On Sun, Sep 28, 2008 at 09:14:38PM -0700, Paul Hoffman wrote:
> In the last paragraph of 3.1.1, change:
>    These
>    can include the registry of the parent zone or administrators of
>    verifying resolvers that have the particular key configured as secure
>    entry points.
> to:
>    If there is a parent zone, these
>    can include the registry of the parent zone or administrators of
>    verifying resolvers that have the particular key configured as secure
>    entry points. If this is a trust anchor, everyone relying on the trust
>    anchor needs to roll over to the new key, which is a very big deal.

        when is a SEP not a TA?

> Remove all of 3.1.2. Longer keys are not useful because the crypto
> guidance is that everyone should use keys that no one can break. Also,

        crypto guidance from whom?  longer keys are useful for several
        reasons.

> it is impossible to judge which zones are more or less valuable to an

        value is in the eyes of the zoen admin, not a random hacker.

> attacker. An attack can only be used if the compromise is unnoticed
> and the attacker can act as an MITM in an unnoticed way. If .com is
> compromised and the attacker forges answers for somebank.com and sends
> them out as an MITM, when the attack is discovered it will be simple
> to prove that .com has been compromised and the KSK will be rolled.
> Defining a long-term successful attack is difficult for keys at any
> level.
> 
> Remove the first phrase of the fourth paragraph of 3.3. At the end of
> the paragraph, add:
>    Note that if a trust anchor replacement is done incorrectly, the
>    entire zone that the trust anchor covers will become bogus until
>    the trust anchor is corrected.

        manipulation of the TA/SEP nonces fundamentally changes the validators 
view of trust.
        one presumes that your assuming a single trust heirarchy and wiggling  
one piece to give
        a parallax view creates "bogus" data -from the perspective of one view 
of a trust heirarchy-.

        alternate trust heirarchies will emerge.

> 
> Here's the biggie. Separate all of section 4 into two distinct
> sections: zones publishing trust anchors, and zones publishing DS
> records to a parent. Make each heading clear which one is being
> discussed.
> 
> --Paul Hoffman, Director
> --VPN Consortium
> _______________________________________________
> DNSOP mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to