[ksk-rollover] Retention of the 2010 KSK CONSIDERED HARMFUL

Michael StJohns msj at nthpermutation.com
Tue Apr 2 17:27:53 UTC 2019


On 4/2/2019 12:50 PM, Salz, Rich wrote:
>
>   * The problem with this is that you need to know *when* N signed
>     N+1, and you can't believe N about the time.
>
> Out of band verification. You make sure the chain you have connects 
> properly up to the current KSK.
>
Then its "Turtles all the way down". 
https://en.wikipedia.org/wiki/Turtles_all_the_way_down

At some point you've involved something outside of the DNS and you need 
a way to trust them, and a way to supercede the trust if they're 
compromised.  Or you need a crowd of them.  Etc.

I thought of time stamp services - those might work but have the same 
problem of root management  for their chain of trust - e.g. the 
resolvers need to be able to get the most recent trust anchors before 
they can validate the DNS trust anchor set....   What I'm actually 
thinking about is some form of inserting a record into the blockchain 
ledger for one of the cryptocurrencies as a mechanism for time stamping 
the state of the trust anchor set at a given point in time.  See 
references 2 and 3 of https://en.wikipedia.org/wiki/Trusted_timestamping

But that's complex and probably requires that the root key holders add 
another step to the process of managing the keys. It's not something 
that's a simple add on.


> Or you tell folks turning on old computers to just reconfig first. :)
>
That gets my vote.  Or  - they just down load all the security patches 
that have been signed with the vendor of the devices private key to 
include the new starting trust anchor set.

Later, Mike


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/ksk-rollover/attachments/20190402/c13a5cee/attachment.html>


More information about the ksk-rollover mailing list