.gov DNSSEC operational message

2010-12-22 Thread Matt Larson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 A KSK roll for the .gov zone will occur at the end of January, 2011. This key change is necessitated by a registry operator transition: VeriSign has been selected by the U.S. General Services Administration (GSA) to operate the domain name registry for

.gov DNSSEC operational message

2013-07-30 Thread Wessels, Duane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 An algorithm roll for the .gov zone will occur at the end of August, 2013. This notice is provided as a courtesy to the DNSSEC community. No action should be required on your part. The .gov zone is currently signed with algorithm 7 (RSASHA1-NSEC3-

.gov DNSSEC operational message

2013-08-14 Thread Wessels, Duane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On the morning of August 14, a relatively small number of networks may have experienced an operational disruption related to the signing of the .gov zone. In preparation for a previously announced algorithm rollover, a software defect resulted in publ

.gov DNSSEC operational message

2013-09-19 Thread Wessels, Duane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Please note that as of today, the .gov zone's transition from algorithm 7 to 8 is now complete. Duane W. -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.19 (Darwin) Comment: GPGTools - http://gpgtools.org iQEcBAEBAgAGBQJSOzJ+AAoJEGyZpGmowJiNrssIAKI

Re: .gov DNSSEC operational message

2010-12-23 Thread Jay Ashworth
- Original Message - > From: "Matt Larson" > The new KSK will not be published in an authenticated manner outside > DNS (e.g., on an SSL-protected web page). Rather, the intended > mechanism for trusting the new KSK is via the signed root zone: DS > records corresponding to the new KSK ar

Re: .gov DNSSEC operational message

2010-12-26 Thread Matt Larson
On Thu, 23 Dec 2010, Jay Ashworth wrote: > > From: "Matt Larson" > > > The new KSK will not be published in an authenticated manner outside > > DNS (e.g., on an SSL-protected web page). Rather, the intended > > mechanism for trusting the new KSK is via the signed root zone: DS > > records corresp

Re: .gov DNSSEC operational message

2010-12-26 Thread Florian Weimer
* Jay Ashworth: > - Original Message - >> From: "Matt Larson" > >> The new KSK will not be published in an authenticated manner outside >> DNS (e.g., on an SSL-protected web page). Rather, the intended >> mechanism for trusting the new KSK is via the signed root zone: DS >> records corres

Re: .gov DNSSEC operational message

2010-12-27 Thread jamie rishaw
Clearly this will require 3 years of subcommittee conferences in order to prove. .j On Sun, Dec 26, 2010 at 11:23, Florian Weimer wrote: > * Jay Ashworth: > >> - Original Message - >>> From: "Matt Larson" >> >>> The new KSK will not be published in an authenticated manner outside >>> DN

Re: .gov DNSSEC operational message

2010-12-28 Thread Doug Barton
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/26/2010 09:07, Matt Larson wrote: | On Thu, 23 Dec 2010, Jay Ashworth wrote: |>> From: "Matt Larson" |> |>> The new KSK will not be published in an authenticated manner outside |>> DNS (e.g., on an SSL-protected web page). Rather, the intended

Re: .gov DNSSEC operational message

2010-12-28 Thread Jay Ashworth
- Original Message - > From: "Matt Larson" > On Thu, 23 Dec 2010, Jay Ashworth wrote: > > > From: "Matt Larson" > > > > > The new KSK will not be published in an authenticated manner > > > outside DNS (e.g., on an SSL-protected web page). Rather, the intended > > > mechanism for trusting

Re: .gov DNSSEC operational message

2010-12-28 Thread Jay Ashworth
- Original Message - > From: "Florian Weimer" > > That sounds like a policy decision... and I'm not sure I think it sounds > > like a *good* policy decision, but since no reasons were provided, it's > > difficult to tell. > > I don't know if it influenced the policy decision, but as it is

Re: .gov DNSSEC operational message

2010-12-28 Thread Kevin Oberman
> Date: Tue, 28 Dec 2010 21:17:57 -0500 (EST) > From: Jay Ashworth > > - Original Message - > > From: "Florian Weimer" > > > That sounds like a policy decision... and I'm not sure I think it sounds > > > like a *good* policy decision, but since no reasons were provided, it's > > > diffic

Re: .gov DNSSEC operational message

2010-12-28 Thread Jay Ashworth
- Original Message - > From: "Doug Barton" > Now OTOH if someone wants to demonstrate the value in having a > publication channel for TLD DNSKEYs outside of the root zone, I'm > certainly willing to listen. Just be forewarned that you will have an > uphill battle in trying to prove your c

Re: .gov DNSSEC operational message

2010-12-28 Thread Jay Ashworth
Original Message - > From: "Kevin Oberman" > There is no reason that you could not do OOB transfers of keys, but it > would be so cumbersome with the need to maintain keys for every TLD > (and, for that matter, every zone under them) and deal with key rolls > at random intervals and conf

Re: .gov DNSSEC operational message

2010-12-28 Thread Kevin Oberman
> Date: Tue, 28 Dec 2010 22:34:20 -0500 (EST) > From: Jay Ashworth > > Original Message - > > From: "Kevin Oberman" > > > There is no reason that you could not do OOB transfers of keys, but it > > would be so cumbersome with the need to maintain keys for every TLD > > (and, for that ma

Re: .gov DNSSEC operational message

2010-12-28 Thread bmanning
On Tue, Dec 28, 2010 at 08:07:22PM -0800, Kevin Oberman wrote: > > Yes, having a verifiable source of keys OOB might have a small bit of > value, but, assuming we get general adoption of RFC 5011, I think it's > pretty limited value. Of course, this begs the question, how do we do a > better job o

Re: .gov DNSSEC operational message

2010-12-29 Thread Robert E. Seastrom
Jay Ashworth writes: > - Original Message - >> From: "Doug Barton" > >> Now OTOH if someone wants to demonstrate the value in having a >> publication channel for TLD DNSKEYs outside of the root zone, I'm >> certainly willing to listen. Just be forewarned that you will have an >> uphill

Re: .gov DNSSEC operational message

2010-12-29 Thread Tony Finch
On 29 Dec 2010, at 03:27, Jay Ashworth wrote: > > If you do not, then your clients have little hope of spotting insider > malfeasance changes, no? No cryptography can expose the difference between data that is correctly signed by the proper procedures and data that is correctly signed by a cor

Re: .gov DNSSEC operational message

2010-12-29 Thread Valdis . Kletnieks
On Wed, 29 Dec 2010 15:01:41 GMT, Tony Finch said: > No cryptography can expose the difference between data that is correctly > signed by the proper procedures and data that is correctly signed by a corrupt > procedure. Amen... Well, it *would* help detect an intruder that's smart enough to subv

Re: .gov DNSSEC operational message

2010-12-29 Thread bmanning
On Wed, Dec 29, 2010 at 11:15:02AM -0500, valdis.kletni...@vt.edu wrote: > On Wed, 29 Dec 2010 15:01:41 GMT, Tony Finch said: > > No cryptography can expose the difference between data that is correctly > > signed by the proper procedures and data that is correctly signed by a > > corrupt > > proc

Re: .gov DNSSEC operational message

2010-12-30 Thread Tony Finch
On 29 Dec 2010, at 16:56, bmann...@vacation.karoshi.com wrote: > >presuposes the attack was server directed. the DNS-sniper will take >out your locally configured root KSK &/or replace it w/ their own. If they can do that then you have MUCH bigger problems than authenticity of DNS repli

Re: .gov DNSSEC operational message

2010-12-30 Thread Jay Ashworth
Bill Manning saith: > who intimated that the OOB channel would be http? since that is based > on the DNS, i'd like to think it was suspect as well. :) No it's not, Bill, not *necessarily*; you know better than that. :-) Cheers, -- jra

Re: .gov DNSSEC operational message - picking a fight

2010-12-28 Thread bmanning
On Tue, Dec 28, 2010 at 11:41:18AM -0800, Doug Barton wrote: > > Now OTOH if someone wants to demonstrate the value in having a > publication channel for TLD DNSKEYs outside of the root zone, I'm > certainly willing to listen. Just be forewarned that you will have an > uphill battle in trying to p

Re: .gov DNSSEC operational message - picking a fight

2010-12-28 Thread Doug Barton
On 12/28/2010 14:46, bmann...@vacation.karoshi.com wrote: On Tue, Dec 28, 2010 at 11:41:18AM -0800, Doug Barton wrote: Now OTOH if someone wants to demonstrate the value in having a publication channel for TLD DNSKEYs outside of the root zone, I'm certainly willing to listen. Just be forewarned

Re: .gov DNSSEC operational message - picking a fight

2010-12-29 Thread Tony Finch
On 28 Dec 2010, at 22:46, bmann...@vacation.karoshi.com wrote: > >IMHO, key management should be able to use an OOB channel >when the in-band is corrupted or overlaoded. Reliance on >strictly the IB channel presumes there will be no problems >with that channel. EVER. For me, I

Re: .gov DNSSEC operational message - picking a fight

2010-12-29 Thread bmanning
On Wed, Dec 29, 2010 at 02:56:35PM +, Tony Finch wrote: > On 28 Dec 2010, at 22:46, bmann...@vacation.karoshi.com wrote: > > > >IMHO, key management should be able to use an OOB channel > >when the in-band is corrupted or overlaoded. Reliance on > >strictly the IB channel presumes