[128977] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNSSEC and SSL

daemon@ATHENA.MIT.EDU (Jakob Schlyter)
Sun Aug 22 05:47:15 2010

From: Jakob Schlyter <jakob@kirei.se>
In-Reply-To: <4C7076B5.9050103@kenweb.org>
Date: Sun, 22 Aug 2010 11:46:41 +0200
To: ML <ml@kenweb.org>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 22 aug 2010, at 03.00, ML wrote:

> Would a future with a ubiquitous DNSSEC deployment eliminate the =
market
> for commercial CAs?
>=20
> Would functioning DNSSEC + self signed certs be more =
secure/trustworthy
> than our current system of trusted CAs chosen by OS/browser =
developers?

For DV (domain validation) certificates one can definitely make that =
claim, but for EV (extended validation) I would see certificate =
validation in DNSSEC as a complement to EV.

DNSSEC and EV together looks like a promising combination.

Disclaimer: I am co-author of =
http://tools.ietf.org/html/draft-hoffman-keys-linkage-from-dns-00 (work =
in progress, see http://www.ietf.org/mailman/listinfo/keyassure for more =
information).


	jakob



home help back first fref pref prev next nref lref last post