[36183] in Kerberos

home help back first fref pref prev next nref lref last post

Insisting on DNSSEC (was: tickets with wrong DNS)

daemon@ATHENA.MIT.EDU (Rick van Rein)
Mon Jun 9 02:36:22 2014

Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.2\))
From: Rick van Rein <rick@openfortress.nl>
In-Reply-To: <1402251663.9430.43.camel@willson.usersys.redhat.com>
Date: Mon, 9 Jun 2014 08:36:02 +0200
Message-Id: <5DCBA616-48DF-450F-9CE8-FB4C90D1B2CA@openfortress.nl>
To: Simo Sorce <simo@redhat.com>
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="windows-1252"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit

Hi,

> The KDC has no way of knowing if DNS is correct or wrong,

It could of course use a DNSSEC-aware resolver.

> nor would it
> trust the DNS

That is a setting with MIT krb5, and an admin could feel safe to enable it after setting up DNSSEC.

> even if it were able to ask a sensible question out of it.

I’ve been thinking along these lines, and would prefer to be able to install a secure name resolver on my KDC, and making it *require* DNSSEC.  This could also help to trust remote, unknown zones.  I wrote it down on

http://rickywiki.vanrein.org/doku.php?id=insisting-on-dnssec

It seems that I am the only one who sees a case for *insisting* on DNSSEC, or do others on this list agree there is a need?

Cheers,
 -Rick
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos


home help back first fref pref prev next nref lref last post