Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security IT

New IAB Chair Defends DNSSEC 49

bednarz writes "Olaf Kolkman, the new chair of the Internet Architecture Board, says that DNSSEC — an approach to authenticating DNS traffic that has been slow to take off — is not a failure. 'It is taking a while to percolate into software, and for that software to percolate into the market, and for people to adapt their environments to deploy and operate DNSSEC. The deployment is hindered by a chicken-and-egg problem'."
This discussion has been archived. No new comments can be posted.

New IAB Chair Defends DNSSEC

Comments Filter:
  • by heauxmeaux ( 869966 ) on Wednesday March 28, 2007 @06:37PM (#18521745)
    You can place my balls ever so gently in your mouth.
  • by X-treme-LLama ( 178013 ) on Wednesday March 28, 2007 @06:41PM (#18521793) Homepage
    Development and implementation, has been slow or nonexistent across the board.. But that doesn't mean it is a failure..

    No, ok, I'll grant him that.. But sometimes no matter how useful (or perhaps good) an idea is, it just doesn't happen. Sorry mate..

    In the interview he says that it's a bit of a "chicken and the egg" problem, yet while he lists a few minor adopters who have it somewhat deployed, he has no concrete solution to the problem..

    Any type of dns security, or verification is certainly interesting, and probably beneficial, but DNS is 25-30 years old, and still works, there just isn't a compelling reason to augment it for most people who deal with keeping DNS servers running...
    • by _ivy_ivy_ ( 1081273 ) on Wednesday March 28, 2007 @07:09PM (#18522167)
      Using that definition, I guess IPv6 is a overwhelming success too. Why does the world insist pushing technology solutions that no one wants?
      • It's the natural tendancy of some people to fix things that are not broken.. or to search for perfection when "good enough" is already available.
      • by Workaphobia ( 931620 ) on Wednesday March 28, 2007 @08:44PM (#18523107) Journal
        Why push solutions no one wants? Because they're good solutions to worthy problems. Because they're better than what we have. Because to not push them would offend technological common sense. If no one wants them then that doesn't mean they are inferior solutions; it could just as easily mean that people do not understand the problem.

        I believe there was a quote by a president who commented on the telephone, that went along the lines of, "It's a marvelous invention, but who would ever want one?"
        • by R2.0 ( 532027 ) on Thursday March 29, 2007 @12:13PM (#18529531)
          You are buying into the fallacy that the mental health profession did for many years - that all "problems" need solutions, with "problem" defined as "doesn't work the way an "expert" thinks it should work". The result was that you couldn't walk into a psychiatrists office and come out with a clean bill of health - ALL behaviors were symptoms.

          Later, the definitions were changed to include the term "that interferes with everyday life" or something similar. So now, someone who double checks their door locks isn't OCD, just cautious, as long as they don't spend an hour a night doing it.

          Likewise IPV6 - if the "problems" with IPV4 don't substantially affect the users, then they aren't problems. They may turn into problems in the future, when users start being affected, but they are not now. Saying "people just don't understand" isn't going to get a lot of traction - it insults the intelligence of the very audience one is trying to convince.
          • by Workaphobia ( 931620 ) on Thursday March 29, 2007 @01:17PM (#18530439) Journal
            I like your analogy, but the problem with it (from my perspective) is that human psychology is incredibly complicated and any attempt to describe it is necessarily a vast simplification, whereas with software and networks it is possible to create models that are unambiguously superior.

            But you are correct in that the ideal model isn't a requirement for a productive system. It's just that it seemed like the parent poster was caught in an infinitly incremental, good-enough mindset, which I object to.
    • by Colin Smith ( 2679 ) on Wednesday March 28, 2007 @07:25PM (#18522343)
      Because MS don't support it, and Windows makes up 90% of client systems. They don't support it because they have a competing non standard embraced and extended system of their own.

       
    • DNS poisoning (Score:4, Informative)

      by jd ( 1658 ) <imipak@ y a hoo.com> on Wednesday March 28, 2007 @09:54PM (#18523681) Homepage Journal
      Certainly this is more common than it once was. It is one of the nastiest of the still-effective low-level attacks. Most of the other fundamental stuff (BGP, for example) has improved on the security front. Now, if DNS is only run on dedicated DNS servers, you can just IPSEC between them, but IPSEC is not getting deployed much, either.

      So what's the real reason none of this is getting used? "No perceived need" is clearly bogus, so we can dispense with that. Seems to me that the real reason is that DNSSEC and IPSEC place overheads on the system, but most data centers and ISPs run DNS on really cheap, natty boxes. If service was degraded still further from security, there would be a lot of complaints. However, it's either that or putting essential services on much higher-performance boxes, and anyone who has ever worked in such organizations know that management would turn to satanic forces to keep their customers before spending a single extra buck on hardware upgrades.

    • by baomike ( 143457 ) on Thursday March 29, 2007 @12:49AM (#18524809)
      by blurb writer. Acronyms fly as the alphabet is rendered asunder.

  • by choongiri ( 840652 ) on Wednesday March 28, 2007 @06:41PM (#18521799) Homepage Journal

    My personal motivation to work in this space is that I want to allow my now 3- and 6-year old children to make use of the Internet based on the same core principles as I now know them.

    You really want your 3- and 6-year olds to inherit the spam-ridden porn-fest we have today? That's just mean. Think of the children!

    • by LighterShadeOfBlack ( 1011407 ) on Wednesday March 28, 2007 @07:01PM (#18522055) Homepage

      You really want your 3- and 6-year olds to inherit the spam-ridden porn-fest we have today? That's just mean. Think of the children!
      I'm with you on the spam part, but I'll defend this porn-fest til the day I die!
    • Freedom of speech.

      We all hate spam, but the lengths to which some people are willing to go to get rid of it is ridiculous.

      • by plague3106 ( 71849 ) on Thursday March 29, 2007 @04:31AM (#18525825)
        No, spam is not a freedom of speech issue. For example, no one's freedom of speech permits them to fill up the HR guy's email box to the point where it is almost unusable. The mailbox exists for the purpose of business communications.

        Freedom of speech does not permit you to litter your neighbors house with leaflets, not matter what they say.

        I don't think people are going to far in battling spam; we recently switched to a new mail server, which has spam filtering built in using several filters, and our HR person is very grateful. Now instead of 300 spam emails, and 3 legit ones, he only has the three legit ones, and possibly a few spam.

        On the other hand, no one is being forced to look at a porn site. Anyone that wants to see it can, and anyone that doesn't go browsing for it.
    • by rucs_hack ( 784150 ) on Thursday March 29, 2007 @02:07AM (#18525177)
      You really want your 3- and 6-year olds to inherit the spam-ridden porn-fest we have today? That's just mean. Think of the children!

      I don't get this porn fest thing. I use the interwebs all the time, and barely ever see any porn. Where is this porn of which you speak?

      The core principle of the internet to me is that anyone can edit it/add to it, or take it in some new direction.

      We have Wikipedia, 'Ask a Ninja' and Red vs Blue now. Three things I never would have thought of when I first plugged my 33k modem in, many years ago. My contribution to the web's main attribute is that people keep visiting my site and downloading because they think its a mod for Wow (confusion in the name). Then they discover its really boring...
  • by Anonymous Coward on Wednesday March 28, 2007 @06:52PM (#18521935)
    D. J. Bernstein [slashdot.org]
    Internet publication [slashdot.org]
    djbdns [slashdot.org] DNS forgery I've given a few talks on ``The DNS security mess'': 2003.02.11 [slashdot.org] (slides available). 2003.03.18 [slashdot.org] (slides available). 2004.04.28 [slashdot.org] (slides available). An attacker with access to your network can easily forge responses to your computer's DNS requests. He can steal your outgoing mail, for example, and intercept your ``secure'' [slashdot.org] web transactions.

    If you're running a DNS server, an attacker with access to your network can easily forge responses from that DNS server to other people. He can steal your incoming mail, for example, and replace your web pages.

    An attacker from anywhere on the Internet, without access to the client network and without access to the server network, can also forge responses, although not so easily. In particular, he has to guess the query time, the DNS ID (16 bits), and the DNS query port (15-16 bits). The dnscache [slashdot.org] program uses a cryptographic generator for the ID and query port to make them extremely difficult to predict. However,

    • an attacker who makes a few billion random guesses is likely to succeed at least once;
    • tens of millions of guesses are adequate with a colliding attack;
    • against BIND, a hundred thousand guesses are adequate, because BIND keeps using the same port for every query; and
    • against old versions of BIND, a thousand guesses are adequate with a colliding attack.

    As of November 2002, CERT is panicking because they didn't realize how trivial this was, even though I spelled it out in a posting [slashdot.org] in July 2001.

    Larger cookies in the DNS protocol could make blind attacks practically impossible. (Caches could achieve a similar effect without protocol changes by repeating queries a bunch of times with different ports and IDs, at the expense of speed and reliability.) However, attackers with access to the network would still be able to forge DNS responses. Public-key signature systems Modern cryptography offers a tool to prevent forgeries: a public-key signature system. In short:

    • You create and publish a key.
    • You---and, if the system is secure, nobody but you---can sign a document under that key.
    • Anyone can verify that the document was signed under your key.

    The signature is a complicated mathematical function of the document and the key. DNSSEC: theory and practice DNSSEC is a project to have a central company, Network Solutions, sign all the .com DNS records. Here's the idea, proposed in 1993:

    • Network Solutions creates and publishes a key.
    • Each *.com creates a key and signs its own DNS records. Yahoo, for example, creates a key and signs the yahoo.com DNS records under that key.
    • Network Solutions signs each *.com key. Yahoo, for example, gives its key to Network Solutions through some secure channel, and Network Solutions signs a document identifying that key as the yahoo.com key.
    • Computers around the Internet are given the Network Solutions key, and begin rejecting DNS records that aren't accompanied by the appropriate signatures.

    However, as of November 2002, Network Solutions simply isn't doing this. There is no Network Solutions key. There are no Network Solutions *.com signatures. There is no secure channel---in fact, no mechanism at all---for Network Solutions to collect *.com keys in the first place.

    Even worse, the DNSSEC protocol is still undergoing massive changes. As Paul Vixie wrote on 2002.11.21:

    We are still doing basic research on what kind of data model will work for dns security. After three or four times of

  • by linux_geek_germany ( 1079711 ) on Wednesday March 28, 2007 @07:00PM (#18522041)
    ...but I do not see some sort of market here that is willing to pay the implementation/deployment of DNSSEC. It is exactly the same reason imho that a lot of proprietary software products are inherently insecure (probably everyone can think of some here...); the company would not derive any profit from securing them better as their average user does not care. On the other hand the whole story makes me think of IPv6 somehow (nice in theory but practically not generally needed/too expensive). So I'm really interested whether we will see any implementations of this.
    • by shani ( 1674 ) <shane@time-travellers.org> on Thursday March 29, 2007 @04:48AM (#18525897) Homepage
      ..but I do not see some sort of market here that is willing to pay the implementation/deployment of DNSSEC.

      As I see it, security is like insurance. It's a cost that gives you nothing... until after you've had a problem.

      Maybe the costs of DNSSEC outweigh the benefits. I think that's probably true today... for lower-level domains at least. For organizations who's main job is providing DNS (like the root servers, ccTLDs, and so on) then the cost is not so high and the potential risks are great.

      The costs of DNSSEC will start to decrease as the technology gets more mature. It's currently moving from bleeding-edge to cutting-edge. :)
    • Re:Nice in theory... (Score:3, Informative)

      by hardaker ( 32597 ) on Thursday March 29, 2007 @11:42AM (#18529081) Homepage
      So I'm really interested whether we will see any implementations of this.

      oh, [wikipedia.org] I [nlnetlabs.nl] think [dnssec-tools.org] we [dnssec-deployment.org] may [cpan.org] see [verisignlabs.com] a [nominum.com] few [nlnetlabs.nl]

  • by thehossman ( 198379 ) on Wednesday March 28, 2007 @07:02PM (#18522063)
    When did a distorted GIF of Amanda Tapping become the symbol of Security?
  • by Anonymous Coward on Wednesday March 28, 2007 @07:05PM (#18522107)
    SUUUUUUUUUUCK IT
  • by cswiger ( 63672 ) <chuck@codefab.com> on Wednesday March 28, 2007 @07:09PM (#18522157) Homepage
    Adding cryptography or secure signing of zone files might be useful if you were either trying to keep info private from eavesdroppers, or wanted to verify that when you went to www.mybank.com, the address record you looked up was actually signed by your bank.

    But nobody (or not many people) use DNSSEC to encrypt zone transfers, and almost everybody hits a recursive nameserver run by your ISP or perhaps local to your company's network, which means that the end-user is never going to know whether the DNS query they issued returned a signed response or was forged from the authoritative DNS server. When done well, DNS spoofing can completely mangle a lot of network interactions one would really like to take for granted, such as being able to look up Microsoft's windowsupdate site, Apple's software update, anti-virus update sites, and so forth.

    Right now, you have to dig deep into the bowels of BIND to even notice whether a zone has been signed, and there is pretty much zero feedback about that status which propogates back to a client like a web browser or your platform-specific software update mechanism. Until that changes, I don't see DNSSEC doing anything really useful to solve the genuine problems which it might be useful to solve. If all you wanted was a way to encrypt zone transfers, using rsync over SSH is a lot easier to deal with.
    • by vux984 ( 928602 ) on Wednesday March 28, 2007 @07:48PM (#18522597)
      Really keeping DNS info private is a relatively obscure application for the public internet, and can be resolved with VPNs and other ways.

      Allowing the bank to sign dns records on the other hand is a worthwhile objective that could kill DNS spoofing.

      The only trick to signed DNS records is that you'd need access to the banks public key to verify the signatures, which could be a problem, because you couldn't rely on unsigned dns to give you the address of the server from which to download the public key. A true chicken and egg problem. ;)

      But the same sort of solution that browsers use with embedded ssl root certificates could probably work. Known clearinghouses for public keys are established, where banks etc can host their public keys, and where the dns clients have the public keys for the clearinghouse built in. (And like browsers, additional authorities can be manually added/removed by the user, etc.)

      A major corp like a bank would be effectively forced to use one of the built in key hosts to save their users the hassle of installing a key manually, but for private corporate uses etc that wouldnt' be necessary.

      Of course, I wrote all that without knowing what DNSSEC actually does, so I might have just regurgitated the essentials of what DNSSEC already does. :)
    • by slamb ( 119285 ) * on Wednesday March 28, 2007 @09:13PM (#18523391) Homepage

      But nobody (or not many people) use DNSSEC to encrypt zone transfers, and almost everybody hits a recursive nameserver run by your ISP or perhaps local to your company's network, which means that the end-user is never going to know whether the DNS query they issued returned a signed response or was forged from the authoritative DNS server.

      DNSSEC doesn't encrypt anything, just authenticate. And it fits into the DNS design of caching and recursive nameservers - believe your ISP's server will give you something that proves the answer came from the authoritative server at some time less than $TTL seconds ago. Now, I don't remember if your ISP's nameserver has to have special DNSSEC support or not to pass that information to you...probably yes, which is another infrastructure hurdle.

      Right now, you have to dig deep into the bowels of BIND to even notice whether a zone has been signed, and there is pretty much zero feedback about that status which propogates back to a client like a web browser or your platform-specific software update mechanism. Until that changes, I don't see DNSSEC doing anything really useful to solve the genuine problems which it might be useful to solve. If all you wanted was a way to encrypt zone transfers, using rsync over SSH is a lot easier to deal with.

      I'd take advantage of DNSSEC if the infrastructure were there - including a public key in a DNSSEC-authenticated zone would be a good way to authenticate a host. There are two other ways in common use by the clients you mentioned, and neither is quite satisfactory:

      • web browsers - they use PKI with trusted third-party roots to verify the site is who it claims to be. Disadvantage: you have to manage that list of trusted third parties, and typically the widely-trusted ones require cash to authenticate a server. Takes time to get the certificate, too.
      • ssh - it doesn't validate the key initially, unless you do so manually. How many times have you seen this message, and how many times have you actually checked the fingerprint before typing "yes"?

        The authenticity of host 'foo' can't be established.
        RSA key fingerprint is ....
        Are you sure you want to continue connecting (yes/no)?
        subsequent connections from the same client are at least verified against your local known hosts. This would be an excellent candidate for retrofitting - the client could retrieve the key from DNSSEC if it's there, and present you with this message otherwise. Over time, people would become more suspicious on seeing it.

        In fact, I just googled for "ssh dnssec" and it looks like someone has already written the code for this.

      New protocols could rely on DNSSEC instead, and there are probably other protocols like ssh that could be retrofitted easily.

      I'm not holding my breath on the infrastructure, though. It's been a while since I've looked at DNSSEC, but IIRC most of the benefits don't come until it's deployed from the root on down. Until .org uses DNSSEC, I can't really use it for slamb.org. I could manually add slamb.org's key into my client software maybe, but that's really not much better than creating my own root certificate for existing PKI mechanisms.

    • by shani ( 1674 ) <shane@time-travellers.org> on Thursday March 29, 2007 @04:39AM (#18525855) Homepage
      But nobody (or not many people) use DNSSEC to encrypt zone transfers, and almost everybody hits a recursive nameserver run by your ISP or perhaps local to your company's network, which means that the end-user is never going to know whether the DNS query they issued returned a signed response or was forged from the authoritative DNS server.

      First, lets clear up some misconceptions here.

      DNSSEC never encrypts transfers, whether zone transfers or other queries. One of the design decisions (documented in the 1990s) is that DNS is a public protocol. So there is no provision to hide data. DNSSEC rather allows cryptographically signed responses, so you can authenticate that the information came from the right place.

      Also, the attack you describe (giving bogus data to secondaries) is exactly one of the problems DNSSEC is designed to protect against. With DNSSEC queries (NSEC or NSEC3), it is not possible to spoof queries merely by sending secondaries bad data via a zone transfer (AXFR or IXFR). Like all public key cryptography, it is not possible to sign a DNS record without the private key. The client can check to verify that replies have been signed by the holder of the private key for the zone.

      Also, when people talk about using DNSSEC for zone transfers, they really mean using TSIG. Unlike NSEC or NSEC3, which uses public key, TSIG uses a shared key. In this way, it's basically a password that the primary and secondary servers agree on. It's much simpler to understand and implement than NSEC/NSEC3, because the problem is simpler.

      As for your claim that nobody uses DNSSEC for zone transfers, I think this is not true. TSIG has been around for a long time, and is easy to use. Sites that host large numbers of DNS zones, either as primary or secondary, often require TSIG (or at least strongly encourage it). Also, a lot of people who run their own primary/secondary infrastructure use it between servers (this is of course easier if you control all servers for a zone).

      As to what percentage of zone transfers are TSIG protected... this is an impossible number to get. So I propose the further discussion needs to be held over beers at a pub somewhere, since there is no actual data. ;)
  • by StartCom ( 1018308 ) on Wednesday March 28, 2007 @07:14PM (#18522227) Homepage
    As long as DNS root servers are unsigned, how can the regular DNS servers start to implement that? Sweden and Puerto Rico???
    • DNSSEC Trust, DLV (Score:3, Informative)

      by shani ( 1674 ) <shane@time-travellers.org> on Thursday March 29, 2007 @05:04AM (#18525961) Homepage
      As long as DNS root servers are unsigned, how can the regular DNS servers start to implement that? Sweden and Puerto Rico???

      In the ideal world, to verify that a DNS answer is correct, you start the chain of trust at the root, then follow to a top-level domain (TLD), and continue on down the tree until you get to your final answer.

      If at any point a zone does not have a DS record pointing to it, then the chain of trust is broken, and the ultimate answer will be unsecured. But this follows the usual DNS hierarchy... if your parent provides DNSSEC, then you have the option to secure your zone.

      But since the root is not signed, you cannot start the chain of trust at the root. A resolver needs to have the public key configured for each of the zones that it knows are secured... these zones are called "trust anchors".

      The problem with this is that there are hundreds of zones in the root. Finding the public key for each zone is a very heavy administrative task, as is getting new keys when the old ones expire. Going further down in the tree makes things even worse.

      One proposed solution, designed as a temporary measure until the root is signed, is DLV. With DLV, you use normal DNSSEC, but if you don't find a trust anchor anywhere in the tree, then you look at another special tree.

      So, say you were looking for "www.mydomain.example.com", and there was no trust anchor. You would then look in a DLV server for "www.mydomain.example.com", then "mydomain.example.com", then "example.com", and finally ".com". If at any point a DLV entry was found, you would follow that chain of trust.

      What DLV does is basically create a "second root" just for securing DNS. It's not a good solution, but it is better than nothing. The main goal is to allow people to use DNSSEC easily while waiting for ICANN to sign the root.

      <full_disclosure>
      The DLV solution is being pushed by my company, ISC [isc.org]. We run a DLV registry [isc.org], which is free for all to both publish data in and query.
      </full_disclosure>
  • by bergeron76 ( 176351 ) on Wednesday March 28, 2007 @07:15PM (#18522235) Homepage
    The only benefit of a DNS trail is to allow rich corporations to audit the queries and optimize them in their favor.

    EVERYTHING the internet stands for (and created) will be vaporized by corporate control of it.

    Bloggers - you'll become accountable for what you say
    Hosters - you'll become responsible for your clients and what they upload
    ad nausem...

    No thanks. I like the internet as it is.
    • by Watson Ladd ( 955755 ) on Wednesday March 28, 2007 @07:43PM (#18522533)
      They already can do that by recording the queries and responses. DNSSEC doesn't offer anything new in terms of traceability. So did you use Tor to post that comment?
    • > "The only benefit of a DNS trail is to allow rich corporations to audit the queries and optimize them in their favor."

      So a secure DNS system does not help protect us from forged DNS responses? What exactly is your reasoning behind that? And what do you mean by optimizing queries in their favor? This is starting to sound like a Net Neutrality debate.

      You're worried that if there's a DNS trail to follow, anonymity will vanish? Unless you regularly engage in DNS spoofing to trick people into confusing your identity with someone else's, I think you're already screwed by virtue of the fact that everyone you communicate with has your IP address.

      So what in hell does DNS have to do with personal accountability?
  • by Anonymous Coward on Wednesday March 28, 2007 @07:21PM (#18522303)
    I read this as DN$$EC somewhere somebody is going to make $$$ of this and it will be just like ssl certificates. This along with the commercial carriers trying to turn the internet into TV2 is going to make the internet a pretty boring place.
  • DNSSEC (Score:2, Insightful)

    by Anonymous Coward on Wednesday March 28, 2007 @07:54PM (#18522647)
    I think Olaf is likely speaking in his role as DNSEXT co-chair or DNS developer, not as chair of the IAB. It's certainly not an "IAB statement" on their web site; it's just someone attributing extra weight to his statement since he picked up an extra dot in IETF-land.

    Since Olaf been pretty heavily involved in the protocol development, he likely does think of it as a success or at least on the road to success. The reality is that it is getting some traction, but it is a long, steep hill.

    What does DNSSEC buy you? It allows you to use a cryptographic check to assure yourself that the data you have is the same as the data the zone maintainer put into the zone. It's object security, rather than channel security, in other words, and it could turn out to be very useful. In particular, it could mean that you would have a way of trusting the data you get from peers, which opens up new scaling possibilities for authoritative data. It doesn't mean that yet, because the whole system mimics the DNS design of descent from a root zone, and ICANN won't sign the root zone. There are proposals, including DLV, for look-aside validation, but they don't provide the same level of security. Instead, you get to decide whether the look-aside validator is clever enough to have done the right checks without the business relationships that underly the real DNS chain of authority. Without ICANN signing the root, DNSSEC isn't really compelling, as it is bootstrapping security based on trust relationships that are vapor-solid. With it, it can be useful in setting up new distribution mechanisms for key data (if you could trust anyone to hand you the root zone while you had a valid way to check the signature, DDoS attacks on the root become very hard), and it helps against cache poisoning attacks. Since those are the precursor to other attacks (especially identity theft attacks), it is worth doing.

    But sexy? No. In demand? So far, only by previous victims of the attacks, but that may change if the connections are more obvious.
  • by throatmonster ( 147275 ) on Wednesday March 28, 2007 @08:47PM (#18523139)
    I think this guy's brain has been baked, fried, and scrambled!
  • by tqbf ( 59350 ) on Wednesday March 28, 2007 @08:52PM (#18523193) Homepage

    Nothing about DNSSEC has improved since wrote about it last year [matasano.com]:

    • The current "standard" (RFC2535) remains "dead and buried" according to DNS pater familias Paul Vixie
    • Nobody even knows what problem DNSSEC is meant to solve, and why it's worth deploying in a world with pervasive TLS
    • It's a nightmare to deploy, both for administrators and for software developers who have to handle things like precomputing tens of thousands of expensive signatures
    • The only reference implementation of the protocol is BIND, the second-least-trusted piece of open source code on the Internet.

    DNSSEC is a huge waste of time. For a fraction of the effort, we could have pervasive opportunistic VPN-style connections. Or we could clean up the mess of insecure code that currently provides our core infrastructure. Or a unified standard secure email transport based on GPG/PGP. Or a concerted effort to solve the cross-site scripting problem. You could come up with a way to secure and authenticate the AOL OSCAR IM protocol and still do more good than DNSSEC ever will.

    Of course, the IETF people will never admit this. The IETF types used to define themselves by making fun of the OSI X-standards people; "rough consensus and working code!". The Internet won, CLNP lost. Where do you think all those standards bureaucrats you made fun of in the OSI groups went? That's right; to IETF working groups.

    • by Anonymous Coward on Thursday March 29, 2007 @02:16AM (#18525225)
      A++++++++ will read again!

      Someone speaks the truth, who are these people who turn themselves into ruling class assholes and constantly pretend that they are working to make the world a better place.
      The parent hits the nail exactly on the head.

      And if we did want simple and more secure dns infrastructure, we would simply sign the root with gpg and encourage everyone to run a local root server whenever they run a cache.
    • by Anonymous Coward on Thursday March 29, 2007 @10:47AM (#18528261)
      • The current standard is not RFC 2535, but rather the set of RFCs 4033, 4034 and 4035.
      • The problem that DNSSEC is designed to solve is, in fact, well-known. Just not by you, apparently.
      • There is no requirement for software developers to "compute tens of thousands of expensive signatures".
      • There are multiple implementations of DNSSECbis (4033/4034/4035), not just BIND9. One example is NSD.
      • Whilst BIND4 and BIND8 had many, many published vulnerabilities, BIND9 (which is the only release of BIND which supports DNSSEC) is a completely separate code-base, and has a much cleaner record.

      So, while your points were pithily worded and certainly sounded insightful, your general argument suffers from a complete absence of facts.

      • by tqbf ( 59350 ) on Thursday March 29, 2007 @01:10PM (#18530337) Homepage
        • You're right that I'm being unfair and misleading about RFC2535
        • You're wrong about the service model for DNSSEC being well-understood. Name a problem that is better solved by DNSSEC than by TLS, either in current practice or in theory.
        • You're wrong about the deployment problems of DNSSEC, but I won't dignify a point you won't even take the time to make fully.
        • BIND and NSD are the two examples of mainstream nameservers with DNSSEC support. But djbdns, which dwarfs NSD in deployments, does not and likely never will support DNSSEC. Neither does Active Directory, Novell, or Apple. And which operating systems currently ship with DNSSEC-enabled resolvers?
        • BIND 9 was developed by the same team as BIND 8. The errata lists in each successive release of BIND 9 aren't smaller than those of BIND 8. BIND 9 has had multiple vulnerabilities. The BIND team's time is better spent shoring up their own code than foisting new "standards" on the rest of us.
    • The current "standard" (RFC2535) remains "dead and buried" according to DNS pater familias Paul Vixie I'm pretty sure that Paul knows about RFCs 4033-4035. I suspect you don't though. rfcfind -n '403[345]' 4033 DNS Security Introduction and Requirements. R. Arends, R. Austein, M. Larson, D. Massey, S. Rose. March 2005. (Format: TXT=52445 bytes) (Obsoletes RFC2535, RFC3008, RFC3090, RFC3445, RFC3655, RFC3658, RFC3755, RFC3757, RFC3845) (Updates RFC1034, RFC1035, RFC2136, RFC2181, RFC2308, RFC3225, RFC3007, RFC3597, RFC3226) (Status: PROPOSED STANDARD) 4034 Resource Records for the DNS Security Extensions. R. Arends, R. Austein, M. Larson, D. Massey, S. Rose. March 2005. (Format: TXT=63879 bytes) (Obsoletes RFC2535, RFC3008, RFC3090, RFC3445, RFC3655, RFC3658, RFC3755, RFC3757, RFC3845) (Updates RFC1034, RFC1035, RFC2136, RFC2181, RFC2308, RFC3225, RFC3007, RFC3597, RFC3226) (Updated by RFC4470) (Status: PROPOSED STANDARD) 4035 Protocol Modifications for the DNS Security Extensions. R. Arends, R. Austein, M. Larson, D. Massey, S. Rose. March 2005. (Format: TXT=130589 bytes) (Obsoletes RFC2535, RFC3008, RFC3090, RFC3445, RFC3655, RFC3658, RFC3755, RFC3757, RFC3845) (Updates RFC1034, RFC1035, RFC2136, RFC2181, RFC2308, RFC3225, RFC3007, RFC3597, RFC3226) (Updated by RFC4470) (Status: PROPOSED STANDARD) Nobody even knows what problem DNSSEC is meant to solve, and why it's worth deploying in a world with pervasive TLS Do you use TLS for every web page you visit? Do you use it for all the email you deliver? Receive? FTP sites you visit? It's a nightmare to deploy, both for administrators and for software developers who have to handle things like precomputing tens of thousands of expensive signatures Many tools do exist, as does hardware, to help with that process. I certainly do agree, though, that if you're trying to publish a large zone (say .com) on a very frequent basis (sub-hourly) you'll hit problems. That's always a problem with cryptographic solutions. (note: there is no requirement to pre-compute the signatures; you could compute them on the fly but that has other issues). The only reference implementation of the protocol is BIND, the second-least-trusted piece of open source code on the Internet. Look again. How was this post not modded a troll?
      • Wouldn't that preview button been a handy thing to press? Sigh...

        The current "standard" (RFC2535) remains "dead and buried" according to DNS pater familias Paul Vixie

        I'm pretty sure that Paul knows about RFCs 4033-4035. I suspect you don't though.

        rfcfind -n '403[345]'
        4033 DNS Security Introduction and Requirements. R. Arends, R.
        Austein, M. Larson, D. Massey, S. Rose. March 2005. (Format:
        TXT=52445 bytes) (Obsoletes RFC2535, RFC3008, RFC3090, RFC3445,
        RFC3655, RFC3658, RFC3755, RFC3757, RFC3845) (Updates RFC1034,
        RFC1035, RFC2136, RFC2181, RFC2308, RFC3225, RFC3007, RFC3597,
        RFC3226) (Status: PROPOSED STANDARD)

        4034 Resource Records for the DNS Security Extensions. R. Arends, R.
        Austein, M. Larson, D. Massey, S. Rose. March 2005. (Format:
        TXT=63879 bytes) (Obsoletes RFC2535, RFC3008, RFC3090, RFC3445,
        RFC3655, RFC3658, RFC3755, RFC3757, RFC3845) (Updates RFC1034,
        RFC1035, RFC2136, RFC2181, RFC2308, RFC3225, RFC3007, RFC3597,
        RFC3226) (Updated by RFC4470) (Status: PROPOSED STANDARD)

        4035 Protocol Modifications for the DNS Security Extensions. R.
        Arends, R. Austein, M. Larson, D. Massey, S. Rose. March 2005.
        (Format: TXT=130589 bytes) (Obsoletes RFC2535, RFC3008, RFC3090,
        RFC3445, RFC3655, RFC3658, RFC3755, RFC3757, RFC3845) (Updates
        RFC1034, RFC1035, RFC2136, RFC2181, RFC2308, RFC3225, RFC3007,
        RFC3597, RFC3226) (Updated by RFC4470) (Status: PROPOSED STANDARD)

        Nobody even knows what problem DNSSEC is meant to solve, and why it's worth deploying in a world with pervasive TLS

        Do you use TLS for every web page you visit? Do you use it for all the email you deliver? Receive? FTP sites you visit?

        It's a nightmare to deploy, both for administrators and for software developers who have to handle things like precomputing tens of thousands of expensive signatures

        Many tools do exist, as does hardware, to help with that process. I certainly do agree, though, that if you're trying to publish a large zone (say .com) on a very frequent basis (sub-hourly) you'll hit problems. That's always a problem with cryptographic solutions. (note: there is no requirement to pre-compute the signatures; you could compute them on the fly but that has other issues).

        The only reference implementation of the protocol is BIND, the second-least-trusted piece of open source code on the Internet.

        Look again.

        How was this post not modded a troll?

  • by dwheeler ( 321049 ) on Thursday March 29, 2007 @12:16AM (#18524645) Homepage Journal
    The fundamental problem is that a WORKING DNSSEC specification hasn't been available. We really DO need what DNSSEC was intended to provide - i.e., if you type in a DNS name, your browser should be able to automatically get its data (IP address, etc.) and use crypto to ensure that it really is the authentic, unmodified data. The problems in DNS have been publicly known since at least 1995.

    But a USEFUL spec hasn't been available until perhaps this year. The real story of DNSSEC is a painful story of attempt after attempt, all of them failing to meet the need.

    In 1997 they released RFC 2065, which really didn't work, and in 1999 they released RFC 2535 and thought they were done. But RFC 2535 was completely impractical; it had an absurdly complicated siz-message protocol to do key exchanges for a child, and changes in a parent required all child keys to be re-signed (if the ".com" zone changed its public key, it would have to send 22 million records (because it would need to update all of the signatures in all of its children)). RFC 2535 was fine for a toy local network, but completely useless for the Internet. This should have been obvious, but the DNS group didn't accept that this was a problem until 2001 or so.

    They then made a big change to DNSSEC, to use "delegation signer (DS) resource records" to provide an additional level of indirection at delegation points between a parent and child zone. In the new approach, when a child's master public key changes, instead of having to have six messages for every record in the child, there is one simple message: the child sends the new public key to its parent (signed, of course). Parents simply store one master public key for each child; this is much more practical. This means that a little data is pushed to the parent, instead of massive amounts of data being exchanged between the parent and children. This does mean that clients have to do a little more work when verifying keys. More specifically, verifying a DNS zone's KEY RRset requires two signature verification operations instead of the one required by RFC 2535 (there is no impact on the number of signatures verified for other types of RRsets). Most view this as a small price to pay, since it changes DNSSEC so it is more practical to deploy.

    But the DNSSEC developers were STILL under the illusion that all DNS data, transitively, is public data. Any peek at a book on how to configure DNS systems clearly states that it's best practice to hide as much data about your organization's internals as you can. But the DNSSEC members didn't understand that, and explicitly permitted zone walking... making it impossible to hide private data. As far as most users were concerned, DNSSEC got rid of one security problem by creating a new one: loss of confidentiality. Even worse, when early adopters tried out DNSSEC and told the EITF group that they would NOT use DNSSEC until this was fixed, their comments were ignored. Finally, DENIC had to explain to the IETF explaining that DNSSEC's zone enumeration issue violates Germany's Federal Data Protection Act, and that other European countries have similar privacy laws forbidding the public release of certain kinds of information. In other words, it is ILLEGAL to deploy DNSSEC in many countries, because it forces private information to become public information.

    So they finally decided to create NSEC3, an extension to DNSSEC that should reduce the zone walking problem and hopefully make DNSSEC reasonable (and legal!) to deploy. But NSEC3 is wet behind the ears.

    Is there really any shock that a specification wasn't widely deployed when (1) technical problems made it impossible to deploy on the internet, and (2) fundamental security problems (like zone enumeration) made it illegal to deploy while creating new security problems? More info on DNSSEC is on Wikipedia [wikipedia.org].

  • PayPal wants the ISPs to filter the phishes for them. Well, the solution is to get the customer off the GP browser.

    You need secure connection? Build a custom browser. The browser checks the other end with its assymetric keys and maybe its one-time pads, and if the keys are wrong, it doesn't connect, tells the user to use something other than the 'net to contact the other guy.

    No changing colors or showing lock images in the universal browser to show that the connectionis secure. Just make or break. The problem in general is letting the customer know, and getting the special purpose browser into the customers' hands. Physical banks can do that, but PayPal is going to have a weak point in the distribution. Physical mail could help, as could, perhaps, cooperation with financial institutions with a physical presence.

    But the solution to dns poisoning, as some have noted, is to layer it on top of the current dns and IP infrastructure for those applications that need it. The lowest levels of communication have to be simple, and asymmetric keys are not that simple.

    Oh, and one more thing. Centralized identity servers are an oxymoron, a conflict in requirements. No central office can know who an individual is, period. The current crop of peer-to-peer identity servers are a bit overdone, but the only good solution is peer-to-peer or local group. And separate identities for separate applications. Centralization removes the safety backup systems that work out-of-band. Gotta keep humans in the loop.

    joudanzuki

  • by europa universalis ( 1081469 ) on Thursday March 29, 2007 @08:36AM (#18526797)
    Is chicken-xor-egg problem. Chicken-and-egg, no problem. Is simple.

What is research but a blind date with knowledge? -- Will Harvey

Working...