Of possible interest...

A new pre-BoF list ([email protected], see below) is discussing certs/keys-in-DNS(sec) both as a way to augment present-day PKI, and as a way to re-invent it.

In addition to the various references helpfully listed below by Ondrej, there's this recent preso by Dan Kaminsky, presented a couple weeks ago at Black Hat...

  Black Ops of Fundamental Defense:
  Introducing the Domain Key Infrastructure (DKI)
  http://www.recursion.com/files/BlackOps-2010.pdf


=JeffH
------
Subject: [keyassure] You want to read this :) (Was: Welcome to the mailing
 list, and possible charter.)
From: [email protected]
Date: Wed, 18 Aug 2010 09:50:29 +0200
To: [email protected]

        (text/plain)
Just to add some reading material to the mailing list archive...

You may want to read:

New I-D by Jakob, Paul, Warren and Adam:
http://www.ietf.org/internet-drafts/draft-hoffman-keys-linkage-from-dns-00.txt

Slightly older CERT RR (which we already have):
http://tools.ietf.org/html/rfc4398

And various older proposals which didn't make it:

(Jakob's)
http://stupid.domain.name/ietf/draft-schlyter-pkix-dns-02.txt

(RR TYPE request I did)
http://www.ops.ietf.org/lists/namedroppers/namedroppers.2009/msg00421.html

This is just to summarize the ideas which were floating around for some
time.  The basis on our work will be in the most recent I-D.


On 17.8.2010 19:21, Warren Kumari wrote:
> Hello all,
>
> We are investigating starting a working group to leverage the DNSSEC
> trust anchor as a trust anchor for various other protocols. We are
> initially focusing on TLS, but are also interested in other
> protocols.
>
> Just so that we are all level set, here is our initial (draft)
> problem statement.
>
> Problem Statement:
>
> The DNS Security Extensions are a collection of resource records and
> protocol modifications that provide source authentication for the
> DNS.
>
> The DNSSEC signed root infrastructure provides a single, well
> published trust-anchor and a method to build a chain of trust from an
> individual resource record (RR)  to that TA. By leveraging this
> infrastructure we can securely bind information (such as a public
> key, certificate identifier, etc) to a DNS name.
>
> Increasingly people would like to be able to take advantage of the
> confidentiality and identity validation provided by protocols such as
> TLS. There are numerous barriers to this, including cost, ease of
> use, complexity, certificate management, etc. By allowing users to
> securely publish public key information we can allow users to easily
> and securely make use of self-signed certificates.
>
> Currently, one of the issues limiting the use of self-signed
> certificates is the difficulty in key-distribution - it is infeasible
> to distribute a key binding at the web scale. By providing a means to
> publish (and securely validate) this information in the DNS, we allow
> for users to attest to the validity of keying information and
> establish trust in the published public key.
>
> The DNSSEC root trust anchor can also be used for additional
> validation during the current path validations. By validating that
> the  certificate presented is the certificate identified by the DNS,
> we can provide additional confidence that the client is connecting to
> the intended server - this helps alleviate concerns that a valid
> certificate has been obtained by an attacker (for example from a CA
> not used by the victim).


--
  Ondřej Surý
  vedoucí výzkumu/Head of R&D department
  -------------------------------------------
  CZ.NIC, z.s.p.o.    --    Laboratoře CZ.NIC
  Americka 23, 120 00 Praha 2, Czech Republic
  mailto:[email protected]    http://nic.cz/
  tel:+420.222745110       fax:+420.222745112
  -------------------------------------------
_______________________________________________
keyassure mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/keyassure



_______________________________________________
certid mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/certid

Reply via email to