On 9/29/2013 3:23 PM, [email protected] wrote:
There's not much to it...  Basically, we have three independent groups who have 
certificate-based IPSec (on IPv6), and now they'd like occasionally to connect 
to each other.  The obvious solution is to cross-sign certificates, but we have 
also recently implemented DNSSEC, so I was wondering if there was a 
better/another way.  Or maybe: I have a shiny new hammer called DNSSEC, and a 
lot of things are starting to look like nails.

I think the same.

DNSSEC, especially combined with DANE, makes a lot of things begin to look like nails.

A nice example, when combined with PGP-DNS and IPsec, would be trivial VoIP encryption.

In terms of getting IPSec based off DNSSEC, the two RFCs 4025 and 4322 actually 
do pretty much what I want (plus or minus that it'll look very different to the 
way I am configuring TLS DANE).  I am going to see if I can get those to work.


For the other things that were talked about:

Mobile devices and NATs - It is true that reverse lookup is inappropriate for 
these scenarios, but ultimately this is just a rejig of the problem that the 
incoming ipaddress is not particularly useful in these scenarios.  If a server 
wishes to verify such connecting clients, it'll have to choose something else 
as an identifier (and thus it falls back into the traditional CA/Kerebros setup)

Reverse DNS being poorly supported by iSPs - To be honest, this is less of a problem for 
me as I only have an internal deployment, so I can do that I like (in-addr.arpa is 
ultimately just a convention, anyone could run a reverse DNS system that actually works 
properly).  Most of my ip addresses are not routable from the public internet anyway.  It 
did lead me to the somewhat more philosophical question of what it means to 
"own" an ipaddress if I can't associate my public keys with a secure central 
registry...
Where did you get a silly idea like that? Obviously ICANN and the largest carriers own them.

If we based IP ownership on SHA-3-512 hashes of PGP certs, however... but I doubt anyone would go along with that.

So I think that the answer is that I can do this with existing technology, with some 
basic restrictions in that I'll need to be running my own reverse DNS lookup for my 
deployment - which seems entirely sensible as I want to have control over which ip 
addresses "exist" in my environment.
This sort of thinking makes me reconsider the concept of community petnaming.
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to