[DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

Edward Lewis <Ed.Lewis@neustar.biz> Tue, 21 April 2009 15:24 UTC

Return-Path: <Ed.Lewis@neustar.biz>
X-Original-To: dnsop@core3.amsl.com
Delivered-To: dnsop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EDC9D28C1DF for <dnsop@core3.amsl.com>; Tue, 21 Apr 2009 08:24:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.821
X-Spam-Level:
X-Spam-Status: No, score=-1.821 tagged_above=-999 required=5 tests=[AWL=0.778, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ocHZL7IXMba4 for <dnsop@core3.amsl.com>; Tue, 21 Apr 2009 08:24:50 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by core3.amsl.com (Postfix) with ESMTP id CE89C3A6B13 for <dnsop@ietf.org>; Tue, 21 Apr 2009 08:24:49 -0700 (PDT)
Received: from [10.31.200.142] (gatt.md.ogud.com [10.20.30.6]) by stora.ogud.com (8.14.3/8.14.3) with ESMTP id n3LFQ32F034524; Tue, 21 Apr 2009 11:26:04 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Mime-Version: 1.0
Message-Id: <a06240807c61393343ac7@[10.31.200.142]>
In-Reply-To: <82iqkykq10.fsf@mid.bfk.de>
References: <20090306141501.4BA2F3A6B4B@core3.amsl.com> <49EDA81E.2000600@ca.afilias.info> <a06240805c6138a622949@[10.31.200.142]> <82iqkykq10.fsf@mid.bfk.de>
Date: Tue, 21 Apr 2009 11:25:59 -0400
To: dnsop@ietf.org
From: Edward Lewis <Ed.Lewis@neustar.biz>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Scanned-By: MIMEDefang 2.64 on 66.92.146.20
Cc: Edward Lewis <Ed.Lewis@neustar.biz>
Subject: [DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Apr 2009 15:24:51 -0000

At 17:03 +0200 4/21/09, Florian Weimer wrote:
>* Edward Lewis:
>
>>  This comes from the observation that the contents of the database
>>  sourcing the zone (whether a commercial-like database or a vi'd file)
>>  are more critical than the private key.  (If) They are sufficiently
>>  protected and I'll just keep the private key behind the same
>>  fortifications.  So, what does an HSM add?
>
>I think the general idea is that if you have to edit your zone because
>it was tampered with, chances are that nobody will notice (or
>everybody will attribute it to routine maintenance).  If your key is
>compromised and you have to replace it out of schedule, you might have
>got some explaining to do. 8-)
>
>Of course, this isn't a strong argument in favor of HSMs.

(Changing the subject to "HSMs" because this is more about that than 
the draft.)

Before the thread goes too far, I should say that I'm thinking of 
this as an operator of a zone that delegates to other entities.

In such a situation, diddling inappropriately with the database means 
"*some*body *will* notice" and that somebody is "above my 
management."  (I.e., customers.)  Diddling with the private key is 
something I only need to raise up to the management.  (If that's any 
metric.)

Rolling a key is much less problematic (especially ZSKs) than having 
to clean up a "hijacked" delegation.  Even a KSK isn't that bad - if 
the parent is signed and I never promise my KSK as an SEP.

I once used this argument in a security conference I did a panel on 
some years ago.  "If I am the operator of a zone and do something to 
mess up the private key so bad my regulator wants to fire me, the 
regulator does not come for the private key, instead they come for 
the database."  My concern is first the database over the key, it's 
what matters in the event of catastrophic organizational failure.

 From that, it's a matter of "fate sharing."  What ever I do to 
protect my most vital element (database) can be used to protect other 
things as well, including the key.  I know - what about insiders 
mucking with the key?  Well, what about the insiders mucking with the 
database?  Fate sharing.

This isn't a "death-knell" for HSMs in my mind.  There are 
environments where they are useful.  It's just in an environment 
which already has a lot of "fortification" an HSM may not be an 
improvement, other than to claim "we do it."
-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

Getting everything you want is easy if you don't want much.