> David Conrad wrote:
> 
> > So far, I have seen what appears to be a lot of FUD from Masataka and  
> > the usual concerns/complaints about DNSSEC from folks who haven't  
> > implemented it in their products or services.
> 
> Unlike me, you have no implementation expertise.
> 
> I did implement server code for my proposal of "Simple Secure
> DNS" more than 10 years ago to confirm that, unlike DNSSEC, it can
> be implemented easily. From the beginning, I knew it is essentially
> (except to support read/write new RR types from/to zone file) less
> than 100 lines of modification to BIND and it actually was so.
> 
> As a lazy implementor, I can design protocols to avoid useless
> implementation efforts. As a faithful protocol designer, I
> implement my design to confirm it actually require little
> implementation efforts.
> 
> At that time, because of fundamental complexity, there was no DNSSEC
> implementation.
> 
> Thus, I am the implementer who can authoritatively declare that all
> the impelementors and system administrators of DNSSEC do not
> understand both of DNS and PKI and are brain dead.
> 
> I, of course, won't bother to implement proven-to-be-fundamentally-
> broken DNSSEC nor join proven-to-be-useless attempts to improve
> the proven-to-be-fundamentally-broken protocol.
> 
> Anyway, the other problem of DNSSEC is that PKI, as a concept, is
> fundamentally broken, against which no PKI protocol can be useful.
> 
>                                               Masataka Ohta

        The current DNSSEC essentially matches "Simple Secure DNS".

                NSEC + RRSIG(NSEC) <=> ZL
                RSIG(type) <=> RRD + NSIG
                DNSKEY <=> ZA
                RRSIG(DS) <=> ZSIG
                DS <=> RDD(ZA)
        
        The trust model is the same as "Simple Secure DNS".
        The threat model is the same as "Simple Secure DNS".
        ZL has the same issues as NSEC has.

        KSK/ZSK maps directly into this from "Simple Secure DNS".

                                         A secure zone is a zone whose
   authentication is provided by the protocol whereas a secure node is a
   node authoritatively belongs to a secure zone.  A secure zone has its
   own secret information to generate signatures for secure nodes in the
   zone.

        DNSKEY uses public keys which you recommended.

                                The signature can be verified by
   sharing secret information between related parties or by using
   private/public key technology.

        RRSIG = TYPE + 32768 would have been better than how we
        actually did it in RFC 4035.

        While things are encoded slightly differently RFC 4035 is
        a implementation of "Simple Secure DNS".
        
        Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: [EMAIL PROTECTED]
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to