David Conrad wrote:
> 
> Phillip Hallam-Baker wrote:
> >
> > If a system is going to be robust in practice it has to take account
> > of all possible sources of error including administrative incompetence
> > and user error.
> 
> I'm curious: where do you draw the line?  Should routing system security
> be included?  Email security (since many transactions relating to DNS
> zone administration occur via email)? Telephone? Etc.
> 
> > Security that only looks at malice is brittle security.
> 
> Security that looks at 'all possible sources of error' seems to me
> to be a halting state problem


Drawing a line amounts to sticking your head in the sand.

A chain is only as strong as its weakest link, and aside from
wanna-bees, determined attackers are *not* going to attack the
strong pieces of the technology, but turn the weak parts or
the links between.

Using DNS names for authentication is the folly here.  If we believe
that using DNS names for authentication, then we need to fix *all*
parts of the technology, including the adminitrative procedures
for managing/delegating DNS names.


-Martin
_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to