Re: [dnsext] historal root keys for upgrade path?

Alex Nicoll <anicoll@cert.org> Wed, 26 January 2011 18:06 UTC

Return-Path: <anicoll@cert.org>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 023653A6834 for <dnsext@core3.amsl.com>; Wed, 26 Jan 2011 10:06:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.135
X-Spam-Level:
X-Spam-Status: No, score=-2.135 tagged_above=-999 required=5 tests=[AWL=0.464, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k2DR2WnSJUmQ for <dnsext@core3.amsl.com>; Wed, 26 Jan 2011 10:06:41 -0800 (PST)
Received: from shetland.sei.cmu.edu (shetland.sei.cmu.edu [192.58.107.44]) by core3.amsl.com (Postfix) with ESMTP id A4E4F3A6818 for <dnsext@ietf.org>; Wed, 26 Jan 2011 10:06:41 -0800 (PST)
Received: from timber.sei.cmu.edu (timber.sei.cmu.edu [10.64.21.23]) by shetland.sei.cmu.edu (8.13.8/8.13.8/1294) with ESMTP id p0QI9gdl020354 for <dnsext@ietf.org>; Wed, 26 Jan 2011 13:09:42 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cert.org; s=jthatj15xw2j; t=1296065382; bh=Fm1LtHCds0iJwKOP3tsjky2xEjrVqn4TiZgBoLmB6e4=; h=From:To:Date:Subject:Message-ID:References:In-Reply-To: Content-Type:Content-Transfer-Encoding:MIME-Version:Sender: Reply-To:Cc; b=dZM49S1xy9RpToaE2k7I6dobHpcJBLGx/lJSKlv8BJqT2TXK4hhGRebodtrXSzQU1 UKKHd1Uj3HZRK+svLFEwu2C+/upUJ/P5L0HAvimt87kYNqFisN1iPh1ohVbwID/RfN jyiEfqeCOP/eja2y3YgU+XEsvOuAntQYss6jM3ps=
Received: from owa.sei.cmu.edu (tyranus.sei.cmu.edu [10.64.28.15]) by timber.sei.cmu.edu (8.13.8/8.13.8/1348) with ESMTP id p0QI9gQ4018003 for <dnsext@ietf.org>; Wed, 26 Jan 2011 13:09:42 -0500
Received: from EXCHANGE.sei.cmu.edu ([10.64.28.13]) by tyranus.sei.cmu.edu ([10.64.28.15]) with mapi; Wed, 26 Jan 2011 13:09:42 -0500
From: Alex Nicoll <anicoll@cert.org>
To: "dnsext@ietf.org" <dnsext@ietf.org>
Date: Wed, 26 Jan 2011 13:09:40 -0500
Thread-Topic: [dnsext] historal root keys for upgrade path?
Thread-Index: Acu9g5vLTa0KYNCkTYCIjyk8j7hrmwAADLNA
Message-ID: <A32A045574615B4FAB96C4952BA5768BB76F8EA25E@EXCHANGE.sei.cmu.edu>
References: <alpine.LFD.1.10.1101251250040.30991@newtla.xelerance.com> <4D3F233C.7000900@vpnc.org> <alpine.LFD.1.10.1101251510140.30991@newtla.xelerance.com> <alpine.LSU.2.00.1101261442120.3329@hermes-1.csi.cam.ac.uk> <AANLkTinCB-d2HWGY4kSOmfSCMNQ-D61keEE+1poTu11g@mail.gmail.com> <alpine.LFD.1.10.1101260958490.30991@newtla.xelerance.com> <AANLkTi=KGpm0O8KqGZO6vC+8k64byPFzM4w1Toq+se3E@mail.gmail.com> <alpine.LFD.1.10.1101261256250.17193@newtla.xelerance.com>
In-Reply-To: <alpine.LFD.1.10.1101261256250.17193@newtla.xelerance.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [dnsext] historal root keys for upgrade path?
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jan 2011 18:06:43 -0000

Gents (and lurking ladies) - 

Maybe I'm missing something here, but I thought that the whole purpose of DNSKEY rotation was to adhere to the basic cryptography tenet that a key is only good for so long, and then there's too great a risk of someone cracking it.  If we implement an entire schema for historical keys that chains trust, don't we introduce the capability for long term key attacks to compromise the whole system?  I know I could do this for several know encryption schemes now - there's no reason advances in computing power cannot do it for new ones.  

Long story short - wouldn't this shoot us in the foot?

-Alex

-----Original Message-----
From: dnsext-bounces@ietf.org [mailto:dnsext-bounces@ietf.org] On Behalf Of Paul Wouters
Sent: Wednesday, January 26, 2011 1:05 PM
To: Phillip Hallam-Baker
Cc: Paul Hoffman; dnsext@ietf.org
Subject: Re: [dnsext] historal root keys for upgrade path?

On Wed, 26 Jan 2011, Phillip Hallam-Baker wrote:

> Which CA(s)s would we have to make the products trust? IANA seems to 
> be using Godaddy today. Is that guaranteed to last forever? If not, 
> then how is a device supposed to know which CA IANA has chosen at some 
> time in the future? Do we just have to trust all 1500+ commercial CA? 
> And deal with all the revocations? And how to install new ones, using 
> what trust? And remember, this is a switch or router, not a browser or an OS with the "update now" button.

> Use a Quorate Root then.
> 
> Multiple Signers, are recognized. A valid key must be counter signed by a quorum of the recognized signers.

Maybe we can add even more complexity to this?

The path here is extremely clear. It hopes from a common trusted key to new keys via intermediate steps, all of which are signed. To bring in any other outside trusted third party with its own pletora of trust anchor update issues is not solving the problem. You are just moving the problem. Worse, you are moving the problem away from the original trusted parties into a hypothetical bag of other trusted parties with even less clear mandates.

> As Ed Lewis points out, these are really tricky trust problems and 
> there are good reasons not to want to trust any monolithic single rooted scheme.

Please either specifically mention the reasons, or stop waiving your generalities. DNSSEC is already trusting "monolithic single rooted scheme", so suggesting we destroy that is moot. There is no valid reason to bring in third parties. Let alone insist that validating resolvers need to gain ASN.1 parsers and X.509 trust anchors. Seriously, grab a 10 year old browser and tell me how well this "proven technology"
works? How many of those CA's are still valid today? How could we have guaranteed to have picked one that is still active today - provided there is any?

We already have a fully functional path of trust, from root key to root key, that is validatable by DNSSEC.

> There are much larger International IT efforts than DNSSEC that have 
> collapsed due to failure to agree on this type of issue.

Yeah, the Government of Canada's Entrust X.509 scheme comes to mind.......

Paul
_______________________________________________
dnsext mailing list
dnsext@ietf.org
https://www.ietf.org/mailman/listinfo/dnsext