognize those out-of-band authentication keys.  in other words
the mechanisms by which this is done needs to be part of the
specification.

> > 2. trusting DNS "by default" - i.e. presuming the user's choice.
> 
> That hasn't been Bill's proposal.  However, Bill is quite correct
> that if the existing (untrusted) DNS gives out bad data, nearly
> everyone is in trouble.

The existing DNS can arrange to return false NS RRs and false glue
RRs for any existing zone.  Those NS RRs can point to servers which
provide only slight differences in the RR that they return.  If this
is done for only a small number of zones, the existing DNS can be used
to impersonate those services without putting "everyone" in trouble.

Similar attacks are possible with DNSSEC.  The difference is that
a greater amount of trust will be invested in the system if users
believe that DNSSEC insulates them from such misrepresentation.

DNSSEC does minimize the potential for attack, but it does not eliminate
it.  I'm not asking for perfection, I'm asking that we be honest about
the limitations of this approach and that provide reasonable alternatives
for those who don't feel that this approach is sufficient for their purposes.

> > 3. building a system that is so inflexible that it doesn't support
> >    other trust models.
> 
> Nothing in Bill's proposal precludes other trust models.

I wasn't referring to Bill's proposal specifically; if that was an implicit
part of this thread, I wasn't aware of it.

Keith

Home | Date list | Subject list