Ted Lemon wrote:
 
>> If you and your peer already have secure channel, you have no
>> reason to use DNSSEC for secure identification nor communication
>> with the peer.

> Ohta-san, this is clueless in so many ways.   It's inspiring.
> 
> First of all, perhaps you do have a secure channel to your trust  
> anchor.

First of all, you don't have a secure channel to a zone
administrator of some homepage you encountered during
netsurfing.

> This doesn't mean that you have a secure channel to all the  
> zones that depend from it.   So you can get the trust anchor key, and  
> because you have it, you can now validate all those zones for which  you 
> have no such secure channel.

The problem, then, is that the validation is indirectly hop by
hop, not end to end.

There will be MitM attacks on intermediate zones.

> This is what, e.g., the PGP key signing that happens at  
> every IETF is all about.

Another example of hop by hop security can not deny the fact that
DNS security is not end to end.

                                                Masataka Ohta

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to