On Mon, Jan 31, 2011 at 5:14 PM, Joe Abley <jab...@hopcount.ca> wrote:

>
> > Either way, it's a local trust anchor... and I don't see why X.509
> > keys are any less compromisable than DNS keys...
>
> The difference is that X.509 keys, as deployed by CAs, have expected
> lifetimes measured in decades. Right now we don't know what the expected
> lifetime of the root zone KSK is.
>

To be precise here, there is no difference in the likelihood that the keys
will be compromised.

The difference is that the X.509 protocol is designed to support keys that
are persistent over long periods (decades) and DNSSEC is not.

In particular an X.509 self-signed certificate is an assertion that the key
holder will maintain and use the associated private key in accordance with
the specified practices for the specified length of time.

You can easily find out how long Comodo or Symantec or whoever is going to
maintain their SSL CA roots, the information is right there in the cert
store and is irrevocable in that the CA can extend the time period (through
recertification) but cannot reduce it.


My advice to Cisco would be to use their existing root to sign the published
CSR for the DNS root KSK in the short term at least.

In the longer term we are going to have to have a look at the problem at a
higher level and work out how we are going to solve it in a scalable way
across all the platforms that involve a root key.

We are starting to make quite a little collection of industry forums that
are doing this root key management as a sideline.

-- 
Website: http://hallambaker.com/
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to