Hello,

(a reaction on second paragraph of 4. Authenticated Operation, only)

That paragraph states that the ENCRYPT RR can be signed by DNSSEC.
However, I don't think is possible !

A signature is the hash of DNS-data-sent, encrypted with the private key.
But in this case : private key of who ?
!!! not the root-zone, I hope.
? from the domain one is about to sent a query for
   (but the whole idea is to hide that kind of information !)

But since this encryption is really between a DNS client and the DNS server
it is about to query, it should be the "private key of that DNS server".
But that is not what DNSSEC is about.

Hence, I think ENCRYPT RR's cannot be protected by DNSSEC.

Kind regards,

Marc


On Thu, Nov 28, 2013 at 2:25 PM, W.C.A. Wijngaards <wou...@nlnetlabs.nl>wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi,
>
> I also heard that this is the place to discuss DNS privacy.
>
> This draft is a protocol, and represents an (interesting) point in the
> solution space.  I would refer to Borzmeyer's draft and Koch's draft
> for problem space analysis.
>
> http://tools.ietf.org/html/draft-wijngaards-dnsop-confidentialdns-00
>
> It supports opportunistic encryption, i.e. try to encrypt but fallback
> to insecure.  This supports deployment immensely, because clean DNS
> paths are uncommon.
>
> It supports stateless operation.  It uses UDP.
>
> It supports encryption for stub-to-cache and cache-to-authority.
>
> Best regards,
>    Wouter
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.15 (GNU/Linux)
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>
> iQIcBAEBAgAGBQJSl0RiAAoJEJ9vHC1+BF+NbOcP/03f76fPIp8rkKtjYdjTHbZ7
> qoMFVsIbZ6GqoB77U2w2dtVEirfqLkcBQ5gE1LzLGL/AS4aKVBg7GLAY/qv1o+BM
> YIvoecRd+P+/mzZZtROJbpe3Pp3ktsL9+A4SaChpWBWPR7qCUKGh2R0YWq6hHj0h
> btIOFROGnt/QH0Pho7/0N9UfNBVlc6By8BSwON2kiR9bD+oyCDGxJQ85N03p8FJo
> kVIZM6PtsUHQxhX4rhQec5t/LBu1oXVq5tdVSzjiIYZAcUI9lLfv7f7o1QccAIUF
> YZ/u1OvIp3l6iKNK3eLrimXRu7dFR09aqUcbYD0LNci6g4AY0awPYk2TE5OtQ1Ll
> SHpil/QzKA0V4QPANfZNBV/wL5SitnQuS6fLYkKnsjSED8AUINNLqYttSo+wPEMs
> ReCPI51pyuvL0E/ZkfiKRsfb8qiuFh1OkCLFgJZMVzecLcOvrVfxxf4SNe8Z8i7F
> IzSNikgqSzIK/hQSEMVjk9O+f97/muQw0fCiqGbIS9hUntEwJ90/Ji20dxlz2aj7
> V7nuC4wz53VWHtIYhiDMP2P9Twbh40TmdIf9yWFZzkayryBVwH5gTuU1ZqL2sVc6
> qMolnaKQdTFnM4jAMzfYBuHyUzFTRqG1u9IXLskmBl0tDAOH0cRV4bD6oH8BZd+X
> v//pHQiVWuyMbndChPrm
> =PdRr
> -----END PGP SIGNATURE-----
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to