Re: [dnsext] historal root keys for upgrade path?

Phillip Hallam-Baker <hallam@gmail.com> Thu, 27 January 2011 16:07 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9BEF63A682B for <dnsext@core3.amsl.com>; Thu, 27 Jan 2011 08:07:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.47
X-Spam-Level:
X-Spam-Status: No, score=-3.47 tagged_above=-999 required=5 tests=[AWL=0.128, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CKJC-fOnXYFL for <dnsext@core3.amsl.com>; Thu, 27 Jan 2011 08:07:31 -0800 (PST)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by core3.amsl.com (Postfix) with ESMTP id 1CAAD3A682A for <dnsext@ietf.org>; Thu, 27 Jan 2011 08:07:30 -0800 (PST)
Received: by yxt33 with SMTP id 33so742371yxt.31 for <dnsext@ietf.org>; Thu, 27 Jan 2011 08:10:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=H7clyGt09ciGNORo/0ncx1URDnfY8qBWeSPNSPMS8nI=; b=e35dkoi/hYO/PdabNZ6HjeV+ZggjUSYUDiPhD7SN5tXgMo2hlC75MYVL9QydLJ1arQ AULR8j7ZRDKgjqDzFry3VPsoR6A+ddw3O6t3K76ZsbdGnjhSB5bW5abIZ979EZKJkw1k OeoSYnEon6o59ZAGJ04e0S5iB2hLOwTftJ/Xc=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=TBDP1+nJdlsWZbkhvgnSsBjwcumauhRg+EmhqXjPKXIHGgBpnZKW1O4E0f4xgpmT0T 3qeFz4qTfJpbXut0QvbbrtF/TankVUZ9DvJsG8biNQgmR3e+cHLEZF3msCBJij3xPrdG fY6B543yH+ZaPu2gfpXJTMbsL98LxncrdPbiM=
MIME-Version: 1.0
Received: by 10.42.229.8 with SMTP id jg8mr2322516icb.461.1296144634266; Thu, 27 Jan 2011 08:10:34 -0800 (PST)
Received: by 10.42.155.6 with HTTP; Thu, 27 Jan 2011 08:10:34 -0800 (PST)
In-Reply-To: <alpine.LFD.1.10.1101261633400.18044@newtla.xelerance.com>
References: <alpine.LFD.1.10.1101251250040.30991@newtla.xelerance.com> <4D3F233C.7000900@vpnc.org> <alpine.LFD.1.10.1101251510140.30991@newtla.xelerance.com> <alpine.LSU.2.00.1101261442120.3329@hermes-1.csi.cam.ac.uk> <AANLkTinCB-d2HWGY4kSOmfSCMNQ-D61keEE+1poTu11g@mail.gmail.com> <alpine.LFD.1.10.1101260958490.30991@newtla.xelerance.com> <AANLkTi=KGpm0O8KqGZO6vC+8k64byPFzM4w1Toq+se3E@mail.gmail.com> <alpine.LFD.1.10.1101261256250.17193@newtla.xelerance.com> <AANLkTinxxDpZ27r9SB8n8QaHad+BM-_UYpGUDUokYr0e@mail.gmail.com> <alpine.LFD.1.10.1101261633400.18044@newtla.xelerance.com>
Date: Thu, 27 Jan 2011 11:10:34 -0500
Message-ID: <AANLkTinXCTmD9_1q6yXn5pgi_4KSRndOcV=BNvAD8-WH@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Paul Wouters <paul@xelerance.com>
Content-Type: multipart/alternative; boundary="20cf3043474c80ce98049ad63081"
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, dnsext@ietf.org
Subject: Re: [dnsext] historal root keys for upgrade path?
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jan 2011 16:07:32 -0000

Both your reply and the reply from the big router vendor make it clear to me
that you do simply do not understand my proposal.

There are some cases in which it is acceptable to have anonymous
contributions like this. But in my view big router manufacturers are quite
capable of representing themselves directly in IETF and should not have need
of intermediaries.

Please tell your associate that if this is an issue, they should participate
in the group directly.


On Wed, Jan 26, 2011 at 4:41 PM, Paul Wouters <paul@xelerance.com> wrote:

> On Wed, 26 Jan 2011, Phillip Hallam-Baker wrote:
>
>  Paul, you came here with an assertion that you were interested in solving
>> a particular problem.
>> Since then you have changed the problem whenever people suggest an
>> alternative that does not match your
>> proposed solution.
>>
>
>  If I was a major router manufacturer or any other manufacturer, I would
>> make sure that there was satisfactory
>> control of the ultimate root of trust embedded in my products.
>>
>
> This particular big router vendor has stated to me that using X.509 and
> CA's can not
> be part of the solution, exactly for the reasons I have mentioned in
> previous emails.
>
> These are their words exactly:
>
>   Frankly, one of the most compelling reasons for wanting to see
>   ubiquitous DNSSEC is precisely this long, ever changing list of X.509
>   CAs, each with its own policies, procedures, personnel, and pressure
>   points, and each representing an opportunity for total failure of the
>   whole PKI. X.509 as deployed is a security disaster, and I see
>   basically no chance of it ever getting better.
>
>   Personally, and I'm hoping to convince [vendor] and everybody else of
>   this eventually, I would like to see DNSSEC *replace* X.509 as the
>   PKI for basically everything on the Internet, or at least see all
>   X.509 trust conditioned on DNSSEC trust.
>
>
> Phillip, it is not just me. Your PKI solution does not fit this
> problem. It just creates an additional problem.
>
>
>  As the Internet matures and the need to upgrade equipment for purely
>> performance issues subsides, service
>> lifetimes for network infrastructure is going to be measured in decades.
>> Which is something of a problem in
>> an industry where Internet time turned out to mean that Netscape took a
>> little over five years to go from
>> startup, to industry behemoth, to extinction rather than the 80-90 years
>> that it took General Motors to
>> achieve the same.
>>
>
> You never did give me your professional expert estimate of the amount or
> percentage of valid CA's of the latest Netscape Navigator/Communicator
> released. I would still be interested in that number to confirm or deny
> the usability of Certificate Agencies over a decade long deployment.
>
> Paul
>



-- 
Website: http://hallambaker.com/