Re: How do we get the whole world to upgrade to DNSSEC capable resolvers?

Ted Lemon <Ted.Lemon@nominum.com> Wed, 23 July 2008 19:16 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7F72E3A6A58; Wed, 23 Jul 2008 12:16:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.073
X-Spam-Level:
X-Spam-Status: No, score=-106.073 tagged_above=-999 required=5 tests=[AWL=0.526, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rxMu9+9x7OyX; Wed, 23 Jul 2008 12:16:10 -0700 (PDT)
Received: from psg.com (psg.com [147.28.0.62]) by core3.amsl.com (Postfix) with ESMTP id B294B3A68BC; Wed, 23 Jul 2008 12:16:10 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1KLjgJ-000JBX-8E for namedroppers-data@psg.com; Wed, 23 Jul 2008 19:07:23 +0000
Received: from [64.18.2.178] (helo=psmtp.com) by psg.com with smtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from <Ted.Lemon@nominum.com>) id 1KLjgF-000JBD-7k for namedroppers@ops.ietf.org; Wed, 23 Jul 2008 19:07:21 +0000
Received: from source ([64.89.228.228]) (using TLSv1) by exprod7ob113.postini.com ([64.18.6.12]) with SMTP; Wed, 23 Jul 2008 12:07:16 PDT
Received: from webmail.nominum.com (webmail.nominum.com [64.89.228.50]) (using TLSv1 with cipher RC4-MD5 (128/128 bits)) (Client CN "webmail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-ng.nominum.com (Postfix) with ESMTP id 2B4181A8206; Wed, 23 Jul 2008 12:07:16 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from [10.0.0.252] (66.93.162.128) by exchange-01.win.nominum.com (64.89.228.50) with Microsoft SMTP Server (TLS) id 8.1.278.0; Wed, 23 Jul 2008 12:07:15 -0700
CC: DNSEXT WG <namedroppers@ops.ietf.org>
Message-ID: <2FFE6519-7E9C-4DE8-AF69-697A4D875011@nominum.com>
From: Ted Lemon <Ted.Lemon@nominum.com>
To: bert hubert <bert.hubert@netherlabs.nl>
In-Reply-To: <20080723183227.GA11957@outpost.ds9a.nl>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
MIME-Version: 1.0 (Apple Message framework v928.1)
Subject: Re: How do we get the whole world to upgrade to DNSSEC capable resolvers?
Date: Wed, 23 Jul 2008 12:07:13 -0700
References: <48875934.8080101@links.org> <F113C53F-D189-45A0-8DC3-14725395D1BD@virtualized.org> <20080723183227.GA11957@outpost.ds9a.nl>
X-Mailer: Apple Mail (2.928.1)
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>

On Jul 23, 2008, at 11:32 AM, bert hubert wrote:
> So - DNS needs only to be strong enough to not be easily subverted  
> in the
> process of transporting plaintext unauthenticated data. This puts an  
> upper
> bound on the overhead (financial, technical and administrative) that  
> we
> should commit to DNS security.

So how to I avoid a situation where, when I type "http://www.bankofexample.com/ 
" in the URL bar of my browser, I get a web page from a phisher who  
provides me with a perfectly valid-looking but completely un-secured  
web site that will phish my password?   Even if your bank ordinarily  
puts up a secure form, if a phisher can subvert your DNS, they can do  
this.

Lest you claim "that's no problem, because people know not to submit  
private data to non-secure forms," answer me this: how often do you, a  
security-savvy person, actually look to see if you are submitting to a  
URL that uses SSL?   Now, how often do you think your friend the  
perfectly intelligent non-computer-geek does it?   How often does your  
elderly great aunt who had a stroke last year check?

Maybe DNSSEC is the wrong answer to this question.   But there needs  
to be an answer.   And it can't be "that's the user's  
responsibility."   Good security does not depend on user education.


--
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/namedroppers/>