Thanks to Phillip for raising this point.

On 01/26/2012 02:35 PM, Richard L. Barnes wrote:
> Illegitimate transfers are out of scope.  From the point of view of the DNS, 
> an illegitimate transfer is indistinguishable from a legitimate transfer.

eh?  The whole point of this discussion, as i understand it, is supposed
to be to figure out a way that users and site administrators can tell
when something illegitimate is going on and have some protection from
attack.

Saying that a fraudulent or coerced DNS transition is "out of scope"
seems equivalent to saying "make the users and admins vulnerable to
attacks via DNS", in which case we might as well give up.

DNS is certainly not a shining beacon when it comes to resistance to
fraud or coercion.  Let's not make it a single point of failure.

> The only thing technology could do for this case is allow the web site to 
> tell customers "I'm not planning to change anything in the next N days".  So, 
> for instance cached DANE records or key pinning.  First-time visitors with 
> nothing cached are out of luck.  Maybe you could have something of an 
> observatory system for sharing the sort of information that other people have 
> cached.

These are reasonable examples of things that a "right key" protocol
could do.  There are probably more ideas people could come up with.  Why
would these suggestions be out of scope?

        --dkg

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to