feature survey -- bind9 dnssec -- autogenerate missing signatures

Francis Dupont Francis.Dupont at fdupont.fr
Thu Sep 4 21:48:55 UTC 2008


 In your previous mail you wrote:
   
   Francis, this is all very well. People with DNSSEC clue will use these  
   sorts of beasts because they understand why keys need to be properly  
   protected.

=> I only wanted to prove the feature we are talking about can be
provided with a reasonnable level of security (of course, if the
needed resources are assigned to).

   I'm far from convinced the typical DNS admin (no DNSSEC  
   clue) will understand this or deploy these sorts of measures if they  
   sign their zones.

=> with SSL/TLS and HTTPS the typical admin should be more aware
than you expect.

   They'll inevitably take the path of least  
   resistance. Which would most probably mean on-the-fly background  
   signing if that was available and the actual signing key on-line and  
   in cleartext on the master server.
   
=> if the master server is properly managed (dedicated box, good
physical and logical access control, etc) this should not be such
a security disaster. And BTW the best HSM plugged to a box fulled
of garbage and loosely managed would never provide a decent level
of security...
 The key point here is that DNSSEC is a hierarchical trust system
so it is only critical the higher levels (root, TLDs, ...) have
the proper security.

   True. but if people are using dynamic DNS, there is already an  
   expectation that the SOA serial number changes "at random". This is  
   unlikely to be the case for the on-the-fly background signing that  
   Paul proposed.

=> can they learn? (or even read the documentation? :-)

Regards

Francis.Dupont at fdupont.fr


More information about the bind-workers mailing list