Re: Historic Moment - Root zone of the Internet was just signed minutes ago!!!

Mark Andrews <marka@isc.org> Wed, 21 July 2010 23:27 UTC

Return-Path: <marka@isc.org>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 408223A68F0 for <ietf@core3.amsl.com>; Wed, 21 Jul 2010 16:27:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.52
X-Spam-Level:
X-Spam-Status: No, score=-2.52 tagged_above=-999 required=5 tests=[AWL=0.079, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iSXUcxdlsqGo for <ietf@core3.amsl.com>; Wed, 21 Jul 2010 16:27:11 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) by core3.amsl.com (Postfix) with ESMTP id 6BFB23A6B47 for <ietf@ietf.org>; Wed, 21 Jul 2010 16:27:10 -0700 (PDT)
Received: from farside.isc.org (farside.isc.org [IPv6:2001:4f8:3:bb::5]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "farside.isc.org", Issuer "ISC CA" (verified OK)) by mx.pao1.isc.org (Postfix) with ESMTPS id B442AC9424; Wed, 21 Jul 2010 23:27:16 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (drugs.dv.isc.org [IPv6:2001:470:1f00:820:214:22ff:fed9:fbdc]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "drugs.dv.isc.org", Issuer "ISC CA" (not verified)) by farside.isc.org (Postfix) with ESMTP id 0D6EDE6032; Wed, 21 Jul 2010 23:27:15 +0000 (UTC) (envelope-from marka@isc.org)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (8.14.3/8.14.3) with ESMTP id o6LNRAcl059340; Thu, 22 Jul 2010 09:27:11 +1000 (EST) (envelope-from marka@drugs.dv.isc.org)
Message-Id: <201007212327.o6LNRAcl059340@drugs.dv.isc.org>
To: Phillip Hallam-Baker <hallam@gmail.com>
From: Mark Andrews <marka@isc.org>
References: <4C404F35.7090207@vigilsec.com> <6D615944-97E1-4FB4-B341-A2A86E476609@muada.com> <alpine.LSU.2.00.1007161753580.12262@hermes-2.csi.cam.ac.uk> <20100716175650.GA292@rvdp.org> <1C8C8833-85E7-4E93-8AB2-1ADF2CF2B0FE@muada.com> <AANLkTikni86AOABGKIB1_jOeQe0Ou4swpGrS8H1MbmrQ@mail.gmail.com> <201007200412.o6K4CtK5004897@drugs.dv.isc.org> <AANLkTillT7BXQ7lkdn0r1g10Q8iPNMbpgNgz6owgeGaZ@mail.gmail.com> <201007210327.o6L3RfiY030781@drugs.dv.isc.org> <AANLkTinw3V51BVfnadCKQIL2fys9AkB3iHE_s231oUgL@mail.gmail.com>
Subject: Re: Historic Moment - Root zone of the Internet was just signed minutes ago!!!
In-reply-to: Your message of "Wed, 21 Jul 2010 08:40:06 -0400." <AANLkTinw3V51BVfnadCKQIL2fys9AkB3iHE_s231oUgL@mail.gmail.com>
Date: Thu, 22 Jul 2010 09:27:10 +1000
Sender: marka@isc.org
Cc: ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Jul 2010 23:27:12 -0000

In message <AANLkTinw3V51BVfnadCKQIL2fys9AkB3iHE_s231oUgL@mail.gmail.com>, Phil
lip Hallam-Baker writes:
> Mark,
> 
> If you didn't know I was right you would have addressed my actual
> argument rather than look for idiotic technical details that have no
> bearing on the issue itself.
> 
> Yes, I know what a DS record is technically, and you know that I know.
> And you know that as far as liability is concerned putting a DS record
> in there is going to provide the location of a server, albeit by
> reference.
> 
> Now I worked in the practices section of a major CA at the time that
> it was being established. I saw the development of the risk and
> liability mitigation strategy being developed first hand. I had
> frequent discussions on the matter with Michael Baum who was leading
> the effort.
> 
> The expertise you are quibbling over can be found in a O'Rielly
> nutshell handbook. You are not quibbling to elucidate the issue, you
> are quibbling in the hope that by demonstrating I got something
> 'wrong' that you can ignore the issues that I am raising. Looking
> through your post I cannot see how you could be confused in the manner
> you purport to be confused.
> 
> If there is going to be an unbroken chain of trust then at some point
> there has to be a point where the registry signs the domain owner key
> and it is damned obvious that that is the potential weak link in the
> chain. I don't want to be more specific that that because I know from
> previous interactions that if I try to be precise the response will be
> to try to distract with irrelevant nitpicking.

Yes adding data to the parent zone requires secure authenticated
communication.  DS however are no diffent to NS.  Both require the
same level of authentication.  Yes it is subject to potential social
engineering attacks.

> What is worrying me is that if the liability issues had actually been
> considered, the answer to how my keys get into the domain would be 'go
> read document X.' because it really isn't possible to do the liability
> analysis on 'that will work the same way as it happens today'.

What's the liabilty for adding wrong NS records today?  What I'm
trying to say is that DS records really don't change the problem.
You already need a system that is secure today regardless of what
data is being added.

> It is very easy for the large registrars to sign the DNS zones for the
> servers they operate in house. It is not easy for the zones operated
> locally - which are the ones that people are most likely to want to
> DNSSEC.

It really isn't that hard and it continues to get easier.

Tell named to use dnssec.

zone "example.com" {
	type master;
	file "master";
	key-directory "/var/named/keys";	// where to find keys
	auto-dnssec allow;
	....
};

Create the keys where named can find them.

% cd /var/named/keys
% dnssec-keygen -f KSK example.com
% dnssec-keygen example.com

If you want you can use a HSM to generate and store the keys but I won't
detail that here.

Tell named to sign the zone with the keys.

% rndc sign example.com

Get the DS records to pass to the parent.

% dig @::1 +noall +answer dnskey example.com > junk
% dnssec-dsfromkey -f junk example.com
(this will extract the KSK and generate DS records for it)

If you don't want to use dig, you can get the records direct from the
master file or from the .key file generate by dnssec-keygen above.

If future we may add something like

% rndc getdsset example.com

to retrieve the ds set you send to the parent.

In the future "auto-dnssec create" will work and you won't need to call
dnssec-kegen and rndc but that requires a working /dev/random.

All the vendors are improving their products to make this easier.

> And before I place any reliance on this contraption, I want to know
> the full process by which the keys get into the domain and how each
> link in that process is secured. Because it would be rather sad if I
> spend time signing my zone and the link between the registrar and the
> registry is secured by the type of password an idiot would have on his
> luggage.

Well ask the registry.  They have procedures today that should be
secure enough if they are doing their role correctly regardless of
whether the zone is signed or not.

> If any registrar can validate keys in any zone in any way they please
> then that means that there really isn't any security here at all. I
> might think I am going to microsoft.com but mcolo registrar may have
> just  hijacked the domain. Yes I know about domain locking, but I want
> to know what controls are in place to put it into effect.

Well ask the registry.  They have procedures today that should be
secure enough if they are doing their role correctly regardless of
whether the zone is signed or not.

> This avoidance of difficult questions is precisely the reason it has
> taken fifteen years to get to this point and the reason I do not have
> any confidence in DNSSEC being usable in the next ten. The same people
> responded in the same way when I brought up the NXT record issue and
> then we went through the same thing again with the EU privacy laws.
> 
> Every time the response is to try to beat down any question.
> 
> If my questions seem vague it is because they are about the real world
> and that is rather vague.

I'm not avoiding the question.  I'm pointing out that the level of
security required to add data to a TLD should already be sufficient.
If it isn't you should have been complaining a long time ago.  DS
is just more data that needs to be treated securely.

What DNSSEC does is secure the path back to the client.
 
Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org