Re: [Trans] DNSSEC also needs CT

Paul Wouters <> Sat, 10 May 2014 21:31 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 156A11A00E8 for <>; Sat, 10 May 2014 14:31:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.651
X-Spam-Status: No, score=-2.651 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id PvGMni23-foC for <>; Sat, 10 May 2014 14:31:28 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id 8DEEA1A00DE for <>; Sat, 10 May 2014 14:31:28 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id 8EC2881703; Sat, 10 May 2014 17:31:22 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=default; t=1399757482; bh=5j+PDVPGakhqWjNauxedrHQOKOkqbcQWjFMWYqbOQxc=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=T6DyLKTVWe+KYK0mfzLwbBhWPfDFTJ8fElZb09iePS2HhR1vVUFma7aOkpZJmdF8m 4EhHDBnP6z8H9D9t6noYcOf+cfYB0NnvP0duQlg3WfKEa79wA5xDTVgZk2e55zdX/W Yv+6Q7geeSx01b8D7woAdDF8aRHoDvIomZz43LOw=
Received: from localhost (paul@localhost) by (8.14.7/8.14.7/Submit) with ESMTP id s4ALVMvn004379; Sat, 10 May 2014 17:31:22 -0400
X-Authentication-Warning: paul owned process doing -bs
Date: Sat, 10 May 2014 17:31:22 -0400
From: Paul Wouters <>
To: Warren Kumari <>
In-Reply-To: <>
Message-ID: <>
References: <> <> <> <>
User-Agent: Alpine 2.10 (LFD 1266 2009-07-14)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
Cc: "" <>
Subject: Re: [Trans] DNSSEC also needs CT
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Public Notary Transparency working group discussion list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Sat, 10 May 2014 21:31:33 -0000

On Sat, 10 May 2014, Warren Kumari wrote:

> On Fri, May 9, 2014 at 7:29 PM, Nico Williams <> wrote:
>> On Fri, May 9, 2014 at 6:12 PM, Phillip Hallam-Baker <> wrote:
>>> The simplest way to align things is to simply have a certificate
>>> issued for the DNSSEC zone KSK and plop that in the log as normal.
>> Sure, each zone acts as a CA for its children.  That works, I think.

The problem with that approach is that it does not make DNSSEC distinct
from the existing CA PKI. It will also not remove the cost factor of
getting a DNSSEC "certificate" from a "certified" CABforum member.

> I have previously had some discussions about including DNSSEC / DANE /
> self signed certs -- one of the objections / concerns was the threat
> of someone DoSing the logs by making up data (there is a cost to a CA
> cert, but I can create an infinite number of TLSA records or self
> signed certs).

Cost should IMHO not become a verification factor. That's the whole
reason https hasn't been universally deployed to begin with. We should
not make the same mistake with DNSSEC.

> The main incentive (that I can see) to DoS the logs would be for the
> lolz[0], and so (IMO) the protection does not need to be very strong -
> having someone have to solve a captcha or make a small payment (could
> become a donation) would be enough.

Or just say that anyone who puts in more than X amount of DNSSEC CT
entries underneath themselves must run a public CT node themselves. So
if want to get more then X entries, or one of their
subzones/customers wants more than X entries, either they or their
subzone/customer will have to run a fully functional CT node. And if
the node goes down, their new entries will be refused.