Two years ago I would have thought the same. But today we are far beyond conspiracy theories. We are facing the biggest coordinated hacker attack in history of the internet. After what we've learned in the last year the US government has abused the trust of billions of internet users to gain control over the internet. We have no clue what other governments and intelligence angencies have done or might do. The former director of the austrian intelligence agency expects a lot of new disclosures in the next half year. Internet users worldwide are furious about the situation.

If we sell DANE as magic bullet without mentioning the trust anchor can manipulate the whole DNSSEC system and who the trust anchor is users will trust DANE blindly. If the trust anchor abuses control over DNSSEC this will blow up right into our face and harm the reputation of the IETF.

In my opinion we should mention the identity of the DNSSEC trust anchor in security considerations and we should mention the DNSSEC trust anchor has the possibility to manipulate the whole DNSSEC system.

Regards,

Renne


Am 2014-07-28 19:12, schrieb Olafur Gudmundsson:
<chair-hat>
This discussion is off topic.
DANE is about how to leverage DNSSEC by applications and conspiracy
theories are not within our charter.

Anyone that does not trust DNSSEC operations is free to ignore
distribution of OPENPGP keys via DNS, and continue to
use the web of trust.
</char-hat>

        Olafur

On Jul 28, 2014, at 10:59 AM, Rene Bartsch <[email protected]> wrote:

Maybe I misunderstood draft-zhang-ct-dnssec-trans-00 but I do not see how it would help. Consider the following case:

(Forced by secret US law) The IANA secretly hands over the current private key of the DNSSEC trust anchor to a US government agency which uses the private key to sign forged zones and feeds them to DNS resolvers. That way US government agencies would be able to manipulate any DNS record including OpenPGP while users would be lulled in a false sense of security.

In case I didn't miss any super-security feature users should be aware of that fact.

Am 2014-07-28 15:52, schrieb Paul Wouters:
3. Security considerations: The IANA has control over the DNSSEC root keys. As the IANA is bound to US law, US government agencies probably have access to the DNSSEC root keys and are capable to manipulate the OpenPGP keys signed with DNSSEC.
There is currently a first attempt at specifying transparancy for
DNSSEC for those who want to audit/track the DNSSEC root or parent
domain holders:
http://tools.ietf.org/html/draft-zhang-ct-dnssec-trans-00
Paul

--
Best regards,

Renne

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

--
Best regards,

Rene Bartsch, B. Sc. Informatics

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to