I've begun to propose an alternative to DNS/DANE, the PERSPECTIVES project from 
CMU, in version 01 of the problem statement: 
http://datatracker.ietf.org/doc/draft-malbrain-tls-strong-authentication.
 
Have you considered what changes to the DNS system would address your concerns? 
 I've proposed encrypted and authenticated connections in another thread.
 
Karl Malbrain
 

________________________________
 From: Simon Josefsson <[email protected]>
To: Karl Malbrain <[email protected]> 
Cc: perpass <[email protected]>; Stephen Farrell <[email protected]> 
Sent: Tuesday, September 24, 2013 3:48 AM
Subject: Re: [perpass] tld strong authentication deployment draft
  

Karl Malbrain <[email protected]> writes:

> I've uploaded a draft on tls strong authentication deployment:
>  
> http://datatracker.ietf.org/doc/draft-malbrain-tls-strong-authentication
> Any comments would be appreciated.

I believe that anything based on DNS is the wrong way forward if your
problem statement involve well funded adversaries.  I think DNS-based
distribution of keying material is a good way to simplify and bootstrap
opportunistic encrypted channels, however, it would not provide strong
authentication in the way that I would like to define it.

/Simon
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to