Re: [dnsext] historal root keys for upgrade path?

Paul Wouters <paul@xelerance.com> Wed, 26 January 2011 15:03 UTC

Return-Path: <paul@xelerance.com>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 55EFC3A67D8 for <dnsext@core3.amsl.com>; Wed, 26 Jan 2011 07:03:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.573
X-Spam-Level:
X-Spam-Status: No, score=-2.573 tagged_above=-999 required=5 tests=[AWL=0.026, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NFuTF7rEGnpf for <dnsext@core3.amsl.com>; Wed, 26 Jan 2011 07:03:42 -0800 (PST)
Received: from newtla.xelerance.com (newtla.xelerance.com [193.110.157.143]) by core3.amsl.com (Postfix) with ESMTP id 1010E3A67D4 for <dnsext@ietf.org>; Wed, 26 Jan 2011 07:03:42 -0800 (PST)
Received: from tla.xelerance.com (tla.xelerance.com [193.110.157.130]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by newtla.xelerance.com (Postfix) with ESMTP id 2DE54C53C; Wed, 26 Jan 2011 10:06:42 -0500 (EST)
Date: Wed, 26 Jan 2011 10:06:41 -0500
From: Paul Wouters <paul@xelerance.com>
To: Phillip Hallam-Baker <hallam@gmail.com>
In-Reply-To: <AANLkTinCB-d2HWGY4kSOmfSCMNQ-D61keEE+1poTu11g@mail.gmail.com>
Message-ID: <alpine.LFD.1.10.1101260958490.30991@newtla.xelerance.com>
References: <alpine.LFD.1.10.1101251250040.30991@newtla.xelerance.com> <4D3F233C.7000900@vpnc.org> <alpine.LFD.1.10.1101251510140.30991@newtla.xelerance.com> <alpine.LSU.2.00.1101261442120.3329@hermes-1.csi.cam.ac.uk> <AANLkTinCB-d2HWGY4kSOmfSCMNQ-D61keEE+1poTu11g@mail.gmail.com>
User-Agent: Alpine 1.10 (LFD 962 2008-03-14)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; format="flowed"; charset="US-ASCII"
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, dnsext@ietf.org
Subject: Re: [dnsext] historal root keys for upgrade path?
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jan 2011 15:03:43 -0000

On Wed, 26 Jan 2011, Phillip Hallam-Baker wrote:

> If you want to distribute keys for immediate use in the DNS, use the infrastructure designed for that purpose.
> If you want to perform long term trust root management, use an architecture that is designed for that purpose.
> 
> X.509v3 is designed to deal with TA keys that are valid for decades. There is experience doing that. There is infrastructure that exists to perform
> management of such keys in a high security environment. And it is possible to outsource management of such to several providers and is is possible to buy
> the equipment to do so in-house.

Which CA(s)s would we have to make the products trust? IANA seems to
be using Godaddy today. Is that guaranteed to last forever? If not,
then how is a device supposed to know which CA IANA has chosen at some
time in the future? Do we just have to trust all 1500+ commercial CA? 
And deal with all the revocations? And how to install new ones, using
what trust? And remember, this is a switch or router, not a browser or
an OS with the "update now" button.

Remember this has to work on a product that has just been factory defaulted
to a config from 10 years ago, and the device is EOL with no firmware upgrades.

> As a general rule, if I install hardware in my enterprise, it is going to have to chain to my root or one that I select.

That's awesome for your enterprise, but the question here transcends
the single enterprise or the single vendor area.

What we are looking at is some guaranteed (preferably DNS but could be http)
based linked list of DNSKEY's that sign each other to show transfer of trust.

This means with ONE original trusted key, the device can climb up to the current
root key in a trusted way. Adding X.509/CA chains solves nothing and adds more
complications.

Paul