On Aug 26, 2008, at 1:06 PM, Dean Anderson wrote:
> How could their testing and analysis be considered 'thorough' or
> credible when they didn't find the very serious flaws just recently
> identified on this list?

To summarize, the two "flaws" to which you refer are:

   (1) there is no cryptographic defense against an attack where the  
attacker convinces the target that a zone that does not exist at all  
does exist.
   (2) replay attacks are possible during the lifetimes of zone  
signatures, which would either convince the target that a zone that  
has been removed still exists, or that a zone that has been added does  
not exist.

These are both known limitations that are explicitly mentioned in the  
protocol document, not oversights on the part of the protocol  
developers which have just been discovered by you.

If you had a problem with (1), you should have raised this back when  
the working group made this change.   At the time it seemed like a bad  
idea to me, but there were good reasons for doing it; what this  
limitation means is that your delegations are not signed for free - if  
you want any security at all out of DNSSEC, you must sign your zone.

I don't see any way around (2), but would be interested in hearing any  
proposals you have.   Replay attacks are a problem in protocols with  
long-lived signatures, and this is one variable to take into account  
when choosing a zone signature lifetime.

Also, of course, if I have mischaracterized the limitations to which  
you refer, I would be interested in being corrected - are there any  
additional lies that can be told using the second flaw, for example?

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to