-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Stephan,

There were acknowledged some drawbacks of using DNSSEC as the security
channel in this specific case. One is that you still do not cover
unscheduled key rollovers, as that event may occur as a result of a
compromised key. It is possible to cover if you use a different security
channel, as is described in the section 'Security Considerations'.
Another drawback is that a proxy parent (for example the registrar)
might not have the appropriate material available to use DNSSEC
verification.

Also, the intention of the memo is to provide a more general solution to
synchronize records between child and parent, which covers all required
records (not only DS) and can be used in all situations.

Best regards,

Matthijs

On 06/29/2010 05:15 PM, Stephan Lagerholm wrote:
> Hi Wolfgang,
> 
> My concern was not about the updates but rather about the gigantic
> number of keys a busy parent would have to create, revoke, store, renew,
> etc. 
> 
> It doesn't make sense to me to utilize symmetric encryption (such as
> TSIG) to solve this problem. A scheme that utilized an asymmetric key
> would be a much better fit. DNSSEC itself would be a strong candidate
> here.
> 
> Thanks, S
> ----------------------------------------------------------------------
> Stephan Lagerholm
> Senior DNS Architect, M.Sc. ,CISSP
> Secure64 Software Corporation, www.secure64.com
> Cell: 469-834-3940
> 
>> -----Original Message-----
>> From: dnsop-boun...@ietf.org [mailto:dnsop-boun...@ietf.org] On Behalf
> Of
>> Wolfgang Nagele
>> Sent: Tuesday, June 29, 2010 9:44 AM
>> To: Stephan Lagerholm
>> Cc: dnsop@ietf.org; Matthijs Mekking
>> Subject: Re: [DNSOP] Fwd: NewVersion Notificationfor
> draft-mekking-dnsop-
>> auto-cpsync-00
>>
>> Hi Stephan,
>>
>>> I like this draft but I'm a little bit concerned about the
> scalability.
>>> How will a busy parent provision a unique secret key for each of the
>>> child?
>> Do you mean the scalability for capacity on the update server side?
>> Although
>> BIND might not be able to scale this out of the box, the example has
> only
>> been
>> given in the draft to have a hands-on way for ppl to try this draft.
>>
>> In reality it should not be a major issue to receive those DNS updates
> and
>> process them (with or without signatures) - similar efforts are
> currently
>> made
>> for each request to change NS-sets on the parent (admittedly those
> might
>> happen
>> less frequent).
>>
>>> And how will this key be transported between the parent and the
>>> child in a secure way?
>> The same way a parent is currently providing a domain owner with
>> credentials for
>> their management interfaces. If a domain owner has specific
> requirements
>> in
>> terms of security on that channel it is something where registrars can
>> offer
>> whatever their customers demand.
>>
>> Regards,
>> Wolfgang
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJMK39zAAoJEA8yVCPsQCW5dPQIAMrzIXKfb3CnhCeAaZA5K6h7
RxLHEnCTh/NQvvFEOTWL+3zeBPP1CL3GO0meXFTUNw7e8kvjmKp7HvYz/3sHafFt
y6wbSmWfWCTgfXbDQfPXd3yxeY1JJBnDWfEbPISvYytB3AIV2YkfXSwa/OtpiFxz
FehVVToLllLARqMEpRuG+EWZZtEojDaPbJfDhyongixwPpaqD3nBzc9tnTkZIUby
4Ld0XZ+6pnBQdIIHXsulf7RxN/0uvwTR0PblLM38mmKB+nd4jebXsm4FjGiIX7zr
k6PXUQsoJdnAsa+TO4+ZF+/7Vl7IolYQo3O5D+3qwd30gWXSmwZxzgVN9NBw/7g=
=JkPp
-----END PGP SIGNATURE-----
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to