> On Mar 3, 2018, at 2:32 PM, Geoff Huston <g...@apnic.net> wrote:
> 
>  I guess that the knowledge that resolver X trusts a key with a hash value of 
> Y does not leave me much the wiser in terms of exploitable knowledge about 
> the (in)security of that resolver.

If there is a key or algorithm compromise for key Y then that seems like useful 
information to an attacker.


> 
> 
> Aren’t we getting into issues of DNS privacy here rather than the sentinel 
> per se? Its not as if the sentinel process calls for any change in the DNS 
> query response mechanism. There is no forking off information to third 
> parties in any form in this draft - the user agent asks a particular query 
> form to its DNS resolvers and the user agent will get a response. As far as I 
> can tell, in the same way that the DNS itself admits third parties to look 
> over the shoulder of DNS transactions in every other DNS query and response, 
> this is no different as far as I can tell.  And in the same way as various 
> DNS privacy mechanisms make it harder for third parties to eavesdrop on user 
> activity, this is no different, and the user agent can take the same measures 
> to attempt to increase the eavesdropping degree of difficulty on sentinel 
> queries as much as any other DNS query that the user agent may make.
> 
> It seems I must be missing something here that has triggered your concerns 
> Duane - could you explain them in a little more details?


No, I wasn't thinking of eavesdropping.  I'm thinking whatever Geoff can do, a 
motivated nation state can just as easily do.  For example...

The country of Freedonia decides it doesn't trust the ICANN-controlled Internet 
and goes off and builds its own root server system and signs its version of the 
root zone with its own set of DNSSEC keys.  Persons and organizations operating 
in Freedonia are required to install this trust anchor and remove the IANA 
trust anchor.  kskroll sentinel provides a way for Freedonia to monitor 
compliance with this policy.  They can use known techniques (ads, embedded 
javascript, unique URL hostnames) to learn which keys are in the trust anchor 
set for resolvers/devices within (and even outside) its realm.

DW

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to