Re: [keyassure] Bare keys again

Matt McCutchen <matt@mattmccutchen.net> Wed, 23 March 2011 15:24 UTC

Return-Path: <matt@mattmccutchen.net>
X-Original-To: keyassure@core3.amsl.com
Delivered-To: keyassure@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3739428C0F8 for <keyassure@core3.amsl.com>; Wed, 23 Mar 2011 08:24:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3bv1MrUOlWEt for <keyassure@core3.amsl.com>; Wed, 23 Mar 2011 08:24:56 -0700 (PDT)
Received: from homiemail-a6.g.dreamhost.com (caiajhbdccac.dreamhost.com [208.97.132.202]) by core3.amsl.com (Postfix) with ESMTP id 13B8428C0DF for <keyassure@ietf.org>; Wed, 23 Mar 2011 08:24:56 -0700 (PDT)
Received: from homiemail-a6.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a6.g.dreamhost.com (Postfix) with ESMTP id B35A2598076 for <keyassure@ietf.org>; Wed, 23 Mar 2011 08:26:29 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; c=nofws; d=mattmccutchen.net; h=subject:from :to:in-reply-to:references:content-type:date:message-id :mime-version:content-transfer-encoding; q=dns; s= mattmccutchen.net; b=XCPbEIpr6EjaH5p0f+oIXTABXyuhHD6QtzP+ul3nZ7p iKdA8qez076bR4YsGZcE6nLXhoSmDDTeZ7v1kNA+7ipWuWxRD9EANKn8NxZpjz7/ 17kx5ocrPk5QObRHVpIy0xYyCx1Mwvc9hQ0iGUV1k7PKYWC5gUIEnD1CQZmLLv5w =
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=mattmccutchen.net; h= subject:from:to:in-reply-to:references:content-type:date :message-id:mime-version:content-transfer-encoding; s= mattmccutchen.net; bh=YPer1kn5wSgcDaQQ+45SnVihE4w=; b=bOJvNoe51D K9Q93NM+aZ4zuAtsOkcX/MX4K1CmvGZsNJyD3xOSGrxj4y5pMB1WsRDDBDxvlEWp 3IILur8ARaiPkrxYAEAKkCi3JjrwRQ8tcKae/U0EGzw9h8goQdiziHdkybKa0joi /ffACHAIDEunq7EOEpHB6tko0g868CVl0=
Received: from [192.168.1.40] (pool-96-231-2-98.washdc.east.verizon.net [96.231.2.98]) (Authenticated sender: matt@mattmccutchen.net) by homiemail-a6.g.dreamhost.com (Postfix) with ESMTPA id 620A6598074 for <keyassure@ietf.org>; Wed, 23 Mar 2011 08:26:29 -0700 (PDT)
From: Matt McCutchen <matt@mattmccutchen.net>
To: keyassure <keyassure@ietf.org>
In-Reply-To: <alpine.LFD.1.10.1103230625150.18330@newtla.xelerance.com>
References: <92D68A5E-5CB7-4C80-8D7B-0B8D55D93608@kumari.net> <alpine.LFD.1.10.1103201932370.20162@newtla.xelerance.com> <9D285351-8D73-4C15-BE2C-5DF731C08DCE@vpnc.org> <alpine.LFD.1.10.1103202028110.20162@newtla.xelerance.com> <1300669586.2117.12.camel@localhost> <alpine.LFD.1.10.1103202211390.20162@newtla.xelerance.com> <1300739370.2117.40.camel@localhost> <alpine.LFD.1.10.1103211631260.20162@newtla.xelerance.com> <AANLkTimyOXv66UeG2q2dmt1-e_Ek6WPPH-coueFc7fDS@mail.gmail.com> <AANLkTin1QjUbVFN8FqjL2SPRLSRRw4Ahs4zbhy4ZdZuX@mail.gmail.com> <alpine.LFD.1.10.1103211727150.28224@newtla.xelerance.com> <alpine.LFD.1.10.1103230625150.18330@newtla.xelerance.com>
Content-Type: text/plain; charset="UTF-8"
Date: Wed, 23 Mar 2011 11:26:28 -0400
Message-ID: <1300893988.2117.179.camel@localhost>
Mime-Version: 1.0
X-Mailer: Evolution 2.32.3
Content-Transfer-Encoding: 7bit
Subject: Re: [keyassure] Bare keys again
X-BeenThere: keyassure@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Key Assurance With DNSSEC <keyassure.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/keyassure>, <mailto:keyassure-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/keyassure>
List-Post: <mailto:keyassure@ietf.org>
List-Help: <mailto:keyassure-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/keyassure>, <mailto:keyassure-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 15:24:57 -0000

On Wed, 2011-03-23 at 06:30 -0400, Paul Wouters wrote:
> Especially considering the latest CA compromise where a CA issued a rogue
> certificate for addons.mozilla.org. And this is not some el cheapo CA,
> but one that is respected and has people very active within the IETF, the
> good guys....
> 
> http://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-browser-collusion
> 
> This is another clear signal that DANE is needed,

Indeed.

> and the need for the X509 storage format is unneccessary.

Non sequitur.  What does the compromise of a CA have to do with the use
(or not) of X.509 as a container in DANE?

-- 
Matt