Brian Dickson wrote:
Are there anyone who still think DNSSEC were cryptographically secure or had protected TLDs more securely than diginotar?
I'm not sure why "thinks" enters into the conversation.
You may replace it with "dreams".
The facts are what matters here:
The important facts are that: DNSSEC is not cryptographically secure. DNSSEC "at the TLD level and higher", which include root zone, is only as trustworthy as diginotar.
Taken together, this means that as long as there exists any CA which is weaker than some TLD, that automatically means that as a global system, DNSSEC is more cryptographically secure than WebPKI.
First, "CA" is terminology not specific to WebPKI, whatever it means, but PKI in general including DNS. That is, a DNSSEC TLD is a CA. Second "any CA which is weaker than some TLD" means not "cryptographically weaker" but "operationally/physically weaker". As such, your conclusion can only be "DNSSEC is more operationally/physically secure than WebPKI" Third, all the CAs, including TLDs, pursuing commercial success have very good appearance using such words as "HSMs" or "four eyes minimum". That is, you can't compare actual operational/physical strength from their formal documents. Remember:
At the TLD level and higher, this involves HSMs and physical access restrictions using a "four eyes minimum" approach. > Not surprisingly, diginotar was equally strongly secure.
Masataka Ohta _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop