To:
Derek Atkins <warlord@MIT.EDU>
cc:
dnssec@cafax.se
From:
Michael Richardson <mcr@sandelman.ottawa.on.ca>
Date:
Mon, 10 May 2004 15:19:47 -0400
In-Reply-To:
Message from Derek Atkins <warlord@MIT.EDU> of "Mon, 10 May 2004 13:11:08 EDT." <sjm65b46wcz.fsf@dogbert.ihtfp.org>
Sender:
owner-dnssec@cafax.se
Subject:
Re: dnssec: resolver - application communication
-----BEGIN PGP SIGNED MESSAGE-----
>>>>> "Derek" == Derek Atkins <warlord@MIT.EDU> writes:
Derek> Let me give an example. Assume SSH starts deploying server
Derek> keys in DNS to help solve the "first contact" problem. The
Derek> application could decide to provide different messages to the
Derek> user based on whether the answer is secured. An unsecured
Derek> SSHKey record would have little additional trust than the
Derek> first-contact assertion. Whereas a signed record could be
Derek> more trusted. The App should be allowed to make the
Derek> distinction.
Note, this means that the application *STILL* gets a result even if
signature(s) FAIL. Even if the ROOT DNS key fails.
for record in NS DS
do
for delegation in delegate-hierarchy
do
Derek> I also think the app should know the difference between:
Derek> - signed, signature is good.
Derek> - signed, but the signature expired.
Derek> - signed, but the signature did not validate.
Derek> - unsigned
Derek> - unsigned, but should be signed
done
done
Derek> Am I missing cases here?
All of the above may occur for NS and DS above.
- --
] ON HUMILITY: to err is human. To moo, bovine. | firewalls [
] Michael Richardson, Xelerance Corporation, Ottawa, ON |net architect[
] mcr@xelerance.com http://www.sandelman.ottawa.on.ca/mcr/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Finger me for keys
iQCVAwUBQJ/V0oqHRg3pndX9AQGwrgP/Zc/9EQVsCh5Fo5+E+DJZsUuZTcvJKsv3
64mpzL1RckdMN3ew2ApHn/O7qPp7pLIZVoXxDzB9qAA5T+2EIjdD1lxcMaBx8FCn
RRF39a4YSxZb6RutKxwEsqHrD8vcBzAHm0VlLPqIbIIEJmQgYz9usxQ1fLAzcxMe
WbpFr2r2/Nc=
=QfGk
-----END PGP SIGNATURE-----