[Cryptography] Against against DNS (Re: New SSL/TLS certs to each live no longer than 47) days by 2029

Bill Woodcock woody at pch.net
Thu Apr 24 17:46:33 EDT 2025


> On Apr 24, 2025, at 00:15, Ron Garret <ron at flownet.com> wrote:
>> On Apr 23, 2025, at 5:17 PM, Bill Woodcock <woody at pch.net> wrote:
>> So I care a lot about DNSSEC, because it’s something I can build a reasonably secure system with
> 
> How?  That's not a rhetorical question, I'm genuinely curious.  I get that secure DNS is better than insecure DNS.  What I don't get is why you think that secure DNS *by itself* is *better* than CA certs.

DNS is just a building-block with which to put together a system that solves a problem.  Generally, the problem is “how do I connect from a device under my control to a server under my control to transfer [email|web pages|files] between them?”

TLS auth and client auth take care of the connection, once the two devices are talking to each other.  But I need to be able to find the server, and that needs to be resilient in the face of load balancing, dynamic response to attacks, etc.  So I need to be able to tell the client what IP address to connect to, and I need to be able to do that in real time, not just depend on the client having a list to try.  I also need to be able to bootstrap the TLS key exchange, and I need that, too, to be resilient in the face of compromised keys and so forth.  DNS / DNSSEC / DANE allow me to do that.  Assuming I use a TLD, the one party that can really screw things up is the party wielding the root-zone ZSK.  But if they want to screw something up, they have to do it publicly, because they only control a portion of the root-zone nameservers, and that’s not the portion that I depend upon.  So, if they want to screw me over, they have to tell me in advance that they want to screw me over, and I have to decide to let them do it.  Because my clients are talking to my recursive resolvers, which are talking to my authoritative server stack.  And I can inject and decide to trust a new root-zone KSK for my own purposes, if I really need to.

But all that falls apart if the software on my client device is willing to trust a CA cert.  I can fix that for (for instance) email, but right now Ladybird is the only web browser that’s going in the right direction.  So whenever I get a new software tool in, my worry is that it’s going to trust CA certs and ignore DANE certs.  I can’t prevent bad CAs from existing, and I can’t know when they’ve issued a new bogus cert.  But with DANE, there’s only one organization that can issue something bogus, and they have to do it publicly, and I can choose to override it.  Which meets my needs.

                                -Bill


Please consider the environment before using AI to process this email.



More information about the cryptography mailing list