Mark Andrews wrote:

>       The current DNSSEC essentially matches "Simple Secure DNS".

Well, mostly. Thank you for your pointer to RFC4035 I ignored.

And, congratulations that the WG has wasted only 10 years of
implementation and operational experiences to reach the
conclusion that the original DNSSEC is, as I said with a small
implementation and no operational effort, broken.

Now, I'm saying, for these 10 years, that PKI, including DNSSEC,
is broken.

Can't you simply believe me?

>               NSEC + RRSIG(NSEC) <=> ZL
>               RSIG(type) <=> RRD + NSIG
>               DNSKEY <=> ZA
>               RRSIG(DS) <=> ZSIG
>               DS <=> RDD(ZA)

>       RRSIG = TYPE + 32768 would have been better than how we
>       actually did it in RFC 4035.

Yes, An essential difference is that NSIG is a lot more compact than
entire RSIG or RRSIG.

However, another essential difference is that as you increases the
variations of cryptography algorithms, the size of the entire RSIG
or RRSIG increases, which is, IMO, more serious than the increase
of possible RR types.

So, I designed simple secure DNS so that everything fits within
512B assuming RSA data of 1024 bit or 1500B assuming 2048 bit
(Unlike many Japanese, I don't believe in PK with elliptic
functions).

>       ZL has the same issues as NSEC has.

The non-issue is based on a misunderstanding that online generation
of signature were insecure, even though the signature generation
mechanism must, anyway, be socially accessible.

That signature generation mechanism is accessible on line dose not
necessarily mean that a private key is accessible on line.
 
>       KSK/ZSK maps directly into this from "Simple Secure DNS".

I have no idea on what KSK/ZSK means. But, it's OK.

>       DNSKEY uses public keys which you recommended.

As a person who dose understand PKI but without much expertise on it,
I was not sure that public key cryptography was reliable. So, I tried
to make "Simple Secure DNS" work with shared key cryptography with
KDCs.

Now, I'm sure neither CAs nor KDCs are not very reliable, because
they need blind belief on intelligent intermediate entities of CAs
or KDCs, directly violating the end-to-end principle.

                                                Masataka Ohta


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to