Re: [DNSOP] I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Shane Kerr
All, internet-dra...@ietf.org wrote: Title : DNSSEC Operational Practices, Version 2 Author(s) : O. Kolkman, M. Gieben Filename: draft-ietf-dnsop-rfc4641bis-01.txt Pages : 38 Date: 2009-03-06 I had a look through

Re: [DNSOP] I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Edward Lewis
At 13:03 +0200 4/21/09, Shane Kerr wrote: The whole idea of offline storage for the zone itself is so fantastical An artifact in the DNSSEC concept stemming from the days when DNSSEC was discussed in the Security Area of the IETF. Fantastical is a good word. It might be more useful to

[DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Edward Lewis
At 17:03 +0200 4/21/09, Florian Weimer wrote: * Edward Lewis: This comes from the observation that the contents of the database sourcing the zone (whether a commercial-like database or a vi'd file) are more critical than the private key. (If) They are sufficiently protected and I'll just

Re: [DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Stephane Bortzmeyer
On Tue, Apr 21, 2009 at 11:25:59AM -0400, Edward Lewis ed.le...@neustar.biz wrote a message of 60 lines which said: My concern is first the database over the key, it's what matters in the event of catastrophic organizational failure. From that, it's a matter of fate sharing. What ever I

Re: [DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Andrew Sullivan
On Tue, Apr 21, 2009 at 11:45:18AM -0400, Edward Lewis wrote: Suppose that I tightly constrain who reads the database. Suppose you do. Then you still have the problem of escalation attacks. HSMs are designed to make such attacks impossible: the key simply won't come out. That's a better

[DNSOP] Key sizes was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Paul Hoffman
At 1:03 PM +0200 4/21/09, Shane Kerr wrote: This section does not match up with the tiny bit of crypto research I've done. The Wikipedia entry on key lengths references an RSA and a NIST publication, both of which suggest 1024 bits not be used after 2010:

Re: [DNSOP] Key sizes was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Edward Lewis
At 9:54 -0700 4/21/09, Paul Hoffman wrote: However, those people should make decisions based on facts about DNSSEC deployment, not extrapolations from estimates that are both speculative and based on key usage that is not applicable to DNSSEC. Paul, you are right. But for the last decade

Re: [DNSOP] Key sizes was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Paul Hoffman
At 1:09 PM -0400 4/21/09, Edward Lewis wrote: At 9:54 -0700 4/21/09, Paul Hoffman wrote: However, those people should make decisions based on facts about DNSSEC deployment, not extrapolations from estimates that are both speculative and based on key usage that is not applicable to DNSSEC. Paul,

Re: [DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Paul Wouters
On Tue, 21 Apr 2009, Edward Lewis wrote: I mentioned that the value in protecting the private key is a function of the cost of rolling to a new key. Plus your legal bill explaining in court over and over again why you were not legally responsible for costs of the breach. The million dollar

Re: [DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Paul Wouters
On Tue, 21 Apr 2009, Edward Lewis wrote: Rolling a key is much less problematic (especially ZSKs) than having to clean up a hijacked delegation. Even a KSK isn't that bad - if the parent is signed and I never promise my KSK as an SEP. Then you put your vulnerability period during emergency

Re: [DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Andrew Sullivan
On Tue, Apr 21, 2009 at 01:22:01PM -0400, Edward Lewis wrote: same fortifications. Breaking the database security won't make getting to the key any easier, i.e., the database does not contain the information needed to access the key. If the database does not contain the information needed

Re: [DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Shane Kerr
Edward Lewis wrote: In a way, I figure - if you can read my private key, I have larger issues to deal with. The problem is that without an HSM then 'you' becomes open to all kinds of social attacks. When we looked at the problem of disgruntled or bribed employees, HSM (or the equivalent) was

Re: [DNSOP] Key sizes was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Shane Kerr
Paul, Paul Hoffman wrote: ...assuming that you feel that attacker would spend even a million dollars to break your key. This line of logic completely discounts common sense, however. Which is more valuable to an attacker: the ability to temporarily spoof DNS responses in your zone, or

Re: [DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Edward Lewis
At 13:50 -0400 4/21/09, Paul Wouters wrote: No, they just connect to the bogus largebank.com and steal more then your gross turnover Ummm, psst, most banks here are bankrupt. ;) I am tempted to lean towards using a KSK in an HSM, and using the ZSK without I had the same thought at

Re: [DNSOP] Key sizes was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Paul Hoffman
At 10:07 PM +0200 4/21/09, Shane Kerr wrote: Paul Hoffman wrote: ...assuming that you feel that attacker would spend even a million dollars to break your key. This line of logic completely discounts common sense, however. Which is more valuable to an attacker: the ability to temporarily

Re: [DNSOP] Key sizes was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

2009-04-21 Thread Paul Wouters
On Tue, 21 Apr 2009, Paul Hoffman wrote: 'openssl speed rsa1024 rsa2048' is your friend here. On my laptop, signing takes six times longer, but verifying only takes three times longer. Different platforms will give different results. So do different versions of openssl. 0.9.8k was much