On Mon, Jan 31, 2011 at 5:14 PM, Joe Abley <jab...@hopcount.ca> wrote:
> > > Either way, it's a local trust anchor... and I don't see why X.509 > > keys are any less compromisable than DNS keys... > > The difference is that X.509 keys, as deployed by CAs, have expected > lifetimes measured in decades. Right now we don't know what the expected > lifetime of the root zone KSK is. > To be precise here, there is no difference in the likelihood that the keys will be compromised. The difference is that the X.509 protocol is designed to support keys that are persistent over long periods (decades) and DNSSEC is not. In particular an X.509 self-signed certificate is an assertion that the key holder will maintain and use the associated private key in accordance with the specified practices for the specified length of time. You can easily find out how long Comodo or Symantec or whoever is going to maintain their SSL CA roots, the information is right there in the cert store and is irrevocable in that the CA can extend the time period (through recertification) but cannot reduce it. My advice to Cisco would be to use their existing root to sign the published CSR for the DNS root KSK in the short term at least. In the longer term we are going to have to have a look at the problem at a higher level and work out how we are going to solve it in a scalable way across all the platforms that involve a root key. We are starting to make quite a little collection of industry forums that are doing this root key management as a sideline. -- Website: http://hallambaker.com/
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop