On 2010-09-17, at 06:28, W.C.A. Wijngaards wrote:

> * The URL that iana published in their description is:
>  https://data.iana.org/root-anchors/root-anchors.xml
> * 'widely available trust certificates' to verify the https

We also specified

 - http:// URLs (no "s")
 - detached OpenPGP signatures
 - detached S/MIME signatures

> Are you sure that we want to create a cross-dependency on the https
> security for the DNS security?

Per above, there are multiple alternatives.

> This means the DNS and cert paths are no
> longer different trust paths.  And we should look at the attack vectors
> here.  If the root-key-prime fails, it is likely the machine will
> initiate this update machinery right away.  Assume a full MitM; say on a
> middlebox; it can make the root-key-prime fail and intercept traffic to
> that URL.

Let's also assume that a trust anchor for the ICANN CA which is used to create 
the detached S/MIME signature, or the PGP public key which is used to create 
the OpenPGP signature has been incorporated in some sensible way into operating 
system and/or DNS software distribution. This ought to represent a 
usefully-different path of trust to allow the authenticity of trust anchors 
received from the repository to be verified.

ICANN continues to offer to work directly with key software vendors to 
facilitate secure distribution of these trust points. We'll fly to your offices 
and hand them to you with signed attestations, if you want.


Joe
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to