[128084] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Kaminsky finds DNS exploit

daemon@ATHENA.MIT.EDU (Paul Hoffman)
Mon Jul 14 13:31:16 2008

In-Reply-To: <87ej5wa6c1.fsf@mid.deneb.enyo.de>
Date: Mon, 14 Jul 2008 09:06:57 -0700
To: Florian Weimer <fw@deneb.enyo.de>, John Levine <johnl@iecc.com>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Cc: cryptography@metzdowd.com

At 4:27 PM +0200 7/14/08, Florian Weimer wrote:
>Implementors say that in many cases, their software as it's currently
>implemented can't take the load.  It's not much worse than web traffic,
>that's why I think it can be made to work (perhaps easier with kernel
>support, who knows).  But code changes are apparently required.

That whole paragraph, taken together, makes no sense.

>And once you need code changes, you can roll out DNSSEC--or some
>extended query ID with 64 additional bits of entropy.

There is a difference between code changes in the kernel for some 
systems (which you allude to above), code changes and a universal 
rollout in all DNS software (which you allude to at the end), and 
stable rollout of the DNSSEC trust anchor system in every significant 
zone and all resolvers.

FWIW, only the latter has anything to do with this mailing list...

--Paul Hoffman, Director
--VPN Consortium

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post