Joe Abley wrote:

On 21-Aug-2009, at 10:08, W.C.A. Wijngaards wrote:

Is available for review and comment.  This represents my take on how
to perform trust-anchor management for a validator without having
a system update mechanism (which works with unsafe DNS).

I don't remember whether I've expressed my concerns about this work in e-mail before. I remember talking to people in Stockholm about it.

Keys are rolled for a reason. You can't always tell from the outside, as an automated device, what the reason was -- it could be that it's a conservative defence against a possible factoring attack having been executed within a particular time, or it could be due to a key compromise.

A historical key has been replaced by a new one. A historical key is not to be trusted. Signatures made by a historical key are not to be trusted.

This work seeks to solve a real problem, as far as I can see -- the problem of how a validator which has been disconnected from the network for some period of time can bootstrap itself based on a trust anchor that was once good.

It's not clear to me that using signatures from keys which are known not to be trusted is a good way for such validators to bootstrap themselves. In fact, I suggest that in general it's a bad way to do it, since in the event of key compromise the result could be the propagation of rogue trust anchors which might be hard to identify operationally.

I have doubts that there is *any* general, in-protocol mechanism for this problem to be solved. It seems possible to me that the right answer may be that individual validators need to implement their own out-of-band mechanisms for acquiring an initial trust anchor, e.g. using existing software update mechanisms and other cryptographic means of establishing trust (e.g. TLS/X.509).

If I was to sum up my concern in one sentence, it would be "if you can trust old keys sufficiently to use them to find a trust anchor, you don't need to roll them in the first place".
Joe - the question becomes one of the integrity of the records process and what provides some sense of non-repudiation in the operations of the trust model. Remember the Envelope of Trust (that's the accompanying term to "Trust Anchor") is what has to be maintained and that's key.

That said there are all kinds of PKI Operations Practice reasons including "its part of our policy to roll keys periodically" so it is appropriate that this was available. It might also be cool to create a historical entry somewhere as to why and to allow down-wind client's of this type of anchor to decide whether they want to trust that roll or continue using the existing cached images instead of updating.

I bring this up because a hacking of the trust-anchor is a reality that DNS hierarchies are going to be forced to deal with. That means that RELYING PARTIES (i.e. DNS servers which reference those trust-anchored sources) need to be able to from a policy control standpoint - decide whether they update or trigger an alarm to the local DNS Master.

Todd Glassey CISM CIFI


Joe

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop
------------------------------------------------------------------------


No virus found in this incoming message.
Checked by AVG - www.avg.com Version: 8.5.409 / Virus Database: 270.13.65/2324 - Release Date: 08/24/09 12:55:00


_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to