Re: [dnsext] slave signing, was does making names the same NEED protocol changes at all?

Phillip Hallam-Baker <hallam@gmail.com> Sun, 27 February 2011 12:45 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3BB653A6930 for <dnsext@core3.amsl.com>; Sun, 27 Feb 2011 04:45:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.57
X-Spam-Level:
X-Spam-Status: No, score=-3.57 tagged_above=-999 required=5 tests=[AWL=0.028, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SoIzkE6PIz-D for <dnsext@core3.amsl.com>; Sun, 27 Feb 2011 04:45:50 -0800 (PST)
Received: from mail-bw0-f44.google.com (mail-bw0-f44.google.com [209.85.214.44]) by core3.amsl.com (Postfix) with ESMTP id C8EF53A68F6 for <dnsext@ietf.org>; Sun, 27 Feb 2011 04:45:49 -0800 (PST)
Received: by bwz13 with SMTP id 13so3547187bwz.31 for <dnsext@ietf.org>; Sun, 27 Feb 2011 04:46:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=WxsTcCKviytzmduW4bOgiqmq5tRwxaTGnbZ+Jdp3Xcg=; b=Ee7vtHxbWv4o0Ly1pSKJrUnettIekWYFuxBPqp8PEnPdMgr4JZhFSln+Af5XeoEtz7 4INVMxTQJhgnQ9OnnCnuRbR0k2VOceXBKIVBDn/HYCKYHVWRHRbkDGS7AehBXLxCt7wl go2d+UG/z3lLdC3DHwh597cpiJGVZRvppipQk=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=AXrY9wBmYVRoIddAIx07/fWjEDgo1PHd6ccZBNHcQM5hX5YiCkGFdti8XzDumlUh2j S284xtIOVsqp5iP9I3PAUfLoUGKb0ZunL7R509NWvsklhxgEsmFSgUscSB6VXIBSPxNm rpSeeomHl2ZOnSl2ueqGOGW+v8tRHroOUN63o=
MIME-Version: 1.0
Received: by 10.204.48.77 with SMTP id q13mr142630bkf.128.1298810806297; Sun, 27 Feb 2011 04:46:46 -0800 (PST)
Received: by 10.204.14.139 with HTTP; Sun, 27 Feb 2011 04:46:46 -0800 (PST)
In-Reply-To: <20110227050500.2966.qmail@joyce.lan>
References: <AANLkTinvqqGTGPeMXUcAv5iY1KGn_=LwfGr3debWo_GE@mail.gmail.com> <20110227050500.2966.qmail@joyce.lan>
Date: Sun, 27 Feb 2011 07:46:46 -0500
Message-ID: <AANLkTim24j3cTV6E3bc78P2xsKoDTKQQNJ6dCe6jjKq+@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: John Levine <johnl@iecc.com>
Content-Type: multipart/alternative; boundary="0016e6d778cebd64fe049d42f45b"
Cc: dnsext@ietf.org
Subject: Re: [dnsext] slave signing, was does making names the same NEED protocol changes at all?
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Feb 2011 12:45:51 -0000

Two questions come to mind

1) How is key publication going to be effected for rDNS-SEC?

Have we actually got a plan for deployment?


2) If we have a viable plan for deployment of rDNS-SEC, why would we not
plan to use that as the PKI for BGPSEC?

It may make sense to employ a hybrid PKI since DNSSEC responses are
transitory and there is a bootstrap issue. But this makes more sense to me
than experimenting with novel X.509 features.


On Sun, Feb 27, 2011 at 12:05 AM, John Levine <johnl@iecc.com> wrote:

> >Requiring slaves to be signers is a major change to the security model.
>
> Maybe, but this isn't the only place it's an issue.
>
> IPv6 rDNS is a can of worms that I'd prefer not to open here, but
> making forward and reverse DNS match on consumer IPv6 is another
> problem that has no straightforward solution.  One of the possiblities
> that keeps coming up is stunt servers that synthesize the records as
> needed, which obviously means that if they do DNSSEC they need to have
> the signing keys.
>
> R's,
> John
>



-- 
Website: http://hallambaker.com/