On 10/13/2011 04:41 PM, Curtis Villamizar wrote:
> In message <[email protected]>
> Michael Richardson writes:
>  
>>>>>>> "Curtis" == Curtis Villamizar <[email protected]> writes:
>>     >> While talking about hardware.  These these devices all need a
>>     >> battery backed clock or all the crypto will be broken.
>>  
>>  
>>     Curtis> Having a clock is not hard but I don't think your statement
>>     Curtis> is true.
>>  
>>     Curtis> Some crypto does not require time, but rather just entropy
>>     Curtis> (a nonce or challenge).  For crypto that does require time
>>     Curtis> the former can be a bootstrap of sorts, possibly to get ntp
>>     Curtis> going if very accurate time is needed (for some reason).
>>  
>> Curtis, Mark, as a DNSSEC implementer knows of what he speaks.  DNSSEC
>> requires time.  Not to the second or even minute, but at least hour.
>>  
>> DNSSEC is a core protocol at this point, and we need to be aware of
>> it.  It doesn't matter today, because we have a broken home DNS
>> system, but that's within homenet to fix.
>>  
>> Bootstraping time enough to get DNSSEC to work is important.
>
> I was thinking routing protocols and KARP.
>
> We are talking about routers and relying on DNS to get routing up is
> always a really bad idea.  Relying on NTP to get routing up is also a
> bad idea.
>
> Neither KARP, as defined, or DNSSEC, are candidates for zero
> configuration.  If the user can configure KARP and DNSSEC they are
> perfectly capable of using a backdoor, like ssh, to set the time of
> day after a reboot that lost time-of-day.
>
> Sorry, but I lost track of why this is an issue for homenet.  What
> zero config crypto are we talking about that may care if it loses time
> of day?
>
DNSSEC.

And as routers are already being attacked, getting DNSSEC secure
end-to-end seems like the right strategy.
                - Jim

_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to