On Apr 25, 2009, at 5:56 AM, Holger Zuleger wrote:
Neither my Linux install nor my Mac OS X install supports TSIG resolver queries out of the box. Probably because you'd have to put the key in a publicly-readable file.
I worry that it's more complicated than that.
Plain HMAC-MD5 will not be a scalable solution. GSS-TSIG could help here. But this has some other drawbacks, e.g. as a third party authentication system, the client has to find the KDC first, and will mostly use DNS for that. So at the end we run into a chicken and egg problem.
But maybe I have overlooked something.

I think it's important to consider what's good enough. Right now, for instance, we all use ssh professionally to get work done. How many of us arrange to get the host key out of band? Probably close to none. How often do we get hosed by MiTM attacks because of this? It probably happens, but I haven't seen any evidence of it. Why? Because the frequency of these events is so low. The MiTM has to get the host key the *first time* you connect to a new host. So maybe once every few years, for any given host. It's not a very inviting target other than in cases of directed attacks, e.g. corporate espionage.

While this ad-hoc key distribution mechanism isn't foolproof, it's difficult to imagine how an off-path attacker could crack it. I think something similar could be done for DNS resolvers with SIG(0). Would it be completely secure? No. Would it be more secure than what we have now? Possibly. My main concern would be that an automated mechanism could be easily convinced to cache bad keys; any proposal that worked this way would have to be designed to avoid that pitfall.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to