On Thu, Jan 21, 2010 at 12:12:50PM -0800, Eric Rescorla wrote: > On Thu, Jan 21, 2010 at 11:38 AM, Paul Hoffman <paul.hoff...@vpnc.org> wrote:
> > is still much higher than the value of the broken key. Remember > > that a broken signing key is only valuable until the fact that it > > is broken is discovered and fixed. So, even if an attacker breaks > > your signing key, when he/she starts to use it for nefarious > > purposes and you discover that, you roll your key and the entire > > time of breaking the new key must be used again before they can > > mount another attack. > > Exactly. So rolling it preemptively doesn't help much. What about the argument that you might not discover the nefarious use (because a small number of DNS transactions, carefully selected, are the only misdirected ones, and everything else appears normal, so you chalk it up to user error)? Remember that unlike many cryptographic protocols, there's no real end-to-end communication here. It could well be hard for a key owner to detect the compromise in a DNS context than in many other contexts. If one accepts that argument (I don't know I do, but let's accept it for the sake of argument), then rolling regularly (modulo jitter) could be argued for on the grounds that it will cut off even undetected compromises. A -- Andrew Sullivan a...@shinkuro.com Shinkuro, Inc. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop