On 7 Mar 2010, at 08:06, George Barwood wrote:

If root-servers.net is unsigned, it's not possible for the resolver to validate
the set of root IP addresses

So what? If the served zones are signed, it simply doesn't matter if the address of a name server is spoofed or hijacked. The Bad Guy won't have the private keys, so will be unable to return answers which validate. In the context of a referral from the root, what matters is the signature over the TLD's RRset (and its KSKs), not the IP address of the root server or any signature that might or might not exist over its name.

(a) An attacker can control every unsigned zone.

(b) An attacker can monitor every request to a signed zone ( no privacy ).

(c) An attacker can deny service to any zone, on a selective basis.

It's not clear what point you're making or what your concerns are. None of these things listed above are remotely relevant. Apart from (a) which is hardly news: zones can be spoofed if they're not signed. [What next? Can we expect revelations about what bears do in the woods?] Privacy -- whatever that might mean -- has never been a design goal of DNS. Or Secure DNS for that matter. An eavesdropper can monitor *any* DNS request (signed or not) if they're close enough to the client or server. DoS attacks can and are mounted on any zone, whether or not they're signed. Meanwhile, in other news, water is discovered to be wet and fire is proven to be hot.

Apparently there are currently no plans to sign root-servers.net

There's no point doing that IMO until .net is signed and there's a single chain of trust from root-servers.net to the One True Trust Anchor, the signed root. If the zone was to be self-signed, that would mean yet another TA would need to be embedded and maintained in validator configurations. Which creates more failure modes and scope for errors. And since validating the answers for root-servers.net will rarely if ever matter, adding that TA would be a lot of risk for almost no reward.
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to