Re: IETF-64 DNSEXT draft minutes
Ben Laurie <ben@algroup.co.uk> Wed, 09 November 2005 17:47 UTC
From: Ben Laurie <ben@algroup.co.uk>
Subject: Re: IETF-64 DNSEXT draft minutes
Date: Wed, 09 Nov 2005 17:47:32 +0000
Lines: 126
References: <6.2.5.6.2.20051108193850.0420fa40@ogud.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
Cc: namedroppers@ops.ietf.org
X-From: owner-namedroppers@ops.ietf.org Wed Nov 09 18:01:06 2005
Return-path: <owner-namedroppers@ops.ietf.org>
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on psg.com
X-Spam-Level:
X-Spam-Status: No, score=-2.6 required=5.0 tests=AWL,BAYES_00 autolearn=ham version=3.1.0
User-Agent: Mozilla Thunderbird 1.0.2 (X11/20050405)
X-Accept-Language: en-us, en
To: Ólafur Guðmundsson <ogud@ogud.com>
In-Reply-To: <6.2.5.6.2.20051108193850.0420fa40@ogud.com>
X-Enigmail-Version: 0.91.0.0
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
X-Message-ID:
Message-ID: <20140418072105.2560.17916.ARCHIVE@ietfa.amsl.com>
Ólafur Guðmundsson wrote: > NSEC3 Report and Discussion > There is an issue tracker available for NSEC3: > http://nsec3.nominum.org.uk/ I guess things to do with "name" in Latin are popular, but actually its Nominet, and the URL is really: http://dnssec.nominet.org.uk/nsec3 > Issue 6: There is a potential DoS attack on resolvers. > Evil editoritative servers can select such a high number of iterations typo: s/editoritative/authoritative/ > that resolvers are overwhelmed. The proposal is to allow resolvers to > specify an upper limit for iterations that it will accept and if a > response has a higher number the resolver will treat is as bogus. > > Olafur Gudmundsson asked why we can't get rid of iterations and just > use the salt. Ben explained that the iterations are designed to > increase the cost of a dictionary attack, while the salt is used to > increase the cost of a pre-computed dictionary attack. Olafur > rephrased his question to is the salt sufficient for the threats > people are seeing? Ben feels this is no, as a single iteration is > very easy to handle with a network probe. This is garbled: my point was that it is a requirement to make enumeration "as hard" in DNSSEC as it is in DNS. It is clear that this is not 100% meaningful, since the mechanisms are different, but NSEC3 at least means they both need a dictionary attack - in order to make the dictionary attack "as hard" then we need a knob we can turn to adjust the cost of computing whether a name is a match for a hash (corresponding to the effort required to send a query in DNS). Iterations is that knob. > Mike St.Johns said that if a number is going to be chosen, please put > it in the draft and be nice to implementors and users, don't make it > configurable, just set it across the board. Ben says if the working > group feels strongly about this it will be done. I would still argue that it should be configurable, but I'm OK with the draft stating a sensible default. > Trust Anchor Management Reports and Discussion > This space is rapidly growing with drafts and there has been very little > review by non-involved participants. The chairs urge the working group to > pay attention because this item is very important to deployment. > > Current Work: > > draft-ietf-dnsext-trustupdate-threshold-01.txt > A co-editor stated that this update was primarily to boilerplate to > refresh the draft so that it would be available for consideration. > A prototype implementation is currently being worked on. This and the > following 2 drafts have IPR claims on file with the IETF. The > co-editor stated that he's been working with his university lawyer > and can proceed on a prototype implementation. He expects it will be > ready by the end of the year and will make it available to a select > group of people who will not be affected by the IPR. > > draft-ietf-dnsext-trustupdate-timers-01.txt > The editor said this version is almost a boilerplate change to > refresh the document. He has started an implementation in dnsjava. > > draft-moreau-dnsext-takrem-dns-00.txt > draft-moreau-dnsext-sdda-rr-00.txt > The author presented slides on some basics of trust anchor management > including some discussion of requirements and how the TAKREM proposal > works. > > Ben Laurie asked why, since emergency key rollover doesn't depend _does_ depend on revocation > on key revocation and there will be some other mechanism to do > revocation, why not just use that? > draft-laurie-dnssec-key-distribution-00.txt > The author said the original idea behind this proposal was to do it > with x.509, but that x.509 has some issues with cross-signing and so > a future version will use PGP signatures. This is the only proposal > on the table that has no known IPR issues. > > Bill Manning asked about what transport this will use, as the user > is expected to visit a URL and follow a signature chain. His concern > is that the end-to-end assumption is increasingly wrong. Also, how > does the proposal cope when data can't be pulled from the URL? The > editor responded that http is the current transport, but really > anything can be used. Also, the data can be pulled from any location > so this shouldn't be an issue. I also think its kinda weird to have to deal with "the Internet doesn't work like its sposed to" in this draft - is Bill proposing that we also rework, say, HTTP, to fix this problem? > Russ Housley asked why this is solving the problem, as he thinks it > doesn't. I obviously blanked at this point, because I have no idea what Russ' problem was - it would be good to get a statement from him on this. > Also, this looks exactly like what x.509 was designed to do. > The author said that x.509 doesn't support multiple certificates with > the same DN, Russ said it did. I will be clarifying this with Russ later today. > Michael Richardson asked if there could be some sort of cross > signature threshold mechanism added so that resolvers only trust > what's going on when there are a minimum number of signatures. > The author said that this proposal was such that if a resolver > trusts a zone, then it trusts what the zone signs (and cross-signs). I should also note that (as I understand it) introducing thresholds would introduce IPR issues. Cheers, Ben. -- to unsubscribe send a message to namedroppers-request@ops.ietf.org with the word 'unsubscribe' in a single line as the message text body. archive: <http://ops.ietf.org/lists/namedroppers/>
- IETF-64 DNSEXT draft minutes Ólafur Guðmundsson
- Re: IETF-64 DNSEXT draft minutes Simon Josefsson
- Re: IETF-64 DNSEXT draft minutes Ben Laurie
- Re: IETF-64 DNSEXT draft minutes Mike StJohns
- Re: IETF-64 DNSEXT draft minutes Ben Laurie
- Re: IETF-64 DNSEXT draft minutes Geoffrey.Sisson