Dean Anderson wrote: >>1) What is more broken with DNSSEC then on DNS?
DNSSEC is, socially, more dangerous than PODS, because DNSSEC gives users false sense of security. > The question really should be 'What is LESS broken with DNSSEC than with > DNS?' Equally broken is bad, too. 'More broken' is clearly a disaster. > 'Not broken' is the goal. I was enlightened on two things through designing and improving simple secure DNS, which is a PKI-based cryptographically secure DNS consistent with PODS. They are: 1) precise authority model of referral and glue A, which is why I know how to fix cache contamination through glue A 2) Meaninglessness of DNSSEC, or PKI in general, with no better security than PODS Just like the Internet is a network of ISPs and end users, a PKI is a network of CAs and end users. If you can blindly believe in that CAs and end users are secure, you can blindly believe in that ISPs and end users are secure, both of which are, of course, wrong. However, with PKI the former is silently assumed and PKI is claimed to be cryptographically secure, which is the fallacy of PKI. For example, even if you make your signature generation mechanism not accessible online through the Internet, the mechanism must be, to keep the PKI work, accessible through the network of CAs and end users, which means the mechanism is effectively online, where "effectively" means attacking is equally easy. That is, WG discussion on securing NXDOMAIN has been totally meaningless. For another example, just as a packet with 16 bit ID and 32 bit source address should not be blindly believed, a person with an ID badge with 16 digit ID and issuer's name of your parent CA should not be blindly believed, though both of them are blindly believed so often. To break DNSSEC, a phishing site pretending as your parent CA and requesting you enter your private key is often enough. >>2) If DNSSEC is flawed, where is a better alternative? > I think there are indeed better alternatives. As I already posted, try to improve implementations to use TCP with random sequence number and random port, which is not more difficult than to improve caching behavior of implementations. Masataka Ohta _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop