In message <cffe5fc9.4d653%[email protected]>, "Wiley, Glen" writes:
> Renne,
> 
> While it is technically true that the holder of the trust anchor could
> alter key material it would be impossible to accomplish unnoticed.  In
> order for a trust anchor to change your zone (say by changing an A record)
> they would have to create a new private key (and corresponding public key)
> then sign the altered RR set.
> 
> Your DNS key signing and zone signing keys should be protected with as
> much diligence as your private signing and encryption keys.
> 
> It is as though a locksmith would have to change the locks on a house in
> order to open the door.  Sure they can do it but the homeowner will notice
> immediately when their keys no longer work.  My analogy breaks down if you
> take it too far, but I hope it conveys the point.
> 
> I am far more worried about vectors that can be leveraged passively and
> unobtrusively.
> 
> I agree that we should be open about DNSSEC/DANE however the holder of the
> trust anchor can not manipulate the DNS without being detected.

If one can intecept the packets one could fake up a world view.
This would be detectable if you have trust anchors for the parts
of the world being faked.

If one can't intercept the packets it will be almost certainly be
detected.

Maintaining a set trust anchors for all the TLD's would defeat most
of the threat.  A state agency would have to compromise multiple
tlds to pull this off not just the root.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: [email protected]

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to