I'm actually somewhat opposed to adopting Joe's trustanchor draft- I don't think the cost/benefit analysis works.

We already have a set of formats for trust anchors - DNS master file DS and DNSKEY records. What the document adds is a signature mechanism over those items (now formatted as either XML or ASN1) and then specifies the keys that are allowed to sign the trust anchors. However, the document completely avoids the question of how those signing keys are managed and protected, and .... wait for it ... replaced as trusted signers.

As I said at the microphone, all this does is move the trust problem back one step (two steps? I think I also have to trust the CA that issued the PGP keys as well as the owner of the PGP keys) and I'm pretty sure may have the result of weakening the actual security of the root for those clients foolish enough to accept the signed data without having human intervention.


There's a bootstrap problem that is generally solved by putting a human in the loop to make decisions. When we started this we published far and wide the hashes of the root trust anchor (KSK) and used that to bootstrap trust of the root zone. We used the "tell me N times" approach to data validation and I think we probably did pretty well with the whole trust establishment across the globe.

To make Joe's approach work, we would need to establish global trust in the ICANN CA, protect the CA keys and the PGP keys, document the hell out of how the signing gets done etc. I'm pretty sure this is neither worth it on the ICANN side (addl root signing costs), nor on the client side.

Later, Mike




_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to