Re: [DNSOP] Updated NSEC5 protocol spec and paper

"Ralf Weber" <dns@fl1ger.de> Sat, 11 March 2017 09:21 UTC

Return-Path: <dns@fl1ger.de>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40BEE129405 for <dnsop@ietfa.amsl.com>; Sat, 11 Mar 2017 01:21:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RfBXUR0bQSFz for <dnsop@ietfa.amsl.com>; Sat, 11 Mar 2017 01:21:49 -0800 (PST)
Received: from smtp.guxx.net (nyx.guxx.net [85.10.208.173]) by ietfa.amsl.com (Postfix) with ESMTP id 6F8F8128B44 for <dnsop@ietf.org>; Sat, 11 Mar 2017 01:21:49 -0800 (PST)
Received: by nyx.guxx.net (Postfix, from userid 107) id 17B7F5F4082E; Sat, 11 Mar 2017 10:21:48 +0100 (CET)
Received: from [64.89.227.152] (p5DD4650D.dip0.t-ipconnect.de [93.212.101.13]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by nyx.guxx.net (Postfix) with ESMTPSA id 146B85F40647; Sat, 11 Mar 2017 10:21:47 +0100 (CET)
From: "Ralf Weber" <dns@fl1ger.de>
To: "Shumon Huque" <shuque@gmail.com>
Date: Sat, 11 Mar 2017 10:21:46 +0100
Message-ID: <6AE3B84A-296A-4550-97BA-E72EFAFDA7B3@fl1ger.de>
In-Reply-To: <CAHPuVdWXGLM6JjR3J53X50W4rcTndiw0UJTKWPxe16WR3znM9Q@mail.gmail.com>
References: <CAHPuVdXTcSaVcN6fBbPy3e=PgRvg8=GemSN_YFhzX387x8YW-A@mail.gmail.com> <CFBF172D-FDD7-4DE1-B5C5-7C76A7792549@vpnc.org> <A05B583C828C614EBAD1DA920D92866BD06F4468@PODCWMBXEX501.ctl.intranet> <20170310172655.GA92236@isc.org> <CAHw9_i+1TLLAkGP_D23R9kLq+0yacXVz70h1SO6CxZcrL4E+RA@mail.gmail.com> <CAHPuVdWXGLM6JjR3J53X50W4rcTndiw0UJTKWPxe16WR3znM9Q@mail.gmail.com>
MIME-Version: 1.0
X-Mailer: MailMate (1.9.6r5347)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/2Lb3M4EAB2hy_WO1Y8Knq7RzHcM>
Cc: "dnsop@ietf.org WG" <dnsop@ietf.org>
Subject: Re: [DNSOP] Updated NSEC5 protocol spec and paper
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Mar 2017 09:21:50 -0000

Moin!

On 10 Mar 2017, at 19:15, Shumon Huque wrote:

> I would like to see us deploy an authenticated denial of existence
> mechanism that is not eminently susceptible to offline dictionary
> attack. My experience so far is that most people in the crypto
> community do not look favorably on NSEC3. Not just Dan Bernstein,
> whose strong criticisms are well known (and correct in my opinion).
> IETF protocols should pass muster with the professional cryptographer
> community.
As others have said there is more than one way to get the zone content
without doing a dictionary attack on the authoritative server (passive
DNS, browser bars, pretty much everything that collects names). So even
if you have a technical solid solution that you can't get it from the
authoritative servers it still will be possible to do it. So you don't
solve a real world problem.

NSEC3 was done to solve two problems (easy zone enumeration, opt out)
for large providers of DNS services (ccTLDs, Verisign). All of these
providers now have DNSSEC, so what is the point on introducing
something that will cause more disruption and maybe slow down adaption
of DNSSEC further?

IMHO there are other things we should work on like getting more
people to validate and rolling to ecliptic curve algorithms.

So long
-Ralf