Re: [DNSOP] Practical issues deploying DNSSEC into the home.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On Sep 12, 2013, at 7:24 AM, Theodore Ts'o <tytso@xxxxxxx> wrote:
> It is still a hierarchical model of trust.  So at the top, if you
> don't trust Verisign for the .COM domain and PIR for the .ORG domain
> (and for people who are worried about the NSA, both of these are US
> corporations), the whole system falls apart.


Its also a constrained path of trust, and you can actually chose who you trust.

E.g. your application could be constructed to look up both "{data}.dnssec-info-domain.com" and "{data}.dnssec-info-domain.ru".  Only if both use the same validated key is the key accepted.

That way, the trust becomes:

1:  The root is trusted

2:  The registrar for .com and .ru don't collaborate, since they must collaborate for the trust to affect the results.


This is a huge difference from SSL, which unless you pin your application to trust only a single CA, you end up having to trust the entire universe of certificate authorities.

--
Nicholas Weaver                  it is a tale, told by an idiot,
nweaver@xxxxxxxxxxxxxxxxx                full of sound and fury,
510-666-2903                                 .signifying nothing
PGP: http://www1.icsi.berkeley.edu/~nweaver/data/nweaver_pub.asc

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]