George,

> On Jul 9, 2018, at 4:36 PM, George Michaelson <g...@algebras.org> wrote:
> 
> There's arguments both sides about cross signing, counter signing and
> independent self-signing. If you want to promote out of band zone
> exchange, it has to be signed. The key it signs with is immaterial if
> you either direct knowledge of the PK in a PKI, or accept a trust
> anchor relationship over it, or a web of trust.

I'm not here to promote out-of-band distribution, but I think its going
to happen (especially for the root zone) and I want something that works
just as well for in- and out-of-band distribution.

I think it makes sense that name server software, whether recursive or
authoritative, can use a technique like this to verify zone data, whether
it is loaded from disk or received over the network.  

The key may be immaterial, but I think the barrier to implementation is
much lower if it can be done with what we already have (DNSSEC) rather than
having to drag something like PGP in.



> So do you prefer (for instance) that the ZSK be used outside of DNSSEC
> to sign a detached signature over the file, irrespective or content
> order, if the file is to be made available?

Sorry I don't quite follow.  What we're suggesting is not a signature over
the file/data, but a hash over the data, which in turn can be signed.

> Because if you basically
> prefer its *not signed* for this mode of transfer, you've stepped

For me the mode of transfer is irrelevant.  My goal is to secure the data,
not the transfer.

> outside the model: you now demand the file is checked on load, element
> by element, against the TA, rather than being integrity checked by a
> MAC signed by the issuer, which permits eg direct binary loadable, or
> other states.

We're not demanding anything (MAY/SHOULD vs MUST) but what we propose is, as
you say, MAC signed by the issuer.

DW


> 
> -G
> 
> On Tue, Jul 10, 2018 at 7:47 AM, Wessels, Duane <dwess...@verisign.com> wrote:
>> 
>>> On Jul 8, 2018, at 6:02 PM, George Michaelson <g...@algebras.org> wrote:
>>> 
>>> So how about use of a PGP key which is a payload in TXT signed over by
>>> the ZSK/KSK so the trust paths bind together?
>>> 
>>> fetch one DNS record +sigs, check against the TA (which has to be a
>>> given) and then..
>> 
>> Currently in the zone digest draft DNSSEC is not mandatory.  That is, the 
>> zone
>> needn't necessarily be signed and a receiver need not perform the validation 
>> if
>> they don't want to.
>> 
>> Even without DNSSEC the digest gives you a little protection from accidental 
>> corruption.  But not from malicious interference of course.
>> 
>> It seems kind of silly to me to double up on public key cryptosystems.  We 
>> already have keys attached to zones and software that generates and 
>> validates signatures.
>> 
>> DW
>> 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to