It is a hard problem and it is possible that there is actually no solution.

All these systems consist of a chain or a graph of signed assertions. There
is no intrinsic ground truth in PKI. All that you can do is to define a
particular key or set of keys as producing the ground truth for your
particular application.

There is also a psychological angle. People are uncomfortable with the idea
of keys with infinite validity intervals. Yet we know that key rollover
mechanisms are the most complex and error prone parts of any PKI.

Another problem we face is the question of what a device or application
should do if it cannot get an acceptable source of ground truth. A lot of
people assume that the answer should be to simply halt. Which is kind of
the wrong thing if the device is a pacemaker.


ICANN has a mechanism for specifying their ground truth that is ultimately
embodied in a sequence of root keys that are created over time.

One consequence of that approach is that I cannot build a device today for
a 20 year service life using the DNSSEC as ground truth for the PKI. No,
don't tell me why that is not a requirement because it is. 95% of all the
world's SCADA systems run code that was written in the 1990s and has not
had one byte modified since. So don't you dare claim that software updates
are essential, that is an ideological position learned from a limited set
of experience.

But even if we accept the need for updates, where does the ground truth for
the updates come from?


If you want to produce a device that has a 20 year service lifespan, the
only way you can do that is to use a PKI that is expressly designed for
that. Which is of course what CableLabs etc. do (or try to). And we need to
encourage vendors to take that approach rather than assume that they can
apply an off the shelf PKI for their purpose. All the problems of the SHA-1
phaseout in the WebPKI came from groups that had applied it to embedded
devices assuming that this would be OK.

This is of course the approach that browser and O/S vendors have taken.
They do not rely on the DNSSEC or WebPKI for validating updates, they rely
on their own PKI that is answerable only to their requirements.

.... but what about user requirements? I have a perfectly good 36" plotter I
paid $50 for that is just as good as a new $2500 machine for my needs. The
only problem being getting round the planned obsolescence of ink cartridge
manufacturing being shut down.


That is why I have developed my SIN proposal which allows devices to be
subordinated to a PKI that is managed by the User/Customer and is within
their sole control.

Let us say that  MB2GK-6DUF5-YGYYL-JNY5E-RWSHZ is the fingerprint of the
master key for the enterprise PKI for example.net This then cross certifies
the ICANN DNSSEC roots as they are published.

Thus the interpretation of the following SIN becomes as robust as the
management of the enterprise PKI:

example.com.mm--mb2gk-6duf5-ygyyl-jny5e-rwshz


Don't want to run the PKI yourself? Get a group of lime minded manufactuers
together and run one as a co-op (e.g. Cable Labs). Outsource management,
etc. etc.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to