Is cryptography where security took the wrong branch?

bmanning at karoshi.com bmanning at karoshi.com
Wed Sep 10 15:43:46 EDT 2003


> 
> At 09:57 AM 9/10/2003 -0700, bmanning at karoshi.com wrote:
> >         ok...  does anyone else want to "touch" a secured DNS system
> >         that has some parts fo the tree fully signed?  Its a way to
> >         get some emperical understanding of how interesting/hard
> >         it is to hammer the DNS into a PKI-like thing.
> >
> >         www.rs.net  has some information.
> 
> My assertion is 1) DNS integrity issues have to be addressed as part of 
> generalized DNS trust issues .... regardless of any use for trusted 
> distribution of information that may include public keys. 2) because domain 
> name infrastructure is the root authority for CA/PKI SSL domain name 
> certificates, there is a suggestion that public keys be registered as part 
> of domain name registration (to fix trust issues in domain infrastructure 
> on behalf of the CA/PKI industry). Being able to trust DNS ... and having 
> registered public keys .... means that existing DNS information 
> distribution operation can turn itno trusted distribution of public keys 
> (aka existing DNS infrastructure supports distribution of any information 
> that happens to be registered).

	Nice collection of URLs.
	Ack both your assertions.  RS.NET is a testbed that is being used to
	validate the accuray of those assertions and explore the operational
	and social impact with the deployment of a DNS that can respond
	with information which can be independently verified for accuracy.
	

--bill

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list