DNSSEC Implementation Held Up By Tech Delays 57
Jack Spine writes "VeriSign has said that the main obstacle to DNSSEC implementation has been technical delays. The large size of the .com and .net domains would have made it impractical to deploy earlier versions of DNSSEC, according to VeriSign vice president of naming services Pat Kane. Deployment of DNSSEC will close a major security flaw in the DNS, the internet's equivalent to a telephone directory. The problem of DNS cache poisoning was thrown into sharp relief by researcher Dan Kaminsky last year."
Can someone explain ZSK and KSK? (Score:4, Insightful)
This is over my head, as the terminology seems repetitive (ZSK for root zone vs. root zone for KSK ?!?!)... can anyone explain the details to a DNSSEC initiate (A quick google search didn't yield any easily understandable content).
Re: (Score:2)
While you're explaining, can you tell us why DNSSEC makes the size of the DNS zones "unwieldy"?
TFA does nothing to explain the nature of their problem.
Fairly useless as far as articles go.
Re: (Score:3, Informative)
While you're explaining, can you tell us why DNSSEC makes the size of the DNS zones "unwieldy"?
Probably the agony of setting up precisely one zillion NSEC records makes the whole thing "unwieldy".
To properly return a cryptographically secure answer that there is no domain named silentdot.org, you need a line like:
shitdot.org NSEC slashdot.org
which is a pointer saying there is nothing between shitdot.org and slashdot.org.
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-2/dnssec.html [cisco.com]
Of course the only thing that is constant about DNSSEC, other than megatons of FUD, is constant change in
Re: (Score:2)
Re: (Score:1, Offtopic)
Re: (Score:2)
Yah, a lot of DNS replies are really really tiny. As in under 64-128 bytes including packet header tiny. Just adding a 128/160/256 bit signature on top of the reply is going to bulk that up a fair amount. Plus you'll need the signing keys on top o
Breaking DNSSEC talk by DJB (Score:2)
While you're explaining, can you tell us why DNSSEC makes the size of the DNS zones "unwieldy"?
DJB held an interesting keynote at USENIX WOOT this year, on some of the unintended side-effects of DNSSEC. Here are the slides: http://cr.yp.to/talks/2009.08.10/slides.pdf [cr.yp.to].
The biggest issue he found was that the a single, small DNS request triggers a huge DNSSEC response with lots of digital signatures (each one of which is at least 1024 bits...). Since the requests are sent over UDP, they can be spoofed. End result? a HUGE DOS amplification effect.
Re: (Score:2)
Re: (Score:2)
IANAE, but it sounds like the KSK is used to sign all the other keys to assure their validity. So you have a KSK for all of DNS, and you use that to sign ZSKs for each TLD...?
I don't really know, but it seemed like it might be more helpful to guess and let someone correct me than to just post a link to a long technical explanation.
Re: (Score:1)
The KSK signs only DNSKEY records, and the ZSK signs all other relevant resource records in the zone. Your DNSSEC delegation comes from a DS record (a fingerprint of your KSK) which is included (and signed) in the delegating zone. The practical upshot of this is you can change your ZSK frequently without having to update the DS record upstream (thus contacting your delegator) every time you do so.
Re: (Score:1)
Re: (Score:1)
* In order to allow for replacement keys, a key rollover scheme is required. Typically, this involves first rolling out new keys in new DNSKEY records, in addition to the existing old keys. Then, when it is safe to assume that the time to live values have caused the caching of old keys to have passed, these new keys can be used. Finally, when it is sa
Re: (Score:2)
Re: (Score:2)
Dont worry about the Details, thes are Lies (Score:2)
The solution is well understood, use cryptographic signing, with a known Public Key, so that clients can verify that the answer they get is Genuine Signed. This wo
Re: (Score:2)
Keep in mind they may be lying. We're supposed to believe with 10 years to work on this they're surprised that tha files are big? Uh, hello, no.
I suspect what's really going on is they just found the intellectual property gotcha inherant in DNSSEC that IMO is gonna prevent it from ever being widespread. It's as damning to the IP/TM guys as the Kaminsky was to technical correctness of the DNS and I suspect the project's been put on hold... and may not come back in its present form.
And then there's the .se de
Re: (Score:3, Insightful)
Re: (Score:2)
Technical delays, Yeah Right. (Score:3, Insightful)
Re: (Score:3, Insightful)
Yeah, Verisign, the largest certificate authority, is the organization responsible for implementing the feature of DNS that basically makes certificate authorities less necessary? I'm sure they're all over trying to get this done quickly.
I'd say unnecessary ... (Score:2)
I trust DNS more than CAs ... just use the DNSSEC keys for SSL and be done with it.
Re: (Score:2)
forward, stop or reverse (Score:2)
Unable or unwilling admins is more like it.
A side effect of buying into the so-simple a monkey could run it sales pitch from Microsoft: You end up with monkeys that can only stroke the big boss telling him or her to sit tight till the next free t-shirt^H^H^H^H^H^H^H service pack. As these monkeys are able to bullshit their way into training positions, they will do what any other weak or insecure monkey will do: bogart their already limited knowledge. Thus with each iteration you get progressively more ignorant monkeys, that have to rely and speci
Re: (Score:1)
Re: (Score:2)
There was also a political argument about who should be the root signatory.
Since I would expect that the root signatory is able to forge DNS records for any part of the internet (or some such thing), it might be perhaps cynical of me to suggest that this wasn't entirely the simple prestige thing that everyone claimed it to be. ;-)
Why use digital signatures? (Score:5, Interesting)
This really seems like a ploy by VeriSign and friends to make ever more people and companies to purchase signed certificates at $100/year or whatever. I don't feel that it's necessary to use digital signatures to secure the system.
The fundamental flaw of DNS is that the "nonce" - the one-time-use random constant used to prevent spoofing - is only 16 bits. If you're going to change the DNS protocol, why not just increase the size of that field to 64 bits and be done with it? Then it's only a software change to DNS servers rather than an expensive certificate and far less of an administrative headache.
Also, I don't think that it's even necessary to change the protocol. The protocol allows for multiple DNS queries in one packet. When doing a DNS query, ask for both www.google.com and a nonce domain like eujrdyhtaeoym.example.com. If the query comes back saying that eujrdyhtaeoym.example.com does not exist (or even if it says it does!), you know nobody is spoofing DNS queries back at you because unless they were snooping traffic, they wouldn't have a way to know that your nonce was eujrdyhtaeoym.
Re: (Score:2)
Wish I had mod points. An interesting solution.
Re:Why use digital signatures? (Score:5, Informative)
You should understand DNSSEC before criticizing it. It doesn't work with SSL-style certificates that have to be signed by a recognized certificate authority. Also, it doesn't change the existing protocol, it extends it in a (mostly) backwards-compatible way. DNS servers just have to know how to request and handle the new additional records; old servers and clients keep working fine.
Your proposed solutions only fix one small piece of the DNS problem, that of spoofed network packets. DNSSEC authenticates the entire response chain, so that (for example) you can be sure that your ISP isn't modifying responses to point you somewhere else (such as their servers) rather than what you requested.
With DNSSEC, you could possibly eliminate the SSL certificate authorities and use signed DNS records to include the certificate information (so you can make sure that when you go to https://www.foo.com/ [foo.com], you really got www.foo.com's certificate and not that of a man-in-the-middle attacker).
Re: (Score:2)
With DNSSEC, you could possibly eliminate the SSL certificate authorities and use signed DNS records to include the certificate information (so you can make sure that when you go to https://www.foo.com/ [foo.com], you really got www.foo.com's certificate and not that of a man-in-the-middle attacker).
That would only really work for the most basic type of signing, where the CA is asserting that the certificate is for SSL use on www.foo.com. I suppose the extended validation attributes (like the company's formal business identity) could also be done that way, but I doubt that ISPs are likely to want to get into that game (the liabilities from errors are a good reason to leave that with specialists).
For client certificates, a CA is really best. After all, I'm not a DNS entry, I'm a free man!
Re: (Score:1)
Only if the answer does not change. If the answer changes, somebody who can view your traffic can replay old responses.
DNSCurve does not have this problem.
http://dnscurve.org/replays.html [dnscurve.org]
Re: (Score:2)
They can replay it within the absolute time of the RRSIG, which can be made relatively small (needs to be long enough to handle time drift).
Re: (Score:2)
An interesting problem occurs in secure near real time system where avoidance is iffy but you still have time to negate,
think laptop plugged into an aircraft FBW, once remote piloting comes to Civil Aviation
Re: (Score:3, Informative)
This really seems like a ploy by VeriSign and friends to make ever more people and companies to purchase signed certificates at $100/year or whatever.
I don't see anything in the DNSSEC specs which would require any external chain-of-trust similar to the current CA system. You just need a secure way to update your resource records with your registrar, which includes your DS (designated signer) record, a public key of your choosing. There's no authentication involved beyond your credentials to update the domain. It's too early to be sure, but this should be included with the purchase of a domain. Once you have your DS record in place you can use it to desi
Re: (Score:2)
You just need a secure way to update your resource records with your registrar, which includes your DS (designated signer) record, a public key of your choosing.
Watch registrars start charging for the privilege of serving DS records.
Re: (Score:2)
They have to serve some sort of DS record for DNSSEC to work at all beyond second-level domains. They could withhold DNSSEC support entirely, of course, but the concept of using one's own DNS servers for third-level and lower domains, or at least having them hosted by someone other than the registrar, is fairly well entrenched. I just don't see them successfully reversing that pattern or forcing such domains to remain unsecured.
Re: (Score:2)
They could withhold DNSSEC support entirely, of course
Segmenting the market by withholding DNSSEC from customers on the $10 per year tier of domain registration is exactly what I meant, especially where VeriSign is involved.
Must use digital signatures? (Score:2)
Ther is little wrong with the design of DNSSEC except it allows --- FOR MONEY --- trust vendors a completely unrequired role in the system, DNSSEC could have easliy avoided this but this is a political question, you should provide your public key, self signed or not, and that needs basically to be the end of it. I can now advertise the fingerprint of my public key on my business card or signature.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
CAs
Re: (Score:2)
This really seems like a ploy by VeriSign and friends to make ever more people and companies to purchase signed certificates at $100/year or whatever.
DNSSEC, as originally conceived, did the exact opposite. Signing a zone was either-or, so the registrars couldn't charge each client for signing their records. Once you signed it for one client, you signed for them all. At the same time DNSSEC obsoletes SSL certificate authorities.
Now, if you happen to be Verisign and make a lot of money selling SSL certificates, how does that sound to you? A bit of work, no potential income from it, and destruction of a major part of your business...
This all lead to NSEC3,
Re: (Score:2)
DNSSEC only allows authentication of a hostname. It's more useful to be able to authenticate a domain name with a real-world identity, however, which still (today) relies on trusted third parties signing certificates with those real-world identities.
??? NSEC3 is just an extension of NSEC (authenticated NXDOMAIN)
Obligatory (Score:1)
"technical reasons" (Score:2)
Three years to deploy RFC 4956 [faqs.org] is not "technical reasons"