Boston Linux & UNIX was originally founded in 1994 as part of The Boston Computer Society. We meet on the third Wednesday of each month at the Massachusetts Institute of Technology, in Building E51.

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] free SSL certs from the EFF



> From: discuss-bounces+blu=nedharvey.com at blu.org [mailto:discuss-
> bounces+blu=nedharvey.com at blu.org] On Behalf Of Bill Bogstad
> 
> As far as I can tell, the problem with DNSSEC isn't with the
> underlying protocols/processes; it is the chicken and egg deployment
> problem.   As Ed Harvey discusses in a different message, not all
> zones are signed.   This causes lots of problems. 

There are lots of possible ways to solve the problem.  A really obvious one would be to create a "secure" DNS service, which is functionally equivalent to regular DNS, except that all query responses must be signed, and that includes signing the "NX_DOMAIN" response, which would then give the client the ability to verifiably determine whether or not a secure response should have existed for a particular query.  That is, unless a malicious DNS root server provides maliciously crafted responses.

Another way would be to mandate that all DNS must be secure by some deadline.  By brute force and legal intervention, forcibly obsolete insecure DNS.

Another solution would be to simply require all non-DNS communications use SSL/TLS.  For example, you don't have to worry about hacked up DNS, if you're using https://blahblah.  Because if the DNS response is invalid, your https protocol is going to detect an invalid server cert.

And there are some other possibilities as well.



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org