Brian, what you said about the crypto is right but there are definitely
opportunities to compromise trust at the tlds. I don’t think it’s wise to
ignore this type of attack. However, in order to make such an attack, you
have to do things which can be noticed (e.g. signing a zone delegation with
a forged key).

So the threat model for a viable  DNSSEC attack is quite a bit different
than for a recursive resolver attack, and is not something that could be
easily effected by a small entity.

Or to put it differently, the cost of a successful attack on DNSSEC would
be orders of magnitude higher than for an attack on a resolver. And unlike
a resolver attack, it is possible to detect a DNSSEC attack by comparing
known keys to detect a compromise. With a resolver attack, you have no way
to know that you’ve been spoofed.

On Tue, Mar 22, 2022 at 22:12 Brian Dickson <brian.peter.dick...@gmail.com>
wrote:

>
>
> On Tue, Mar 22, 2022 at 7:12 AM Masataka Ohta <
> mo...@necom830.hpcl.titech.ac.jp> wrote:
>
>> Paul Wouters wrote:
>>
>> >> Wrong. DNSSEC as PKI is not cryptographically secure subject to
>> >> MitM attacks on CA chains, which is not more difficult than
>> >> MitM attacks on ISP chains.
>> >
>> > I think at this point we have reached a point where your repeated
>> > claims lack any merit
>>
>> So, you ignore diginotar to have demonstrated that PKI to
>> blindly trust untrustworthy TTPs is cryptographically
>> insecure.
>>
>
> This is where your error is introduced. DNSSEC does not involve blind
> trust.
>
> Previous statements by you (Ohta-san) in this thread, and observations or
> counter-points:
>
> If a resolver correctly knows an IP address of a nameserver of a
>> parent zone and the resolver and the nameserver can communicate
>> with long enough ID, the resolver can correctly know an IP
>> address of a nameserver of a child zone, which is secure enough
>> data origin security.
>>
>
> The difference between this model (client to server transport security
> using IDs) and DNSSEC, is that DNSSEC is resistant to any MITM attacks, so
> long as the resolver's root trust anchor is the same as the one published
> by ICANN/IANA and used to sign the root zone.
>
> It is correct that the single element is a necessary component of the
> trust model for DNSSEC. It is not a dependency within DNSSEC that the
> endpoint's connectivity must be transport-secured or impervious to hijack.
> DNSSEC does not care where the data lives or how it is retrieved. It
> protects the data cryptographically.
>
>  The point is that DNSSEC, or PKI in general, is not cryptographically
>> secure merely blindly trusting untrustworthy intermediate systems,
>> which means it is against the end to end principle, improperly
>> called TTPs (Trusted Third Parties).
>
>
> I think this is where your argument fails. The trust in DNSSEC is not
> blind. The validation which is done by a resolver can be confirmed by an
> end-host, along the entire chain (tree) from root to leaf.
>
> In order to achieve complete compromise, the adversary (e.g. state) would
> need to compromise every software stack on every host and every resolver,
> and block access to every external place that could provide contradictory
> results.
>
> Given that the root trust anchor is public, and published on the IANA's
> web site with all the appropriate protections, this means anyone can
> publish the same information on their own web site, e.g. protected by TLS.
>
> The only way this would not be available to someone under the control of
> that adversary, would be the compromise of every CA's cert, or publishing
> competing certs for every TLS cert in existence, or to prevent any access
> to external sites entirely.
>
> The notion that a state exercising that level of control would also permit
> the long-enough ID communication to enable your alternative to function,
> does not seem credible.
>
> This devolves down to two possibilities: your method is not viable if the
> efforts needed to block use of the Root Trust Anchor are undertaken; or if
> the efforts needed to block the Root Trust Anchor are not undertaken (in
> their entirety), attempts to replace the Root Trust Anchor are detectable,
> which also means the real Root Trust Anchor can be obtained and validated,
> and once the latter is done, DNSSEC continues to be cryptographically
> secure.
>
> The actual real root trust anchor is not feasible to compromise, nor are
> the signing mechanisms involved for signing the root zone. A secured root
> zone and root trust anchor makes it impossible to compromise any zone
> protected by its parent, with the root zone anchoring those protections.
>
> DNSSEC is not blind trust. The ability to compromise via spoofing requires
> compromise of a parent. The root zone cannot feasibly be compromised.
> Therefore DNSSEC is secure.
>
>  I concur with the rest of the folks on this thread, this subject thread
> is effectively concluded.
>
> This message is mostly for your (Ohta-san's) benefit to understand why
> DNSSEC is not in the same category as WebPKI in terms of the trust model
> and trust mechanisms.
>
> There is an analogy in infinities:
> The rational numbers and real numbers are both infinite, but the infinity
> of the real numbers is "uncountable", a larger infinity than the infinity
> of the rational numbers, which are "countable".
>
> Brian
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to