On 8October2013Tuesday, at 6:19, Phillip Hallam-Baker wrote: > > > > On Tue, Oct 8, 2013 at 8:53 AM, manning bill <bmann...@isi.edu> wrote: > > > > > > I think the US executive branch would be better rid of the control before > > the vandals work out how to use it for mischief. But better would be to > > ensure that no such leverage exists. There is no reason for the apex of the > > DNS to be a single root, it could be signed by a quorum of signers (in > > addition to the key splitting which I am fully familiar with). And every > > government should be assigned a sovereign reserve of IPv6 addresses to > > prevent a scarcity being used as leverage. > > > > -- > > Website: http://hallambaker.com/ > > Quorum signing with split keys was already built and tested in a > root server operator testbed (the OTDR testbed) from 1998-2005. It was > considered more fragile than the current system. > > Considered more fragile by whom? > > By the members of the $250m/yr NSA mole program? > > > Very few people in DNS land recognize the class of attack as being realistic. > Even when they have prime ministers and members of the GRU visiting them to > tell them how important the issue is to their country. > > We already have one example of lobbyists attempting this type of attack (see > Martin's post). So it is far from unrealistic. > > > At present ICANN's power over the DNS is entirely discretionary. Attempting > to drop Palestine out of the routing tables would simply be the end of the > ICANN root zone. ICANN could continue to manage .com but their influence over > the rest of the system would end completely. > > But DNSSEC changes the balance of power. With the root signed and embedded > infrastructure verifying DNSSEC trust chains, the cost of a switchover rises > remarkably. And when I tried to mention the fact I tended to get nasty > threats. > > The third question of power is 'how do we get rid of you'. The answer in the > case of DNSSEC is that you can't. > > > Fortunately the issue is quite easily fixed, just as the problem of using > IPv6 or BGP allocations for leverage is fixable. Governments don't need to > wait on ICANN or the IETF to develop a quorum signing model for the DNS apex, > they could and should institute one themselves and tell their infrastructure > providers to chain to the quorum roots rather than the monolithic apex root. > >
Been there, done that, outgrew the teeshirt. Interestingly, the perceived value of a common, global namespace is _MUCH_ higher than the value of a controlled, boundary constrained namespace… At least by nearly every government to date. The fragile vectors could be classed in two buckets, Human Factors & Timing. /bill