[134196] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: .gov DNSSEC operational message

daemon@ATHENA.MIT.EDU (Kevin Oberman)
Tue Dec 28 22:25:08 2010

To: Jay Ashworth <jra@baylink.com>
In-reply-to: Your message of "Tue, 28 Dec 2010 21:17:57 EST."
	<11723331.3042.1293589077547.JavaMail.root@benjamin.baylink.com> 
Date: Tue, 28 Dec 2010 19:24:54 -0800
From: "Kevin Oberman" <oberman@es.net>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

> Date: Tue, 28 Dec 2010 21:17:57 -0500 (EST)
> From: Jay Ashworth <jra@baylink.com>
> 
> ----- Original Message -----
> > From: "Florian Weimer" <fw@deneb.enyo.de>
> > > That sounds like a policy decision... and I'm not sure I think it sounds
> > > like a *good* policy decision, but since no reasons were provided, it's
> > > difficult to tell.
> > 
> > I don't know if it influenced the policy decision, but as it is
> > currently specified, the protocol ensures that configuring an
> > additional trust anchor never decreases availability when you've also
> > got the root trust anchor configured, it can only increase it. This
> > means that there is little reason to configure such a trust anchor,
> > especially in the present scenario.
> 
> Not being a DNSSEC maven, the idea that there was no out-of-band way to 
> confirm what the in-band method was telling you seemed bad to me; Matt's 
> explanation, OTOH, seems sensible.

There is no reason that you could not do OOB transfers of keys, but it
would be so cumbersome with the need to maintain keys for every TLD
(and, for that matter, every zone under them) and deal with key rolls at
random intervals and confirm that the new keys you were getting were, in
fact legitimate would be more than overwhelming. It just does not scale.

DNSSEC(bis) was designed to deal with this by being able to
cryptographically confirm that all data is valid and all keys are
legitimate as long as you have the root key. I am not about to go into
how all of this is accomplished, but it does.

Some parts of it are still a bit fragile, but the basic DNSSEC spec is
now very solid and the implementations of it are getting to pretty
good. (Can hardly wait for BIND 10!)

I think the DNSSEC spec is a very good basket and I hope that the
current implementations are, as well. At least I am very confident
that they will fail-safe.
-- 
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: oberman@es.net			Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751


home help back first fref pref prev next nref lref last post