AS IF: draft-ietf-dnsext-ad-is-secure-03.txt

John Gilmore <gnu@toad.com> Sun, 29 July 2001 05:52 UTC

Received: from psg.com (exim@psg.com [147.28.0.62]) by ietf.org (8.9.1a/8.9.1a) with SMTP id BAA13861 for <dnsext-archive@lists.ietf.org>; Sun, 29 Jul 2001 01:52:18 -0400 (EDT)
Received: from lserv by psg.com with local (Exim 3.31 #1) id 15QZru-000Iv6-00 for namedroppers-data@psg.com; Sat, 28 Jul 2001 12:35:22 -0700
Received: from rip.psg.com ([147.28.0.39] ident=exim) by psg.com with esmtp (Exim 3.31 #1) id 15QZru-000Iv0-00 for namedroppers@ops.ietf.org; Sat, 28 Jul 2001 12:35:22 -0700
Received: from randy by rip.psg.com with local (Exim 3.31 #1) id 15QZru-0003vc-00 for namedroppers@ops.ietf.org; Sat, 28 Jul 2001 12:35:22 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
From: John Gilmore <gnu@toad.com>
To: DNSEXT <namedroppers@ops.ietf.org>, gnu@toad.com
Cc: risks@csl.sri.com
Subject: AS IF: draft-ietf-dnsext-ad-is-secure-03.txt
In-reply-to: <E15QVvU-000BdA-00@psg.com>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Message-Id: <E15QZru-000Iv6-00@psg.com>
Date: Sat, 28 Jul 2001 12:35:22 -0700
Content-Transfer-Encoding: 7bit

I think some of you guys have gotten so tied up in micromanaging DNS
Security implementation details that you forgot what swamp we were
trying to drain.

There is no point in building a cryptographically-secured DNS in which
many of the machines will be configured to "just believe whatever they
are told, regardless of the cryptographic signatures"!

We already have such a DNS -- today's.  It doesn't need signatures or
AD bits or big packets or any other changes.  Anyone who is happy
with that can go home and stop arguing.  The rest of us are interested
in the real security and integrity of the Internet.

Any client implementation that listens to a single bit of the response
to tell it whether the response is cryptographically valid must be
considered noncompliant with the DNSSEC spec.  It's just an old
fashioned insecure DNS client.  There's nothing wrong with that, as
long as you don't have any high trust expecations for it.

Any server which deposits a single bit in the response to claim to
clients that it has cryptographically validated the results, so
they don't have to, is just encouraging the above abuse.

I'm not shocked to find people advocating that such a server actually
lie to the clients about whether it has validated the data.  The
entire model (trusting a packet to tell you whether somebody else has
validated the data) provides ample opportunities for not only your
friends but your enemies to lie to you.  Just like in the current DNS.

	John

PS: I know, I know, the "valid" bit will be secured by some "out of
band" means.  Like a shared static key, and/or by the security of the
file system on the server.  Right.  For extra credit: composing
several weak security primitives produces what?  Strong security or
weak security?

PPS: The real question is why anyone is advocating that the DNS be
"secured" by lame security.  There are challenges aplenty even when
you're working with strong primitives; trying to mix in weak stuff is
just wasting everyone's time.  People have encouraged me in the past
to assume the possibility of mere incompetence rather than assuming
actual malice (e.g. when the FBI's Louis Freeh testified to Congress
about the security of DES).  So: Were any of you on the standards
committees for cellphone privacy?  How about on the 802.11 "Wiretap
Equivalent Privacy" committee?  Did any of you have a hand in
shortening the key in DES?  Perhaps you designed the encryption scheme
used in DVDs or in Adobe eBooks?  Whether you're incompetent or
malicious, stick to breaking codes, it's much easier.  Especially when
you break them in the standards committee before they're deployed.


to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.