On Sun, Apr 11, 2021 at 07:57:15PM -0400, Keith Moore wrote:
On 4/11/21 7:05 PM, Viktor Dukhovni wrote:
There are of course pros/cons for CT and pros/cons for DNSSEC, but my
take is that architecturally DNSSEC is better suited for securing the
typical domain on the public Internet.
Architectural arguments are great, but pragmatically speaking there seem
to be significant deployment problems with DNSSEC.
Historically, yes. But substantial improvements have been made, and it
is now much easier than it used to be.
Adoption has been hampered by difficult KSK enrollment, rollover,
immaturity of tooling and by habitual cynicism from plausibly
authoritative voices.
These aren't the problems (except perhaps immaturity of tooling) that
most immediately come to mind.
Where is the easy to understand guide for how to sign your own RRs or
zone(s), and to verify that the signing is properly done?
With BIND 9.16, just pick one of the stock policies, and BIND does the
rest, generates keys, keeps the signatures current, periodically rolls
the ZSK, even rolls the KSK and publishes CDS/CDNSKEY RRs, and I believe
delays retiring the old KSK until the parent domain actually updates
the DS RRs (whether via CDS, or manual update). Try it!
Which registrars provide tools for signing, or do you have to operate
your own master DNS server in order to do that?
If you're talking about registrars that sign zones for you, there are
many. Some of the ones hosting large numbers of signed domains are:
- one.com
- ovh.net
- googledomains.com
- Amazon Route 53
- transip.nl
- domeneshop.no
- forpsi.cz
Many others, those are just some of the larger ones.
How long does it take for the typical domain name owner to sign their
RRs for the first time?
With BIND 9.16, just add a policy to the zone definition. A few
seconds.
What's the ongoing commitment in time for a domain owner to maintain
DNSSEC for their RRs?
None, BIND keeps the zone signed. Of course wether you're signing or
not, service monitoring is highly recommended, to check signature
validity I use
named-compilezone -i local -jD -f raw -o - $zone $zonedb |
ldns-verify-zone -e P0Y0M3DT3H23M54S -V1 -S /dev/stdin
What's the immediate benefit to the signer from signing one's own RRs?
(Note: if nothing is verifying signatures, the immediate benefit is zero.)
Since "nothing is verifying" is simply false, the benefit is that
verification indeed takes place. The strongest case is hardening
of CAA records and TLSA records. Soon also HTTPS and SVCB records,
which have security-relevant information, worth hardining IMHO.
And how do we close these (and doubtless other) gaps?
My zone has been signed since ~2014, no gaps to report, but for more
complex environments work is being done to address
- multi-provider signing (Shumon Huque, et. al. doing great work)
- CDS support by registries and registrars, .CZ, .ZA, soon
Godaddy...
We're not standing still, lots of good activity to close the gaps both
new and longstanding.
I'd love for the Internet to be able to make better use of DNSSEC and to
need to rely less on PKI. But for all that I love about this idea, I
don't think this is going to happen until most of these problems are fixed.
That's why lots of work is happening to address the remaining adoption
barriers.