I think the draft is very unclear on this (DNSSEC) point - at least I don't find this statement about the ENCRYPT RR being signed by with the private key of example.com.
Anyway : a RRSIG RR holds the name of the domain that signed in clear text. Kind regards, Marc On Fri, Nov 29, 2013 at 10:40 AM, W.C.A. Wijngaards <wou...@nlnetlabs.nl>wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Hi Marc, > > In the draft it says to store the ENCRYPT RR in this case at > ns.example.com. It would then be signed with the ZSK DNSKEY for > example.com, with normal DNSSEC chain of trust. > > But again, the authenticated operation is not the main aim of this draft. > > Best regards, > Wouter > > On 11/29/2013 10:28 AM, Marc Lampo wrote: > > Hello, > > > > (a reaction on second paragraph of 4. Authenticated Operation, > > only) > > > > That paragraph states that the ENCRYPT RR can be signed by DNSSEC. > > However, I don't think is possible ! > > > > A signature is the hash of DNS-data-sent, encrypted with the > > private key. But in this case : private key of who ? !!! not the > > root-zone, I hope. ? from the domain one is about to sent a query > > for (but the whole idea is to hide that kind of information !) > > > > But since this encryption is really between a DNS client and the > > DNS server it is about to query, it should be the "private key of > > that DNS server". But that is not what DNSSEC is about. > > > > Hence, I think ENCRYPT RR's cannot be protected by DNSSEC. > > > > Kind regards, > > > > Marc > > > > > > On Thu, Nov 28, 2013 at 2:25 PM, W.C.A. Wijngaards > > <wou...@nlnetlabs.nl <mailto:wou...@nlnetlabs.nl>> wrote: > > > > Hi, > > > > I also heard that this is the place to discuss DNS privacy. > > > > This draft is a protocol, and represents an (interesting) point in > > the solution space. I would refer to Borzmeyer's draft and Koch's > > draft for problem space analysis. > > > > http://tools.ietf.org/html/draft-wijngaards-dnsop-confidentialdns-00 > > > > It supports opportunistic encryption, i.e. try to encrypt but > > fallback to insecure. This supports deployment immensely, because > > clean DNS paths are uncommon. > > > > It supports stateless operation. It uses UDP. > > > > It supports encryption for stub-to-cache and cache-to-authority. > > > > Best regards, Wouter > > > > _______________________________________________ DNSOP mailing list > > DNSOP@ietf.org <mailto:DNSOP@ietf.org> > > https://www.ietf.org/mailman/listinfo/dnsop > > > > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.15 (GNU/Linux) > Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ > > iQIcBAEBAgAGBQJSmGEgAAoJEJ9vHC1+BF+NM2MP/3eUycaHd5l3eywpaevDj9HX > z1E7b3+ebH/cLGMAR0KD940aYw7xYlDG/6b83hqeEVdQVxD7ga6VUcOPImbfOX7o > h8AwJif9mFsGaPCFwxMiaGnF/NmdPAt+C9KNB9fNuEKWIGZbNCDjms7KpC6FDTua > JJ6lPLnuuWCiIUEiKbsjOEl2sJ2y8XV48+jvKuYYXc3EOL2tF0+/BiclXSB7Jw3y > YZ9caUU24teNVWU6g24SflxX/WdPRdSGAGFLYmFc2NEWrrXVvhmpmVGl9le/W6Lc > /pycV+yQZEK7NXP1KrAx28GSjlaJ8duKAXgAk8zsw7bEiqMPpzzNx7fp9pkXGbRy > KoEKMiOdnZGnqhIAx4H32ookjWuMnZFGY2FeKL0D3YsR9AgkuVbc+ga7MODwg6JH > 62WADFn8DZCzbNOGIc7375FiVpogCZfPOP5BjrN1VTWL6r3jxAClWZABhQ+gEfCt > 34+cxl83FaznxkvhK5DBQoQQmVdcitKOywkKgTlCPAd+gXSJ7SzzxrlcC5Vz0Py5 > xoRYjPOnFC/Fz3rrLzhFomsISftKeIsvuCRlqsnd/FMzkqwxhUtZuKlUYEJs5qbF > kxv39xcDrAlbpyYvK5o14LKzto9+7/zpWI/js/0A1gWaq62mbpoq67J+UbgYCASk > Ilm/xu2QrnoGLsAS9R3q > =8SfA > -----END PGP SIGNATURE----- >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop