Re: against dnssec

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 17 Jan 2015, Björn Persson wrote:

Both CAs and DNSSEC can be attacked by governments in different ways.
The author thinks that DNSSEC is more vulnerable. I happen to disagree,
but more importantly, those who feel that they need to can secure their
keys both through DANE and with a certificate from a CA. Using two
independent methods of verification in parallel is never less secure
than using only one of them.

And then on top of that, there is certificate transparency and dnssec
transparency:

http://www.certificate-transparency.org/

that allows using multiple parties for trust.

"DNSSEC is Cryptographically Weak"

He claims that many keys currently in use aren't strong enough, and
makes it sound like that's a design flaw in the protocol itself. He
neglects to mention that DNSSEC by design allows both variable key
lengths, frequent key changes and specification of new ciphers.

Yeah, he argues the 90 day 1024bit RSA root key is too weak and compares
it to 1024bit RSA keys used by CAs valid for 10-30 years. Although I
do agree with him that the root ZSK key could be bumped to 2048 bit.
I'd avoid ECDSA keys and other ECC because too many resolvers do not
support those algorithms. ECDSA is still not always available because those systems are running older
software before rhel/fedora allowed some (NIST) ECC code. Other ECC
algorithms are still patent minefields (eg djb curves, brainpool, etc)

He complains that DNSSEC doesn't secure the link between the recursive
resolver and its client. That's exactly what people are working to fix
by running a local validating resolver.

And there are APIs worked on for that, such as get-dns or
draft-ietf-dnsop-edns-chain-query

"DNSSEC is Unsafe"

"Authenticated denial. Offline signers. Secret hostnames. Pick two."
OK, then I'll pick authenticated denial and offline signers. Hostnames
have never been secret. DNS lookups are unencrypted, so every time you
look up a name you tell any snoopers that that name exists. Why would
you need secret hostnames anyway?

It also completely ignores the issue that online signing for
authenticated denial is an easy DDoS vector (similar to dnscurve
which also needs to do crypto operations per query. The DNSSEC design
of not requiring crypto on nameservers (esp not requiring private keys
on publicy facing servers) was an excellent choice. Yes, an attacker
with enough resources can find out "secret" hostnames, but so can
pervasive monitors like the NSA by just vaccuming plaintext data. These
"secrets" should never be relied upon.

Paul
--
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux