Re: [TLS] [pkix] Cert Enumeration and Key Assurance With DNSSEC

Peter Gutmann <pgut001@cs.auckland.ac.nz> Sun, 03 October 2010 04:13 UTC

Return-Path: <pgut001@cs.auckland.ac.nz>
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 84D7A3A6CC3; Sat, 2 Oct 2010 21:13:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.423
X-Spam-Level:
X-Spam-Status: No, score=-3.423 tagged_above=-999 required=5 tests=[AWL=0.176, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qVgnXRAKWe6t; Sat, 2 Oct 2010 21:13:17 -0700 (PDT)
Received: from mx2-int.auckland.ac.nz (mx2-int.auckland.ac.nz [130.216.12.41]) by core3.amsl.com (Postfix) with ESMTP id F34743A6CBA; Sat, 2 Oct 2010 21:13:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=auckland.ac.nz; i=pgut001@cs.auckland.ac.nz; q=dns/txt; s=uoa; t=1286079250; x=1317615250; h=from:to:subject:cc:in-reply-to:message-id:date; z=From:=20Peter=20Gutmann=20<pgut001@cs.auckland.ac.nz> |To:=20hallam@gmail.com,=20marsh@extendedsubset.com |Subject:=20Re:=20[pkix]=20[TLS]=20=20Cert=20Enumeration =20and=20Key=20Assurance=20With=20DNSSEC|Cc:=20benl@googl e.com,=20dnsop@ietf.org,=20pkix@ietf.org,=20saag@ietf.org ,=0D=0A=20=20=20=20tls@ietf.org|In-Reply-To:=20<AANLkTik4 MeDWDRxXLkPd8k6HPVeKY9_7p4FQWzyXwvFD@mail.gmail.com> |Message-Id:=20<E1P2Fxe-0007zZ-C6@wintermute02.cs.aucklan d.ac.nz>|Date:=20Sun,=2003=20Oct=202010=2017:14:06=20+130 0; bh=T3vmDS0FinxYWvomixy3afWZwpCIHxwHJgqJNNNc46I=; b=PQMaKsEz+teqejsdUVJPkBgPezRaV6cELAOdxDOnoywHZKZ0GtN/xZ3r 86DiPN5GzlRNtLHwg2hjZpQXI5rKNyAQWhig3v7F1zkFJmFKOrFbD6Cbi f9eWjA6dJocxRZN34AEvoJYPQ8nD2HNo03dp3FX+O6mT21ej0g7SUpxtM o=;
X-IronPort-AV: E=Sophos;i="4.57,273,1283688000"; d="scan'208";a="29379051"
X-Ironport-HAT: UNIVERSITY - $RELAY-THROTTLE
X-Ironport-Source: 130.216.207.92 - Outgoing - Outgoing
Received: from wintermute02.cs.auckland.ac.nz ([130.216.207.92]) by mx2-int.auckland.ac.nz with ESMTP/TLS/AES256-SHA; 03 Oct 2010 17:14:06 +1300
Received: from pgut001 by wintermute02.cs.auckland.ac.nz with local (Exim 4.69) (envelope-from <pgut001@cs.auckland.ac.nz>) id 1P2Fxe-0007zZ-C6; Sun, 03 Oct 2010 17:14:06 +1300
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: hallam@gmail.com, marsh@extendedsubset.com
In-Reply-To: <AANLkTik4MeDWDRxXLkPd8k6HPVeKY9_7p4FQWzyXwvFD@mail.gmail.com>
Message-Id: <E1P2Fxe-0007zZ-C6@wintermute02.cs.auckland.ac.nz>
Date: Sun, 03 Oct 2010 17:14:06 +1300
Cc: pkix@ietf.org, dnsop@ietf.org, saag@ietf.org, tls@ietf.org
Subject: Re: [TLS] [pkix] Cert Enumeration and Key Assurance With DNSSEC
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Oct 2010 04:13:20 -0000

Phillip Hallam-Baker <hallam@gmail.com> writes:

>The attack surface is the number of paths that are open to an attacker.
>
>In the current model there is only one trust path, the PKIX path.

Which isn't so much a path as a twelve-lane motorway with elevated cloverleaf
interchanges, twenty-four-hour drive-through catering stops, and large neon
signs every few km inviting every attacker to join in.

>In the new model, the attacker has a choice of trust paths, the PKIX path and
>the DNSSEC path and they can attack either of them.

Or you can block off the PKIX motorway and leave only the (possibly) smaller
DNSSEC two-lane road.

(I'm not sure whether DNSSEC has a smaller overall attack surface than PKIX,
but chances are it does because the only security protocol with an even larger
attack surface than PKIX is XMLsec, whose attack surface is so huge that it
won't fit on the planets surface but actually extends several km out into
space).

Peter.