Am 2014-07-31 17:10, schrieb Paul Wouters:
On Thu, 31 Jul 2014, Rene Bartsch wrote:

It seems DNSSEC/DANE helps against most hackers and attackers but cannot protect from attackers which have access to both the trust anchor keys and routing infrastructure.

Whom do you trust? "No one" is not a valid answer.

http://en.wikipedia.org/wiki/Bundesnachrichtendienst#History

In global communication I only trust mathematically proven algorithms. But don't worry, I trust people I've known for years personally. ;-)

The best we can do is
audit/log the KSKs and do some kind of "N of M" verification that such
keys are in the public world view. Of course, that leads to small
outages during rollovers....

Do the DNSSEC RFCs allow to distribute public KSKs of TLDs with resolver software?

Of course. That's not so much a matter of protocol but of local policy.

Paul

In hierarchical architectures we always have a more or less trustworthy anchor. So we should clearly describe the security limitations in the security considerations section. Real security has to wait until the next evolution step of the internet (maybe blockchains?).

Renne


--
Best regards,

Rene Bartsch, B. Sc. Informatics

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to