At 13:50 -0400 4/21/09, Paul Wouters wrote:

No, they just connect to the bogus largebank.com and steal more then your gross
turnover....

Ummm, psst, most banks here are bankrupt. ;)

I am tempted to lean towards using a KSK in an HSM, and using the ZSK without

I had the same thought at one point.  But...

As far as an HSM as one way to cover my bases in the event of litigation, that goes without question - especially when hypothetically speaking. But pragmatically speaking, I haven't seen a "proof" I need an HSM.

Yes, I could use some stress in my life, I hear it's a good way to lose weight.

At 13:59 -0400 4/21/09, Paul Wouters wrote:

Then you put your vulnerability period during emergency key rollover in the
hands of the RRSIG lifetime of the parent. That lifetime is probably even
longer then the time for the attack(er) to make it to CNN's broadcast that
hopefully warns your custmers.

The problem with revocation in DNSSEC is not limited to issues impacted by the choice whether to use an HSM. E.g., if the HSM uses a key that some one else guesses, you have the same problem whether you used an HSM or not. (I guess I suppose it's possible to have key dictionary attacks, for example.)

But I suppose that's far flung - I would hope an HSM does a good job at randomn number generation.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar                    You can leave a voice message at +1-571-434-5468

Getting everything you want is easy if you don't want much.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to