On Thu, Jan 21, 2010 at 12:12:50PM -0800, Eric Rescorla wrote:
> On Thu, Jan 21, 2010 at 11:38 AM, Paul Hoffman <paul.hoff...@vpnc.org> wrote:

> > is still much higher than the value of the broken key. Remember
> > that a broken signing key is only valuable until the fact that it
> > is broken is discovered and fixed. So, even if an attacker breaks
> > your signing key, when he/she starts to use it for nefarious
> > purposes and you discover that, you roll your key and the entire
> > time of breaking the new key must be used again before they can
> > mount another attack.
> 
> Exactly. So rolling it preemptively doesn't help much.

What about the argument that you might not discover the nefarious use
(because a small number of DNS transactions, carefully selected, are
the only misdirected ones, and everything else appears normal, so you
chalk it up to user error)?  Remember that unlike many cryptographic
protocols, there's no real end-to-end communication here.  It could
well be hard for a key owner to detect the compromise in a DNS context
than in many other contexts. 

If one accepts that argument (I don't know I do, but let's accept it
for the sake of argument), then rolling regularly (modulo jitter)
could be argued for on the grounds that it will cut off even
undetected compromises.  

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to