Brad;
> >> And what does this have to do with DNSSEC?
> >
> > The theory explains the reality that public key cryptography
> > (including DNSSEC) is not used for serious purposes.
>
> Not used for serious purposes?!?
No, not at all.
> Okay, let's have you run a B2B
> website where billions of dollars can be moved with the click of a
> single mouse button. Now, we have to ensure that you really are
> interacting with the real B2B website and not some clever fake, or
> worse, some site that performs a man-in-the-middle attack on you
> while you are conducting a real transaction, so that they can later
> go in and conduct multiple fake transactions.
Are you saying that the B2B website gladly accept a billion dollar
order from some unkown company just because a CA says the company's
domain name is not faked?
Purely techinically, if secret is shared between the website and the
company, shared key cryptography protect you from a clever fake and a
MITM attack.
But, it is not enough credential to perform serious commercial
transaction. The website should check credit status of its
members.
> How about home banking? Sure, hundreds, thousands, tens of
> thousands, etc... of dollars may not be a whole lot of money to you,
> but they may be the entire life savings of a family. Multiply that
> by 250 million people in the US alone, and you're talking about some
> real money.
Protection for home banking is by shared secret.
> > Such security is not useful for serious purposes, when no one is
> > really responsible if your transactions are spoofed.
>
> Okay, so we can all sue you for billions and trillions of dollars
> worth of damages when someone spoofs a DNS response packet which then
> leads us to be vulnerable to man-in-the-middle attacks.
Huh?
You can't ask root server operators for compasation for billions
and trillions of dollars worth of damages when someone spoofs a DNS
response.
Serious users protect them with shared secret. They don't blank-mindedly
rely on CAs not really offerring any serious compasation.
> No, in both cases. There are a multitude of heinously screwed up
> servers in this world, and a multitude of heinously screwed up
> routers, too.
And, there will be multiple screwed up CAs. Or, are there already?
So, have weakly secure Internet and DNS as a infrastructure and don't
rely on intermediate entities of servers, routers or CAs.
Masataka Ohta