BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] free SSL certs from the EFF
- Subject: [Discuss] free SSL certs from the EFF
- From: warlord at MIT.EDU (Derek Atkins)
- Date: Thu, 04 Dec 2014 10:35:15 -0500
- In-reply-to: <547F3855.10106@gmail.com> (Richard Pieri's message of "Wed, 03 Dec 2014 11:20:37 -0500")
- References: <546C4823.6060900@gmail.com> <BN3PR0401MB1204BAB10AE6249C54E4E81BDC760@BN3PR0401MB1204.namprd04.prod.outlook.com> <54737E7C.5040506@mattgillen.net> <BN3PR0401MB1204CDD16766109B0CD095ECDC730@BN3PR0401MB1204.namprd04.prod.outlook.com> <sjm8uirdxem.fsf@securerf.ihtfp.org> <BN3PR0401MB1204B299B351DFF7F2E85FBDDC7D0@BN3PR0401MB1204.namprd04.prod.outlook.com> <sjmlhmqcb1j.fsf@securerf.ihtfp.org> <BN3PR0401MB120492A5BDE4D3CEE0AECDD3DC7A0@BN3PR0401MB1204.namprd04.prod.outlook.com> <sjm8uiqc7sw.fsf@securerf.ihtfp.org> <547E0FB3.3070005@gmail.com> <sjmy4qobui6.fsf@securerf.ihtfp.org> <547F3855.10106@gmail.com>
Richard Pieri <richard.pieri at gmail.com> writes: > On 12/3/2014 10:52 AM, Derek Atkins wrote: >> Actually, it was designed to protect against that. I sat in the >> IETF meetings where that was explicitly discussed. If an intermediary >> strips the DNSSEC records out then a resolver expecting DNSSEC will >> force a validation error. > > Which results in a denial of service for clients if DNSSEC is > enforced. That's not protecting users; that's dumping them into black > holes. Some say DoS, some say protected. If someone is trying to poison my DNS Cache I'd rather ignore them and blackhole than accept their attack and go to the wrong place. Besides, DNS allows me to go ask multiple sources for information. If I'm expecting a DNSSEC response and don't get it, I know that I need to go ask somewhere else. That's a FEATURE, not a bug. If I'm sitting in a hotel room behind a broken middleware box then I know, for sure, that the middleware is breaking me; I can turn off validation at that point (or decide never to stay at that hotel again -- or both!) >> Well, it sort of does, but it's not easy. But this is why they use >> ZSKs. The Root Zone KSK is mightily protected. > > So, too, allegedly, were the keys at DigiNotar. I have no idea what the DigiNotar security practices were. I *DO* know exactly what ICANN's practices are (and I even know at least one key-holder personally). -derek -- Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory Member, MIT Student Information Processing Board (SIPB) URL: http://web.mit.edu/warlord/ PP-ASEL-IA N1NWH warlord at MIT.EDU PGP key available
- Follow-Ups:
- [Discuss] free SSL certs from the EFF
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] free SSL certs from the EFF
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] free SSL certs from the EFF
- References:
- [Discuss] free SSL certs from the EFF
- From: warlord at MIT.EDU (Derek Atkins)
- [Discuss] free SSL certs from the EFF
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] free SSL certs from the EFF
- From: warlord at MIT.EDU (Derek Atkins)
- [Discuss] free SSL certs from the EFF
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] free SSL certs from the EFF
- From: warlord at MIT.EDU (Derek Atkins)
- [Discuss] free SSL certs from the EFF
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] free SSL certs from the EFF
- From: warlord at MIT.EDU (Derek Atkins)
- [Discuss] free SSL certs from the EFF
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] free SSL certs from the EFF
- Prev by Date: [Discuss] Boston Linux and Unix InstallFest LIV Saturday December 6, 2014
- Next by Date: [Discuss] free SSL certs from the EFF
- Previous by thread: [Discuss] free SSL certs from the EFF
- Next by thread: [Discuss] free SSL certs from the EFF
- Index(es):