On 30 Sep 2010, at 20:04, Joe Abley <jab...@hopcount.ca> wrote:
> 
> I don't follow your logic.
> 
> You seem to be saying that trust-history, which uses keys that should not be 
> trusted, is better than using the root-anchor repository, where there are 
> still some open questions.

I am making a distinction between bootstrapping and normal operations. A key 
that should not be trusted for normal ops may still be useful for bootstrap.

The threat we are trying to deal with is a combination of a root KSK compromise 
and widespread attacks on software that is bootstrapping its DNS trust anchor. 
(Happily the first is unlikely and the second is a narrow target.)

With trust anchor history in the DNS, a validator can start from a stale trust 
anchor, confirm that it is stale, update it to a provisional trust anchor, 
start its DNSSEC service, use the working DNS layer to obtain additional 
signatures that affirm that the provisional trust anchor is in fact OK, then 
make the service available to other users.

Without trust anchor history, you start off with a trust anchor that is broken, 
and the only option is to downgrade to insecure DNS and use that to get the new 
trust anchor and its signatures.

It seems to me that keeping the trust anchor history in the DNS should make it 
possible to reduce the attack window a lot. This is particularly true if the 
history zone has a short delegation chain from the root, to minimise the number 
of insecure queries a bootstrapping validator must make.

> Isn't the right approach to answer those open questions?

I think the answer requires a solution to exactly the same problem, except the 
keys and signatures are at higher levels in the protocol stack. How does a 
bootstrapping device deal with a rollover of the IANA web server's 
certificate's CA? Or of the special CA that IANA uses to sign the root KSK?

The policies and procedures for managing the root zone keys are well documented 
and performed in the open. It is all very impressive. If you want bootstrapping 
to be as convincingly secure, you are going to have to duplicate all this 
ceremonial for the higher level keys. This seems redundant to me.

Tony.
--
f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to