Re: [dnsext] we need help to make names the same, was draft-yao-dnsext-identical-resolution-02 comment

Nicholas Weaver <nweaver@ICSI.Berkeley.EDU> Wed, 23 February 2011 03:35 UTC

Return-Path: <dnsext-bounces@ietf.org>
X-Original-To: namedroppers-archive-gleetwall6@lists.ietf.org
Delivered-To: ietfarch-namedroppers-archive-gleetwall6@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AF04E3A6802; Tue, 22 Feb 2011 19:35:40 -0800 (PST)
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 99C463A67F5 for <dnsext@core3.amsl.com>; Tue, 22 Feb 2011 19:35:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FrrNsQZZM1+2 for <dnsext@core3.amsl.com>; Tue, 22 Feb 2011 19:35:38 -0800 (PST)
Received: from taffy.ICSI.Berkeley.EDU (taffy.ICSI.Berkeley.EDU [192.150.187.26]) by core3.amsl.com (Postfix) with ESMTP id B74BD3A699C for <dnsext@ietf.org>; Tue, 22 Feb 2011 19:35:38 -0800 (PST)
Received: from albook.hsd1.ca.comcast.net (c-67-164-126-174.hsd1.ca.comcast.net [67.164.126.174]) (Authenticated sender: nweaver) by taffy.ICSI.Berkeley.EDU (Postfix) with ESMTP id 81DAD36A030; Tue, 22 Feb 2011 19:36:21 -0800 (PST)
Mime-Version: 1.0 (Apple Message framework v1082)
From: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
In-Reply-To: <4D647551.5060602@necom830.hpcl.titech.ac.jp>
Date: Tue, 22 Feb 2011 19:36:20 -0800
Message-Id: <A0895032-7141-4289-8C38-D8A4D287A9E9@ICSI.Berkeley.EDU>
References: <20110216165921.GW96213@shinkuro.com> <3B90ED2E-980D-4B01-889F-447D66D0B58D@insensate.co.uk> <20110216174011.GZ96213@shinkuro.com> <20110218143653.GC84482@bikeshed.isc.org> <20110218151209.GF66684@shinkuro.com> <4D5EEE09.4080405@dougbarton.us> <20110218222950.GL74065@shinkuro.com> <4D5F270F.20401@abenaki.wabanaki.net> <199C7B2B4228461FB024E59A990DB46D@ics.forth.gr> <4D641DB6.4090705@necom830.hpcl.titech.ac.jp> <20110222205617.GS53815@shinkuro.com> <4D64489B.7020901@necom830.hpcl.titech.ac.jp> <713D992A-1DB9-4F72-9D18-8E923AD51D8D@icsi.berkeley.edu> <4D647551.5060602@necom830.hpcl.titech.ac.jp>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
X-Mailer: Apple Mail (2.1082)
Cc: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>, dnsext@ietf.org
Subject: Re: [dnsext] we need help to make names the same, was draft-yao-dnsext-identical-resolution-02 comment
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: dnsext-bounces@ietf.org
Errors-To: dnsext-bounces@ietf.org

On Feb 22, 2011, at 6:47 PM, Masataka Ohta wrote:

> Nicholas Weaver wrote:
> 
>> OR use DNSSEC but sign data dynamically.
>> 
>> 10 years ago, online signatures may have been questionable
>> computationally.  Today, online signatures are near-trivial
>> computationally.
> 
> Any reference?

Not for DNSSEC, but computationally DNSSEC signature generation is no harder than SSL connection setup.  Google was able to make Gmail SSL only with a trivially small increase in computation.


Random reported SSL setups per second are ~1500/s for a commodity 64B processor with 1024B keys.  (People don't benchmark this kind of thing as much as they used to...)

AND this parallelizes obscenely well: because of the stateless nature of DNS, a simple salted hash function dispatch to compute nodes will easily handle a cluster to however many requests per second you need to case-sensitive-normalize.  

AND such compute nodes could cache the signatures for common conventions, which means you can't computationally DOS the common cases and the COMMON cases no longer require dynamically executed DNSSEC...


> Note that "near-trivial computationally" means more lengthy
> signatures are required than 10 years ago.

2048B signatures are only ~4x harder than 1024B signatures computationally to GENERATE, but vastly harder to crack using brute force.  Thats the wonder of cryptography and the exponentials involved.  Its quadratic increase in complexity to add bits to your RSA keysize, but far far far greater impact on the cost of cryptanalysis.


_______________________________________________
dnsext mailing list
dnsext@ietf.org
https://www.ietf.org/mailman/listinfo/dnsext