>>>>> "Paul" == Paul Hoffman <[email protected]> writes:
    Paul> On Oct 31, 2011, at 8:09 PM, Michael Richardson wrote:
    >> If the entities are in fact a group who has an internal trust
    >> anchor:

    Paul> They have an entity they trust to make introductions. That's
    Paul> different.

Please explain, as I don't understand the difference.

    >> a) if they want to use DNSSEC, it only matters they have DNSSEC
    >> deployed for the part of the reverse zone they use, and that they
    >> have a trusted anchor into that.

    Paul> And if they don't? See below.

But, you said they did trust someone.

    >> b) a really simple way to get secure DNS data is to make every
    >> (gateway) machine a secondary for the zones in question.

    Paul> So in order to participate in this mesh, you need to be a DNS
    Paul> server. That seems a tad onerous.

huh?  
  1) DNS servers scale linearly with the amount of data.  
     Smartphones can trivially run DNS servers today, but I agree that
     it's not gonna fit into that Ardino.
  2) I said "be a secondary", that means doing a zone transfer, and
     possibly listening for notifies.  What you with the data once
     you receive it is really your own business.
        
    >> c) a second way is to simply point the /etc/resolv.conf and/or
    >> the DNS-forwarders to some *set* of internal servers, ideally
    >> authenticated with TSIG... OR, even do it over the single spoke
    >> to hub IPsec tunnel.

    Paul> That only works if the DNS servers are authoritative for zone
    Paul> in question. But...

    >> Finally, if we are talking IPv4, then the internal IPs are likely
    >> RFC1918, and so one can't use the public DNS anyway, so you have
    >> to do either (b) or (c) ANYWAY.

    Paul> It would have been nice if you put this assumption at the
    Paul> beginning of your message.

    Paul> We are *not* only talking IPv4. Further, for IPv4, we are
    Paul> *not* only talking private address spaces.

    Paul> If you want to extend your earlier protocol to handle
    Paul> non-opportunistic tunnel brokering for IPv4-only,
    Paul> private-address-space-only environments, that's great: I
    Paul> suspect that some people will gravitate towards it. But that's
    Paul> not the problem that is being discussed here.

It handles this case right today.
I wrote the assumption because, frankly, doing anything for IPv4 RFC1918
networks is a total hack.  It's 2011, and I assume people want IPv6.

If they have *only* 69888 /24s to connect (that's the entire RFC1918
address space), then that's only around 17M of data to store 69888 times
2048-bit raw rsa keys.   I guess I assuming the problem was bigger than this.

-- 
]       He who is tired of Weird Al is tired of life!           |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON    |net architect[
] [email protected] http://www.sandelman.ottawa.on.ca/ |device driver[
   Kyoto Plus: watch the video <http://www.youtube.com/watch?v=kzx1ycLXQSE>
                       then sign the petition. 


_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to