Re: Historic Moment - Root zone of the Internet was just signed minutes ago!!!

Phillip Hallam-Baker <hallam@gmail.com> Tue, 20 July 2010 12:05 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8B06E3A689C for <ietf@core3.amsl.com>; Tue, 20 Jul 2010 05:05:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.858
X-Spam-Level:
X-Spam-Status: No, score=-1.858 tagged_above=-999 required=5 tests=[AWL=0.741, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 05U5TtFuqAje for <ietf@core3.amsl.com>; Tue, 20 Jul 2010 05:05:49 -0700 (PDT)
Received: from mail-iw0-f172.google.com (mail-iw0-f172.google.com [209.85.214.172]) by core3.amsl.com (Postfix) with ESMTP id 48FC93A6816 for <ietf@ietf.org>; Tue, 20 Jul 2010 05:05:49 -0700 (PDT)
Received: by iwn38 with SMTP id 38so6291876iwn.31 for <ietf@ietf.org>; Tue, 20 Jul 2010 05:06:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=IE9jUT0Op78hit1Z3fGlGObQ6T0BkuSXdURRzNRYBko=; b=fJy1xOXwRgFV7EOYGj1bzyWhvsxxxPn/CuRJjgoxtn43Nf9kVumWuESX7OsdejuLeF D33N5S8l40tS8YEDUF8/33SirqDbMhZucIBJ8kJ70ArfgFPxEfGzXO3syyz21Vx4B/LB 8M/i2GEMW4caN7uIpCycvRvKRx4E10wPswe1Y=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=jLYLRjZLLeScGNgZPlpYBzZUGQ7Q1USxKOILTGnCGldAFoJe4fes2NJcAalFDFlav+ JA3Emu+gYkBKG5U5yoritNA0GpFRNKlHb0LmmdQzDazAg73SCNxP09eNRfUmEaMXALsd ZnrndOXA/MuaolV3DwCZT31/Y6KvfOXo5C/U4=
MIME-Version: 1.0
Received: by 10.231.171.7 with SMTP id f7mr7225124ibz.72.1279627564431; Tue, 20 Jul 2010 05:06:04 -0700 (PDT)
Received: by 10.231.10.76 with HTTP; Tue, 20 Jul 2010 05:06:04 -0700 (PDT)
In-Reply-To: <201007200412.o6K4CtK5004897@drugs.dv.isc.org>
References: <4C404F35.7090207@vigilsec.com> <6D615944-97E1-4FB4-B341-A2A86E476609@muada.com> <alpine.LSU.2.00.1007161753580.12262@hermes-2.csi.cam.ac.uk> <20100716175650.GA292@rvdp.org> <1C8C8833-85E7-4E93-8AB2-1ADF2CF2B0FE@muada.com> <AANLkTikni86AOABGKIB1_jOeQe0Ou4swpGrS8H1MbmrQ@mail.gmail.com> <201007200412.o6K4CtK5004897@drugs.dv.isc.org>
Date: Tue, 20 Jul 2010 08:06:04 -0400
Message-ID: <AANLkTillT7BXQ7lkdn0r1g10Q8iPNMbpgNgz6owgeGaZ@mail.gmail.com>
Subject: Re: Historic Moment - Root zone of the Internet was just signed minutes ago!!!
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailman-Approved-At: Thu, 22 Jul 2010 07:47:58 -0700
Cc: ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Jul 2010 12:05:50 -0000

On Tue, Jul 20, 2010 at 12:12 AM, Mark Andrews <marka@isc.org> wrote:
>
> In message <AANLkTikni86AOABGKIB1_jOeQe0Ou4swpGrS8H1MbmrQ@mail.gmail.com>, Phil
> lip Hallam-Baker writes:
>> Being able to verify signatures is of no value.
>>
>> The system only has value when you can act differently according to
>> whether the signature verifies or not.
>>
>> I keep asking, but nobody will tell me how I get the keys for my
>> domains into the TLD.
>
> Firstly you get DS records into the TLD not DNSKEY records.  Secondly
> it is/will be by a mechanism similar to how you get NS records into
> the TLD.  In other words go ask your registrar when they are going
> to support adding DS records and stop complaining here.

I am not asking about the TLD keys, I am asking about my keys.

And I really hope that the mechanism for handling the name holder keys
recognizes that registering a million keys is different to
distributing a hundred where all the parties know each other
personally.

You would not be saying "go ask your registrar when they are going to
support adding DS records" if you didn't know that the answer was that
the registrars have made no commitment to deploy.

Holding a key signing ceremony is not a new technological achievement.
It is being held now with great fanfare in the hope that if everyone
makes enough noise about how much momentum DNSSEC has that the
opposition of the registrars will somehow disappear.

I don't see why that strategy would work. I have certainly never seen
it work in the past.


> This is not a technological problem.  It is a business problem
> between you, your registrar and the registry.

You are an engineer. If the technology does not meet the business
needs then you have failed.

If DNSSEC is not going to fail we need to re-engineer it to propose a
business model that actually works. Sitting on the sidelines and
shouting 'the technology is perfect damit, go make the business model
work', is not going to solve the problem. Nor is 'go away, my
technology is perfect, perfect I tell you'.

What has me very worried here are the comments to the effect 'the
registrars are behind'. What if the registrars are not 'behind', what
if they have no interest in deployment or are actively opposed but
unable to say so openly while Cerf and co are saying that DNSSEC is
the historic solution to solve the problem of Internet security?


>> This is not a trivial issue. There is a question of liability to be
>> addressed. So far ICANN and VeriSign Registry Services have addressed
>> the issue by booting it down the chain. But the system as a whole
>> cannot work until there is someone willing to accept the liability and
>> for that to happen they are going to require tools to manage their
>> litigation risk.
>
> How is the liability different from that of accepting NS records?
> DS records don't magically change the liability.  Stuffing up either
> NS or DS records will break the delegation.

Yes they do.

An NS record specifies the address of the DNS server

A DS record specifies an intermediate certificate in the chain of
trust for authenticating any entity that is attached to the domain.

In the case of an NS record it is established that the design does not
provide security in the DNS layer and this has to be provided
independently via an end to end mechanism such as SSL with DV or EV
certs.

In the case of a DS record the design is expressly designed to provide
for authentication of assertions relating to a domain name distributed
through the DNS.


-- 
Website: http://hallambaker.com/