
From nobody Tue Apr  1 17:20:20 2014
Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F31E1A001C for <perpass@ietfa.amsl.com>; Tue,  1 Apr 2014 17:20:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NAxgFOlDarRd for <perpass@ietfa.amsl.com>; Tue,  1 Apr 2014 17:20:15 -0700 (PDT)
Received: from mail-pd0-x230.google.com (mail-pd0-x230.google.com [IPv6:2607:f8b0:400e:c02::230]) by ietfa.amsl.com (Postfix) with ESMTP id D205B1A0034 for <perpass@ietf.org>; Tue,  1 Apr 2014 17:20:15 -0700 (PDT)
Received: by mail-pd0-f176.google.com with SMTP id r10so10267135pdi.21 for <perpass@ietf.org>; Tue, 01 Apr 2014 17:20:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:organization:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=Qtg7A3gp0C0/bgXRriaNgrXuomCiHT72D0LxNvh38Sc=; b=KJe+H82cqcE/doug+L5J5T+5sedKtBRsrFblGoKdcqKIv113MjVQcojdpgsl6dZkqH K0QhHZHr3kLqJBzADoT+vOhmXnxST1oQZMUMkmHGsW6f61XKyVFkFqJ4aKSzhmcsRDLM Pgsu+akpxM1RnB1D1MtyQYjB3PcnLv0mrS66uj9YH1UMx4Dgf48aWWJqfyAbkFfSSZlc PL3DwsDSeiublSwnXPDSa5MyVBWQwvX7HnVUd2UAgA0C/Xg8aAgE5qZtW9SZa1F32dLQ mK3smv9q1VChDoMogfKsbLIjmwKFiS1vyTHeB43v6yUDfEntxmxhKBV3+TN9e7/fGsKN YitQ==
X-Received: by 10.66.21.73 with SMTP id t9mr34173476pae.36.1396398012275; Tue, 01 Apr 2014 17:20:12 -0700 (PDT)
Received: from [172.24.37.45] (wireless-nat-21.auckland.ac.nz. [130.216.30.132]) by mx.google.com with ESMTPSA id xk1sm1048935pac.21.2014.04.01.17.20.10 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 01 Apr 2014 17:20:11 -0700 (PDT)
Message-ID: <533B57BE.6040106@gmail.com>
Date: Wed, 02 Apr 2014 13:20:14 +1300
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
User-Agent: Thunderbird 2.0.0.6 (Windows/20070728)
MIME-Version: 1.0
To: turners@ieca.com
References: <20140401220128.3CD897FC3A9@rfc-editor.org>
In-Reply-To: <20140401220128.3CD897FC3A9@rfc-editor.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/GcziRfDzYaG_uyUntD5ZS0znml4
Cc: perpass@ietf.org
Subject: Re: [perpass] RFC 7169 on The NSA (No Secrecy Afforded) Certificate Extension
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Apr 2014 00:20:18 -0000

Sean,

I'm a little puzzled. Do I read the end of section 2
correctly as indicating that in the shady world we now
inhabit, FALSE may mean TRUE?

That said, since the announcement arrived on Wednesday
in my time zone, I do take this RFC very seriously.
Perpass should discuss it carefully.

    Brian


From nobody Sat Apr  5 10:25:26 2014
Return-Path: <watsonbladd@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0EDD1A03DA for <perpass@ietfa.amsl.com>; Sat,  5 Apr 2014 10:25:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.7
X-Spam-Level: 
X-Spam-Status: No, score=0.7 tagged_above=-999 required=5 tests=[BAYES_50=0.8,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7pBT58zr-Vp8 for <perpass@ietfa.amsl.com>; Sat,  5 Apr 2014 10:25:19 -0700 (PDT)
Received: from mail-yk0-x233.google.com (mail-yk0-x233.google.com [IPv6:2607:f8b0:4002:c07::233]) by ietfa.amsl.com (Postfix) with ESMTP id 16D811A0204 for <perpass@ietf.org>; Sat,  5 Apr 2014 10:25:19 -0700 (PDT)
Received: by mail-yk0-f179.google.com with SMTP id 9so4111420ykp.38 for <perpass@ietf.org>; Sat, 05 Apr 2014 10:25:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:date:message-id:subject:from:to:content-type; bh=s7ESkdP62zFo2UYpEeYZEq7w4Gv0RHxtciLuvEWdGx0=; b=JHWbg/iepcWVnNu/FfnWeZo9qFWardbO/eEXu9xcRb+cQ2Lk/keg/7Tf4olYLcgr2Z DabWytJgGr8x4fuYysBjkI3zlYaR4fR0LuD/eyd0nnRQEnDkHlwu2iFb1WObXaYp2wWA yiDEHsKZUmjMMjtxEFisvH4kuzi5GRXYMXB+N+5HZM4+lz/vJAwhWvgnufg+b7treDaR 58nbhW7Y/5VP6Ww2roZEwiIw5M0qXNCUNwbvr8Edj+C+UzbjKIeipMRy7aptwJ72PV90 ZimV5s5PzDDXRJDYbsyoTsTokL4xuYbf1oY/DDjeKUPBwzEsY9EUpwKD6qH0h6BrWUM8 iemA==
MIME-Version: 1.0
X-Received: by 10.236.125.12 with SMTP id y12mr28212271yhh.42.1396718713995; Sat, 05 Apr 2014 10:25:13 -0700 (PDT)
Received: by 10.170.63.197 with HTTP; Sat, 5 Apr 2014 10:25:13 -0700 (PDT)
Date: Sat, 5 Apr 2014 10:25:13 -0700
Message-ID: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com>
From: Watson Ladd <watsonbladd@gmail.com>
To: perpass@ietf.org
Content-Type: text/plain; charset=UTF-8
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/Azzm_VQ-xY6QJ1xowwKcDAW1Qi4
Subject: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Apr 2014 17:25:23 -0000

Dear all,
https://s3.amazonaws.com/s3.documentcloud.org/documents/1102570/full-spectrum-cyber-effects-final.pdf
explains that RADIUS data is being used to find TDIs. I have no idea
what a TDI is, but from the document it looks like it contains
information about specific users.

Furthermore, BGP/MPLS is being exploited. Predictable, given how often
this happens by "accident".  Anyone who knows more about RADIUS and
BGP should take a look and see what is going on/what mitigations are
required.

Sincerely,
Watson Ladd


From nobody Sat Apr  5 11:55:41 2014
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E9C301A027D for <perpass@ietfa.amsl.com>; Sat,  5 Apr 2014 11:55:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id br99t0PGBAqM for <perpass@ietfa.amsl.com>; Sat,  5 Apr 2014 11:55:36 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) by ietfa.amsl.com (Postfix) with ESMTP id AC8A41A0279 for <perpass@ietf.org>; Sat,  5 Apr 2014 11:55:35 -0700 (PDT)
Received: from [192.168.131.139] ([80.92.122.106]) by mail.gmx.com (mrgmx102) with ESMTPSA (Nemesis) id 0MbJTE-1WFwpx0mV2-00IjGN; Sat, 05 Apr 2014 20:55:29 +0200
Message-ID: <53404F86.9000308@gmx.net>
Date: Sat, 05 Apr 2014 20:46:30 +0200
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: Watson Ladd <watsonbladd@gmail.com>, perpass@ietf.org
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com>
In-Reply-To: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com>
X-Enigmail-Version: 1.5.2
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="AoaL1AkqARFp4cHPsJ8N6dqnDNGcUfPuc"
X-Provags-ID: V03:K0:LXxleeDf60kPCXwvkZgTMo/R6rgnP0YaiecmA971Yh8XpdqRnOI RE1jG4dCrruoP2w7PmoGT0Tv6q4G9ivfaei1zDqAOzYxpmSngPB0PZVsagOPXO+hL7oI/yv s3zAjQ0R/pUsLgv286SaC/1fV1akXVcJqq2FdwCmPaHIfoD6IaY7iAFD++FXGOvOP1VWm/Q 1nkxYssGEC1dr+So4LvcQ==
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/Eb8Sinsoiy57UoNqTtxHDJRweks
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Apr 2014 18:55:40 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--AoaL1AkqARFp4cHPsJ8N6dqnDNGcUfPuc
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

TDI (as described on slide 15) is 'target geographical identifiers'.

RADIUS would allow you to find out where someone is located based on his
or her point of attachment in the network.

On 04/05/2014 07:25 PM, Watson Ladd wrote:
> Dear all,
> https://s3.amazonaws.com/s3.documentcloud.org/documents/1102570/full-sp=
ectrum-cyber-effects-final.pdf
> explains that RADIUS data is being used to find TDIs. I have no idea
> what a TDI is, but from the document it looks like it contains
> information about specific users.
>=20
> Furthermore, BGP/MPLS is being exploited. Predictable, given how often
> this happens by "accident".  Anyone who knows more about RADIUS and
> BGP should take a look and see what is going on/what mitigations are
> required.
>=20
> Sincerely,
> Watson Ladd
>=20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
>=20


--AoaL1AkqARFp4cHPsJ8N6dqnDNGcUfPuc
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBCgAGBQJTQE+GAAoJEGhJURNOOiAtpdoIAIPJsUWfKXVg+qf5uUJxz0lq
LqLqgCoIBrPZPTAVzoI5Igv4zVi4W/x1fEF/hWrBTYrZolwkjHkN6JkDBSqpz1vL
8huoJP7ZgIHttJPT228yV7F1FHiZ2Y9VW6huKM+Mz1echkgXKgDBgmyE7k/9EdSZ
d4N6H9aICdyslmWZFeWozsqQBSnciAec5Z7S9ZF/BDTlTZcUJAcInK8IeF9po1E/
kgwCatqMegWGdWajobNC+W5e4COEYi/mO9g/MGiAB/23uQ8C4dT8UiLfd7uY4Wie
sEPKvYqx0KteNKuPAcIQgXRWMmAmQORGqF5vkCc2lNpJpErSloxTZhuQMAKTfV8=
=Y3UI
-----END PGP SIGNATURE-----

--AoaL1AkqARFp4cHPsJ8N6dqnDNGcUfPuc--


From nobody Sat Apr  5 12:00:43 2014
Return-Path: <huitema@huitema.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B59F61A029D for <perpass@ietfa.amsl.com>; Sat,  5 Apr 2014 12:00:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.8
X-Spam-Level: 
X-Spam-Status: No, score=0.8 tagged_above=-999 required=5 tests=[BAYES_50=0.8,  RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QCsE8bVMh8bl for <perpass@ietfa.amsl.com>; Sat,  5 Apr 2014 12:00:37 -0700 (PDT)
Received: from xsmtp06.mail2web.com (xsmtp26.mail2web.com [168.144.250.193]) by ietfa.amsl.com (Postfix) with ESMTP id E09F01A0279 for <perpass@ietf.org>; Sat,  5 Apr 2014 12:00:33 -0700 (PDT)
Received: from [10.5.2.16] (helo=xmail06.myhosting.com) by xsmtp06.mail2web.com with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <huitema@huitema.net>) id 1WWVpL-0001Ao-LD for perpass@ietf.org; Sat, 05 Apr 2014 15:00:28 -0400
Received: (qmail 31811 invoked from network); 5 Apr 2014 19:00:27 -0000
Received: from unknown (HELO HUITEMA5) (Authenticated-user:_huitema@huitema.net@[24.16.156.113]) (envelope-sender <huitema@huitema.net>) by xmail06.myhosting.com (qmail-ldap-1.03) with ESMTPA for <perpass@ietf.org>; 5 Apr 2014 19:00:26 -0000
From: "Christian Huitema" <huitema@huitema.net>
To: "'Watson Ladd'" <watsonbladd@gmail.com>, <perpass@ietf.org>
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com>
In-Reply-To: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com>
Date: Sat, 5 Apr 2014 12:00:25 -0700
Message-ID: <006401cf5101$4e7e7040$eb7b50c0$@huitema.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AQJoWrMh6phIOS7e+A4d49V27VjeDpnRSFuw
Content-Language: en-us
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/e_viA6s3pFphY_UadFcB40wNCJ0
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Apr 2014 19:00:41 -0000

> Dear all,
>
https://s3.amazonaws.com/s3.documentcloud.org/documents/1102570/full-spectru
m-cyber-effects-final.pdf
> explains that RADIUS data is being used to find TDIs. I have no idea
> what a TDI is, but from the document it looks like it contains
> information about specific users.

RADIUS is normally used as part of network access authentication, between a
network access point and an authentication service. Unless precautions are
taken, monitoring the RADIUS traffic can reveal the identity of users
connecting to specific networks.  It is easy to see the implications for
pervasive monitoring.

There are two basic ways to protect RADIUS traffic from this monitoring. One
possibility  is to make sure that the actual user identities are only
transmitted in encrypted EAP payloads, such as PEAP, but this requires
scrubbing all implementations and making sure that they properly implement a
correct EAP variant. A stronger defense is to encrypt the traffic between
access point and authentication server. The RADIUS specification suggested
using IPSEC, compatible with the UDP transport. RFC 6614 specifies how to
protect RADIUS traffic with TLS. 

Either TLS or IPSEC for RADIUS will thwart pervasive monitoring.

-- Christian Huitema





From nobody Sat Apr  5 12:09:48 2014
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E7AE1A0282 for <perpass@ietfa.amsl.com>; Sat,  5 Apr 2014 12:09:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P9QnUVxyFmk1 for <perpass@ietfa.amsl.com>; Sat,  5 Apr 2014 12:09:41 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) by ietfa.amsl.com (Postfix) with ESMTP id 7088E1A0291 for <perpass@ietf.org>; Sat,  5 Apr 2014 12:09:41 -0700 (PDT)
Received: from [192.168.131.139] ([80.92.122.106]) by mail.gmx.com (mrgmx102) with ESMTPSA (Nemesis) id 0Lkiqm-1X6weG1F5Q-00aXKw; Sat, 05 Apr 2014 21:09:32 +0200
Message-ID: <534052CB.9030404@gmx.net>
Date: Sat, 05 Apr 2014 21:00:27 +0200
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: Christian Huitema <huitema@huitema.net>,  'Watson Ladd' <watsonbladd@gmail.com>, perpass@ietf.org
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com> <006401cf5101$4e7e7040$eb7b50c0$@huitema.net>
In-Reply-To: <006401cf5101$4e7e7040$eb7b50c0$@huitema.net>
X-Enigmail-Version: 1.5.2
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="isQ0nO13MJI39QQKfCFW8B9a60EPVH47u"
X-Provags-ID: V03:K0:BofwTGPHsk2QISJBgCsiC2DBNVKW5trNa0LeHMwEdqCaSv2tLkp 2UH7CvWiqN4mMMv8IadZevIrL8R2oWYErC++rY7C435OrICE1lRVBY2HevHEuEhr4Ojcpd1 DoovnYDj6rPRbVPmiehug95TP8JxW4uvpb2qnYF1PXFjZK7azzmh7u5t1yxJbu4HsdNDUvw LX4R6OQ5bTdt5eno3m4wA==
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/VkyUVlUUr8_puVDR_xISUO6ZFpg
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Apr 2014 19:09:46 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--isQ0nO13MJI39QQKfCFW8B9a60EPVH47u
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable



On 04/05/2014 09:00 PM, Christian Huitema wrote:
> Either TLS or IPSEC for RADIUS will thwart pervasive monitoring.

If someone gains access to the backend database of the RADIUS server
then you are unfortunately in trouble. It is also worth noting that both
RADIUS and Diameter deployments have lots of intermediaries (as noted in
this privacy reviews:
http://www.iab.org/wp-content/IAB-uploads/2011/07/ABFAB-privacy-review.tx=
t
http://www.iab.org/wp-content/IAB-uploads/2011/07/AAA-privacy-review.txt

What you can then see is probably very similar to this:
http://www.zeit.de/datenschutz/malte-spitz-data-retention


--isQ0nO13MJI39QQKfCFW8B9a60EPVH47u
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBCgAGBQJTQFLLAAoJEGhJURNOOiAtLVUIAIiEgi+AmCXxUZ+mrMDAyWnp
cQCt4Im2WBO22SscyIvUmSy9Ukgm+QjTK8oZCJzUdXhQKx8W7HP8R38SOUj/Yzih
aq4N2KRw/yzqtfDOixbh1JXWV0HDiFuef3bxtYhX8emo4BCJRPztusRJ1NvEaIa8
M/CChufVqbeJ6uit8iyRM3OG7GrC/D+cEe9G0apbkfFgFKPncEM/mUc3VMixx1vO
EqtiWQ6TvcU42HnCEmuPfzNXWuQwn1U2lS2fxgkRI4HIRACNCiHWiJkk7INUL+Ta
RorVkqcub3kpIm5KQTxFhPKJElV99lzyzVQiCYYwNqjyCi8oCyFXMGY3m/vtL/M=
=BKsK
-----END PGP SIGNATURE-----

--isQ0nO13MJI39QQKfCFW8B9a60EPVH47u--


From nobody Sat Apr  5 12:54:04 2014
Return-Path: <huitema@huitema.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D4E61A02C2 for <perpass@ietfa.amsl.com>; Sat,  5 Apr 2014 12:54:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.3
X-Spam-Level: 
X-Spam-Status: No, score=-1.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_31=0.6, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CfMp7XLnUNvO for <perpass@ietfa.amsl.com>; Sat,  5 Apr 2014 12:53:58 -0700 (PDT)
Received: from xsmtp12.mail2web.com (xsmtp32.mail2web.com [168.144.250.235]) by ietfa.amsl.com (Postfix) with ESMTP id 72CC51A0235 for <perpass@ietf.org>; Sat,  5 Apr 2014 12:53:58 -0700 (PDT)
Received: from [10.5.2.49] (helo=xmail11.myhosting.com) by xsmtp12.mail2web.com with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <huitema@huitema.net>) id 1WWWf1-0000R4-Rw for perpass@ietf.org; Sat, 05 Apr 2014 15:53:53 -0400
Received: (qmail 1634 invoked from network); 5 Apr 2014 19:53:50 -0000
Received: from unknown (HELO HUITEMA5) (Authenticated-user:_huitema@huitema.net@[24.16.156.113]) (envelope-sender <huitema@huitema.net>) by xmail11.myhosting.com (qmail-ldap-1.03) with ESMTPA for <hannes.tschofenig@gmx.net>; 5 Apr 2014 19:53:50 -0000
From: "Christian Huitema" <huitema@huitema.net>
To: "'Hannes Tschofenig'" <hannes.tschofenig@gmx.net>, "'Watson Ladd'" <watsonbladd@gmail.com>, <perpass@ietf.org>
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com> <006401cf5101$4e7e7040$eb7b50c0$@huitema.net> <534052CB.9030404@gmx.net>
In-Reply-To: <534052CB.9030404@gmx.net>
Date: Sat, 5 Apr 2014 12:53:49 -0700
Message-ID: <009a01cf5108$c404c970$4c0e5c50$@huitema.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AQJoWrMh6phIOS7e+A4d49V27VjeDgJsgOHDAkS2kuWZq83g8A==
Content-Language: en-us
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/q2ZDYdm1d89eAWGTmnbFJR-RE6Q
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Apr 2014 19:54:02 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>> Either TLS or IPSEC for RADIUS will thwart pervasive monitoring.
>
> If someone gains access to the backend database of the RADIUS server
> then you are unfortunately in trouble. It is also worth noting that =
both
> RADIUS and Diameter deployments have lots of intermediaries (as noted =
in
> this privacy reviews:
> =
http://www.iab.org/wp-content/IAB-uploads/2011/07/ABFAB-privacy-review.tx=
t
> =
http://www.iab.org/wp-content/IAB-uploads/2011/07/AAA-privacy-review.txt
>=20
> What you can then see is probably very similar to this:
> http://www.zeit.de/datenschutz/malte-spitz-data-retention

Hannes is correct, the encrypted transport will only protect against =
passive monitoring of the RADIUS traffic. There are two other obvious =
attacks, monitoring at intermediate servers and monitoring at the =
authentication server itself. And the references are worth reading =
again. Were they ever published as an RFC?
The monitoring at intermediate servers and proxies may be mitigated =
somewhat by the choice of appropriate EAP methods, in which the user =
name is obfuscated in the outer envelope and only revealed to the server =
in the encrypted EAP payload.
As for the attack against authentication servers, they are somewhat =
beyond the reach of the IETF. In fact, if I am not mistaken, the =
European data retention rules require that network providers keep that =
kind of information available for 18 months, and provide it on request. =
We can expect similar rules to appear in other regions. But we should at =
least try ensure that if data has to be revealed, this is done with =
proper process and is applied on a case by case basis.

- -- Christian Huitema

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.20 (MingW32)
Comment: Using gpg4o v3.2.42.4591 - http://www.gpg4o.de/
Charset: utf-8

iQEcBAEBAgAGBQJTQF9MAAoJELba05IUOHVQJcgH/36uoCUKk4ub5eXY6KAEbOvn
o88VYa2ANRSrs83T6PBeiqgAXzc8UlIf6YbQaB1C8zryAmT2sp4GhXtvFdlEReWb
uS0MsTW8nobamy3MrdLmH9VF9Ark+QE53HxCP75yw5OPQ3ac41EnNpXCxjAVZoJo
Sw4Y0fLiL8B2qAsPffSZOYUGVEy1KxJZjqlBy0pEgmrtYibHUY0/6V2vg+ULa0iq
nkeg23UEKPvLPfTE3mK5xrOvWVDCKSdKCl8ha7Oc8xqMITGVjStynPytLwhBl+J5
w7c4EgavBMKZwu5A8qQKbSQ+/ug0x1JXFw9MfRx8QNwBm9ktcsvKUxq+H8Qzn8I=3D
=3DEB7x
-----END PGP SIGNATURE-----


From nobody Tue Apr  8 06:49:17 2014
Return-Path: <stefan.winter@restena.lu>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DAD41A03A1 for <perpass@ietfa.amsl.com>; Tue,  8 Apr 2014 06:49:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.529
X-Spam-Level: 
X-Spam-Status: No, score=0.529 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RP_MATCHES_RCVD=-0.272, WEIRD_PORT=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1_cDcPQChJbz for <perpass@ietfa.amsl.com>; Tue,  8 Apr 2014 06:49:09 -0700 (PDT)
Received: from smtprelay.restena.lu (smtprelay.restena.lu [IPv6:2001:a18:1::62]) by ietfa.amsl.com (Postfix) with ESMTP id D378D1A0330 for <perpass@ietf.org>; Tue,  8 Apr 2014 06:49:05 -0700 (PDT)
Received: from smtprelay.restena.lu (localhost [127.0.0.1]) by smtprelay.restena.lu (Postfix) with ESMTP id C07B81057F for <perpass@ietf.org>; Tue,  8 Apr 2014 15:49:04 +0200 (CEST)
Received: from [IPv6:2001:a18:1:8:921b:eff:fe1b:d2e7] (unknown [IPv6:2001:a18:1:8:921b:eff:fe1b:d2e7]) by smtprelay.restena.lu (Postfix) with ESMTPS id B39261057E for <perpass@ietf.org>; Tue,  8 Apr 2014 15:49:04 +0200 (CEST)
Message-ID: <5343FE50.1080808@restena.lu>
Date: Tue, 08 Apr 2014 15:49:04 +0200
From: Stefan Winter <stefan.winter@restena.lu>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.3.0
MIME-Version: 1.0
To: perpass@ietf.org
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com> <006401cf5101$4e7e7040$eb7b50c0$@huitema.net> <534052CB.9030404@gmx.net>
In-Reply-To: <534052CB.9030404@gmx.net>
X-Enigmail-Version: 1.6
OpenPGP: id=8A39DC66; url=http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC0DE6A358A39DC66
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="idfbXvcT1L0pdw1dMBvfP4Ev64HoJmFlk"
X-Virus-Scanned: ClamAV
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/QrwYsHOtazTArldXwf1hkN7hL1I
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Apr 2014 13:49:15 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--idfbXvcT1L0pdw1dMBvfP4Ev64HoJmFlk
Content-Type: multipart/mixed;
 boundary="------------060402010003030405000007"

This is a multi-part message in MIME format.
--------------060402010003030405000007
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi,

>> Either TLS or IPSEC for RADIUS will thwart pervasive monitoring.

As an author of RFC6614 on RADIUS/TLS, I try to keep an ear on the
ground when it comes to deployment in real life.

One of the things I hear occasionally is that people read the tag
"Experimental" and conclude that this is something they don't want to do.=


That's a real shame. In eduroam, we are now using RADIUS/TLS on numerous
international aggregation links. It has some usability issues (PKI much
more complex to deploy than "good old" shared secrets) and some spurious
transmission issues (reported by some people on busy links - I suspect
head-of-line blocking at play) - but overall this is perfectly usable in
real life.

Maybe the time to move it from Experimental to Standards Track has come.

> If someone gains access to the backend database of the RADIUS server
> then you are unfortunately in trouble. It is also worth noting that bot=
h
> RADIUS and Diameter deployments have lots of intermediaries (as noted i=
n
> this privacy reviews:
> http://www.iab.org/wp-content/IAB-uploads/2011/07/ABFAB-privacy-review.=
txt
> http://www.iab.org/wp-content/IAB-uploads/2011/07/AAA-privacy-review.tx=
t
>=20
> What you can then see is probably very similar to this:
> http://www.zeit.de/datenschutz/malte-spitz-data-retention

While that's totally true - this isn't perpass is it? Yes, there are
proxies, and there are EAP home servers; if you break into them then you
can do lots of fancy things. But you are not a pervasive *passive*
attacker any more.

Greetings,

Stefan Winter

--=20
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - R=E9seau T=E9l=E9informatique de l'Education National=
e et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

PGP key updated to 4096 Bit RSA - I will encrypt all mails if the
recipient's key is known to me

http://pgp.mit.edu:11371/pks/lookup?op=3Dget&search=3D0xC0DE6A358A39DC66

--------------060402010003030405000007
Content-Type: application/pgp-keys;
 name="0x8A39DC66.asc"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
 filename="0x8A39DC66.asc"

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.22 (GNU/Linux)
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3D=3D
=3D3NUt
-----END PGP PUBLIC KEY BLOCK-----

--------------060402010003030405000007--

--idfbXvcT1L0pdw1dMBvfP4Ev64HoJmFlk
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=nIsS
-----END PGP SIGNATURE-----

--idfbXvcT1L0pdw1dMBvfP4Ev64HoJmFlk--


From nobody Tue Apr  8 06:52:05 2014
Return-Path: <stefan.winter@restena.lu>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 438A21A0330 for <perpass@ietfa.amsl.com>; Tue,  8 Apr 2014 06:52:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.171
X-Spam-Level: 
X-Spam-Status: No, score=-2.171 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.272, WEIRD_PORT=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O_wfIsjkkL5C for <perpass@ietfa.amsl.com>; Tue,  8 Apr 2014 06:51:59 -0700 (PDT)
Received: from smtprelay.restena.lu (smtprelay.restena.lu [IPv6:2001:a18:1::62]) by ietfa.amsl.com (Postfix) with ESMTP id E48331A03D9 for <perpass@ietf.org>; Tue,  8 Apr 2014 06:51:48 -0700 (PDT)
Received: from smtprelay.restena.lu (localhost [127.0.0.1]) by smtprelay.restena.lu (Postfix) with ESMTP id 948DE1057F for <perpass@ietf.org>; Tue,  8 Apr 2014 15:51:48 +0200 (CEST)
Received: from [IPv6:2001:a18:1:8:921b:eff:fe1b:d2e7] (unknown [IPv6:2001:a18:1:8:921b:eff:fe1b:d2e7]) by smtprelay.restena.lu (Postfix) with ESMTPS id 872471057E for <perpass@ietf.org>; Tue,  8 Apr 2014 15:51:48 +0200 (CEST)
Message-ID: <5343FEF4.7050309@restena.lu>
Date: Tue, 08 Apr 2014 15:51:48 +0200
From: Stefan Winter <stefan.winter@restena.lu>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.3.0
MIME-Version: 1.0
To: perpass@ietf.org
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com> <006401cf5101$4e7e7040$eb7b50c0$@huitema.net> <534052CB.9030404@gmx.net> <009a01cf5108$c404c970$4c0e5c50$@huitema.net>
In-Reply-To: <009a01cf5108$c404c970$4c0e5c50$@huitema.net>
X-Enigmail-Version: 1.6
OpenPGP: id=8A39DC66; url=http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC0DE6A358A39DC66
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="SNGpQBdF0QlE1L0HgpbPIkQm8lMuwEpQp"
X-Virus-Scanned: ClamAV
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/qf3GuHXw6AYI9bpYwK9CzMNeNMI
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Apr 2014 13:52:01 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--SNGpQBdF0QlE1L0HgpbPIkQm8lMuwEpQp
Content-Type: multipart/mixed;
 boundary="------------040903020506050407080609"

This is a multi-part message in MIME format.
--------------040903020506050407080609
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable


> Hannes is correct, the encrypted transport will only protect against pa=
ssive monitoring of the RADIUS traffic. There are two other obvious attac=
ks, monitoring at intermediate servers and monitoring at the authenticati=
on server itself. And the references are worth reading again. Were they e=
ver published as an RFC?
> The monitoring at intermediate servers and proxies may be mitigated som=
ewhat by the choice of appropriate EAP methods, in which the user name is=
 obfuscated in the outer envelope and only revealed to the server in the =
encrypted EAP payload.

Good choice of an EAP method will protect the password, and may protect
the username (it is up to John Doe on his computing device to configure
anonymous outer identities correctly - or not; guess what's the default
on most people's brains ;-) ).

There is still plenty of metadata to learn from the RADIUS packet, even
in the absence of username and password. If you control the
intermediary, mobility profiles come easy.

Greetings,

Stefan Winter

> As for the attack against authentication servers, they are somewhat bey=
ond the reach of the IETF. In fact, if I am not mistaken, the European da=
ta retention rules require that network providers keep that kind of infor=
mation available for 18 months, and provide it on request. We can expect =
similar rules to appear in other regions. But we should at least try ensu=
re that if data has to be revealed, this is done with proper process and =
is applied on a case by case basis.
>=20
> -- Christian Huitema
>=20
> gpgkeys: key B6DAD39214387550 not found on keyserver
>=20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
>=20

--=20
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - R=E9seau T=E9l=E9informatique de l'Education National=
e et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

PGP key updated to 4096 Bit RSA - I will encrypt all mails if the
recipient's key is known to me

http://pgp.mit.edu:11371/pks/lookup?op=3Dget&search=3D0xC0DE6A358A39DC66

--------------040903020506050407080609
Content-Type: application/pgp-keys;
 name="0x8A39DC66.asc"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
 filename="0x8A39DC66.asc"

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.22 (GNU/Linux)

mQINBFIplEwBEADTSz+DS8nio+RSvfSLLfaOnCGi1nqpn8Pb1laVUyEvnAAzZ5je
miS88GxfiDH6hUGlWzcaW0hCfUHGiohr485adbjxRksPngWgAt/1bRxpifsW3zOb
Fjgog01WWQV5Sihlwc4zr8zvYbFA5BJZ6YdkR9C5J015riv5OS30WTjA65SSXgYr
b7zJWPwmegTFwE093uBFvC39waz3xYpVu5j87nO6w2MVQt/8sY2/2BFPEq+xfOaj
l18UEwc7w8SCgnZdlVNcmEK4UBvJuwS/1lsR2JeQa8Gu1EDxC7PRgMgNXsDSWnnB
e9aVmfG54+6ILe1QH2dwk9sPBQT5w2+vjijrb3Dv9ur+1kN+TNU2XE436jVpnnY/
3OsLdix30STQn4Q/XOm7YoVMeDwwviefilRxzK0dXA+wKj92T68Od82CFxuZqPAg
BCVmWfQM91iK9piqFK+QP+R3vF6+NGDBdwbe68iVKs0v5L8XmbxBQndjpmo+lo2a
smBR2TAIfZHaKdgtBw13u3GPVVKlg/Mpko8ki9JOSem2aFyi3kQEVKptWgXT3POl
97DWJzsR5VyKz6GOx9kJAEISRyLZwm0wqh8+9LCza5oeIKW381lzq1b9x30vOh8C
BSQQJ+cG9ko0yPHAj7Suw2TmPXx1qMctmE6Ahq82ZW30SljdZby8WQuR2wARAQAB
tDxTdGVmYW4gV2ludGVyIChSRVNURU5BIGtleSAyMDEzKykgPHN0ZWZhbi53aW50
ZXJAcmVzdGVuYS5sdT6JAjkEEwECACMFAlIplEwCGwMHCwkIBwMCAQYVCAIJCgsE
FgIDAQIeAQIXgAAKCRDA3mo1ijncZj7/D/99hVS+mJr8dSPCaDaUFFxBiT2eI1Lo
R8VKEerTCRw5BsdL6pN2eRJZ9NmsqWo1ynWVHEzO91bNZ+oZGgyoNohcBAI7p+r0
qUTzkyqwdZO4kMm0pqKoM9xkP3tf2mjGujKjOz4Y7S7wnz2ZFokeUsecoRVJF/++
/qHnmeWLn44J1HUKLHYCjMu+QXGOgGXgz024jQ5eUrnPwzNp0Z90AFVHlWC+bymt
y/ToIUUCQqS5Ff0jzdWLd8U695OG9iGvjBQT1LdEjsfbAwuKV5UcnpxNqUpUwKa5
9hdX5/2cMZP07FI1UXwnBlxa8rJfdb13FLjSKX4vUUHedYUZMjMPgcwl1a+zGE22
lHiSQWgP8QLA/W3BLsi22ERCEPZBfexOeOtaWIItDIz18fIaQoMDoRPshzar0JI2
CzLYsyeKySAtYJEHFVoLmMvhkwzBmgqA/BEswUA67CfCr1jFHRXdpmWM7YkyAmMa
9q6LwquWKS5+MXlUXe/3oZUcgpw/T9Uuy3Jo3RdS7B3jFcWaVr6KsO/A9u1gr/aY
n5M+iJTQSj4vzqtkQaJTpSspRZoKa66HZt3IwSYiDiYZqtM83ynuj9kjnZzGfnuT
aNIi996q6Mptr33mOzIE1wmMqnJYwTr3EcNtf483q/qrJwh5ES8Q9xY7aat/ZcSl
8fKubW4TlfVr8YhGBBARAgAGBQJSKZUGAAoJEPo5vdH/HhVmYTgAn24eoqO/O98o
vNpt08Uab/+/tmYKAJ9kjXm9Njz5h33efzeelZUa484rr7kCDQRSKZRMARAAvBPp
n7FQq7LQ5glohtbL6XIEo1U4X67S0TzUYieENSWSVYuWYIhCBldmWdmH8Bpj/qHe
qdon7v+SLtR4WngzMR9toupKcFfHnbP9kpazTSB2ySHxXWGX1gJOpPXdCcg9iveK
BHEsDn00ThTcPsvtXpnnzET16pXIvOXO0bxTmVZ4INIF1SWgvYma/g8kBbgXLpkj
8tOywBqFiiYPEZlDeCxDHiMgUDh6olda9K/0TZFTdMPUgjKuubfAeaDNCOrVt4Rj
mFOaRLikcZocmgJhm3z/j25x7/mnNu+0di1H/S67YGQJ+pqCFInzIXDx7aRW2+JC
iqsY2X3xOPWZZzjyis5SNnfOcPH3gt2hYz1fy+thsBGf4NgCN01JRqIJ2/MOQCgU
dwh+9l8xqaJvCkUHM4hVh4W62MAe1u7UEqQbvvNEqxM5034vcvlE+/LRkrDCspw+
2YJ9QyroLerVRwW5DVleP8Ifi8VB3yD80nqXYs9aqRy0BkDNIQ43ERhESMt8dJqr
NkxgC6pemZrhNwyDh+hy2kPNGQh/iBpdKuH1o3E24TIZoV2v3YHvzob7aAYHddE/
PofAXhJW7I9mAs+HdWDmnI8ckuPDFpFH+Y/BFGvEXgcnJAJ1wEvf+4LuiIi0MHjR
4EWFn9vvoFDAIqD10h3FSd3D59HGtdSsNn4XaCsAEQEAAYkCHwQYAQIACQUCUimU
TAIbDAAKCRDA3mo1ijncZhBtEACL036ddjc5pFoYIdoUY1vT8SMXJNquewCnL1qu
DADzqDZFU5GNlQEy10krSfBwlTb9ahTtE0JFrOdZwUZtoa1Pgfr8nU6KOgrXPHbN
jS/9dyc5CwGVVIpOavIm2CsMVDJ9LCF/NT+u/t1k6eGfHhPVl3dUQyDa/lzc1chK
UIVQYQkFmr0A/iXP+29lFCaI+IeyU0bSdZhezDwUROn5vEx+fiPZyHDShCb+BxJv
/o2LQp9JHenCiSbO+ioRZdxgbWfoKBuXOfmSStqMWXas/gZ5vS3xq72LNtKPRxgp
jX3P8Zml1XDqpcBau7eK75VKE0Yd06YxnUIsbcEzInUc3uzW/u0DFpXYkMJb0XIv
JyUt5yYPKfV13N8kSkPi5pLxm8yuftXMzfgeFMR7nafY3glTVj/TxElzg6xeZNqf
C2ZjIbBtZg9ylHU8u8wwB+dX282crs0R3N9A064C71/cXlBqcjzjlKH2NUIWGxr+
od3TXFIFjszSU3NgMPKrWNhFLLwS81MpbkOe73s6aDhS8RDyNucoxtKXriLR+4Xi
u4+pyj5ukYP1JqpB3ZobY/XZgCnJMye+7xeTpIDJ1LPORxM3NNAElyb26lxAK2P+
km+EpI0Zzz6rNSCfg5jYQ474+e/GBgaSG4MlaPoZ+XAfN46u1Xjjv1/AkkA4IA6m
5zP5og=3D=3D
=3D3NUt
-----END PGP PUBLIC KEY BLOCK-----

--------------040903020506050407080609--

--SNGpQBdF0QlE1L0HgpbPIkQm8lMuwEpQp
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=rRAN
-----END PGP SIGNATURE-----

--SNGpQBdF0QlE1L0HgpbPIkQm8lMuwEpQp--


From nobody Tue Apr  8 14:13:05 2014
Return-Path: <paul@marvell.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76DBE1A02A2 for <perpass@ietfa.amsl.com>; Tue,  8 Apr 2014 14:13:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.267
X-Spam-Level: 
X-Spam-Status: No, score=-2.267 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hb0he3m6qy0j for <perpass@ietfa.amsl.com>; Tue,  8 Apr 2014 14:13:00 -0700 (PDT)
Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com [67.231.156.173]) by ietfa.amsl.com (Postfix) with ESMTP id B51FE1A0203 for <perpass@ietf.org>; Tue,  8 Apr 2014 14:13:00 -0700 (PDT)
Received: from pps.filterd (m0045851.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.14.5/8.14.5) with SMTP id s38LCveN007723; Tue, 8 Apr 2014 14:12:57 -0700
Received: from sc-owa.marvell.com ([199.233.58.135]) by mx0b-0016f401.pphosted.com with ESMTP id 1k4gyq2ptp-1 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Tue, 08 Apr 2014 14:12:57 -0700
Received: from SC-vEXCH2.marvell.com ([10.93.76.134]) by SC-OWA.marvell.com ([::1]) with mapi; Tue, 8 Apr 2014 14:12:56 -0700
From: Paul Lambert <paul@marvell.com>
To: Christian Huitema <huitema@huitema.net>, "'Watson Ladd'" <watsonbladd@gmail.com>, "perpass@ietf.org" <perpass@ietf.org>
Date: Tue, 8 Apr 2014 14:12:57 -0700
Thread-Topic: [perpass] RADIUS is targeted by GCHQ
Thread-Index: Ac9Tb093GTqNz+TeSbeu9iOM7qpCGA==
Message-ID: <CF69B331.37D4E%paul@marvell.com>
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com> <006401cf5101$4e7e7040$eb7b50c0$@huitema.net>
In-Reply-To: <006401cf5101$4e7e7040$eb7b50c0$@huitema.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.3.9.131030
acceptlanguage: en-US
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.11.96, 1.0.14,  0.0.0000 definitions=2014-04-08_04:2014-04-08,2014-04-08,1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1402240000 definitions=main-1404080206
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/I7b5lgNzpwDVNwUwKzgzdWz-vzc
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Apr 2014 21:13:02 -0000

>
>
>
>Either TLS or IPSEC for RADIUS will thwart pervasive monitoring.
Only if correctly implemented.  The Wi-Fi industry has a pervasive problem
where the TLS certificates for the authentication servers are not
validated by all devices.  We are putting in certificating testing to
encourage correct implementations, but it will take time to see a
significant change in products being sold.

The lack of certificate validation compounds the vulnerability of MSCHAPv2
which has been commonly used for =B3enterprise" grade Wi-Fi deployments.
Some new solutions for this problem area will be available soon =8A will
post when they are announced.

Paul


>
>-- Christian Huitema
>
>
>
>
>_______________________________________________
>perpass mailing list
>perpass@ietf.org
>https://www.ietf.org/mailman/listinfo/perpass


From nobody Thu Apr 10 07:55:34 2014
Return-Path: <linus@nordberg.se>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 789FD1A01E9 for <perpass@ietfa.amsl.com>; Thu, 10 Apr 2014 07:55:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.477
X-Spam-Level: *
X-Spam-Status: No, score=1.477 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HELO_EQ_SE=0.35, J_CHICKENPOX_31=0.6, RP_MATCHES_RCVD=-0.272, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ny5cmhwnG31d for <perpass@ietfa.amsl.com>; Thu, 10 Apr 2014 07:55:28 -0700 (PDT)
Received: from smtp.nordberg.se (smtp.nordberg.se [193.10.5.87]) by ietfa.amsl.com (Postfix) with ESMTP id 9CFFF1A01DC for <perpass@ietf.org>; Thu, 10 Apr 2014 07:55:27 -0700 (PDT)
Received: from tool.nordberg.se (h158n2-asp-a13.ias.bredband.telia.com [217.210.64.158]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by smtp.nordberg.se (Postfix) with ESMTPSA id DC79F11759; Thu, 10 Apr 2014 16:55:24 +0200 (CEST)
From: Linus Nordberg <linus@nordberg.se>
To: "Christian Huitema" <huitema@huitema.net>
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com> <006401cf5101$4e7e7040$eb7b50c0$@huitema.net> <534052CB.9030404@gmx.net> <009a01cf5108$c404c970$4c0e5c50$@huitema.net>
Date: Thu, 10 Apr 2014 16:55:22 +0200
In-Reply-To: <009a01cf5108$c404c970$4c0e5c50$@huitema.net> (Christian Huitema's message of "Sat, 5 Apr 2014 12:53:49 -0700")
Message-ID: <87sipl5j51.fsf@nordberg.se>
User-Agent: Gnus/5.13 (Gnus v5.13)
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/h6Q5_pN8N-k9vS8F6T1sZC6KAbQ
Cc: perpass@ietf.org
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Apr 2014 14:55:32 -0000

"Christian Huitema" <huitema@huitema.net> wrote
Sat, 5 Apr 2014 12:53:49 -0700:

|                               In fact, if I am not mistaken, the
| European data retention rules require that network providers keep that
| kind of information available for 18 months, and provide it on request.

There is a EU directive mandating member states to pass laws storing
some traffic data for 6 to 24 months, at the member states choice.

I know that some member states legislation requires ISP:s to store more
or less the contents of DHCP logs. I'm not sure which states, if any,
stipulate storing RADIUS logs in addition to that.


|          We can expect similar rules to appear in other regions.

Let's hope not. The data retention directive was declared invalid [0] by
the Court of Justice of EU day before yesterday.

Swedish providers are already announcing they will stop storing their
customers meta data for the purpose of data retention.

[0] http://curia.europa.eu/jcms/upload/docs/application/pdf/2014-04/cp140054en.pdf


From nobody Thu Apr 10 08:07:38 2014
Return-Path: <sxpert@sxpert.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40A9C1A0159 for <perpass@ietfa.amsl.com>; Thu, 10 Apr 2014 08:07:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.55
X-Spam-Level: 
X-Spam-Status: No, score=-0.55 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HELO_EQ_FR=0.35, J_CHICKENPOX_31=0.6, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1AbFFzCHIHsv for <perpass@ietfa.amsl.com>; Thu, 10 Apr 2014 08:07:28 -0700 (PDT)
Received: from amazone.ujf-grenoble.fr (mailmx.ujf-grenoble.fr [193.54.238.254]) by ietfa.amsl.com (Postfix) with ESMTP id C7CE81A0306 for <perpass@ietf.org>; Thu, 10 Apr 2014 08:07:13 -0700 (PDT)
Received: from tana4.ujf-grenoble.fr (tana4.ujf-grenoble.fr [152.77.66.210]) by amazone.ujf-grenoble.fr (Postfix) with ESMTP id 3g4Qgg5W0tz8SB7; Thu, 10 Apr 2014 17:07:11 +0200 (CEST)
Received: from tana4.ujf-grenoble.fr (unknown [127.0.0.1]) by tana4.ujf-grenoble.fr (Postfix) with ESMTP id A86D52E04E; Thu, 10 Apr 2014 17:07:11 +0200 (CEST)
X-UJF-AV: Scanned on tana4.ujf-grenoble.fr
Received: from tana4.ujf-grenoble.fr ([127.0.0.1]) by tana4.ujf-grenoble.fr (tana4.ujf-grenoble.fr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dfqmRtoDv5Vb; Thu, 10 Apr 2014 17:07:11 +0200 (CEST)
Received: from smtps.ujf-grenoble.fr (seth.ujf-grenoble.fr [152.77.18.66]) by tana4.ujf-grenoble.fr (Postfix) with ESMTP id 8DC442E045; Thu, 10 Apr 2014 17:07:11 +0200 (CEST)
Received: from [130.190.24.155] (eduroam-024155.grenet.fr [130.190.24.155]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: jacquotr@ujf-grenoble.fr) by smtps.ujf-grenoble.fr (Postfix) with ESMTPSA id 864C2244C25; Thu, 10 Apr 2014 17:07:11 +0200 (CEST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (1.0)
From: home <sxpert@sxpert.org>
X-Mailer: iPad Mail (11D167)
In-Reply-To: <87sipl5j51.fsf@nordberg.se>
Date: Thu, 10 Apr 2014 17:07:12 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <D0DC59FB-D937-41C9-908C-F371752868B5@sxpert.org>
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com> <006401cf5101$4e7e7040$eb7b50c0$@huitema.net> <534052CB.9030404@gmx.net> <009a01cf5108$c404c970$4c0e5c50$@huitema.net> <87sipl5j51.fsf@nordberg.se>
To: Linus Nordberg <linus@nordberg.se>
X-Greylist: Whitelist-UJF SMTP Authentifie (jacquotr@ujf-grenoble.fr) via submission-587 ACL (117)
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/MZ6jxP9e72TR4CakFQ3_aioZdgo
Cc: "perpass@ietf.org" <perpass@ietf.org>, Christian Huitema <huitema@huitema.net>
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Apr 2014 15:07:36 -0000

That data retention directive was just struck down by the eu court

http://www.laquadrature.net/en/data-retention-eu-court-of-justice-denounces-=
mandatory-data-retention

> On 10 Apr 2014, at 16:55, Linus Nordberg <linus@nordberg.se> wrote:
>=20
> "Christian Huitema" <huitema@huitema.net> wrote
> Sat, 5 Apr 2014 12:53:49 -0700:
>=20
> |                               In fact, if I am not mistaken, the
> | European data retention rules require that network providers keep that
> | kind of information available for 18 months, and provide it on request.
>=20
> There is a EU directive mandating member states to pass laws storing
> some traffic data for 6 to 24 months, at the member states choice.
>=20
> I know that some member states legislation requires ISP:s to store more
> or less the contents of DHCP logs. I'm not sure which states, if any,
> stipulate storing RADIUS logs in addition to that.
>=20
>=20
> |          We can expect similar rules to appear in other regions.
>=20
> Let's hope not. The data retention directive was declared invalid [0] by
> the Court of Justice of EU day before yesterday.
>=20
> Swedish providers are already announcing they will stop storing their
> customers meta data for the purpose of data retention.
>=20
> [0] http://curia.europa.eu/jcms/upload/docs/application/pdf/2014-04/cp1400=
54en.pdf
>=20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass


From nobody Thu Apr 10 10:06:50 2014
Return-Path: <doug.mtview@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF6B51A0309 for <perpass@ietfa.amsl.com>; Thu, 10 Apr 2014 10:06:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 64wbsV5LAMDe for <perpass@ietfa.amsl.com>; Thu, 10 Apr 2014 10:06:43 -0700 (PDT)
Received: from mail-qg0-x22a.google.com (mail-qg0-x22a.google.com [IPv6:2607:f8b0:400d:c04::22a]) by ietfa.amsl.com (Postfix) with ESMTP id 566161A0298 for <perpass@ietf.org>; Thu, 10 Apr 2014 10:06:43 -0700 (PDT)
Received: by mail-qg0-f42.google.com with SMTP id q107so4242333qgd.15 for <perpass@ietf.org>; Thu, 10 Apr 2014 10:06:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=FrF/ytZ4XKgUrFywUlW53cuUMZ7sUQSEQKyCU6LyxBY=; b=vW+tVPnC/xOSirp2/SzGBHg2fFPXW91ktQ+vmtwF1xTDYxH58dQI5+hkEH+QFUZS3t g7nst1Pvb4dCLWXgsiLhPaNLftcczJrCUjh3eYoDIfrCWhT1350H2jDrpuRV0GC45PcL w+vd3iGSnDEP9VYUDTX9PJVCPviTrEqOyoM7MaygOmBcSspBcdHRrkpwSkaiWeMHNdQl 5+G9UYptY5R+CdQwvFkPl3X7Afhi/5vcskmjGQukF0udDNl0AfW2P3/+wRLjN3XupTL6 g1zUBJCJtwNiL6NaZ2wTGeZ6shwJxKJGU5V4a1ks88NgWRiM834egb9abIhcSIdWgmSx SD7Q==
X-Received: by 10.229.17.69 with SMTP id r5mr22295366qca.7.1397149601498; Thu, 10 Apr 2014 10:06:41 -0700 (PDT)
Received: from [192.168.0.54] (107-0-5-6-ip-static.hfc.comcastbusiness.net. [107.0.5.6]) by mx.google.com with ESMTPSA id g7sm8627829qaf.14.2014.04.10.10.06.39 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 10 Apr 2014 10:06:40 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_550993FB-EFFE-4DC2-A8F6-2CBAA826191B"
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
From: Douglas Otis <doug.mtview@gmail.com>
In-Reply-To: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com>
Date: Thu, 10 Apr 2014 10:06:40 -0700
Message-Id: <FB7364F1-0684-4220-A852-B04DC3BB4493@gmail.com>
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com>
To: Watson Ladd <watsonbladd@gmail.com>
X-Mailer: Apple Mail (2.1874)
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/fWPJCsYt-RjJGTfz3aADRClZdhA
Cc: perpass <perpass@ietf.org>
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Apr 2014 17:06:48 -0000

--Apple-Mail=_550993FB-EFFE-4DC2-A8F6-2CBAA826191B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


On Apr 5, 2014, at 10:25 AM, Watson Ladd <watsonbladd@gmail.com> wrote:

> Dear all,
> =
https://s3.amazonaws.com/s3.documentcloud.org/documents/1102570/full-spect=
rum-cyber-effects-final.pdf
> explains that RADIUS data is being used to find TDIs. I have no idea
> what a TDI is, but from the document it looks like it contains
> information about specific users.
>=20
> Furthermore, BGP/MPLS is being exploited. Predictable, given how often
> this happens by "accident".  Anyone who knows more about RADIUS and
> BGP should take a look and see what is going on/what mitigations are
> required.
>=20
> Sincerely,
> Watson Ladd

Dear Watson,

FYI,
en.wikipedia.org/wiki/Telecom_Data_Intelligence

Here is a reference to a TDI acronym which seems fitting.  BGP and PKI =
remain avenues for MiTM events.

Regards,
Douglas Otis=

--Apple-Mail=_550993FB-EFFE-4DC2-A8F6-2CBAA826191B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space;"><br>On Apr 5, 2014, at 10:25 AM, =
Watson Ladd &lt;<a =
href=3D"mailto:watsonbladd@gmail.com">watsonbladd@gmail.com</a>&gt; =
wrote:<br><br><blockquote type=3D"cite">Dear all,<br><a =
href=3D"https://s3.amazonaws.com/s3.documentcloud.org/documents/1102570/fu=
ll-spectrum-cyber-effects-final.pdf">https://s3.amazonaws.com/s3.documentc=
loud.org/documents/1102570/full-spectrum-cyber-effects-final.pdf</a><br>ex=
plains that RADIUS data is being used to find TDIs. I have no =
idea<br>what a TDI is, but from the document it looks like it =
contains<br>information about specific users.<br><br>Furthermore, =
BGP/MPLS is being exploited. Predictable, given how often<br>this =
happens by "accident". &nbsp;Anyone who knows more about RADIUS =
and<br>BGP should take a look and see what is going on/what mitigations =
are<br>required.<br><br>Sincerely,<br>Watson =
Ladd<br></blockquote><div><br></div><div>Dear =
Watson,</div><div><br></div><div>FYI,</div><div><a =
href=3D"http://en.wikipedia.org/wiki/Telecom_Data_Intelligence">en.wikiped=
ia.org/wiki/Telecom_Data_Intelligence</a></div><div><br></div><div>Here =
is a reference to a TDI acronym which seems fitting. &nbsp;BGP and PKI =
remain avenues for MiTM =
events.</div><div><br></div><div>Regards,</div><div>Douglas =
Otis</div></body></html>=

--Apple-Mail=_550993FB-EFFE-4DC2-A8F6-2CBAA826191B--


From nobody Thu Apr 10 16:56:31 2014
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E32841A0381 for <perpass@ietfa.amsl.com>; Thu, 10 Apr 2014 16:56:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.58
X-Spam-Level: 
X-Spam-Status: No, score=-0.58 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DATE_IN_PAST_03_06=1.592, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.272, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DMrdSbBHYGCZ for <perpass@ietfa.amsl.com>; Thu, 10 Apr 2014 16:56:30 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) by ietfa.amsl.com (Postfix) with ESMTP id BF30A1A0357 for <perpass@ietf.org>; Thu, 10 Apr 2014 16:56:29 -0700 (PDT)
Received: from [192.168.37.142] ([64.134.222.118]) by mail.gmx.com (mrgmx002) with ESMTPSA (Nemesis) id 0LqQzp-1XBsJi2uyv-00e3ZQ; Fri, 11 Apr 2014 01:56:24 +0200
Message-ID: <5346E2B5.3090600@gmx.net>
Date: Thu, 10 Apr 2014 11:28:05 -0700
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: Paul Lambert <paul@marvell.com>, Christian Huitema <huitema@huitema.net>,  'Watson Ladd' <watsonbladd@gmail.com>,  "perpass@ietf.org" <perpass@ietf.org>
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com> <006401cf5101$4e7e7040$eb7b50c0$@huitema.net> <CF69B331.37D4E%paul@marvell.com>
In-Reply-To: <CF69B331.37D4E%paul@marvell.com>
X-Enigmail-Version: 1.5.2
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="ECwT9wDmGSE76AmJ4PPEDcMJBtWWSOTnj"
X-Provags-ID: V03:K0:qV03XagU0znQQkadUfvgLgPrgHvTj0hRuznx0xdkubdDYFCrhWB WYBeJ+OCGHnQNnkT8rWlx/aFWGu7VunAsV2Ua18oYW5Qtb7sjf2IbMd9fAV6gELeA9CVVDg s57QDmaWeEVbUadgA5CgIOZRexa9HgqpbXW/iuhUntNSj2QkKeIS4ssTbwjOM5//cPDkzzx 82IYVDyx93lG4vmlM6Edw==
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/6kkCsO9gWEwcuAwtC56PAUTXdoQ
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Apr 2014 23:56:31 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--ECwT9wDmGSE76AmJ4PPEDcMJBtWWSOTnj
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Paul, RADIUS by itself has little to-do with device authentication
(other than carrying the packets).

Problems with EAP methods is not a problem of RADIUS.

Ciao
Hannes

On 04/08/2014 11:12 PM, Paul Lambert wrote:
>>
>>
>>
>> Either TLS or IPSEC for RADIUS will thwart pervasive monitoring.
> Only if correctly implemented.  The Wi-Fi industry has a pervasive prob=
lem
> where the TLS certificates for the authentication servers are not
> validated by all devices.  We are putting in certificating testing to
> encourage correct implementations, but it will take time to see a
> significant change in products being sold.
>=20
> The lack of certificate validation compounds the vulnerability of MSCHA=
Pv2
> which has been commonly used for =B3enterprise" grade Wi-Fi deployments=
=2E
> Some new solutions for this problem area will be available soon =8A wil=
l
> post when they are announced.
>=20
> Paul
>=20
>=20
>>
>> -- Christian Huitema
>>
>>
>>
>>
>> _______________________________________________
>> perpass mailing list
>> perpass@ietf.org
>> https://www.ietf.org/mailman/listinfo/perpass
>=20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
>=20


--ECwT9wDmGSE76AmJ4PPEDcMJBtWWSOTnj
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBCgAGBQJTRuK1AAoJEGhJURNOOiAtJf4H/jh6ArgEm6gLEYeVAXQmYJ+X
bonUfMqX/WT8+yBbUSDr4XYCrWnYBcxoal/rAOnAKHdOsRy0QDBqP8wIi/LwBEl0
RJXDgegXfPiENiQdqFgo7/jxrDvteib/ip2TNdvza+isPMLsKydCMaIpOHvK7k1c
xgDLa2+dJ7Q7ewy6eAh855FyqITgUzrTW/uRLEk2wHBuMj7kTy6LLOfYCacKhpPx
FL1C9W3hcbGNcgMrzZ7JrEEal352QLueRLh73LGyqjAHpNurC3IzuhzrGbiWtt2V
qoVq2mZYpXAfjQ9FbmootoVSLe/69F+PVi2yt/aK18wlnC/KJbsL6WKFf70NRo8=
=6Y78
-----END PGP SIGNATURE-----

--ECwT9wDmGSE76AmJ4PPEDcMJBtWWSOTnj--


From nobody Thu Apr 10 17:45:05 2014
Return-Path: <paul@marvell.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 272781A03D3 for <perpass@ietfa.amsl.com>; Thu, 10 Apr 2014 17:45:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.267
X-Spam-Level: 
X-Spam-Status: No, score=-2.267 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WKX5ZJnIB5gf for <perpass@ietfa.amsl.com>; Thu, 10 Apr 2014 17:44:58 -0700 (PDT)
Received: from mx0a-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) by ietfa.amsl.com (Postfix) with ESMTP id 8F3591A03AA for <perpass@ietf.org>; Thu, 10 Apr 2014 17:44:58 -0700 (PDT)
Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.14.5/8.14.5) with SMTP id s3B0imuM014809; Thu, 10 Apr 2014 17:44:48 -0700
Received: from sc-owa.marvell.com ([199.233.58.135]) by mx0a-0016f401.pphosted.com with ESMTP id 1k658gr3ve-1 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Thu, 10 Apr 2014 17:44:48 -0700
Received: from SC-vEXCH2.marvell.com ([10.93.76.134]) by SC-OWA.marvell.com ([::1]) with mapi; Thu, 10 Apr 2014 17:44:47 -0700
From: Paul Lambert <paul@marvell.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, Christian Huitema <huitema@huitema.net>, "'Watson Ladd'" <watsonbladd@gmail.com>, "perpass@ietf.org" <perpass@ietf.org>
Date: Thu, 10 Apr 2014 17:44:47 -0700
Thread-Topic: [perpass] RADIUS is targeted by GCHQ
Thread-Index: Ac9VGH+czmXYdQiFTRSOoZZqqREkMAABaX3Q
Message-ID: <7BAC95F5A7E67643AAFB2C31BEE662D0197C632A12@SC-VEXCH2.marvell.com>
References: <CACsn0c=ueunJoUNrcBap2BXU-evxRJaNpkhK97HQWfmwmzMtsA@mail.gmail.com> <006401cf5101$4e7e7040$eb7b50c0$@huitema.net> <CF69B331.37D4E%paul@marvell.com> <5346E2B5.3090600@gmx.net>
In-Reply-To: <5346E2B5.3090600@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="windows-1257"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.11.96, 1.0.14,  0.0.0000 definitions=2014-04-10_06:2014-04-11,2014-04-10,1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1402240000 definitions=main-1404110011
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/rXkQNNCXmI86IupTeCb7CR-na7c
Subject: Re: [perpass] RADIUS is targeted by GCHQ
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Apr 2014 00:45:03 -0000

]-----Original Message-----
]From: Hannes Tschofenig [mailto:hannes.tschofenig@gmx.net]
..
]Paul, RADIUS by itself has little to-do with device authentication
](other than carrying the packets).

Yes - RADIUS is just a wrapper, I was describing the broader system issue. =
 The thread mentioned pervasive capture of information and RADIUS. =20

A significant path for capture of EAP information carried in RADIUS packets=
 is via MiTM attacks when the EAP/RADIUS information is carried in TLS.  Co=
de used for EAP/RADIUS does not always validate certificates correctly crea=
ting a path to capture the RADIUS/EAP information.  =20

]
]Problems with EAP methods is not a problem of RADIUS.
Yes ... but it is a system problem with the use of RADIUS.

Paul

]
]Ciao
]Hannes
]
]On 04/08/2014 11:12 PM, Paul Lambert wrote:
]>>
]>>
]>>
]>> Either TLS or IPSEC for RADIUS will thwart pervasive monitoring.
]> Only if correctly implemented.  The Wi-Fi industry has a pervasive
]> problem where the TLS certificates for the authentication servers are
]> not validated by all devices.  We are putting in certificating testing
]> to encourage correct implementations, but it will take time to see a
]> significant change in products being sold.
]>
]> The lack of certificate validation compounds the vulnerability of
]> MSCHAPv2 which has been commonly used for =B3enterprise" grade Wi-Fi
]deployments.
]> Some new solutions for this problem area will be available soon =D0 will
]> post when they are announced.
]>
]> Paul
]>
]>
]>>
]>> -- Christian Huitema
]>>
]>>
]>>
]>>
]>> _______________________________________________
]>> perpass mailing list
]>> perpass@ietf.org
]>> https://www.ietf.org/mailman/listinfo/perpass
]>
]> _______________________________________________
]> perpass mailing list
]> perpass@ietf.org
]> https://www.ietf.org/mailman/listinfo/perpass
]>


From nobody Fri Apr 11 14:40:36 2014
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBF1A1A02AF for <perpass@ietfa.amsl.com>; Fri, 11 Apr 2014 14:40:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.528
X-Spam-Level: 
X-Spam-Status: No, score=0.528 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RP_MATCHES_RCVD=-0.272] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pww3qcNLjEkN for <perpass@ietfa.amsl.com>; Fri, 11 Apr 2014 14:40:29 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id ECED11A023E for <perpass@ietf.org>; Fri, 11 Apr 2014 14:40:28 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id E49CCBEC9 for <perpass@ietf.org>; Fri, 11 Apr 2014 22:40:26 +0100 (IST)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IIvikfeG1EN6 for <perpass@ietf.org>; Fri, 11 Apr 2014 22:40:25 +0100 (IST)
Received: from [10.87.48.3] (unknown [86.42.23.50]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id D3DA5BEC4 for <perpass@ietf.org>; Fri, 11 Apr 2014 22:40:24 +0100 (IST)
Message-ID: <53486148.2070002@cs.tcd.ie>
Date: Fri, 11 Apr 2014 22:40:24 +0100
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: perpass <perpass@ietf.org>
References: <5347DCBA.6080101@cs.tcd.ie>
In-Reply-To: <5347DCBA.6080101@cs.tcd.ie>
X-Enigmail-Version: 1.6
X-Forwarded-Message-Id: <5347DCBA.6080101@cs.tcd.ie>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/VPAafsmya2as2GA1HEnS9EX37xQ
Subject: [perpass] Fwd: Re: Delivering perpass
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Apr 2014 21:40:33 -0000

Hiya,

Trevor was asking me about the state of play here. The
answer might be more generally useful so forwarding this
(with permission) in case it is.

Cheers,
S.



-------- Original Message --------
Subject: Re: Delivering perpass
Date: Fri, 11 Apr 2014 13:14:50 +0100
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
To: Trevor Freeman <trevorf@exchange.microsoft.com>,  Kathleen Moriarty
<kathleen.moriarty.ietf@gmail.com>


Hi Trevor,

On 04/10/2014 10:35 PM, Trevor Freeman wrote:
> Hi folks,
> 
> I am curious how you see the perpass discussion changing some of IETF
> practices.
> 
> As noted in the perpass attack draft
> 
> Pervasive monitoring is a technical attack that should be mitigated
> in the design of IETF protocols, where possible
> 
> How is the "where possible" going to be assessed. Will the
> presumption become you must defend against perpass unless you can
> show solid reasons why not? For example, requiring authors to
> document some possible approaches and why they were eliminated to at
> least show they tried? What about the backwards compatibility card,
> how often can that be played?

The reality is that we'll have to learn as we go. Our new bcp
does not say you "must defend against" but rather that you must
have considered the topic. The extent to which that gets done
well or badly is something we'll have to see, as will the ways
that participants, WGs and the IESG deal with that. Please
don't though consider this as something the IESG police, it'll
be better off all around if participants do consider the PM
attack and if WGs take that into account, as per the new BCP.
Same as always, factoring stuff like this in early is going
to be better and easier all around.

Backwards compatibility is clearly an issue but I don't think
of it as a card to play, its another engineering constraint
that we have to deal with. For example, we are not getting rid
of email, and won't even though email is leaky as hell with
meta-data even with S/MIME or PGP. If someone did come up with
a workable e2e email security solution that was way less leaky
and that got deployed, then we would want to consider that, but
since that's mythical, it doesn't arise. So absent a working
solution, for email, backwards compatibility is likely to be
a factor forever. In other cases, YMMV of course but that's
just because we're dealing with partly conflicting constraints,
as we always do.

> 
> Do we need to go though and audit the existing portfolio to see where
> we have work to do to meet the higher standards i.e. perpass
> resistant?

There's work started to do reviews of old RFCs for this.
We'd be delighted if you were to join in on that! Contact
Avri Doria or Scott Brim. There's a wiki page at [1] for
that.

  [1] https://trac.tools.ietf.org/group/ppm-legacy-review/

The intent there is that as and when we do new work on
those technologies, these reviews can inform that work.
And maybe these reviews might motivate folks to do new
work as well, we'll see. We're in a try-and-see mode
right now, and hope to see how that's going at IETF-90,
so your input on that now would be really timely and
appreciated if you have a few cycles to pick an RFC,
make a ticket and do a review of that in the next month
or so. (Go on, I bet you have some RFC you can think of
that could be useful low-hanging fruit for this:-)

> 
> Do we need a new guidance rfc to lay out the priorities for
> confidentially, integrity and authentication security for rfc
> authors?

Yes we do. But we're not ready for that yet. The idea I
think would be to add a new RFC to BCP 72 [2] that sets
out what we've learned, once we've learned enough. I'd
hope that we might be able to start on that towards the
end of the year. (And again, feel free to volunteer in
advance to help out:-)

  [2] https://tools.ietf.org/html/bcp72

We also want to get the threat model draft [3] done so
consider helping out there too if you've time with
comments/text etc as usual.

  [3] https://tools.ietf.org/html/draft-barnes-pervasive-problem

> 
> The standards we write can be used both on-premise and in the cloud.
> Pervasive monitoring is a bigger priority for cloud deployments. How
> should we reconcile those two scenarios since they are deployment
> specific.

Yes, that tension is noted in pepass-attack and will be
part of the working-out that we work out. There's also
however the fact that while many deployments previously
considered protocols to be running in "trusted" environments,
we have seen (e.g. Belgacom) that that is not such a
good assumption any more given the PM attack. That has
already had clear impact for e.g. inter data centre
traffic deployments, but will take longer to work out
for e.g. Diameter deployments I expect. But in both cases
the change is not so much to the protocol but to turn
on security.

> I am sure you and your colleges on the IESG have been mulling over
> similar questions.

Yep. We're discussing some modification to the discuss
criteria [4] in the short term, and will have a broader
discussion at the IESG retreat in May. Jari posted about
the discuss criteria change plan to the IETF list before,
but we're wrangling text at the moment. Anything longer
term, will be reported as usual and the community will
get their say as usual.

  [4] https://www.ietf.org/iesg/statement/discuss-criteria.html

> I was just curious what might be written on the new stones when you
> come back down the mountain. Thanks Trevor

There's no mountain and no stones:-) The perpass-attack LC
for example had nearly 1000 messages on various lists and
the Vancouver tech plenary had I'd say about 1000 people
in the room. The IESG are not aiming to surprise anyone on
this, but to reflect the IETF consensus, which is rough,
but which I hope will get less rough as we go and as folks
see that we're improving things without going crazy.

Cheers,
S.

PS: Now that I've written this, it might be a useful
state-of-play to send to the perpass list, mind if I
do that by just forwarding this?



> 



From nobody Sat Apr 12 23:34:05 2014
Return-Path: <doug.mtview@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52BE31A0271 for <perpass@ietfa.amsl.com>; Sat, 12 Apr 2014 23:34:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.1
X-Spam-Level: 
X-Spam-Status: No, score=-0.1 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eJ-NkSex2eDd for <perpass@ietfa.amsl.com>; Sat, 12 Apr 2014 23:33:58 -0700 (PDT)
Received: from mail-pb0-x231.google.com (mail-pb0-x231.google.com [IPv6:2607:f8b0:400e:c01::231]) by ietfa.amsl.com (Postfix) with ESMTP id 170341A0220 for <perpass@ietf.org>; Sat, 12 Apr 2014 23:33:58 -0700 (PDT)
Received: by mail-pb0-f49.google.com with SMTP id jt11so7011879pbb.22 for <perpass@ietf.org>; Sat, 12 Apr 2014 23:33:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=198fBUe256IKhK4FZDanpCLADin4vqPhKXA79aKdr60=; b=1AKhW/rBJuOgVou/qNpSKT8tEshoq8f6t9VKAQWXnGyfQSVuS1L6DSGu3G8ALnoNAl /4riti1iYzjR8YvJoVpJIWdRevmXdSKMNwO/Wj+UM579nQ8fVh4C4qcC5ecwwoF2nTsO VK1yu7K7aUEuyOlwNwM5GVWgyH/EU3yKWGedTa0IKFEU+W3TiAbLzgRW/p4UfOWGfm1R aSIyOgE7HBr3iDyyW9j0jKiLYyQ9D2ZtIVUX4kowqrXPDHB3jO17ifW1h+h47MWB5vhQ gKZ7BNsf8FTIfF4tpiSERYzCfIKw/ZiCGTGT9qh5B6A5pjHyoXfaVc71bVfrNeZHbj5q NOxg==
X-Received: by 10.66.192.41 with SMTP id hd9mr6864537pac.87.1397370836093; Sat, 12 Apr 2014 23:33:56 -0700 (PDT)
Received: from ?IPv6:2601:9:76c0:27:7458:1b67:99a2:976f? ([2601:9:76c0:27:7458:1b67:99a2:976f]) by mx.google.com with ESMTPSA id kc9sm25847332pbc.25.2014.04.12.23.33.54 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sat, 12 Apr 2014 23:33:55 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_38C80607-6055-4935-BE74-59F854ED5063"
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
From: Douglas Otis <doug.mtview@gmail.com>
In-Reply-To: <53486148.2070002@cs.tcd.ie>
Date: Sat, 12 Apr 2014 23:33:53 -0700
Message-Id: <4813B9C3-C292-42B2-9023-E415E1450255@gmail.com>
References: <5347DCBA.6080101@cs.tcd.ie> <53486148.2070002@cs.tcd.ie>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
X-Mailer: Apple Mail (2.1874)
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/hycYAr9sqzF2nLOE1XX8pgN_6ME
Cc: perpass <perpass@ietf.org>
Subject: Re: [perpass] Delivering perpass
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Apr 2014 06:34:01 -0000

--Apple-Mail=_38C80607-6055-4935-BE74-59F854ED5063
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


On Apr 11, 2014, at 2:40 PM, Stephen Farrell <stephen.farrell@cs.tcd.ie> =
wrote:

>=20
> Hiya,
>=20
> Trevor was asking me about the state of play here. The
> answer might be more generally useful so forwarding this
> (with permission) in case it is.
>=20
> Cheers,
> S.

Dear Stephen,

There is in fact a reasonable email solution with low leakage unlike PGP =
or S/MIME.

See:=20
http://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-07

Regards,
Douglas Otis


> -------- Original Message --------
> Subject: Re: Delivering perpass
> Date: Fri, 11 Apr 2014 13:14:50 +0100
> From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
> To: Trevor Freeman <trevorf@exchange.microsoft.com>,  Kathleen =
Moriarty
> <kathleen.moriarty.ietf@gmail.com>
>=20
>=20
> Hi Trevor,
>=20
> On 04/10/2014 10:35 PM, Trevor Freeman wrote:
>> Hi folks,
>>=20
>> I am curious how you see the perpass discussion changing some of IETF
>> practices.
>>=20
>> As noted in the perpass attack draft
>>=20
>> Pervasive monitoring is a technical attack that should be mitigated
>> in the design of IETF protocols, where possible
>>=20
>> How is the "where possible" going to be assessed. Will the
>> presumption become you must defend against perpass unless you can
>> show solid reasons why not? For example, requiring authors to
>> document some possible approaches and why they were eliminated to at
>> least show they tried? What about the backwards compatibility card,
>> how often can that be played?
>=20
> The reality is that we'll have to learn as we go. Our new bcp
> does not say you "must defend against" but rather that you must
> have considered the topic. The extent to which that gets done
> well or badly is something we'll have to see, as will the ways
> that participants, WGs and the IESG deal with that. Please
> don't though consider this as something the IESG police, it'll
> be better off all around if participants do consider the PM
> attack and if WGs take that into account, as per the new BCP.
> Same as always, factoring stuff like this in early is going
> to be better and easier all around.
>=20
> Backwards compatibility is clearly an issue but I don't think
> of it as a card to play, its another engineering constraint
> that we have to deal with. For example, we are not getting rid
> of email, and won't even though email is leaky as hell with
> meta-data even with S/MIME or PGP. If someone did come up with
> a workable e2e email security solution that was way less leaky
> and that got deployed, then we would want to consider that, but
> since that's mythical, it doesn't arise. So absent a working
> solution, for email, backwards compatibility is likely to be
> a factor forever. In other cases, YMMV of course but that's
> just because we're dealing with partly conflicting constraints,
> as we always do.
>=20
>>=20
>> Do we need to go though and audit the existing portfolio to see where
>> we have work to do to meet the higher standards i.e. perpass
>> resistant?
>=20
> There's work started to do reviews of old RFCs for this.
> We'd be delighted if you were to join in on that! Contact
> Avri Doria or Scott Brim. There's a wiki page at [1] for
> that.
>=20
>  [1] https://trac.tools.ietf.org/group/ppm-legacy-review/
>=20
> The intent there is that as and when we do new work on
> those technologies, these reviews can inform that work.
> And maybe these reviews might motivate folks to do new
> work as well, we'll see. We're in a try-and-see mode
> right now, and hope to see how that's going at IETF-90,
> so your input on that now would be really timely and
> appreciated if you have a few cycles to pick an RFC,
> make a ticket and do a review of that in the next month
> or so. (Go on, I bet you have some RFC you can think of
> that could be useful low-hanging fruit for this:-)
>=20
>>=20
>> Do we need a new guidance rfc to lay out the priorities for
>> confidentially, integrity and authentication security for rfc
>> authors?
>=20
> Yes we do. But we're not ready for that yet. The idea I
> think would be to add a new RFC to BCP 72 [2] that sets
> out what we've learned, once we've learned enough. I'd
> hope that we might be able to start on that towards the
> end of the year. (And again, feel free to volunteer in
> advance to help out:-)
>=20
>  [2] https://tools.ietf.org/html/bcp72
>=20
> We also want to get the threat model draft [3] done so
> consider helping out there too if you've time with
> comments/text etc as usual.
>=20
>  [3] https://tools.ietf.org/html/draft-barnes-pervasive-problem
>=20
>>=20
>> The standards we write can be used both on-premise and in the cloud.
>> Pervasive monitoring is a bigger priority for cloud deployments. How
>> should we reconcile those two scenarios since they are deployment
>> specific.
>=20
> Yes, that tension is noted in pepass-attack and will be
> part of the working-out that we work out. There's also
> however the fact that while many deployments previously
> considered protocols to be running in "trusted" environments,
> we have seen (e.g. Belgacom) that that is not such a
> good assumption any more given the PM attack. That has
> already had clear impact for e.g. inter data centre
> traffic deployments, but will take longer to work out
> for e.g. Diameter deployments I expect. But in both cases
> the change is not so much to the protocol but to turn
> on security.
>=20
>> I am sure you and your colleges on the IESG have been mulling over
>> similar questions.
>=20
> Yep. We're discussing some modification to the discuss
> criteria [4] in the short term, and will have a broader
> discussion at the IESG retreat in May. Jari posted about
> the discuss criteria change plan to the IETF list before,
> but we're wrangling text at the moment. Anything longer
> term, will be reported as usual and the community will
> get their say as usual.
>=20
>  [4] https://www.ietf.org/iesg/statement/discuss-criteria.html
>=20
>> I was just curious what might be written on the new stones when you
>> come back down the mountain. Thanks Trevor
>=20
> There's no mountain and no stones:-) The perpass-attack LC
> for example had nearly 1000 messages on various lists and
> the Vancouver tech plenary had I'd say about 1000 people
> in the room. The IESG are not aiming to surprise anyone on
> this, but to reflect the IETF consensus, which is rough,
> but which I hope will get less rough as we go and as folks
> see that we're improving things without going crazy.
>=20
> Cheers,
> S.
>=20
> PS: Now that I've written this, it might be a useful
> state-of-play to send to the perpass list, mind if I
> do that by just forwarding this?
>=20
>=20
>=20
>>=20
>=20
>=20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass


--Apple-Mail=_38C80607-6055-4935-BE74-59F854ED5063
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space;"><div><br></div><div>On Apr 11, =
2014, at 2:40 PM, Stephen Farrell &lt;<a =
href=3D"mailto:stephen.farrell@cs.tcd.ie">stephen.farrell@cs.tcd.ie</a>&gt=
; wrote:<br><br><blockquote type=3D"cite"><br>Hiya,<br><br>Trevor was =
asking me about the state of play here. The<br>answer might be more =
generally useful so forwarding this<br>(with permission) in case it =
is.<br><br>Cheers,<br>S.<br></blockquote><div><br></div><div>Dear =
Stephen,<div><br></div><div>There is in fact a reasonable email solution =
with low leakage unlike PGP or =
S/MIME.</div><div><br></div><div>See:&nbsp;</div><div><a =
href=3D"http://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-07">http=
://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-07</a></div><div><br=
></div><div>Regards,</div><div>Douglas =
Otis</div><div><br></div></div><br><blockquote type=3D"cite">-------- =
Original Message --------<br>Subject: Re: Delivering perpass<br>Date: =
Fri, 11 Apr 2014 13:14:50 +0100<br>From: Stephen Farrell &lt;<a =
href=3D"mailto:stephen.farrell@cs.tcd.ie">stephen.farrell@cs.tcd.ie</a>&gt=
;<br>To: Trevor Freeman &lt;<a =
href=3D"mailto:trevorf@exchange.microsoft.com">trevorf@exchange.microsoft.=
com</a>&gt;, &nbsp;Kathleen Moriarty<br>&lt;<a =
href=3D"mailto:kathleen.moriarty.ietf@gmail.com">kathleen.moriarty.ietf@gm=
ail.com</a>&gt;<br><br><br>Hi Trevor,<br><br>On 04/10/2014 10:35 PM, =
Trevor Freeman wrote:<br><blockquote type=3D"cite">Hi folks,<br><br>I am =
curious how you see the perpass discussion changing some of =
IETF<br>practices.<br><br>As noted in the perpass attack =
draft<br><br>Pervasive monitoring is a technical attack that should be =
mitigated<br>in the design of IETF protocols, where possible<br><br>How =
is the "where possible" going to be assessed. Will the<br>presumption =
become you must defend against perpass unless you can<br>show solid =
reasons why not? For example, requiring authors to<br>document some =
possible approaches and why they were eliminated to at<br>least show =
they tried? What about the backwards compatibility card,<br>how often =
can that be played?<br></blockquote><br>The reality is that we'll have =
to learn as we go. Our new bcp<br>does not say you "must defend against" =
but rather that you must<br>have considered the topic. The extent to =
which that gets done<br>well or badly is something we'll have to see, as =
will the ways<br>that participants, WGs and the IESG deal with that. =
Please<br>don't though consider this as something the IESG police, =
it'll<br>be better off all around if participants do consider the =
PM<br>attack and if WGs take that into account, as per the new =
BCP.<br>Same as always, factoring stuff like this in early is =
going<br>to be better and easier all around.<br><br>Backwards =
compatibility is clearly an issue but I don't think<br>of it as a card =
to play, its another engineering constraint<br>that we have to deal =
with. For example, we are not getting rid<br>of email, and won't even =
though email is leaky as hell with<br>meta-data even with S/MIME or PGP. =
If someone did come up with<br>a workable e2e email security solution =
that was way less leaky<br>and that got deployed, then we would want to =
consider that, but<br>since that's mythical, it doesn't arise. So absent =
a working<br>solution, for email, backwards compatibility is likely to =
be<br>a factor forever. In other cases, YMMV of course but =
that's<br>just because we're dealing with partly conflicting =
constraints,<br>as we always do.<br><br><blockquote type=3D"cite"><br>Do =
we need to go though and audit the existing portfolio to see where<br>we =
have work to do to meet the higher standards i.e. =
perpass<br>resistant?<br></blockquote><br>There's work started to do =
reviews of old RFCs for this.<br>We'd be delighted if you were to join =
in on that! Contact<br>Avri Doria or Scott Brim. There's a wiki page at =
[1] for<br>that.<br><br>&nbsp;[1] <a =
href=3D"https://trac.tools.ietf.org/group/ppm-legacy-review/">https://trac=
.tools.ietf.org/group/ppm-legacy-review/</a><br><br>The intent there is =
that as and when we do new work on<br>those technologies, these reviews =
can inform that work.<br>And maybe these reviews might motivate folks to =
do new<br>work as well, we'll see. We're in a try-and-see mode<br>right =
now, and hope to see how that's going at IETF-90,<br>so your input on =
that now would be really timely and<br>appreciated if you have a few =
cycles to pick an RFC,<br>make a ticket and do a review of that in the =
next month<br>or so. (Go on, I bet you have some RFC you can think =
of<br>that could be useful low-hanging fruit for =
this:-)<br><br><blockquote type=3D"cite"><br>Do we need a new guidance =
rfc to lay out the priorities for<br>confidentially, integrity and =
authentication security for rfc<br>authors?<br></blockquote><br>Yes we =
do. But we're not ready for that yet. The idea I<br>think would be to =
add a new RFC to BCP 72 [2] that sets<br>out what we've learned, once =
we've learned enough. I'd<br>hope that we might be able to start on that =
towards the<br>end of the year. (And again, feel free to volunteer =
in<br>advance to help out:-)<br><br>&nbsp;[2] <a =
href=3D"https://tools.ietf.org/html/bcp72">https://tools.ietf.org/html/bcp=
72</a><br><br>We also want to get the threat model draft [3] done =
so<br>consider helping out there too if you've time =
with<br>comments/text etc as usual.<br><br>&nbsp;[3] <a =
href=3D"https://tools.ietf.org/html/draft-barnes-pervasive-problem">https:=
//tools.ietf.org/html/draft-barnes-pervasive-problem</a><br><br><blockquot=
e type=3D"cite"><br>The standards we write can be used both on-premise =
and in the cloud.<br>Pervasive monitoring is a bigger priority for cloud =
deployments. How<br>should we reconcile those two scenarios since they =
are deployment<br>specific.<br></blockquote><br>Yes, that tension is =
noted in pepass-attack and will be<br>part of the working-out that we =
work out. There's also<br>however the fact that while many deployments =
previously<br>considered protocols to be running in "trusted" =
environments,<br>we have seen (e.g. Belgacom) that that is not such =
a<br>good assumption any more given the PM attack. That has<br>already =
had clear impact for e.g. inter data centre<br>traffic deployments, but =
will take longer to work out<br>for e.g. Diameter deployments I expect. =
But in both cases<br>the change is not so much to the protocol but to =
turn<br>on security.<br><br><blockquote type=3D"cite">I am sure you and =
your colleges on the IESG have been mulling over<br>similar =
questions.<br></blockquote><br>Yep. We're discussing some modification =
to the discuss<br>criteria [4] in the short term, and will have a =
broader<br>discussion at the IESG retreat in May. Jari posted =
about<br>the discuss criteria change plan to the IETF list =
before,<br>but we're wrangling text at the moment. Anything =
longer<br>term, will be reported as usual and the community will<br>get =
their say as usual.<br><br>&nbsp;[4] <a =
href=3D"https://www.ietf.org/iesg/statement/discuss-criteria.html">https:/=
/www.ietf.org/iesg/statement/discuss-criteria.html</a><br><br><blockquote =
type=3D"cite">I was just curious what might be written on the new stones =
when you<br>come back down the mountain. Thanks =
Trevor<br></blockquote><br>There's no mountain and no stones:-) The =
perpass-attack LC<br>for example had nearly 1000 messages on various =
lists and<br>the Vancouver tech plenary had I'd say about 1000 =
people<br>in the room. The IESG are not aiming to surprise anyone =
on<br>this, but to reflect the IETF consensus, which is rough,<br>but =
which I hope will get less rough as we go and as folks<br>see that we're =
improving things without going crazy.<br><br>Cheers,<br>S.<br><br>PS: =
Now that I've written this, it might be a useful<br>state-of-play to =
send to the perpass list, mind if I<br>do that by just forwarding =
this?<br><br><br><br><blockquote =
type=3D"cite"><br></blockquote><br><br>___________________________________=
____________<br>perpass mailing list<br><a =
href=3D"mailto:perpass@ietf.org">perpass@ietf.org</a><br>https://www.ietf.=
org/mailman/listinfo/perpass<br></blockquote><br></div></body></html>=

--Apple-Mail=_38C80607-6055-4935-BE74-59F854ED5063--


From nobody Wed Apr 16 14:50:21 2014
Return-Path: <trevorf@exchange.microsoft.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 361161A0359 for <perpass@ietfa.amsl.com>; Wed, 16 Apr 2014 14:50:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HKKX3iTjkATO for <perpass@ietfa.amsl.com>; Wed, 16 Apr 2014 14:50:14 -0700 (PDT)
Received: from na01-by1-obe.outbound.o365filtering.com (na01-by1-obe.ptr.o365filtering.com [64.4.22.90]) by ietfa.amsl.com (Postfix) with ESMTP id 812BF1A01F8 for <perpass@ietf.org>; Wed, 16 Apr 2014 14:50:14 -0700 (PDT)
Received: from BL2SR01CA102.namsdf01.sdf.exchangelabs.com (10.255.109.147) by BL2SR01MB593.namsdf01.sdf.exchangelabs.com (10.255.109.164) with Microsoft SMTP Server (TLS) id 15.0.934.4; Wed, 16 Apr 2014 19:14:51 +0000
Received: from SN2FFOFD003.ffo.gbl (2a01:111:f400:7c04::24) by BL2SR01CA102.outlook.office365.com (2a01:111:e400:c01::19) with Microsoft SMTP Server (TLS) id 15.0.934.4 via Frontend Transport; Wed, 16 Apr 2014 19:14:51 +0000
Received: from hybrid.exchange.microsoft.com (131.107.159.99) by SN2FFOFD003.mail.o365filtering.com (10.111.201.40) with Microsoft SMTP Server (TLS) id 15.0.929.2 via Frontend Transport; Wed, 16 Apr 2014 19:14:51 +0000
Received: from DFM-TK5MBX15-06.exchange.corp.microsoft.com (157.54.109.45) by DFM-TK5EDG15-01.exchange.corp.microsoft.com (157.54.27.96) with Microsoft SMTP Server (TLS) id 15.0.913.11; Wed, 16 Apr 2014 12:14:47 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com (157.54.109.44) by DFM-TK5MBX15-06.exchange.corp.microsoft.com (157.54.109.45) with Microsoft SMTP Server (TLS) id 15.0.913.11; Wed, 16 Apr 2014 12:14:47 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com ([157.54.109.44]) by DFM-TK5MBX15-05.exchange.corp.microsoft.com ([169.254.5.109]) with mapi id 15.00.0913.011; Wed, 16 Apr 2014 12:14:46 -0700
From: Trevor Freeman <trevorf@exchange.microsoft.com>
To: "perpass@ietf.org" <perpass@ietf.org>
Thread-Topic: RFC Test Considerations
Thread-Index: Ac9Zo/b4m0K4MAQMT3SXzjQEEX1IaA==
Date: Wed, 16 Apr 2014 19:14:45 +0000
Message-ID: <814e37f59def4d43af8dcc94d71ceb2a@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.13]
Content-Type: multipart/alternative; boundary="_000_814e37f59def4d43af8dcc94d71ceb2aDFMTK5MBX1505exchangeco_"
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:131.107.159.99; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(10009001)(189002)(199002)(33646001)(92566001)(76176001)(99396002)(95666003)(85306002)(76786001)(76796001)(77096001)(53806002)(95416001)(84676001)(65816002)(59766002)(74366001)(63696004)(85852003)(83072002)(54356002)(56816006)(54316003)(47446003)(15975445006)(49866002)(74706001)(51856002)(47976003)(56776002)(47736002)(74876001)(87936001)(71186001)(69226001)(84326002)(98676001)(15202345003)(81342001)(50986002)(90146001)(81542001)(44976005)(93136001)(74502001)(2656002)(76482001)(74662001)(77982001)(94946001)(93516002)(512954002)(19580395003)(46102001)(79102001)(81686001)(4396001)(80022001)(97186001)(87266001)(2009001)(19300405004)(81816001)(20776003)(6806004)(80976001)(94316002)(97736001)(97336001)(16236675003)(83322001)(66066001)(31966008)(24736002); DIR:OUT; SFP:1101; SCL:1; SRVR:BL2SR01MB593; H:hybrid.exchange.microsoft.com;  FPR:; PTR:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-Exchange-Organization-AntiSpam-Internal: BULK:None; ACTION:Default; RISK:Low; SCL:0; SPMLVL:NotSpam; PCL:0; RULEID:
X-Forefront-PRVS: 01834E39B7
X-OriginatorOrg: exchange.microsoft.com
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/pTgWsLrN2aKUd74lU2DlIDGvOU0
Subject: [perpass] RFC Test Considerations
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Apr 2014 21:50:18 -0000

--_000_814e37f59def4d43af8dcc94d71ceb2aDFMTK5MBX1505exchangeco_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

A common thread I am seeing is we are not doing enough to prove\document we=
 can robustly test something.

A lot of the web pki ops workgroup was spent discussing the fact we don't h=
ave good test tools for pki certificate validation. Likewise I have seen th=
e case made that implicit tls negotiation is more successful then explicit =
tls negation because it is easier to test.

We define what features must or should be supported but leave it up to the =
reader on what tests are necessary to prove the implementation is robust an=
d trustworthy.

That seems an omission.

We are building a threat model which should document all the way we can be =
attacked. We should then be able to lists all the tests necessary for a rfc=
 to prove an attacker would not succeed. Given this would change over time =
as we learn more threats, it would make sense to have this as a separate dr=
aft much like we split out cryptographic algorithm requirements from protoc=
ol drafts.

Trevor



--_000_814e37f59def4d43af8dcc94d71ceb2aDFMTK5MBX1505exchangeco_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">A common thread I am seeing is we are not doing enou=
gh to prove\document we can robustly test something.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">A lot of the web pki ops workgroup was spent discuss=
ing the fact we don&#8217;t have good test tools for pki certificate valida=
tion. Likewise I have seen the case made that implicit tls negotiation is m=
ore successful then explicit tls negation
 because it is easier to test. <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">We define what features must or should be supported =
but leave it up to the reader on what tests are necessary to prove the impl=
ementation is robust and trustworthy.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">That seems an omission.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">We are building a threat model which should document=
 all the way we can be attacked. We should then be able to lists all the te=
sts necessary for a rfc to prove an attacker would not succeed. Given this =
would change over time as we learn
 more threats, it would make sense to have this as a separate draft much li=
ke we split out cryptographic algorithm requirements from protocol drafts.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Trevor<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_814e37f59def4d43af8dcc94d71ceb2aDFMTK5MBX1505exchangeco_--


From nobody Mon Apr 28 11:38:41 2014
Return-Path: <trevorf@exchange.microsoft.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AF461A6F0F for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 11:38:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h4QEEiNBe-xS for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 11:38:37 -0700 (PDT)
Received: from na01-sn2-obe.outbound.o365filtering.com (mail-sn2on0642.outbound.o365filtering.com [IPv6:2a01:111:f400:fc04::642]) by ietfa.amsl.com (Postfix) with ESMTP id 75BFA1A0792 for <perpass@ietf.org>; Mon, 28 Apr 2014 11:38:37 -0700 (PDT)
Received: from BLUSR01CA103.namsdf01.sdf.exchangelabs.com (10.255.124.148) by BLUSR01MB601.namsdf01.sdf.exchangelabs.com (10.255.124.166) with Microsoft SMTP Server (TLS) id 15.0.944.2; Mon, 28 Apr 2014 18:38:14 +0000
Received: from SN2FFOFD001.ffo.gbl (10.255.124.132) by BLUSR01CA103.outlook.office365.com (10.255.124.148) with Microsoft SMTP Server (TLS) id 15.0.944.2 via Frontend Transport; Mon, 28 Apr 2014 18:38:14 +0000
Received: from hybrid.exchange.microsoft.com (131.107.159.100) by SN2FFOFD001.mail.o365filtering.com (10.111.201.20) with Microsoft SMTP Server (TLS) id 15.0.939.3 via Frontend Transport; Mon, 28 Apr 2014 18:38:13 +0000
Received: from DFM-TK5MBX15-07.exchange.corp.microsoft.com (157.54.109.46) by DFM-TK5EDG15-02.exchange.corp.microsoft.com (157.54.27.97) with Microsoft SMTP Server (TLS) id 15.0.913.17; Mon, 28 Apr 2014 11:38:08 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com (157.54.109.44) by DFM-TK5MBX15-07.exchange.corp.microsoft.com (157.54.109.46) with Microsoft SMTP Server (TLS) id 15.0.913.17; Mon, 28 Apr 2014 11:38:05 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com ([157.54.109.44]) by DFM-TK5MBX15-05.exchange.corp.microsoft.com ([169.254.5.13]) with mapi id 15.00.0913.011; Mon, 28 Apr 2014 11:38:04 -0700
From: Trevor Freeman <trevorf@exchange.microsoft.com>
To: "perpass@ietf.org" <perpass@ietf.org>
Thread-Topic: Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VA==
Date: Mon, 28 Apr 2014 18:38:04 +0000
Message-ID: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.13]
Content-Type: multipart/alternative; boundary="_000_4c73ca3fa5c24ace8dce760932e2f791DFMTK5MBX1505exchangeco_"
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:131.107.159.100; IPV:NLI; EFV:NLI; SFV:NSPM;  SFS:(10009001)(199002)(189002)(81686001)(33646001)(74876001)(80976001)(19580395003)(44976005)(4396001)(83322001)(74706001)(74366001)(6806004)(16236675003)(2009001)(94946001)(31966008)(84676001)(74662001)(97186001)(95666003)(97336001)(97736001)(95416001)(50986002)(19300405004)(81542001)(81342001)(84326002)(59766002)(47736002)(81816001)(56776002)(47976003)(56816006)(51856002)(65816002)(63696004)(54316003)(49866002)(15975445006)(85306002)(53806002)(54356002)(47446003)(74502001)(98676001)(99396002)(71186001)(87936001)(76482001)(92566001)(66066001)(93136001)(90146001)(20776003)(77982001)(46102001)(80022001)(85852003)(79102001)(512954002)(83072002)(76786001)(76796001)(87266001)(76176001)(69226001)(15202345003)(94316002)(77096001)(2656002)(93516002)(24736002); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUSR01MB601; H:hybrid.exchange.microsoft.com;  FPR:; PTR:InfoDomainNonexistent; MX:1; LANG:en; 
X-Exchange-Antispam-Report-Test: BL:0; ACTION:Default; RISK:Low; SCL:0; SPMLVL:NotSpam; PCL:0; RULEID:
X-Forefront-PRVS: 01952C6E96
X-OriginatorOrg: exchange.microsoft.com
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/3As1eIS4qZW4fAvG_QXjPTC26h4
Subject: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 18:38:40 -0000

--_000_4c73ca3fa5c24ace8dce760932e2f791DFMTK5MBX1505exchangeco_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

We have a range of technologies in the toolkit to address issues identified=
 by perpass.

One of the candidate technologies is DNSSEC. At a technology level it has m=
uch to commend it.

The vast majority of critical TLDs are signed, so another good point in its=
 favor.

However when you look at the next tier down, the statistics point to a prob=
lem.

According to the Verisign labs scoreboard, 340K+ domains in the .com namesp=
ace are secured by DNSSEC
http://scoreboard.verisignlabs.com/

If you express that number as % that is about 0.4% and the growth trend is =
about 0.1% per year
http://scoreboard.verisignlabs.com/percent-trace.png

The trend seems about 2 orders of magnitude below where we need to be for D=
NSSEC to be viable in a realistic timescale.

Am I misinterpreting the data? If not, then do we have consensus on what is=
 blocking deployment?

Trevor





--_000_4c73ca3fa5c24ace8dce760932e2f791DFMTK5MBX1505exchangeco_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">We have a range of technologies in the toolkit to ad=
dress issues identified by perpass.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">One of the candidate technologies is DNSSEC. At a te=
chnology level it has much to commend it.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The vast majority of critical TLDs are signed, so an=
other good point in its favor.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">However when you look at the next tier down, the sta=
tistics point to a problem.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">According to the Verisign labs scoreboard, 340K&#43;=
 domains in the .com namespace are secured by DNSSEC<o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://scoreboard.verisignlabs.com/">http=
://scoreboard.verisignlabs.com/</a><o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">If you express that number as % that is about 0.4% a=
nd the growth trend is about 0.1% per year<o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://scoreboard.verisignlabs.com/percen=
t-trace.png">http://scoreboard.verisignlabs.com/percent-trace.png</a><o:p><=
/o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The trend seems about 2 orders of magnitude below wh=
ere we need to be for DNSSEC to be viable in a realistic timescale.<o:p></o=
:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Am I misinterpreting the data? If not, then do we ha=
ve consensus on what is blocking deployment?
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Trevor<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4c73ca3fa5c24ace8dce760932e2f791DFMTK5MBX1505exchangeco_--


From nobody Mon Apr 28 11:47:09 2014
Return-Path: <mellon@fugue.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9BEC21A6FB2 for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 11:47:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.552
X-Spam-Level: 
X-Spam-Status: No, score=-2.552 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AgyRD7LaV4mI for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 11:47:04 -0700 (PDT)
Received: from toccata.fugue.com (toccata.fugue.com [204.152.186.142]) by ietfa.amsl.com (Postfix) with ESMTP id B6D3A1A6FAC for <perpass@ietf.org>; Mon, 28 Apr 2014 11:47:04 -0700 (PDT)
Received: from [10.0.10.40] (c-174-62-147-182.hsd1.nh.comcast.net [174.62.147.182]) by toccata.fugue.com (Postfix) with ESMTPSA id 1C9D92380387; Mon, 28 Apr 2014 14:47:02 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
From: Ted Lemon <mellon@fugue.com>
In-Reply-To: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Date: Mon, 28 Apr 2014 14:47:00 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <27EDB546-7BF8-43E0-9982-FD932FBD2F18@fugue.com>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
To: Trevor Freeman <trevorf@exchange.microsoft.com>
X-Mailer: Apple Mail (2.1874)
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/S-ytueP4qhqgYhop7xHS1V58Azo
Cc: "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 18:47:06 -0000

On Apr 28, 2014, at 2:38 PM, Trevor Freeman =
<trevorf@exchange.microsoft.com> wrote:
> Am I misinterpreting the data? If not, then do we have consensus on =
what is blocking deployment?

Given that most of the registered domains are garbage, I suspect you'd =
need to use a better methodology to learn anything from this =
measurement.



From nobody Mon Apr 28 13:02:10 2014
Return-Path: <envite@rolamasao.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A46F41A6FA8 for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 13:02:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.234
X-Spam-Level: ***
X-Spam-Status: No, score=3.234 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, HELO_MISMATCH_ORG=0.611, HOST_EQ_STATIC=1.172, MIME_8BIT_HEADER=0.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4UYciqCb6OEn for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 13:02:02 -0700 (PDT)
Received: from rolamasao.org (68.167.216.87.static.jazztel.es [87.216.167.68]) by ietfa.amsl.com (Postfix) with ESMTP id 0FA8F1A03FC for <perpass@ietf.org>; Mon, 28 Apr 2014 13:02:01 -0700 (PDT)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by rolamasao.org (Postfix_t) with ESMTP id 2C1CE11EB7 for <perpass@ietf.org>; Mon, 28 Apr 2014 21:01:57 +0100 (WEST)
Message-ID: <1398715312.17858.535.camel@tochox.rolamasao.org>
From: Noel David Torres =?ISO-8859-1?Q?Ta=F1o?= <envite@rolamasao.org>
To: "perpass@ietf.org" <perpass@ietf.org>
Date: Mon, 28 Apr 2014 21:01:52 +0100
In-Reply-To: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature";  boundary="=-gbOlqsivyMvayE1hBE/x"
X-Mailer: Evolution 3.8.5-2+b3 
Mime-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/pFj3PLUE56OrPsO3ES4k7dLQQEE
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 20:02:03 -0000

--=-gbOlqsivyMvayE1hBE/x
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

El lun, 28-04-2014 a las 18:38 +0000, Trevor Freeman escribi=C3=B3:
> We have a range of technologies in the toolkit to address issues
> identified by perpass.
>=20
> =20
>=20
> One of the candidate technologies is DNSSEC. At a technology level it
> has much to commend it.=20
>=20
> =20
>=20
> The vast majority of critical TLDs are signed, so another good point
> in its favor.
>=20
> =20
>=20
> However when you look at the next tier down, the statistics point to a
> problem.
>=20
> =20
>=20
> According to the Verisign labs scoreboard, 340K+ domains in the .com
> namespace are secured by DNSSEC
>=20
> http://scoreboard.verisignlabs.com/
>=20
> =20
>=20
> If you express that number as % that is about 0.4% and the growth
> trend is about 0.1% per year
>=20
> http://scoreboard.verisignlabs.com/percent-trace.png
>=20
> =20
>=20
> The trend seems about 2 orders of magnitude below where we need to be
> for DNSSEC to be viable in a realistic timescale.
>=20
> =20
>=20
> Am I misinterpreting the data? If not, then do we have consensus on
> what is blocking deployment?=20
>=20
> =20
>=20
> Trevor
>=20
> =20
>=20
Which are the numbers for .org ?

This one should have a little percentage of garbage, parked domains,
etc. Moreover, it is kess used by corporations with large IT departments
and more used by small organizations like Libre Software projects.

And it is very important to trust the software you download.

Regards

Noel
er Envite


--=-gbOlqsivyMvayE1hBE/x
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEABECAAYFAlNes7AACgkQcLQA8+7Hw3LTWwCeMD4gHHd8f5yBDAAzD/Gv1vGQ
9TwAn1h+RcgvF9/0GVX42jxmhCQcHIPK
=W5I7
-----END PGP SIGNATURE-----

--=-gbOlqsivyMvayE1hBE/x--


From nobody Mon Apr 28 13:20:27 2014
Return-Path: <warren@kumari.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 462871A6FB7 for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 13:20:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.978
X-Spam-Level: 
X-Spam-Status: No, score=-1.978 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FoO22k30reEH for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 13:20:22 -0700 (PDT)
Received: from mail-we0-f173.google.com (mail-we0-f173.google.com [74.125.82.173]) by ietfa.amsl.com (Postfix) with ESMTP id 57D8E1A6F54 for <perpass@ietf.org>; Mon, 28 Apr 2014 13:20:22 -0700 (PDT)
Received: by mail-we0-f173.google.com with SMTP id w61so6816194wes.18 for <perpass@ietf.org>; Mon, 28 Apr 2014 13:20:21 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=8IpI7upD2kqhUQKzE9MAto9j+THlK09mZRimwuV5mGk=; b=LFFWnBE6Se6BrAf9MgmWqE946HaXDSa0tLSSl96YzX+6D8dLBHcxvJrYxPDNW8LSoX /6e53vGtY12iA62xiWo/33cP+68E7aRQGksVmkT/D0uXWq3ncdddpqIhcDfptyPcdCvv M6WKnwDuR50Qq45PHe7gXVIzXByl40Qo1RR4fLSuYuARg+adoq1u1DVB4MvteZhBwLXd G0nMyCjLhgcxHegW2wK4JiFgx1knpeK+49S1/fquz7AoiRPlhfaxWf3u/Nx4x2EiDopj yKnPxDDnBI6+NKlTyELVRFWimNcOMtz+pRZFQ8YtYKkY7YwDjpJP562pI8OUOfpxb0dc 8Z/A==
X-Gm-Message-State: ALoCoQlTv3ceA3VShaZelFaGIC4b9u14bECCh32F7VnU6bHC+nqoKqA9jfTTYFyWz0dpcKdS5yY0
MIME-Version: 1.0
X-Received: by 10.194.171.167 with SMTP id av7mr20760891wjc.32.1398716421035;  Mon, 28 Apr 2014 13:20:21 -0700 (PDT)
Received: by 10.194.54.162 with HTTP; Mon, 28 Apr 2014 13:20:20 -0700 (PDT)
X-Originating-IP: [98.244.98.35]
In-Reply-To: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Date: Mon, 28 Apr 2014 16:20:20 -0400
Message-ID: <CAHw9_iKh-M46-HYsHKY2urP70QWtoUOZT3YE6naa_GB0k453GQ@mail.gmail.com>
From: Warren Kumari <warren@kumari.net>
To: Trevor Freeman <trevorf@exchange.microsoft.com>
Content-Type: text/plain; charset=ISO-8859-1
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/TBwXVrYiy7CZMWWpdrR92vtLuuk
Cc: "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 20:20:24 -0000

On Mon, Apr 28, 2014 at 2:38 PM, Trevor Freeman
<trevorf@exchange.microsoft.com> wrote:
> We have a range of technologies in the toolkit to address issues identified
> by perpass.
>
>
>
> One of the candidate technologies is DNSSEC. At a technology level it has
> much to commend it.
>
>

For which aspects of perpass?  DNSSEC provides no encryption, so the
fact that I'm browsing to something on www.nakedfurries.com is visible
to all...

Don't get me wrong -- I'm a big DNSSEC (and DANE :-)) proponent, but
folk often seem to miss the fact that DNSSEC doesn't do what the name
implies...

W




>
> The vast majority of critical TLDs are signed, so another good point in its
> favor.
>
>
>
> However when you look at the next tier down, the statistics point to a
> problem.
>
>
>
> According to the Verisign labs scoreboard, 340K+ domains in the .com
> namespace are secured by DNSSEC
>
> http://scoreboard.verisignlabs.com/
>
>
>
> If you express that number as % that is about 0.4% and the growth trend is
> about 0.1% per year
>
> http://scoreboard.verisignlabs.com/percent-trace.png
>
>
>
> The trend seems about 2 orders of magnitude below where we need to be for
> DNSSEC to be viable in a realistic timescale.
>
>
>
> Am I misinterpreting the data? If not, then do we have consensus on what is
> blocking deployment?
>
>
>
> Trevor
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
>


From nobody Mon Apr 28 13:47:44 2014
Return-Path: <trevorf@exchange.microsoft.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62AA91A70FD for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 13:47:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GEpRNKqDJo_k for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 13:47:38 -0700 (PDT)
Received: from na01-sn2-obe.outbound.o365filtering.com (mail-sn2on0651.outbound.o365filtering.com [IPv6:2a01:111:f400:fc04::651]) by ietfa.amsl.com (Postfix) with ESMTP id 19CDE1A6FBB for <perpass@ietf.org>; Mon, 28 Apr 2014 13:47:37 -0700 (PDT)
Received: from BLUSR01CA104.namsdf01.sdf.exchangelabs.com (10.255.124.149) by BLUSR01MB602.namsdf01.sdf.exchangelabs.com (10.255.124.167) with Microsoft SMTP Server (TLS) id 15.0.944.2; Mon, 28 Apr 2014 20:47:14 +0000
Received: from SN2FFOFD002.ffo.gbl (10.255.124.132) by BLUSR01CA104.outlook.office365.com (10.255.124.149) with Microsoft SMTP Server (TLS) id 15.0.944.2 via Frontend Transport; Mon, 28 Apr 2014 20:47:14 +0000
Received: from hybrid.exchange.microsoft.com (131.107.159.100) by SN2FFOFD002.mail.o365filtering.com (10.111.201.21) with Microsoft SMTP Server (TLS) id 15.0.939.3 via Frontend Transport; Mon, 28 Apr 2014 20:47:14 +0000
Received: from DFM-TK5MBX15-07.exchange.corp.microsoft.com (157.54.109.46) by DFM-TK5EDG15-02.exchange.corp.microsoft.com (157.54.27.97) with Microsoft SMTP Server (TLS) id 15.0.913.17; Mon, 28 Apr 2014 13:47:05 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com (157.54.109.44) by DFM-TK5MBX15-07.exchange.corp.microsoft.com (157.54.109.46) with Microsoft SMTP Server (TLS) id 15.0.913.17; Mon, 28 Apr 2014 13:47:05 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com ([157.54.109.44]) by DFM-TK5MBX15-05.exchange.corp.microsoft.com ([169.254.5.13]) with mapi id 15.00.0913.011; Mon, 28 Apr 2014 13:46:46 -0700
From: Trevor Freeman <trevorf@exchange.microsoft.com>
To: Warren Kumari <warren@kumari.net>
Thread-Topic: [perpass] Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VAASV20AAA4xIbA=
Date: Mon, 28 Apr 2014 20:46:45 +0000
Message-ID: <82d65ea8e469437cb74d96afd81be11c@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <CAHw9_iKh-M46-HYsHKY2urP70QWtoUOZT3YE6naa_GB0k453GQ@mail.gmail.com>
In-Reply-To: <CAHw9_iKh-M46-HYsHKY2urP70QWtoUOZT3YE6naa_GB0k453GQ@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.13]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:131.107.159.100; IPV:NLI; EFV:NLI; SFV:NSPM;  SFS:(10009001)(51704005)(377454003)(199002)(189002)(13464003)(24454002)(84676001)(97756001)(97736001)(6806004)(31966008)(46102001)(15974865002)(4396001)(87266001)(98676001)(77096001)(76786001)(76796001)(74876001)(2656002)(87936001)(81686001)(69226001)(81816001)(80022001)(81342001)(95416001)(23726002)(66066001)(15975445006)(85306002)(94946001)(79102001)(97186001)(33646001)(81542001)(2009001)(15202345003)(74502001)(44976005)(77982001)(97336001)(19580405001)(80976001)(76482001)(20776003)(95666003)(47776003)(83322001)(74662001)(19580395003)(93516002)(93136001)(50466002)(74706001)(94316002)(85852003)(99396002)(92566001)(83072002)(46406003)(50986002)(54316003)(47446003)(74366001)(90146001)(47736002)(53806002)(56776002)(49866002)(59766002)(51856002)(47976003)(56816006)(65816002)(63696004)(54356002)(24736002); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUSR01MB602; H:hybrid.exchange.microsoft.com;  FPR:; PTR:InfoDomainNonexistent; MX:1; LANG:en; 
X-Exchange-Antispam-Report-Test: BL:0; ACTION:Default; RISK:Low; SCL:0; SPMLVL:NotSpam; PCL:0; RULEID:
X-Forefront-PRVS: 01952C6E96
X-OriginatorOrg: exchange.microsoft.com
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/4cYgf8npln_1piP1G7_DwT1ebcg
Cc: "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 20:47:41 -0000

Hi Warren,

Granted DNNSEC does not by itself provide encryption but that is like sayin=
g X.509 does not do encryption, all it does is sign keys.  Generally there =
are two ways DNNSEC could be useful. One way, as you point out is to authen=
ticate encryption keys. The other way is to detect attempts to subvert DNS =
name resolution which may induce me to disclose information to someone. We =
cannot assume all pervasive monitoring is totally passive.=20

Trevor

-----Original Message-----
From: Warren Kumari [mailto:warren@kumari.net]=20
Sent: Monday, April 28, 2014 1:20 PM
To: Trevor Freeman
Cc: perpass@ietf.org
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?

On Mon, Apr 28, 2014 at 2:38 PM, Trevor Freeman <trevorf@exchange.microsoft=
.com> wrote:
> We have a range of technologies in the toolkit to address issues=20
> identified by perpass.
>
>
>
> One of the candidate technologies is DNSSEC. At a technology level it=20
> has much to commend it.
>
>

For which aspects of perpass?  DNSSEC provides no encryption, so the fact t=
hat I'm browsing to something on www.nakedfurries.com is visible to all...

Don't get me wrong -- I'm a big DNSSEC (and DANE :-)) proponent, but folk o=
ften seem to miss the fact that DNSSEC doesn't do what the name implies...

W




>
> The vast majority of critical TLDs are signed, so another good point=20
> in its favor.
>
>
>
> However when you look at the next tier down, the statistics point to a=20
> problem.
>
>
>
> According to the Verisign labs scoreboard, 340K+ domains in the .com=20
> namespace are secured by DNSSEC
>
> http://scoreboard.verisignlabs.com/
>
>
>
> If you express that number as % that is about 0.4% and the growth=20
> trend is about 0.1% per year
>
> http://scoreboard.verisignlabs.com/percent-trace.png
>
>
>
> The trend seems about 2 orders of magnitude below where we need to be=20
> for DNSSEC to be viable in a realistic timescale.
>
>
>
> Am I misinterpreting the data? If not, then do we have consensus on=20
> what is blocking deployment?
>
>
>
> Trevor
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
>


From nobody Mon Apr 28 14:17:00 2014
Return-Path: <trevorf@exchange.microsoft.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B64EB1A7030 for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 14:16:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.601
X-Spam-Level: 
X-Spam-Status: No, score=-1.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z5stZ6NqCwG8 for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 14:16:55 -0700 (PDT)
Received: from na01-by1-obe.outbound.o365filtering.com (mail-by1on0156.outbound.o365filtering.com [207.46.101.156]) by ietfa.amsl.com (Postfix) with ESMTP id 600B91A07A2 for <perpass@ietf.org>; Mon, 28 Apr 2014 14:16:55 -0700 (PDT)
Received: from BL2SR01CA104.namsdf01.sdf.exchangelabs.com (10.255.109.149) by BL2SR01MB594.namsdf01.sdf.exchangelabs.com (10.255.109.165) with Microsoft SMTP Server (TLS) id 15.0.944.2; Mon, 28 Apr 2014 21:16:52 +0000
Received: from BY1FFOFD002.ffo.gbl (2a01:111:f400:7c00::89) by BL2SR01CA104.outlook.office365.com (2a01:111:e400:c01::21) with Microsoft SMTP Server (TLS) id 15.0.944.2 via Frontend Transport; Mon, 28 Apr 2014 21:16:52 +0000
Received: from hybrid.exchange.microsoft.com (131.107.159.99) by BY1FFOFD002.mail.o365filtering.com (10.1.16.84) with Microsoft SMTP Server (TLS) id 15.0.939.3 via Frontend Transport; Mon, 28 Apr 2014 21:16:51 +0000
Received: from DFM-TK5MBX15-08.exchange.corp.microsoft.com (157.54.109.47) by DFM-TK5EDG15-01.exchange.corp.microsoft.com (157.54.27.96) with Microsoft SMTP Server (TLS) id 15.0.913.17; Mon, 28 Apr 2014 14:16:45 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com (157.54.109.44) by DFM-TK5MBX15-08.exchange.corp.microsoft.com (157.54.109.47) with Microsoft SMTP Server (TLS) id 15.0.913.17; Mon, 28 Apr 2014 14:16:38 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com ([157.54.109.44]) by DFM-TK5MBX15-05.exchange.corp.microsoft.com ([169.254.5.13]) with mapi id 15.00.0913.011; Mon, 28 Apr 2014 14:16:38 -0700
From: Trevor Freeman <trevorf@exchange.microsoft.com>
To: =?utf-8?B?Tm9lbCBEYXZpZCBUb3JyZXMgVGHDsW8=?= <envite@rolamasao.org>, "perpass@ietf.org" <perpass@ietf.org>
Thread-Topic: [perpass] Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VAARslMAAAz/m7A=
Date: Mon, 28 Apr 2014 21:16:37 +0000
Message-ID: <68855aa3650248608cac2a6377f7e48e@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <1398715312.17858.535.camel@tochox.rolamasao.org>
In-Reply-To: <1398715312.17858.535.camel@tochox.rolamasao.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.13]
Content-Type: multipart/alternative; boundary="_000_68855aa3650248608cac2a6377f7e48eDFMTK5MBX1505exchangeco_"
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:131.107.159.99; CTRY:US; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(10009001)(377454003)(189002)(377424004)(51704005)(13464003)(199002)(97336001)(97186001)(66066001)(20776003)(80022001)(84326002)(87266001)(2656002)(95416001)(85306002)(85852003)(16236675003)(84676001)(83072002)(47976003)(56776002)(99396002)(63696004)(47446003)(47736002)(54316003)(49866002)(50986002)(54356002)(51856002)(56816006)(93136001)(94316002)(2009001)(59766002)(74706001)(65816002)(98676001)(74876001)(92566001)(53806002)(4396001)(93516002)(90146001)(69226001)(79102001)(512874002)(74366001)(6806004)(31966008)(77096001)(44976005)(94946001)(74502001)(74662001)(76796001)(80976001)(33646001)(77982001)(83322001)(19580395003)(19580405001)(87936001)(76482001)(46102001)(81342001)(15975445006)(76786001)(15202345003)(71186001)(95666003)(81542001)(97736001)(19300405004)(81816001)(81686001)(24736002); DIR:OUT; SFP:1101; SCL:1; SRVR:BL2SR01MB594; H:hybrid.exchange.microsoft.com;  FPR:; PTR:InfoDomainNonexistent; MX:1; LANG:en; 
X-Exchange-Antispam-Report-Test: BL:0; ACTION:Default; RISK:Low; SCL:0; SPMLVL:NotSpam; PCL:0; RULEID:
X-Forefront-PRVS: 01952C6E96
X-OriginatorOrg: exchange.microsoft.com
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/TD-pNZdAIgI-G7trWIzpI5TY9xw
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 21:16:59 -0000

--_000_68855aa3650248608cac2a6377f7e48eDFMTK5MBX1505exchangeco_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SGkgTm9lbCwNCg0KDQoNCklmIEROTlNFQyBpcyB1c2VkIGluIGNvcnBvcmF0aW9ucywgdGhhdCBt
YXkgYmUgYW4gaW50ZXJlc3RpbmcgZGF0YSBwb2ludCBidXQgcGVycGFzcyBpcyBzcGVjaWZ5IGxv
b2tpbmcgYXQgdGhlIGludGVybmUgc28gaXQgZG9lcyBub3QgaGVscCBtdWNoLg0KDQoNCg0KSSB1
bmRlcnN0YW5kIHRoZXkgY291bGQgYmUgc29tZSBiZW5lZml0IHRvIGFkZGluZyBzb21lIG90aGVy
IGZpbHRlciB0byB0aGUgZGF0YSBidXQgdGhlIG51bWJlciB0byB0cnkgYW5kIHRyeSB0byBhZGQg
YSBiZXR0ZXIgcXVhbGl0eSBtZXRyaWMuIEJ1dCBhYnNlbnQgdGhhdCwgdGhlIG51bWJlciBpcyB3
aGF0IGlzIGl0LiBIYXBweSB0byBoYXZlIHRoZSBkaXNjdXNzaW9uIG9uIGhvdyB3ZSB3b3VsZCBj
b25zaWRlciB3aGF0IHRvIGZpbHRlciBvbiBhbmQgbWF5YmUgVmVyaXNpZ24gY291bGQgcHJvdmlk
ZSBtb3JlIGF0dHJpYnV0ZXMgd2l0aCB0aGUgZGF0YSBmb3IgdXNlIHRvIG1pbmUgdGhlIGluZm9y
bWF0aW9uLg0KDQoNCg0KSSBkaWQgc29tZSBhZC1ob2MgcmVzZWFyY2ggYW5kIGFtb25nc3QgdGhl
IHByb21pbmVudCBpbnRlcm5ldCBzZXJ2aWNlcyBvciBmaW5hbmNpYWwgaW5zdGl0dXRpb25zLCB0
aGUgc2VlbXMgbGl0dGxlIGV2aWRlbmNlIG9mIEROU1NFQy4gIFRoZSBvbmx5IGJyaWdodCBzcG90
IHNlZW1lZCB0byBiZSBnb3Zlcm5tZW50IHdlYiBzaXRlcywgdGhvdWdoIGhlcmUgdGhlIGRlcGxv
eW1lbnQgd2FzIHN0aWxsIGluY29uc2lzdGVudCBpbiB0aGF0IGdvdmVybm1lbnQgYWdlbmNpZXMg
aGF2ZSBtYW55IHdlYiBzaXRlcyBub3QgcGFydCBvZiB0aGUgYmFzZSBkb21haW4gYW5kIHRoZXNl
IHdlcmUgb2Z0ZW4gbm90IHNpZ25lZC4NCg0KDQoNClRyZXZvcg0KDQoNCg0KLS0tLS1PcmlnaW5h
bCBNZXNzYWdlLS0tLS0NCkZyb206IHBlcnBhc3MgW21haWx0bzpwZXJwYXNzLWJvdW5jZXNAaWV0
Zi5vcmddIE9uIEJlaGFsZiBPZiBOb2VsIERhdmlkIFRvcnJlcyBUYcOxbw0KU2VudDogTW9uZGF5
LCBBcHJpbCAyOCwgMjAxNCAxOjAyIFBNDQpUbzogcGVycGFzc0BpZXRmLm9yZw0KU3ViamVjdDog
UmU6IFtwZXJwYXNzXSBJcyBETlNERUMgYSB2aWFibGUgdGVjaG5vbG9neSBmb3IgcGVycGFzcz8N
Cg0KDQoNCkVsIGx1biwgMjgtMDQtMjAxNCBhIGxhcyAxODozOCArMDAwMCwgVHJldm9yIEZyZWVt
YW4gZXNjcmliacOzOg0KDQo+IFdlIGhhdmUgYSByYW5nZSBvZiB0ZWNobm9sb2dpZXMgaW4gdGhl
IHRvb2xraXQgdG8gYWRkcmVzcyBpc3N1ZXMNCg0KPiBpZGVudGlmaWVkIGJ5IHBlcnBhc3MuDQoN
Cj4NCg0KPg0KDQo+DQoNCj4gT25lIG9mIHRoZSBjYW5kaWRhdGUgdGVjaG5vbG9naWVzIGlzIERO
U1NFQy4gQXQgYSB0ZWNobm9sb2d5IGxldmVsIGl0DQoNCj4gaGFzIG11Y2ggdG8gY29tbWVuZCBp
dC4NCg0KPg0KDQo+DQoNCj4NCg0KPiBUaGUgdmFzdCBtYWpvcml0eSBvZiBjcml0aWNhbCBUTERz
IGFyZSBzaWduZWQsIHNvIGFub3RoZXIgZ29vZCBwb2ludA0KDQo+IGluIGl0cyBmYXZvci4NCg0K
Pg0KDQo+DQoNCj4NCg0KPiBIb3dldmVyIHdoZW4geW91IGxvb2sgYXQgdGhlIG5leHQgdGllciBk
b3duLCB0aGUgc3RhdGlzdGljcyBwb2ludCB0byBhDQoNCj4gcHJvYmxlbS4NCg0KPg0KDQo+DQoN
Cj4NCg0KPiBBY2NvcmRpbmcgdG8gdGhlIFZlcmlzaWduIGxhYnMgc2NvcmVib2FyZCwgMzQwSysg
ZG9tYWlucyBpbiB0aGUgLmNvbQ0KDQo+IG5hbWVzcGFjZSBhcmUgc2VjdXJlZCBieSBETlNTRUMN
Cg0KPg0KDQo+IGh0dHA6Ly9zY29yZWJvYXJkLnZlcmlzaWdubGFicy5jb20vDQoNCj4NCg0KPg0K
DQo+DQoNCj4gSWYgeW91IGV4cHJlc3MgdGhhdCBudW1iZXIgYXMgJSB0aGF0IGlzIGFib3V0IDAu
NCUgYW5kIHRoZSBncm93dGgNCg0KPiB0cmVuZCBpcyBhYm91dCAwLjElIHBlciB5ZWFyDQoNCj4N
Cg0KPiBodHRwOi8vc2NvcmVib2FyZC52ZXJpc2lnbmxhYnMuY29tL3BlcmNlbnQtdHJhY2UucG5n
DQoNCj4NCg0KPg0KDQo+DQoNCj4gVGhlIHRyZW5kIHNlZW1zIGFib3V0IDIgb3JkZXJzIG9mIG1h
Z25pdHVkZSBiZWxvdyB3aGVyZSB3ZSBuZWVkIHRvIGJlDQoNCj4gZm9yIEROU1NFQyB0byBiZSB2
aWFibGUgaW4gYSByZWFsaXN0aWMgdGltZXNjYWxlLg0KDQo+DQoNCj4NCg0KPg0KDQo+IEFtIEkg
bWlzaW50ZXJwcmV0aW5nIHRoZSBkYXRhPyBJZiBub3QsIHRoZW4gZG8gd2UgaGF2ZSBjb25zZW5z
dXMgb24NCg0KPiB3aGF0IGlzIGJsb2NraW5nIGRlcGxveW1lbnQ/DQoNCj4NCg0KPg0KDQo+DQoN
Cj4gVHJldm9yDQoNCj4NCg0KPg0KDQo+DQoNCldoaWNoIGFyZSB0aGUgbnVtYmVycyBmb3IgLm9y
ZyA/DQoNCg0KDQpUaGlzIG9uZSBzaG91bGQgaGF2ZSBhIGxpdHRsZSBwZXJjZW50YWdlIG9mIGdh
cmJhZ2UsIHBhcmtlZCBkb21haW5zLCBldGMuIE1vcmVvdmVyLCBpdCBpcyBrZXNzIHVzZWQgYnkg
Y29ycG9yYXRpb25zIHdpdGggbGFyZ2UgSVQgZGVwYXJ0bWVudHMgYW5kIG1vcmUgdXNlZCBieSBz
bWFsbCBvcmdhbml6YXRpb25zIGxpa2UgTGlicmUgU29mdHdhcmUgcHJvamVjdHMuDQoNCg0KDQpB
bmQgaXQgaXMgdmVyeSBpbXBvcnRhbnQgdG8gdHJ1c3QgdGhlIHNvZnR3YXJlIHlvdSBkb3dubG9h
ZC4NCg0KDQoNClJlZ2FyZHMNCg0KDQoNCk5vZWwNCg0KZXIgRW52aXRlDQoNCg0K

--_000_68855aa3650248608cac2a6377f7e48eDFMTK5MBX1505exchangeco_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m
YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy
IDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWws
IGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJ
Zm9udC1zaXplOjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO30N
CmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCWNv
bG9yOiMwNTYzQzE7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQphOnZpc2l0ZWQsIHNw
YW4uTXNvSHlwZXJsaW5rRm9sbG93ZWQNCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCWNvbG9y
OiM5NTRGNzI7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwLk1zb1BsYWluVGV4dCwg
bGkuTXNvUGxhaW5UZXh0LCBkaXYuTXNvUGxhaW5UZXh0DQoJe21zby1zdHlsZS1wcmlvcml0eTo5
OTsNCgltc28tc3R5bGUtbGluazoiUGxhaW4gVGV4dCBDaGFyIjsNCgltYXJnaW46MGluOw0KCW1h
cmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJD
YWxpYnJpIiwic2Fucy1zZXJpZiI7fQ0Kc3Bhbi5QbGFpblRleHRDaGFyDQoJe21zby1zdHlsZS1u
YW1lOiJQbGFpbiBUZXh0IENoYXIiOw0KCW1zby1zdHlsZS1wcmlvcml0eTo5OTsNCgltc28tc3R5
bGUtbGluazoiUGxhaW4gVGV4dCI7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlm
Ijt9DQouTXNvQ2hwRGVmYXVsdA0KCXttc28tc3R5bGUtdHlwZTpleHBvcnQtb25seTsNCglmb250
LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO30NCkBwYWdlIFdvcmRTZWN0aW9uMQ0KCXtz
aXplOjguNWluIDExLjBpbjsNCgltYXJnaW46MS4waW4gMS4waW4gMS4waW4gMS4waW47fQ0KZGl2
LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0aW9uMTt9DQotLT48L3N0eWxlPjwhLS1baWYg
Z3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVkZWZhdWx0cyB2OmV4dD0iZWRpdCIgc3BpZG1heD0i
MTAyNiIgLz4NCjwveG1sPjwhW2VuZGlmXS0tPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86
c2hhcGVsYXlvdXQgdjpleHQ9ImVkaXQiPg0KPG86aWRtYXAgdjpleHQ9ImVkaXQiIGRhdGE9IjEi
IC8+DQo8L286c2hhcGVsYXlvdXQ+PC94bWw+PCFbZW5kaWZdLS0+DQo8L2hlYWQ+DQo8Ym9keSBs
YW5nPSJFTi1VUyIgbGluaz0iIzA1NjNDMSIgdmxpbms9IiM5NTRGNzIiPg0KPGRpdiBjbGFzcz0i
V29yZFNlY3Rpb24xIj4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPkhpIE5vZWwsPG86cD48L286
cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxw
IGNsYXNzPSJNc29QbGFpblRleHQiPklmIEROTlNFQyBpcyB1c2VkIGluIGNvcnBvcmF0aW9ucywg
dGhhdCBtYXkgYmUgYW4gaW50ZXJlc3RpbmcgZGF0YSBwb2ludCBidXQgcGVycGFzcyBpcyBzcGVj
aWZ5IGxvb2tpbmcgYXQgdGhlIGludGVybmUgc28gaXQgZG9lcyBub3QgaGVscCBtdWNoLjxvOnA+
PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+PG86cD4mbmJzcDs8L286cD48L3A+
DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij5JIHVuZGVyc3RhbmQgdGhleSBjb3VsZCBiZSBzb21l
IGJlbmVmaXQgdG8gYWRkaW5nIHNvbWUgb3RoZXIgZmlsdGVyIHRvIHRoZSBkYXRhIGJ1dCB0aGUg
bnVtYmVyIHRvIHRyeSBhbmQgdHJ5IHRvIGFkZCBhIGJldHRlciBxdWFsaXR5IG1ldHJpYy4gQnV0
IGFic2VudCB0aGF0LCB0aGUgbnVtYmVyIGlzIHdoYXQgaXMgaXQuIEhhcHB5IHRvIGhhdmUgdGhl
IGRpc2N1c3Npb24gb24gaG93IHdlIHdvdWxkIGNvbnNpZGVyDQogd2hhdCB0byBmaWx0ZXIgb24g
YW5kIG1heWJlIFZlcmlzaWduIGNvdWxkIHByb3ZpZGUgbW9yZSBhdHRyaWJ1dGVzIHdpdGggdGhl
IGRhdGEgZm9yIHVzZSB0byBtaW5lIHRoZSBpbmZvcm1hdGlvbi4gJm5ic3A7PG86cD48L286cD48
L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNs
YXNzPSJNc29QbGFpblRleHQiPkkgZGlkIHNvbWUgYWQtaG9jIHJlc2VhcmNoIGFuZCBhbW9uZ3N0
IHRoZSBwcm9taW5lbnQgaW50ZXJuZXQgc2VydmljZXMgb3IgZmluYW5jaWFsIGluc3RpdHV0aW9u
cywgdGhlIHNlZW1zIGxpdHRsZSBldmlkZW5jZSBvZiBETlNTRUMuICZuYnNwO1RoZSBvbmx5IGJy
aWdodCBzcG90IHNlZW1lZCB0byBiZSBnb3Zlcm5tZW50IHdlYiBzaXRlcywgdGhvdWdoIGhlcmUg
dGhlIGRlcGxveW1lbnQgd2FzIHN0aWxsIGluY29uc2lzdGVudA0KIGluIHRoYXQgZ292ZXJubWVu
dCBhZ2VuY2llcyBoYXZlIG1hbnkgd2ViIHNpdGVzIG5vdCBwYXJ0IG9mIHRoZSBiYXNlIGRvbWFp
biBhbmQgdGhlc2Ugd2VyZSBvZnRlbiBub3Qgc2lnbmVkLg0KPG86cD48L286cD48L3A+DQo8cCBj
bGFzcz0iTXNvUGxhaW5UZXh0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Q
bGFpblRleHQiPlRyZXZvcjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+
PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4tLS0tLU9yaWdp
bmFsIE1lc3NhZ2UtLS0tLTxicj4NCkZyb206IHBlcnBhc3MgW21haWx0bzpwZXJwYXNzLWJvdW5j
ZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBOb2VsIERhdmlkIFRvcnJlcyBUYcOxbzxicj4NClNl
bnQ6IE1vbmRheSwgQXByaWwgMjgsIDIwMTQgMTowMiBQTTxicj4NClRvOiBwZXJwYXNzQGlldGYu
b3JnPGJyPg0KU3ViamVjdDogUmU6IFtwZXJwYXNzXSBJcyBETlNERUMgYSB2aWFibGUgdGVjaG5v
bG9neSBmb3IgcGVycGFzcz88L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij48bzpwPiZuYnNw
OzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPkVsIGx1biwgMjgtMDQtMjAxNCBh
IGxhcyAxODozOCAmIzQzOzAwMDAsIFRyZXZvciBGcmVlbWFuIGVzY3JpYmnDszo8bzpwPjwvbzpw
PjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgV2UgaGF2ZSBhIHJhbmdlIG9mIHRl
Y2hub2xvZ2llcyBpbiB0aGUgdG9vbGtpdCB0byBhZGRyZXNzIGlzc3Vlcw0KPG86cD48L286cD48
L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IGlkZW50aWZpZWQgYnkgcGVycGFzcy48
bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgPG86cD48L286cD48
L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7Jm5ic3A7IDxvOnA+PC9vOnA+PC9wPg0K
PHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJN
c29QbGFpblRleHQiPiZndDsgT25lIG9mIHRoZSBjYW5kaWRhdGUgdGVjaG5vbG9naWVzIGlzIERO
U1NFQy4gQXQgYSB0ZWNobm9sb2d5IGxldmVsIGl0DQo8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNz
PSJNc29QbGFpblRleHQiPiZndDsgaGFzIG11Y2ggdG8gY29tbWVuZCBpdC48bzpwPjwvbzpwPjwv
cD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgPG86cD48L286cD48L3A+DQo8cCBjbGFz
cz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7Jm5ic3A7IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1z
b1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQi
PiZndDsgVGhlIHZhc3QgbWFqb3JpdHkgb2YgY3JpdGljYWwgVExEcyBhcmUgc2lnbmVkLCBzbyBh
bm90aGVyIGdvb2QgcG9pbnQNCjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4
dCI+Jmd0OyBpbiBpdHMgZmF2b3IuPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5U
ZXh0Ij4mZ3Q7IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyZu
YnNwOyA8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgPG86cD48
L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IEhvd2V2ZXIgd2hlbiB5b3Ug
bG9vayBhdCB0aGUgbmV4dCB0aWVyIGRvd24sIHRoZSBzdGF0aXN0aWNzIHBvaW50IHRvIGENCjxv
OnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyBwcm9ibGVtLjxvOnA+
PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwvbzpwPjwvcD4N
CjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsmbmJzcDsgPG86cD48L286cD48L3A+DQo8cCBj
bGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1Bs
YWluVGV4dCI+Jmd0OyBBY2NvcmRpbmcgdG8gdGhlIFZlcmlzaWduIGxhYnMgc2NvcmVib2FyZCwg
MzQwSyYjNDM7IGRvbWFpbnMgaW4gdGhlIC5jb20NCjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9
Ik1zb1BsYWluVGV4dCI+Jmd0OyBuYW1lc3BhY2UgYXJlIHNlY3VyZWQgYnkgRE5TU0VDPG86cD48
L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IDxvOnA+PC9vOnA+PC9wPg0K
PHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8YSBocmVmPSJodHRwOi8vc2NvcmVib2FyZC52
ZXJpc2lnbmxhYnMuY29tLyI+PHNwYW4gc3R5bGU9ImNvbG9yOndpbmRvd3RleHQ7dGV4dC1kZWNv
cmF0aW9uOm5vbmUiPmh0dHA6Ly9zY29yZWJvYXJkLnZlcmlzaWdubGFicy5jb20vPC9zcGFuPjwv
YT48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgPG86cD48L286
cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7Jm5ic3A7IDxvOnA+PC9vOnA+PC9w
Pg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNz
PSJNc29QbGFpblRleHQiPiZndDsgSWYgeW91IGV4cHJlc3MgdGhhdCBudW1iZXIgYXMgJSB0aGF0
IGlzIGFib3V0IDAuNCUgYW5kIHRoZSBncm93dGgNCjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9
Ik1zb1BsYWluVGV4dCI+Jmd0OyB0cmVuZCBpcyBhYm91dCAwLjElIHBlciB5ZWFyPG86cD48L286
cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IDxvOnA+PC9vOnA+PC9wPg0KPHAg
Y2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8YSBocmVmPSJodHRwOi8vc2NvcmVib2FyZC52ZXJp
c2lnbmxhYnMuY29tL3BlcmNlbnQtdHJhY2UucG5nIj4NCjxzcGFuIHN0eWxlPSJjb2xvcjp3aW5k
b3d0ZXh0O3RleHQtZGVjb3JhdGlvbjpub25lIj5odHRwOi8vc2NvcmVib2FyZC52ZXJpc2lnbmxh
YnMuY29tL3BlcmNlbnQtdHJhY2UucG5nPC9zcGFuPjwvYT48bzpwPjwvbzpwPjwvcD4NCjxwIGNs
YXNzPSJNc29QbGFpblRleHQiPiZndDsgPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxh
aW5UZXh0Ij4mZ3Q7Jm5ic3A7IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4
dCI+Jmd0OyA8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgVGhl
IHRyZW5kIHNlZW1zIGFib3V0IDIgb3JkZXJzIG9mIG1hZ25pdHVkZSBiZWxvdyB3aGVyZSB3ZSBu
ZWVkIHRvIGJlDQo8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsg
Zm9yIEROU1NFQyB0byBiZSB2aWFibGUgaW4gYSByZWFsaXN0aWMgdGltZXNjYWxlLjxvOnA+PC9v
OnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwvbzpwPjwvcD4NCjxw
IGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsmbmJzcDsgPG86cD48L286cD48L3A+DQo8cCBjbGFz
cz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWlu
VGV4dCI+Jmd0OyBBbSBJIG1pc2ludGVycHJldGluZyB0aGUgZGF0YT8gSWYgbm90LCB0aGVuIGRv
IHdlIGhhdmUgY29uc2Vuc3VzIG9uDQo8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFp
blRleHQiPiZndDsgd2hhdCBpcyBibG9ja2luZyBkZXBsb3ltZW50PzxvOnA+PC9vOnA+PC9wPg0K
PHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJN
c29QbGFpblRleHQiPiZndDsmbmJzcDsgPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxh
aW5UZXh0Ij4mZ3Q7IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0
OyBUcmV2b3I8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgPG86
cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7Jm5ic3A7IDxvOnA+PC9v
OnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwvbzpwPjwvcD4NCjxw
IGNsYXNzPSJNc29QbGFpblRleHQiPldoaWNoIGFyZSB0aGUgbnVtYmVycyBmb3IgLm9yZyA/PG86
cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij48bzpwPiZuYnNwOzwvbzpwPjwv
cD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPlRoaXMgb25lIHNob3VsZCBoYXZlIGEgbGl0dGxl
IHBlcmNlbnRhZ2Ugb2YgZ2FyYmFnZSwgcGFya2VkIGRvbWFpbnMsIGV0Yy4gTW9yZW92ZXIsIGl0
IGlzIGtlc3MgdXNlZCBieSBjb3Jwb3JhdGlvbnMgd2l0aCBsYXJnZSBJVCBkZXBhcnRtZW50cyBh
bmQgbW9yZSB1c2VkIGJ5IHNtYWxsIG9yZ2FuaXphdGlvbnMgbGlrZSBMaWJyZSBTb2Z0d2FyZSBw
cm9qZWN0cy48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPjxvOnA+Jm5i
c3A7PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+QW5kIGl0IGlzIHZlcnkgaW1w
b3J0YW50IHRvIHRydXN0IHRoZSBzb2Z0d2FyZSB5b3UgZG93bmxvYWQuPG86cD48L286cD48L3A+
DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNsYXNz
PSJNc29QbGFpblRleHQiPlJlZ2FyZHM8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFp
blRleHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Tm9l
bDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+ZXIgRW52aXRlPG86cD48
L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4N
CjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K

--_000_68855aa3650248608cac2a6377f7e48eDFMTK5MBX1505exchangeco_--


From nobody Mon Apr 28 14:31:58 2014
Return-Path: <bmanning@isi.edu>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B00A1A8829 for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 14:31:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.851
X-Spam-Level: 
X-Spam-Status: No, score=-4.851 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z9E8FZGP6Jc7 for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 14:31:54 -0700 (PDT)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) by ietfa.amsl.com (Postfix) with ESMTP id 346701A6F03 for <perpass@ietf.org>; Mon, 28 Apr 2014 14:31:54 -0700 (PDT)
Received: from [192.168.0.13] (cpe-23-241-118-60.socal.res.rr.com [23.241.118.60]) (authenticated bits=0) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id s3SLU6XL022966 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Mon, 28 Apr 2014 14:30:16 -0700 (PDT)
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
Content-Type: text/plain; charset=windows-1252
From: manning bill <bmanning@isi.edu>
In-Reply-To: <68855aa3650248608cac2a6377f7e48e@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Date: Mon, 28 Apr 2014 14:30:05 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <99F7F051-1C3B-4D01-BA69-A0FCA4E5B2D9@isi.edu>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <1398715312.17858.535.camel@tochox.rolamasao.org> <68855aa3650248608cac2a6377f7e48e@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
To: Trevor Freeman <trevorf@exchange.microsoft.com>
X-Mailer: Apple Mail (2.1874)
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: bmanning@isi.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/dfN0NpGBoRphlSOPZladdCLej-I
Cc: =?windows-1252?Q?Noel_David_Torres_Ta=F1o?= <envite@rolamasao.org>, John Heidemann <johnh@isi.edu>, Jason_Livingood@cable.comcast.com, "perpass@ietf.org" <perpass@ietf.org>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 21:31:56 -0000

two data points:

- Comcast has greatly facilitated the e2e authentication model by =
funding DNSMASQ to support DNSSEC validation.   Since this piece was =
missing, the landscape has changed.
- Paul Hoffman has pulled together a functional replacement for the DNS =
APIs=85   see:  http://www.vpnc.org/getdns-api/   This gets past the =
validator and into the Application.

I -think- that there is an actual path now for DNSSEC.  If you are =
looking for opaqueness,   consider this third bit:

- http://www.isi.edu/ant/tdns/index.html   =85   swaps out UDP for TLS =
as the DNS transport.

YMMV of course.   Chunks of this development and testing will no doubt =
occur in the ISI/RINOC testbed.


/bill
Neca eos omnes.  Deus suos agnoscet.

On 28April2014Monday, at 14:16, Trevor Freeman =
<trevorf@exchange.microsoft.com> wrote:

> Hi Noel,
> =20
> If DNNSEC is used in corporations, that may be an interesting data =
point but perpass is specify looking at the interne so it does not help =
much.
> =20
> I understand they could be some benefit to adding some other filter to =
the data but the number to try and try to add a better quality metric. =
But absent that, the number is what is it. Happy to have the discussion =
on how we would consider what to filter on and maybe Verisign could =
provide more attributes with the data for use to mine the information. =20=

> =20
> I did some ad-hoc research and amongst the prominent internet services =
or financial institutions, the seems little evidence of DNSSEC.  The =
only bright spot seemed to be government web sites, though here the =
deployment was still inconsistent in that government agencies have many =
web sites not part of the base domain and these were often not signed.
> =20
> Trevor
> =20
> -----Original Message-----
> From: perpass [mailto:perpass-bounces@ietf.org] On Behalf Of Noel =
David Torres Ta=F1o
> Sent: Monday, April 28, 2014 1:02 PM
> To: perpass@ietf.org
> Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
> =20
> El lun, 28-04-2014 a las 18:38 +0000, Trevor Freeman escribi=F3:
> > We have a range of technologies in the toolkit to address issues
> > identified by perpass.
> >
> >=20
> >
> > One of the candidate technologies is DNSSEC. At a technology level =
it
> > has much to commend it.
> >
> >=20
> >
> > The vast majority of critical TLDs are signed, so another good point
> > in its favor.
> >
> >=20
> >
> > However when you look at the next tier down, the statistics point to =
a
> > problem.
> >
> >=20
> >
> > According to the Verisign labs scoreboard, 340K+ domains in the .com
> > namespace are secured by DNSSEC
> >
> > http://scoreboard.verisignlabs.com/
> >
> >=20
> >
> > If you express that number as % that is about 0.4% and the growth
> > trend is about 0.1% per year
> >
> > http://scoreboard.verisignlabs.com/percent-trace.png
> >
> >=20
> >
> > The trend seems about 2 orders of magnitude below where we need to =
be
> > for DNSSEC to be viable in a realistic timescale.
> >
> >=20
> >
> > Am I misinterpreting the data? If not, then do we have consensus on
> > what is blocking deployment?
> >
> >=20
> >
> > Trevor
> >
> >=20
> >
> Which are the numbers for .org ?
> =20
> This one should have a little percentage of garbage, parked domains, =
etc. Moreover, it is kess used by corporations with large IT departments =
and more used by small organizations like Libre Software projects.
> =20
> And it is very important to trust the software you download.
> =20
> Regards
> =20
> Noel
> er Envite
> =20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass


From nobody Mon Apr 28 14:32:20 2014
Return-Path: <trevorf@exchange.microsoft.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A9E71A70FD for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 14:32:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.601
X-Spam-Level: 
X-Spam-Status: No, score=-1.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jHQID4TOp7T1 for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 14:32:15 -0700 (PDT)
Received: from na01-by1-obe.outbound.o365filtering.com (mail-by1on0152.outbound.o365filtering.com [207.46.101.152]) by ietfa.amsl.com (Postfix) with ESMTP id 53F7B1A6F03 for <perpass@ietf.org>; Mon, 28 Apr 2014 14:32:15 -0700 (PDT)
Received: from BLUSR01CA104.namsdf01.sdf.exchangelabs.com (10.255.124.149) by BLUSR01MB589.namsdf01.sdf.exchangelabs.com (10.255.124.163) with Microsoft SMTP Server (TLS) id 15.0.944.2; Mon, 28 Apr 2014 21:32:12 +0000
Received: from BY1FFOFD004.ffo.gbl (10.255.124.132) by BLUSR01CA104.outlook.office365.com (10.255.124.149) with Microsoft SMTP Server (TLS) id 15.0.944.2 via Frontend Transport; Mon, 28 Apr 2014 21:32:12 +0000
Received: from hybrid.exchange.microsoft.com (131.107.147.100) by BY1FFOFD004.mail.o365filtering.com (10.1.16.61) with Microsoft SMTP Server (TLS) id 15.0.939.3 via Frontend Transport; Mon, 28 Apr 2014 21:32:12 +0000
Received: from DFM-TK5MBX15-08.exchange.corp.microsoft.com (157.54.109.47) by DFM-TK5EDG15-02.exchange.corp.microsoft.com (157.54.27.97) with Microsoft SMTP Server (TLS) id 15.0.913.17; Mon, 28 Apr 2014 14:32:07 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com (157.54.109.44) by DFM-TK5MBX15-08.exchange.corp.microsoft.com (157.54.109.47) with Microsoft SMTP Server (TLS) id 15.0.913.17; Mon, 28 Apr 2014 14:32:07 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com ([157.54.109.44]) by DFM-TK5MBX15-05.exchange.corp.microsoft.com ([169.254.5.13]) with mapi id 15.00.0913.011; Mon, 28 Apr 2014 14:32:07 -0700
From: Trevor Freeman <trevorf@exchange.microsoft.com>
To: Trevor Freeman <trevorf@exchange.microsoft.com>, =?utf-8?B?Tm9lbCBEYXZpZCBUb3JyZXMgVGHDsW8=?= <envite@rolamasao.org>, "perpass@ietf.org" <perpass@ietf.org>
Thread-Topic: [perpass] Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VAARslMAAAz/m7AAGM7GUA==
Date: Mon, 28 Apr 2014 21:32:06 +0000
Message-ID: <9173e62849894476ab29b6c1e49f268f@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <1398715312.17858.535.camel@tochox.rolamasao.org> <68855aa3650248608cac2a6377f7e48e@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
In-Reply-To: <68855aa3650248608cac2a6377f7e48e@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.13]
Content-Type: multipart/alternative; boundary="_000_9173e62849894476ab29b6c1e49f268fDFMTK5MBX1505exchangeco_"
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: =?us-ascii?Q?CIP:131.107.147.100; CTRY:US; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(10?= =?us-ascii?Q?009001)(377424004)(51704005)(377454003)(13464003)(189002)(19?= =?us-ascii?Q?9002)(47446003)(53806002)(33646001)(54356002)(87266001)(5677?= =?us-ascii?Q?6002)(47976003)(4396001)(74502001)(85852003)(92566001)(54316?= =?us-ascii?Q?003)(47736002)(59766002)(65816002)(56816006)(76796001)(63696?= =?us-ascii?Q?004)(77982001)(49866002)(74662001)(512874002)(84326002)(8530?= =?us-ascii?Q?6002)(19300405004)(84676001)(2009001)(74366001)(80022001)(98?= =?us-ascii?Q?676001)(66066001)(87936001)(76786001)(2656002)(90146001)(319?= =?us-ascii?Q?66008)(51856002)(19580405001)(15974865002)(99396002)(7709600?= =?us-ascii?Q?1)(95416001)(44976005)(94316002)(97336001)(6806004)(97186001?= =?us-ascii?Q?)(94946001)(1511001)(97736001)(15975445006)(79102001)(461020?= =?us-ascii?Q?01)(74876001)(81816001)(81686001)(81542001)(81342001)(809760?= =?us-ascii?Q?01)(19580395003)(83322001)(71186001)(83072002)(93136001)(509?= =?us-ascii?Q?86002)(93516002)(69226001)(16601075003)(95666003)(20776003)(?= =?us-ascii?Q?15202345003)(16236675003)(74706001)(76482001)(24736002)(3667?= =?us-ascii?Q?265003);DIR:OUT;SFP:1101;SCL:1;SRVR:BLUSR01MB589;H:hybrid.ex?= =?us-ascii?Q?change.microsoft.com;FPR:;PTR:InfoDomainNonexistent;MX:1;LAN?= =?us-ascii?Q?G:en;?=
X-Exchange-Antispam-Report-Test: BL:0; ACTION:Default; RISK:Low; SCL:0; SPMLVL:NotSpam; PCL:0; RULEID:
X-Forefront-PRVS: 01952C6E96
X-OriginatorOrg: exchange.microsoft.com
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/eKPhOJHos27LI2oNd87rc8TpZ9w
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 21:32:18 -0000

--_000_9173e62849894476ab29b6c1e49f268fDFMTK5MBX1505exchangeco_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_9173e62849894476ab29b6c1e49f268fDFMTK5MBX1505exchangeco_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m
YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy
IDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWws
IGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJ
Zm9udC1zaXplOjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO30N
CmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCWNv
bG9yOiMwNTYzQzE7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQphOnZpc2l0ZWQsIHNw
YW4uTXNvSHlwZXJsaW5rRm9sbG93ZWQNCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCWNvbG9y
OiM5NTRGNzI7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwLk1zb1BsYWluVGV4dCwg
bGkuTXNvUGxhaW5UZXh0LCBkaXYuTXNvUGxhaW5UZXh0DQoJe21zby1zdHlsZS1wcmlvcml0eTo5
OTsNCgltc28tc3R5bGUtbGluazoiUGxhaW4gVGV4dCBDaGFyIjsNCgltYXJnaW46MGluOw0KCW1h
cmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJD
YWxpYnJpIiwic2Fucy1zZXJpZiI7fQ0Kc3Bhbi5QbGFpblRleHRDaGFyDQoJe21zby1zdHlsZS1u
YW1lOiJQbGFpbiBUZXh0IENoYXIiOw0KCW1zby1zdHlsZS1wcmlvcml0eTo5OTsNCgltc28tc3R5
bGUtbGluazoiUGxhaW4gVGV4dCI7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlm
Ijt9DQpzcGFuLkVtYWlsU3R5bGUxOQ0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbC1yZXBseTsN
Cglmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiOw0KCWNvbG9yOiMxRjQ5N0Q7fQ0K
Lk1zb0NocERlZmF1bHQNCgl7bXNvLXN0eWxlLXR5cGU6ZXhwb3J0LW9ubHk7DQoJZm9udC1zaXpl
OjEwLjBwdDt9DQpAcGFnZSBXb3JkU2VjdGlvbjENCgl7c2l6ZTo4LjVpbiAxMS4waW47DQoJbWFy
Z2luOjEuMGluIDEuMGluIDEuMGluIDEuMGluO30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7cGFnZTpX
b3JkU2VjdGlvbjE7fQ0KLS0+PC9zdHlsZT48IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4NCjxvOnNo
YXBlZGVmYXVsdHMgdjpleHQ9ImVkaXQiIHNwaWRtYXg9IjEwMjYiIC8+DQo8L3htbD48IVtlbmRp
Zl0tLT48IS0tW2lmIGd0ZSBtc28gOV0+PHhtbD4NCjxvOnNoYXBlbGF5b3V0IHY6ZXh0PSJlZGl0
Ij4NCjxvOmlkbWFwIHY6ZXh0PSJlZGl0IiBkYXRhPSIxIiAvPg0KPC9vOnNoYXBlbGF5b3V0Pjwv
eG1sPjwhW2VuZGlmXS0tPg0KPC9oZWFkPg0KPGJvZHkgbGFuZz0iRU4tVVMiIGxpbms9IiMwNTYz
QzEiIHZsaW5rPSIjOTU0RjcyIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iY29sb3I6IzFGNDk3RCI+SSBzcG9rZSB0byBzb29u
LiBXaGlsZSB0aGUgVVMgZ292ZXJubWVudCBkb21haW5zICZuYnNwO2lzIHNpZ25lZCwgdGhlIGFj
dHVhbCB3ZWIgc2l0ZSBpcyBub3QgaW4gbWFueSBjYXNlcy4NCjxvOnA+PC9vOnA+PC9zcGFuPjwv
cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJjb2xvcjojMUY0OTdEIj5Gb3Ig
ZXhhbXBsZTo8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh
biBzdHlsZT0iY29sb3I6IzFGNDk3RCI+PGEgaHJlZj0iaHR0cDovL3d3dy5kaHMuZ292Ij53d3cu
ZGhzLmdvdjwvYT4gaXMgYSBjbmFtZSBlbnRyeQ0KPGEgaHJlZj0iaHR0cDovL3d3dy5kaHMuZ292
LmVkZ2VrZXkubmV0Ij53d3cuZGhzLmdvdi5lZGdla2V5Lm5ldDwvYT4gd2hpY2ggaXMgdW5zaWdu
ZWQuPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5
bGU9ImNvbG9yOiMxRjQ5N0QiPlRoaXMgaXMgaW4gdHVybiBhIENOQU1FIHRvIGFub3RoZXIgdW5z
aWduZWQgZG9tYWluPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImNvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJjb2xvcjojMUY0OTdEIj53d3cuZGhz
Lmdvdi5lZGdla2V5Lm5ldCBpcyBhIENOQU1FIHRvIGU2NDg1LmRzY2IuYWthbWFpZWRnZS5uZXQ8
bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i
Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPGRpdj4NCjxkaXYg
c3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0UxRTFFMSAxLjBwdDtwYWRkaW5n
OjMuMHB0IDBpbiAwaW4gMGluIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPkZyb206PC9iPiBw
ZXJwYXNzIFttYWlsdG86cGVycGFzcy1ib3VuY2VzQGlldGYub3JnXSA8Yj5PbiBCZWhhbGYgT2YN
CjwvYj5UcmV2b3IgRnJlZW1hbjxicj4NCjxiPlNlbnQ6PC9iPiBNb25kYXksIEFwcmlsIDI4LCAy
MDE0IDI6MTcgUE08YnI+DQo8Yj5Ubzo8L2I+IE5vZWwgRGF2aWQgVG9ycmVzIFRhw7FvOyBwZXJw
YXNzQGlldGYub3JnPGJyPg0KPGI+U3ViamVjdDo8L2I+IFJlOiBbcGVycGFzc10gSXMgRE5TREVD
IGEgdmlhYmxlIHRlY2hub2xvZ3kgZm9yIHBlcnBhc3M/PG86cD48L286cD48L3A+DQo8L2Rpdj4N
CjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBj
bGFzcz0iTXNvUGxhaW5UZXh0Ij5IaSBOb2VsLDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1z
b1BsYWluVGV4dCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0
Ij5JZiBETk5TRUMgaXMgdXNlZCBpbiBjb3Jwb3JhdGlvbnMsIHRoYXQgbWF5IGJlIGFuIGludGVy
ZXN0aW5nIGRhdGEgcG9pbnQgYnV0IHBlcnBhc3MgaXMgc3BlY2lmeSBsb29raW5nIGF0IHRoZSBp
bnRlcm5lIHNvIGl0IGRvZXMgbm90IGhlbHAgbXVjaC48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNz
PSJNc29QbGFpblRleHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWlu
VGV4dCI+SSB1bmRlcnN0YW5kIHRoZXkgY291bGQgYmUgc29tZSBiZW5lZml0IHRvIGFkZGluZyBz
b21lIG90aGVyIGZpbHRlciB0byB0aGUgZGF0YSBidXQgdGhlIG51bWJlciB0byB0cnkgYW5kIHRy
eSB0byBhZGQgYSBiZXR0ZXIgcXVhbGl0eSBtZXRyaWMuIEJ1dCBhYnNlbnQgdGhhdCwgdGhlIG51
bWJlciBpcyB3aGF0IGlzIGl0LiBIYXBweSB0byBoYXZlIHRoZSBkaXNjdXNzaW9uIG9uIGhvdyB3
ZSB3b3VsZCBjb25zaWRlcg0KIHdoYXQgdG8gZmlsdGVyIG9uIGFuZCBtYXliZSBWZXJpc2lnbiBj
b3VsZCBwcm92aWRlIG1vcmUgYXR0cmlidXRlcyB3aXRoIHRoZSBkYXRhIGZvciB1c2UgdG8gbWlu
ZSB0aGUgaW5mb3JtYXRpb24uICZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1Bs
YWluVGV4dCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij5J
IGRpZCBzb21lIGFkLWhvYyByZXNlYXJjaCBhbmQgYW1vbmdzdCB0aGUgcHJvbWluZW50IGludGVy
bmV0IHNlcnZpY2VzIG9yIGZpbmFuY2lhbCBpbnN0aXR1dGlvbnMsIHRoZSBzZWVtcyBsaXR0bGUg
ZXZpZGVuY2Ugb2YgRE5TU0VDLiAmbmJzcDtUaGUgb25seSBicmlnaHQgc3BvdCBzZWVtZWQgdG8g
YmUgZ292ZXJubWVudCB3ZWIgc2l0ZXMsIHRob3VnaCBoZXJlIHRoZSBkZXBsb3ltZW50IHdhcyBz
dGlsbCBpbmNvbnNpc3RlbnQNCiBpbiB0aGF0IGdvdmVybm1lbnQgYWdlbmNpZXMgaGF2ZSBtYW55
IHdlYiBzaXRlcyBub3QgcGFydCBvZiB0aGUgYmFzZSBkb21haW4gYW5kIHRoZXNlIHdlcmUgb2Z0
ZW4gbm90IHNpZ25lZC4NCjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+
PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij5UcmV2b3I8bzpw
PjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9w
Pg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+LS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS08YnI+
DQpGcm9tOiBwZXJwYXNzIFs8YSBocmVmPSJtYWlsdG86cGVycGFzcy1ib3VuY2VzQGlldGYub3Jn
Ij5tYWlsdG86cGVycGFzcy1ib3VuY2VzQGlldGYub3JnPC9hPl0gT24gQmVoYWxmIE9mIE5vZWwg
RGF2aWQgVG9ycmVzIFRhw7FvPGJyPg0KU2VudDogTW9uZGF5LCBBcHJpbCAyOCwgMjAxNCAxOjAy
IFBNPGJyPg0KVG86IDxhIGhyZWY9Im1haWx0bzpwZXJwYXNzQGlldGYub3JnIj5wZXJwYXNzQGll
dGYub3JnPC9hPjxicj4NClN1YmplY3Q6IFJlOiBbcGVycGFzc10gSXMgRE5TREVDIGEgdmlhYmxl
IHRlY2hub2xvZ3kgZm9yIHBlcnBhc3M/PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxh
aW5UZXh0Ij48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPkVs
IGx1biwgMjgtMDQtMjAxNCBhIGxhcyAxODozOCAmIzQzOzAwMDAsIFRyZXZvciBGcmVlbWFuIGVz
Y3JpYmnDszo8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgV2Ug
aGF2ZSBhIHJhbmdlIG9mIHRlY2hub2xvZ2llcyBpbiB0aGUgdG9vbGtpdCB0byBhZGRyZXNzIGlz
c3Vlcw0KPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IGlkZW50
aWZpZWQgYnkgcGVycGFzcy48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQi
PiZndDsgPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7Jm5ic3A7
IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwvbzpw
PjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgT25lIG9mIHRoZSBjYW5kaWRhdGUg
dGVjaG5vbG9naWVzIGlzIEROU1NFQy4gQXQgYSB0ZWNobm9sb2d5IGxldmVsIGl0DQo8bzpwPjwv
bzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgaGFzIG11Y2ggdG8gY29tbWVu
ZCBpdC48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgPG86cD48
L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7Jm5ic3A7IDxvOnA+PC9vOnA+
PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwvbzpwPjwvcD4NCjxwIGNs
YXNzPSJNc29QbGFpblRleHQiPiZndDsgVGhlIHZhc3QgbWFqb3JpdHkgb2YgY3JpdGljYWwgVExE
cyBhcmUgc2lnbmVkLCBzbyBhbm90aGVyIGdvb2QgcG9pbnQNCjxvOnA+PC9vOnA+PC9wPg0KPHAg
Y2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyBpbiBpdHMgZmF2b3IuPG86cD48L286cD48L3A+DQo8
cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1z
b1BsYWluVGV4dCI+Jmd0OyZuYnNwOyA8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFp
blRleHQiPiZndDsgPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7
IEhvd2V2ZXIgd2hlbiB5b3UgbG9vayBhdCB0aGUgbmV4dCB0aWVyIGRvd24sIHRoZSBzdGF0aXN0
aWNzIHBvaW50IHRvIGENCjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+
Jmd0OyBwcm9ibGVtLjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0
OyA8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsmbmJzcDsgPG86
cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IDxvOnA+PC9vOnA+PC9w
Pg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyBBY2NvcmRpbmcgdG8gdGhlIFZlcmlzaWdu
IGxhYnMgc2NvcmVib2FyZCwgMzQwSyYjNDM7IGRvbWFpbnMgaW4gdGhlIC5jb20NCjxvOnA+PC9v
OnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyBuYW1lc3BhY2UgYXJlIHNlY3Vy
ZWQgYnkgRE5TU0VDPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7
IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8YSBocmVmPSJo
dHRwOi8vc2NvcmVib2FyZC52ZXJpc2lnbmxhYnMuY29tLyI+PHNwYW4gc3R5bGU9ImNvbG9yOndp
bmRvd3RleHQ7dGV4dC1kZWNvcmF0aW9uOm5vbmUiPmh0dHA6Ly9zY29yZWJvYXJkLnZlcmlzaWdu
bGFicy5jb20vPC9zcGFuPjwvYT48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRl
eHQiPiZndDsgPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7Jm5i
c3A7IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwv
bzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgSWYgeW91IGV4cHJlc3MgdGhh
dCBudW1iZXIgYXMgJSB0aGF0IGlzIGFib3V0IDAuNCUgYW5kIHRoZSBncm93dGgNCjxvOnA+PC9v
OnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyB0cmVuZCBpcyBhYm91dCAwLjEl
IHBlciB5ZWFyPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IDxv
OnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8YSBocmVmPSJodHRw
Oi8vc2NvcmVib2FyZC52ZXJpc2lnbmxhYnMuY29tL3BlcmNlbnQtdHJhY2UucG5nIj4NCjxzcGFu
IHN0eWxlPSJjb2xvcjp3aW5kb3d0ZXh0O3RleHQtZGVjb3JhdGlvbjpub25lIj5odHRwOi8vc2Nv
cmVib2FyZC52ZXJpc2lnbmxhYnMuY29tL3BlcmNlbnQtdHJhY2UucG5nPC9zcGFuPjwvYT48bzpw
PjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgPG86cD48L286cD48L3A+
DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7Jm5ic3A7IDxvOnA+PC9vOnA+PC9wPg0KPHAg
Y2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Q
bGFpblRleHQiPiZndDsgVGhlIHRyZW5kIHNlZW1zIGFib3V0IDIgb3JkZXJzIG9mIG1hZ25pdHVk
ZSBiZWxvdyB3aGVyZSB3ZSBuZWVkIHRvIGJlDQo8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJN
c29QbGFpblRleHQiPiZndDsgZm9yIEROU1NFQyB0byBiZSB2aWFibGUgaW4gYSByZWFsaXN0aWMg
dGltZXNjYWxlLjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8
bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsmbmJzcDsgPG86cD48
L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IDxvOnA+PC9vOnA+PC9wPg0K
PHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyBBbSBJIG1pc2ludGVycHJldGluZyB0aGUgZGF0
YT8gSWYgbm90LCB0aGVuIGRvIHdlIGhhdmUgY29uc2Vuc3VzIG9uDQo8bzpwPjwvbzpwPjwvcD4N
CjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsgd2hhdCBpcyBibG9ja2luZyBkZXBsb3ltZW50
PzxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8bzpwPjwvbzpw
PjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPiZndDsmbmJzcDsgPG86cD48L286cD48L3A+
DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4mZ3Q7IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9
Ik1zb1BsYWluVGV4dCI+Jmd0OyBUcmV2b3I8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Q
bGFpblRleHQiPiZndDsgPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij4m
Z3Q7Jm5ic3A7IDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+Jmd0OyA8
bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPldoaWNoIGFyZSB0aGUgbnVt
YmVycyBmb3IgLm9yZyA/PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij48
bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPlRoaXMgb25lIHNo
b3VsZCBoYXZlIGEgbGl0dGxlIHBlcmNlbnRhZ2Ugb2YgZ2FyYmFnZSwgcGFya2VkIGRvbWFpbnMs
IGV0Yy4gTW9yZW92ZXIsIGl0IGlzIGtlc3MgdXNlZCBieSBjb3Jwb3JhdGlvbnMgd2l0aCBsYXJn
ZSBJVCBkZXBhcnRtZW50cyBhbmQgbW9yZSB1c2VkIGJ5IHNtYWxsIG9yZ2FuaXphdGlvbnMgbGlr
ZSBMaWJyZSBTb2Z0d2FyZSBwcm9qZWN0cy48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Q
bGFpblRleHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4dCI+
QW5kIGl0IGlzIHZlcnkgaW1wb3J0YW50IHRvIHRydXN0IHRoZSBzb2Z0d2FyZSB5b3UgZG93bmxv
YWQuPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij48bzpwPiZuYnNwOzwv
bzpwPjwvcD4NCjxwIGNsYXNzPSJNc29QbGFpblRleHQiPlJlZ2FyZHM8bzpwPjwvbzpwPjwvcD4N
CjxwIGNsYXNzPSJNc29QbGFpblRleHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHAgY2xhc3M9
Ik1zb1BsYWluVGV4dCI+Tm9lbDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb1BsYWluVGV4
dCI+ZXIgRW52aXRlPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvUGxhaW5UZXh0Ij48bzpw
PiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K

--_000_9173e62849894476ab29b6c1e49f268fDFMTK5MBX1505exchangeco_--


From nobody Mon Apr 28 14:47:16 2014
Return-Path: <york@isoc.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F03901A802C for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 14:47:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K-WPJwypSyYz for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 14:47:10 -0700 (PDT)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2lp0211.outbound.protection.outlook.com [207.46.163.211]) by ietfa.amsl.com (Postfix) with ESMTP id 99F2B1A6FB7 for <perpass@ietf.org>; Mon, 28 Apr 2014 14:47:09 -0700 (PDT)
Received: from BLUPR06MB243.namprd06.prod.outlook.com (10.242.191.154) by BLUPR06MB242.namprd06.prod.outlook.com (10.242.191.142) with Microsoft SMTP Server (TLS) id 15.0.929.12; Mon, 28 Apr 2014 21:47:01 +0000
Received: from BLUPR06MB243.namprd06.prod.outlook.com ([169.254.2.49]) by BLUPR06MB243.namprd06.prod.outlook.com ([169.254.2.49]) with mapi id 15.00.0929.001; Mon, 28 Apr 2014 21:47:01 +0000
From: Dan York <york@isoc.org>
To: Trevor Freeman <trevorf@exchange.microsoft.com>
Thread-Topic: [perpass] Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VAAGswyA
Date: Mon, 28 Apr 2014 21:47:00 +0000
Message-ID: <D10D2737-322D-40CC-8C8F-B368A4A8CD24@isoc.org>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
In-Reply-To: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [74.75.92.114]
x-forefront-prvs: 01952C6E96
x-forefront-antispam-report: SFV:NSPM; SFS:(10019001)(428001)(189002)(199002)(377454003)(24454002)(4396001)(81342001)(83716003)(82746002)(101416001)(19580405001)(83322001)(19580395003)(74502001)(81542001)(31966008)(2656002)(46102001)(79102001)(1511001)(87936001)(36756003)(86362001)(16236675002)(76176999)(50986999)(54356999)(92726001)(20776003)(15975445006)(15202345003)(74662001)(92566001)(80976001)(66066001)(76482001)(80022001)(99396002)(15395725003)(99286001)(77982001)(33656001)(100906001); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR06MB242; H:BLUPR06MB243.namprd06.prod.outlook.com; FPR:8C8FF107.A7FA57F1.FDF9F3B0.4E4B0140.2072B; MLV:sfv; PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
received-spf: None (: isoc.org does not designate permitted sender hosts)
Content-Type: multipart/alternative; boundary="_000_D10D2737322D40CC8C8FB368A4A8CD24isocorg_"
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/MuHIbURnqvMXYrFGZmENsBRozg8
Cc: "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 21:47:14 -0000

--_000_D10D2737322D40CC8C8FB368A4A8CD24isocorg_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Trevor,

On Apr 28, 2014, at 2:38 PM, Trevor Freeman <trevorf@exchange.microsoft.com=
<mailto:trevorf@exchange.microsoft.com>>
 wrote:

We have a range of technologies in the toolkit to address issues identified=
 by perpass.

One of the candidate technologies is DNSSEC. At a technology level it has m=
uch to commend it.

Which of the perpass issues do you see DNSSEC helping with?  If I look at h=
ttp://tools.ietf.org/html/draft-trammell-perpass-ppa-01 or http://tools.iet=
f.org/html/draft-tschofenig-perpass-surveillance-01 or other documents that=
 have been circulated, they are almost all related to concerns around priva=
cy and more specifically confidentiality... which is not a focus of DNSSEC.=
  DNSSEC is focused on ensuring the *integrity* of the information carried =
in DNS queries, although when coupled with DANE for TLS certificates it can=
 help with confidentiality, too.

The trend seems about 2 orders of magnitude below where we need to be for D=
NSSEC to be viable in a realistic timescale.

Am I misinterpreting the data?

No, you're not misinterpreting the data for .COM.  Only a very small % of .=
com domains are signed.  The story is better in other TLDs such as .GOV, fo=
r instance, where 87% of all domains are DNSSEC-signed ( http://fedv6-deplo=
yment.antd.nist.gov/snap-all.html ).  Attaining this high level, of course,=
 took a mandate from the US government to all agencies.

Over in .NL, there are 1.7 million domains signed representing about 31% of=
 all .NL domains (see right sidebar of https://www.sidn.nl/ ).  We are trac=
king a number of other statistics sites that monitor the DNSSEC status of v=
arious TLDs at:
http://www.internetsociety.org/deploy360/dnssec/statistics/

You are correct, though, that overall the % of domains signed with DNSSEC i=
s low.

If not, then do we have consensus on what is blocking deployment?

I don't know that there is a "consensus"... and I could have a long convers=
ation on this topic...  but I know from conversations with a good number of=
 people within what I'll call the "DNSSEC community" over the past couple o=
f years that we have the fundamental bootstrapping issue with DNSSEC where =
we need both more signing of domains and more deployment of DNSSEC-validati=
ng DNS resolvers.  The challenge has been that people say "why should I bot=
her signing my domain when 'no one' is validating" and on the opposite side=
 ISPs and other network operators say "why should I enable DNSSEC validatio=
n in my DNS resolvers where there aren't a lot of domains signed".  About 2=
 years ago a colleague and I wrote a paper for the SATIN conference in the =
UK and while the situation *has* improved, many of the points are still val=
id:

http://www.internetsociety.org/deploy360/resources/whitepaper-challenges-an=
d-opportunities-in-deploying-dnssec/

The good news is that we've seen some good growth on the validation side, h=
elped largely by Google turning on full DNSSEC validation in their Public D=
NS servers and Comcast enabling DNSSEC validation in their large network in=
 North America.  Additionally, many ISPs in countries such as Sweden, the N=
etherlands, the Czech Republic and Brazil have turned on DNSSEC validation.=
   Geoff Huston, George Michaelson and the rest of the team at APNIC Labs h=
ave done a number of DNSSEC validation measurement projects and presented t=
hose at various conferences.   At RIPE67 last October, his set of slides ( =
https://ripe67.ripe.net/presentations/111-2013-10-15-dnssec.pdf ) was showi=
ng the May 2013 data where about 8.3% of all queries were being validated. =
 That's certainly a good start... and the validation % is much higher in so=
me countries.

We also now have DNSSEC validation easily configurable in most all the majo=
r DNS resolvers, including BIND, Unbound and Microsoft Windows Server 2012.=
  It was also recently added to dnsmasq, a DNS server widely used in many s=
maller environments.  So the conditions are now right to get more DNSSEC va=
lidation occurring - this was one of the roadblocks for some time.   We als=
o have the new getdns API ( http://www.vpnc.org/getdns-api/ ) that provides=
 an easier way for application developers to get to DNS info and to get DNS=
SEC records.

There are still some operational issues to sort out regarding deploying DNS=
SEC validation that have been documented by Wes Hardaker, Olafur Gudmundsso=
n and Suresh Krishnaswamy in a draft in the DNSOP working group:

http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-roadblock-avoidance

On the signing side, we know many of the deployment challenges and people a=
re working on them, although many of them are not anything that the IETF ca=
n do anything directly about. There are a few standardization issues that a=
re being worked through within the DNSOP working group, such as how a paren=
t zone is alerted when a key changes in a child zone.  There's a secure key=
 transfer mechanism working through EPPEXT.

As an example of one area outside of the IETF, one challenge historically h=
as been that many registrars have not provided any way to let you add DS or=
 DNSKEY records to your domain info, which would then be passed up to your =
TLD.  That is now changing because ICANN's 2013 Registrar Accreditation Agr=
eement (RAA) requires registrars to support the passing of DNSSEC records -=
 and to sell the newgTLDs, registrars have to sign the 2013 RAA.  So we're =
seeing more registrars offering at least some base level of DNSSEC support.

Beyond that, it would certainly be helpful if there were more automation in=
 the overall system to make it easier for people to just enable DNSSEC and =
have it "just work" - for example, it would be great to see more DNS hostin=
g providers offer DNSSEC-signing.  It would also be helpful to have more co=
ntent distribution networks (CDNs) supporting DNSSEC, as this is a barrier =
for getting many websites signed.

Perhaps a more fundamental factor "blocking" deployment is just that people=
 don't understand the value of DNSSEC and haven't felt the urgent need to d=
eploy it.  It's on "their list" of things to implement... but hasn't bubble=
d up enough in the priorities.  Many of us view DANE as a key driver here a=
s it provides a real use case for how DNSSEC can help add a layer of trust =
to your web security infrastructure.

I could go on... and probably what I should do is write an update to that S=
ATIN paper that provides a more current look at the remaining challenges...=
 but hopefully this provides a view into some of the state of deployment.  =
   I'm glad to expand on any points or be part of a larger discussion aroun=
d these issues.  I'm employed by the Internet Society on the Deploy360 prog=
ram where a large part of my work is focused on how we accelerate DNSSEC de=
ployment... so I'm here to help on these points.

Regards,
Dan

P.S. And if anyone is interested in being involved specifically with effort=
s around advancing DNSSEC deployment (both inside the IETF but more so outs=
ide in the larger industry), we have a separate mailing list set up at  htt=
ps://elists.isoc.org/mailman/listinfo/dnssec-coord  that is open to anyone =
to join.

--
Dan York
Senior Content Strategist, Internet Society
york@isoc.org<mailto:york@isoc.org>   +1-802-735-1624
Jabber: york@jabber.isoc.org<mailto:york@jabber.isoc.org>
Skype: danyork   http://twitter.com/danyork

http://www.internetsociety.org/deploy360/


--_000_D10D2737322D40CC8C8FB368A4A8CD24isocorg_
Content-Type: text/html; charset="us-ascii"
Content-ID: <E46E96859F6A1A469EA847AA3810A4DE@namprd06.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<base href=3D"x-msg://995/">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
Trevor,
<div><br>
<div>
<div>On Apr 28, 2014, at 2:38 PM, Trevor Freeman &lt;<a href=3D"mailto:trev=
orf@exchange.microsoft.com">trevorf@exchange.microsoft.com</a>&gt;</div>
<div>&nbsp;wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"font-family=
: Helvetica; font-size: medium; font-style: normal; font-variant: normal; f=
ont-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2=
; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-s=
pace: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto;=
 -webkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
We have a range of technologies in the toolkit to address issues identified=
 by perpass.<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<o:p>&nbsp;</o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
One of the candidate technologies is DNSSEC. At a technology level it has m=
uch to commend it.</div>
</div>
</div>
</blockquote>
<div><br>
</div>
Which of the perpass issues do you see DNSSEC helping with? &nbsp;If I look=
 at&nbsp;<a href=3D"http://tools.ietf.org/html/draft-trammell-perpass-ppa-0=
1">http://tools.ietf.org/html/draft-trammell-perpass-ppa-01</a>&nbsp;or&nbs=
p;<a href=3D"http://tools.ietf.org/html/draft-tschofenig-perpass-surveillan=
ce-01">http://tools.ietf.org/html/draft-tschofenig-perpass-surveillance-01<=
/a>&nbsp;or
 other documents that have been circulated, they are almost all related to =
concerns around privacy and more specifically confidentiality... which is n=
ot a focus of DNSSEC. &nbsp;DNSSEC is focused on ensuring the *integrity* o=
f the information carried in DNS queries,
 although when coupled with DANE for TLS certificates it can help with conf=
identiality, too.</div>
<div>
<div><br>
</div>
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"font-family=
: Helvetica; font-size: medium; font-style: normal; font-variant: normal; f=
ont-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2=
; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-s=
pace: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto;=
 -webkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<span style=3D"font-size: 11pt; ">The trend seems about 2 orders of magnitu=
de below where we need to be for DNSSEC to be viable in a realistic timesca=
le.</span></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<o:p>&nbsp;</o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
Am I misinterpreting the data? </div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>
<div>No, you're not misinterpreting the data for .COM. &nbsp;Only a very sm=
all % of .com domains are signed. &nbsp;The story is better in other TLDs s=
uch as .GOV, for instance, where 87% of all domains are DNSSEC-signed (&nbs=
p;<a href=3D"http://fedv6-deployment.antd.nist.gov/snap-all.html">http://fe=
dv6-deployment.antd.nist.gov/snap-all.html</a>&nbsp;).
 &nbsp;Attaining this high level, of course, took a mandate from the US gov=
ernment to all agencies. &nbsp;</div>
<div><br>
</div>
<div>Over in .NL, there are 1.7 million domains signed representing about 3=
1% of all .NL domains (see right sidebar of&nbsp;<a href=3D"https://www.sid=
n.nl/">https://www.sidn.nl/</a>&nbsp;). &nbsp;We are tracking a number of o=
ther statistics sites that monitor the DNSSEC status
 of various TLDs at:</div>
<div><a href=3D"http://www.internetsociety.org/deploy360/dnssec/statistics/=
">http://www.internetsociety.org/deploy360/dnssec/statistics/</a></div>
<div><br>
</div>
<div>You are correct, though, that overall the % of domains signed with DNS=
SEC is low.&nbsp;</div>
</div>
<br>
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"font-family=
: Helvetica; font-size: medium; font-style: normal; font-variant: normal; f=
ont-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2=
; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-s=
pace: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto;=
 -webkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
If not, then do we have consensus on what is blocking deployment?</div>
</div>
</div>
</blockquote>
<br>
</div>
<div>
<div>I don't know that there is a &quot;consensus&quot;... and I could have=
 a long conversation on this topic... &nbsp;but I know from conversations w=
ith a good number of people within what I'll call the &quot;DNSSEC communit=
y&quot; over the past couple of years that we have the fundamental
 bootstrapping issue with DNSSEC where we need both more signing of domains=
 and more deployment of DNSSEC-validating DNS resolvers. &nbsp;The challeng=
e has been that people say &quot;why should I bother signing my domain when=
 'no one' is validating&quot; and on the opposite
 side ISPs and other network operators say &quot;why should I enable DNSSEC=
 validation in my DNS resolvers where there aren't a lot of domains signed&=
quot;. &nbsp;About 2 years ago a colleague and I wrote a paper for the SATI=
N conference in the UK and while the situation
 *has* improved, many of the points are still valid:</div>
<div><br>
</div>
<div><a href=3D"http://www.internetsociety.org/deploy360/resources/whitepap=
er-challenges-and-opportunities-in-deploying-dnssec/">http://www.internetso=
ciety.org/deploy360/resources/whitepaper-challenges-and-opportunities-in-de=
ploying-dnssec/</a></div>
<div><br>
</div>
<div>The good news is that we've seen some good growth on the validation si=
de, helped largely by Google turning on full DNSSEC validation in their Pub=
lic DNS servers and Comcast enabling DNSSEC validation in their large netwo=
rk in North America. &nbsp;Additionally,
 many ISPs in countries such as Sweden, the Netherlands, the Czech Republic=
 and Brazil have turned on DNSSEC validation. &nbsp; Geoff Huston, George M=
ichaelson and the rest of the team at APNIC Labs have done a number of DNSS=
EC validation measurement projects and
 presented those at various conferences. &nbsp; At RIPE67 last October, his=
 set of slides (&nbsp;<a href=3D"https://ripe67.ripe.net/presentations/111-=
2013-10-15-dnssec.pdf">https://ripe67.ripe.net/presentations/111-2013-10-15=
-dnssec.pdf</a>&nbsp;) was showing the May 2013 data
 where about 8.3% of all queries were being validated. &nbsp;That's certain=
ly a good start... and the validation % is much higher in some countries.</=
div>
<div><br>
</div>
<div>We also now have DNSSEC validation easily configurable in most all the=
 major DNS resolvers, including BIND, Unbound and Microsoft Windows Server =
2012. &nbsp;It was also recently added to dnsmasq, a DNS server widely used=
 in many smaller environments. &nbsp;So the
 conditions are now right to get more DNSSEC validation occurring - this wa=
s one of the roadblocks for some time. &nbsp; We also have the new getdns A=
PI (&nbsp;<a href=3D"http://www.vpnc.org/getdns-api/">http://www.vpnc.org/g=
etdns-api/</a>&nbsp;) that provides an easier way
 for application developers to get to DNS info and to get DNSSEC records.</=
div>
<div><br>
</div>
<div>There are still some operational issues to sort out regarding deployin=
g DNSSEC validation that have been documented by Wes Hardaker, Olafur Gudmu=
ndsson and Suresh Krishnaswamy in a draft in the DNSOP working group:</div>
<div><br>
</div>
<div><a href=3D"http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-roadbloc=
k-avoidance">http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-roadblock-a=
voidance</a></div>
<div><br>
</div>
<div>On the signing side, we know many of the deployment challenges and peo=
ple are working on them, although many of them are not anything that the IE=
TF can do anything directly about. There are a few standardization issues t=
hat are being worked through within
 the DNSOP working group, such as how a parent zone is alerted when a key c=
hanges in a child zone. &nbsp;There's a secure key transfer mechanism worki=
ng through EPPEXT.&nbsp;</div>
<div><br>
</div>
<div>As an example of one area outside of the IETF, one challenge historica=
lly has been that many registrars have not provided any way to let you add =
DS or DNSKEY records to your domain info, which would then be passed up to =
your TLD. &nbsp;That is now changing
 because ICANN's 2013 Registrar Accreditation Agreement (RAA) requires regi=
strars to support the passing of DNSSEC records - and to sell the newgTLDs,=
 registrars have to sign the 2013 RAA. &nbsp;So we're seeing more registrar=
s offering at least some base level of
 DNSSEC support.</div>
<div><br>
</div>
<div>Beyond that, it would certainly be helpful if there were more automati=
on in the overall system to make it easier for people to just enable DNSSEC=
 and have it &quot;just work&quot; - for example, it would be great to see =
more DNS hosting providers offer DNSSEC-signing.
 &nbsp;It would also be helpful to have more content distribution networks =
(CDNs) supporting DNSSEC, as this is a barrier for getting many websites si=
gned.</div>
<div><br>
</div>
<div>Perhaps a more fundamental factor &quot;blocking&quot; deployment is j=
ust that people don't understand the value of DNSSEC and haven't felt the u=
rgent need to deploy it. &nbsp;It's on &quot;their list&quot; of things to =
implement... but hasn't bubbled up enough in the priorities.
 &nbsp;Many of us view DANE as a key driver here as it provides a real use =
case for how DNSSEC can help add a layer of trust to your web security infr=
astructure.</div>
<div><br>
</div>
<div>I could go on... and probably what I should do is write an update to t=
hat SATIN paper that provides a more current look at the remaining challeng=
es... but hopefully this provides a view into some of the state of deployme=
nt. &nbsp; &nbsp; I'm glad to expand on any
 points or be part of a larger discussion around these issues. &nbsp;I'm em=
ployed by the Internet Society on the Deploy360 program where a large part =
of my work is focused on how we accelerate DNSSEC deployment... so I'm here=
 to help on these points.</div>
<div><br>
</div>
<div>Regards,</div>
<div>Dan</div>
<div><br>
</div>
<div>P.S. And if anyone is interested in being involved specifically with e=
fforts around advancing DNSSEC deployment (both inside the IETF but more so=
 outside in the larger industry), we have a separate mailing list set up at=
 &nbsp;<a href=3D"https://elists.isoc.org/mailman/listinfo/dnssec-coord">ht=
tps://elists.isoc.org/mailman/listinfo/dnssec-coord</a>&nbsp;
 that is open to anyone to join.</div>
<div><br>
</div>
</div>
<div>
<div apple-content-edited=3D"true">
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
--</div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Dan York</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Senior Content Strategist, Internet Socie=
ty</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif"><a href=3D"mailto:york@isoc.org">york@iso=
c.org</a> &nbsp; &#43;1-802-735-1624</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Jabber: <a href=3D"mailto:york@jabber.iso=
c.org">york@jabber.isoc.org</a>&nbsp;</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Skype: danyork &nbsp; <a href=3D"http://t=
witter.com/danyork">
http://twitter.com/danyork</a></font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif"><br>
</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); position: static; z-index: auto; ">
<font face=3D"Calibri,sans-serif"><a href=3D"http://www.internetsociety.org=
/deploy360/">http://www.internetsociety.org/deploy360/</a>&nbsp;</font></di=
v>
<div><font face=3D"Calibri,sans-serif"><br>
</font></div>
</div>
</div>
</div>
</body>
</html>

--_000_D10D2737322D40CC8C8FB368A4A8CD24isocorg_--


From nobody Mon Apr 28 14:50:28 2014
Return-Path: <york@isoc.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1329C1A6F0C for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 14:50:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x03Eir1R92Nn for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 14:50:21 -0700 (PDT)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2lp0205.outbound.protection.outlook.com [207.46.163.205]) by ietfa.amsl.com (Postfix) with ESMTP id 241131A6FB8 for <perpass@ietf.org>; Mon, 28 Apr 2014 14:50:21 -0700 (PDT)
Received: from BLUPR06MB243.namprd06.prod.outlook.com (10.242.191.154) by BLUPR06MB244.namprd06.prod.outlook.com (10.242.191.153) with Microsoft SMTP Server (TLS) id 15.0.929.12; Mon, 28 Apr 2014 21:50:18 +0000
Received: from BLUPR06MB243.namprd06.prod.outlook.com ([169.254.2.49]) by BLUPR06MB243.namprd06.prod.outlook.com ([169.254.2.49]) with mapi id 15.00.0929.001; Mon, 28 Apr 2014 21:50:18 +0000
From: Dan York <york@isoc.org>
To: Trevor Freeman <trevorf@exchange.microsoft.com>
Thread-Topic: [perpass] Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VAADBzsAAAKcUYAAAIpvAAAAopKA
Date: Mon, 28 Apr 2014 21:50:17 +0000
Message-ID: <AFE2DF81-A297-4B92-9F2B-A9D456F8A49C@isoc.org>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <1398715312.17858.535.camel@tochox.rolamasao.org> <68855aa3650248608cac2a6377f7e48e@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <9173e62849894476ab29b6c1e49f268f@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
In-Reply-To: <9173e62849894476ab29b6c1e49f268f@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [2604:6000:9fc0:53:801e:5527:2cfe:8df6]
x-forefront-prvs: 01952C6E96
x-forefront-antispam-report: SFV:NSPM; SFS:(10019001)(428001)(377454003)(24454002)(199002)(189002)(99286001)(33656001)(99396002)(79102001)(1511001)(83322001)(19580395003)(19580405001)(50986999)(81542001)(101416001)(81342001)(54356999)(76176999)(86362001)(87936001)(82746002)(83716003)(92566001)(2656002)(92726001)(80022001)(15975445006)(31966008)(46102001)(74662001)(74502001)(76482001)(80976001)(15202345003)(20776003)(77982001)(16601075003)(15395725003)(4396001)(36756003)(16236675002)(100906001)(3826001)(3667265003); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR06MB244; H:BLUPR06MB243.namprd06.prod.outlook.com; FPR:BB82718B.2F104D20.F9E33F54.D440F9C1.201EE; MLV:sfv; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
received-spf: None (: isoc.org does not designate permitted sender hosts)
Content-Type: multipart/alternative; boundary="_000_AFE2DF81A2974B929F2BA9D456F8A49Cisocorg_"
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/DhkYGj80C4rcQ6BEGYpLRYR316w
Cc: =?iso-8859-1?Q?Noel_David_Torres_Ta=F1o?= <envite@rolamasao.org>, "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 21:50:25 -0000

--_000_AFE2DF81A2974B929F2BA9D456F8A49Cisocorg_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Trevor,

On Apr 28, 2014, at 5:32 PM, Trevor Freeman <trevorf@exchange.microsoft.com=
<mailto:trevorf@exchange.microsoft.com>>
 wrote:

I spoke to soon. While the US government domains  is signed, the actual web=
 site is not in many cases.
For example:
www.dhs.gov<http://www.dhs.gov> is a cname entry www.dhs.gov.edgekey.net<ht=
tp://www.dhs.gov.edgekey.net> which is unsigned.
This is in turn a CNAME to another unsigned domain

www.dhs.gov.edgekey.net<http://www.dhs.gov.edgekey.net> is a CNAME to e6485=
.dscb.akamaiedge.net<http://e6485.dscb.akamaiedge.net>

Yes, support of DNSSEC by content distribution networks (CDNs) remains one =
of the stumbling blocks to getting full DNSSEC support out there for web si=
tes.  Some CDNs *do* support DNSSEC, but not for all customers, and other s=
imply don't.  We definitely need to see more CDN customers *asking* their C=
DN providers for DNSSEC-signing.

Dan

--
Dan York
Senior Content Strategist, Internet Society
york@isoc.org<mailto:york@isoc.org>   +1-802-735-1624
Jabber: york@jabber.isoc.org<mailto:york@jabber.isoc.org>
Skype: danyork   http://twitter.com/danyork

http://www.internetsociety.org/deploy360/


--_000_AFE2DF81A2974B929F2BA9D456F8A49Cisocorg_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <3100EE1CB8341E4F9D0F6DD1EF3367D8@namprd06.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<base href=3D"x-msg://1037/">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
Trevor,
<div><br>
<div apple-content-edited=3D"true">
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); position: static; z-index: auto; ">
On Apr 28, 2014, at 5:32 PM, Trevor Freeman &lt;<a href=3D"mailto:trevorf@e=
xchange.microsoft.com">trevorf@exchange.microsoft.com</a>&gt;</div>
</div>
<div>
<div>&nbsp;wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"font-family=
: Helvetica; font-size: medium; font-style: normal; font-variant: normal; f=
ont-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2=
; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-s=
pace: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto;=
 -webkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<span style=3D"color: rgb(31, 73, 125); ">I spoke to soon. While the US gov=
ernment domains &nbsp;is signed, the actual web site is not in many cases.<=
o:p></o:p></span></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<span style=3D"color: rgb(31, 73, 125); ">For example:<o:p></o:p></span></d=
iv>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<span style=3D"color: rgb(31, 73, 125); "><a href=3D"http://www.dhs.gov" st=
yle=3D"color: rgb(149, 79, 114); text-decoration: underline; ">www.dhs.gov<=
/a><span class=3D"Apple-converted-space">&nbsp;</span>is a cname entry<span=
 class=3D"Apple-converted-space">&nbsp;</span><a href=3D"http://www.dhs.gov=
.edgekey.net" style=3D"color: rgb(149, 79, 114); text-decoration: underline=
; ">www.dhs.gov.edgekey.net</a><span class=3D"Apple-converted-space">&nbsp;=
</span>which
 is unsigned.<o:p></o:p></span></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<span style=3D"color: rgb(31, 73, 125); ">This is in turn a CNAME to anothe=
r unsigned domain<o:p></o:p></span></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<span style=3D"color: rgb(31, 73, 125); ">&nbsp;</span></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<span style=3D"color: rgb(31, 73, 125); "><a href=3D"http://www.dhs.gov.edg=
ekey.net" style=3D"color: rgb(149, 79, 114); text-decoration: underline; ">=
www.dhs.gov.edgekey.net</a><span class=3D"Apple-converted-space">&nbsp;</sp=
an>is a CNAME to<span class=3D"Apple-converted-space">&nbsp;</span><a href=
=3D"http://e6485.dscb.akamaiedge.net" style=3D"color: rgb(149, 79, 114); te=
xt-decoration: underline; ">e6485.dscb.akamaiedge.net</a></span></div>
</div>
</div>
</blockquote>
<br>
</div>
</div>
<div>Yes, support of DNSSEC by content distribution networks (CDNs) remains=
 one of the stumbling blocks to getting full DNSSEC support out there for w=
eb sites. &nbsp;Some CDNs *do* support DNSSEC, but not for all customers, a=
nd other simply don't. &nbsp;We definitely
 need to see more CDN customers *asking* their CDN providers for DNSSEC-sig=
ning.</div>
<div><br>
</div>
<div>Dan</div>
<div><br>
</div>
<div>
<div apple-content-edited=3D"true">
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
--</div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Dan York</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Senior Content Strategist, Internet Socie=
ty</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif"><a href=3D"mailto:york@isoc.org">york@iso=
c.org</a> &nbsp; &#43;1-802-735-1624</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Jabber: <a href=3D"mailto:york@jabber.iso=
c.org">york@jabber.isoc.org</a>&nbsp;</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Skype: danyork &nbsp; <a href=3D"http://t=
witter.com/danyork">
http://twitter.com/danyork</a></font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif"><br>
</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); position: static; z-index: auto; ">
<font face=3D"Calibri,sans-serif"><a href=3D"http://www.internetsociety.org=
/deploy360/">http://www.internetsociety.org/deploy360/</a>&nbsp;</font></di=
v>
<div><font face=3D"Calibri,sans-serif"><br>
</font></div>
</div>
</div>
</body>
</html>

--_000_AFE2DF81A2974B929F2BA9D456F8A49Cisocorg_--


From nobody Mon Apr 28 15:08:21 2014
Return-Path: <doug.mtview@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AFA8E1A6FB7 for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 15:07:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gMYPqWzg9eW1 for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 15:07:42 -0700 (PDT)
Received: from mail-pa0-x229.google.com (mail-pa0-x229.google.com [IPv6:2607:f8b0:400e:c03::229]) by ietfa.amsl.com (Postfix) with ESMTP id 515EB1A7035 for <perpass@ietf.org>; Mon, 28 Apr 2014 15:07:39 -0700 (PDT)
Received: by mail-pa0-f41.google.com with SMTP id kp14so3038178pab.0 for <perpass@ietf.org>; Mon, 28 Apr 2014 15:07:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=o1a2Kjvv9PaOEpn2jJSkg0LDatOmJoBxRzTeeB/SnMM=; b=jH+fsn15gIxN2Ib9N2R+6vzZmipvl7mPP381SLWGW9Ob8Rw6Nz0YgcnwnR7hPXx0AZ DlmhTmQOO+OMP4LwAvs2OsYp5mAmpGMzhfYIAOwGjOdV0hN3qFM0W8Lr67gg7OO8vI+l F8U/QY4q2mqYAbrsnwZeAPpfkNc886T8Y1D5UtGM1JDI0zujbOlUY7tPV8rtGZdNpVUK JohzoegoEK0M/wk/1vy1otyBa70EdQFPLiUfczSJ2Jgg1Ojj8ARpmwDTjvqPWiONa4bo JWavEYPQpIe+1BX4hZCYOq46wTjWQQJu/cH3T6B28DVOe/pac8EdiKtnQINMKJWPef/k EhJw==
X-Received: by 10.66.186.238 with SMTP id fn14mr11345302pac.135.1398722858574;  Mon, 28 Apr 2014 15:07:38 -0700 (PDT)
Received: from [192.168.0.54] (107-0-5-6-ip-static.hfc.comcastbusiness.net. [107.0.5.6]) by mx.google.com with ESMTPSA id yv5sm37212744pbb.49.2014.04.28.15.07.36 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 28 Apr 2014 15:07:37 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_4A867450-40E5-4D50-87AD-2A98F0B78B6D"
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
From: Douglas Otis <doug.mtview@gmail.com>
In-Reply-To: <9173e62849894476ab29b6c1e49f268f@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Date: Mon, 28 Apr 2014 15:07:37 -0700
Message-Id: <5E9948EB-9896-4057-B5D4-50343EFEA39F@gmail.com>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <1398715312.17858.535.camel@tochox.rolamasao.org> <68855aa3650248608cac2a6377f7e48e@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <9173e62849894476ab29b6c1e49f268f@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
To: Trevor Freeman <trevorf@exchange.microsoft.com>
X-Mailer: Apple Mail (2.1874)
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/TwEsKeVsCl98jwqUuy_daPBDGX8
Cc: =?iso-8859-1?Q?Noel_David_Torres_Ta=F1o?= <envite@rolamasao.org>, "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 22:07:50 -0000

--Apple-Mail=_4A867450-40E5-4D50-87AD-2A98F0B78B6D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1



On Apr 28, 2014, at 2:32 PM, Trevor Freeman =
<trevorf@exchange.microsoft.com> wrote:

> I spoke to soon. While the US government domains  is signed, the =
actual web site is not in many cases.
> For example:
> www.dhs.gov is a cname entry www.dhs.gov.edgekey.net which is =
unsigned.
> This is in turn a CNAME to another unsigned domain
> =20
> www.dhs.gov.edgekey.net is a CNAME to e6485.dscb.akamaiedge.net

Dear Trevor,

Yes, there are many such CNAME wildcards in use.  A poor practice from =
many perspectives. =20

Comcast has been helpful in vetting DNSSEC use. See =
http://dns.comcast.net.  =
http://tools.ietf.org/html/draft-start-tls-over-dns-00 solves many =
deployment and privacy issues.  DNSSEC should be considered a much =
needed work in progress.

Regards,
Douglas Otis

=20
> From: perpass [mailto:perpass-bounces@ietf.org] On Behalf Of Trevor =
Freeman
> Sent: Monday, April 28, 2014 2:17 PM
> To: Noel David Torres Ta=F1o; perpass@ietf.org
> Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
> =20
> Hi Noel,
> =20
> If DNNSEC is used in corporations, that may be an interesting data =
point but perpass is specify looking at the interne so it does not help =
much.
> =20
> I understand they could be some benefit to adding some other filter to =
the data but the number to try and try to add a better quality metric. =
But absent that, the number is what is it. Happy to have the discussion =
on how we would consider what to filter on and maybe Verisign could =
provide more attributes with the data for use to mine the information. =20=

> =20
> I did some ad-hoc research and amongst the prominent internet services =
or financial institutions, the seems little evidence of DNSSEC.  The =
only bright spot seemed to be government web sites, though here the =
deployment was still inconsistent in that government agencies have many =
web sites not part of the base domain and these were often not signed.
> =20
> Trevor
> =20
> -----Original Message-----
> From: perpass [mailto:perpass-bounces@ietf.org] On Behalf Of Noel =
David Torres Ta=F1o
> Sent: Monday, April 28, 2014 1:02 PM
> To: perpass@ietf.org
> Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
> =20
> El lun, 28-04-2014 a las 18:38 +0000, Trevor Freeman escribi=F3:
> > We have a range of technologies in the toolkit to address issues
> > identified by perpass.
> >
> >=20
> >
> > One of the candidate technologies is DNSSEC. At a technology level =
it
> > has much to commend it.
> >
> >=20
> >
> > The vast majority of critical TLDs are signed, so another good point
> > in its favor.
> >
> >=20
> >
> > However when you look at the next tier down, the statistics point to =
a
> > problem.
> >
> >=20
> >
> > According to the Verisign labs scoreboard, 340K+ domains in the .com
> > namespace are secured by DNSSEC
> >
> > http://scoreboard.verisignlabs.com/
> >
> >=20
> >
> > If you express that number as % that is about 0.4% and the growth
> > trend is about 0.1% per year
> >
> > http://scoreboard.verisignlabs.com/percent-trace.png
> >
> >=20
> >
> > The trend seems about 2 orders of magnitude below where we need to =
be
> > for DNSSEC to be viable in a realistic timescale.
> >
> >=20
> >
> > Am I misinterpreting the data? If not, then do we have consensus on
> > what is blocking deployment?
> >
> >=20
> >
> > Trevor
> >
> >=20
> >
> Which are the numbers for .org ?
> =20
> This one should have a little percentage of garbage, parked domains, =
etc. Moreover, it is kess used by corporations with large IT departments =
and more used by small organizations like Libre Software projects.
> =20
> And it is very important to trust the software you download.
> =20
> Regards
> =20
> Noel
> er Envite
> =20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass


--Apple-Mail=_4A867450-40E5-4D50-87AD-2A98F0B78B6D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;"><div><br></div><div><br><div><div>On Apr 28, 2014, =
at 2:32 PM, Trevor Freeman &lt;<a =
href=3D"mailto:trevorf@exchange.microsoft.com">trevorf@exchange.microsoft.=
com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"font-family: =
Helvetica; font-size: 14px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><span style=3D"color: =
rgb(31, 73, 125);">I spoke to soon. While the US government domains =
&nbsp;is signed, the actual web site is not in many =
cases.<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><span style=3D"color: =
rgb(31, 73, 125);">For example:<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><span style=3D"color: rgb(31, 73, 125);"><a =
href=3D"http://www.dhs.gov/" style=3D"color: rgb(149, 79, 114); =
text-decoration: underline;">www.dhs.gov</a><span =
class=3D"Apple-converted-space">&nbsp;</span>is a cname entry<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://www.dhs.gov.edgekey.net/" style=3D"color: rgb(149, 79, =
114); text-decoration: underline;">www.dhs.gov.edgekey.net</a><span =
class=3D"Apple-converted-space">&nbsp;</span>which is =
unsigned.<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><span style=3D"color: =
rgb(31, 73, 125);">This is in turn a CNAME to another unsigned =
domain<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><span style=3D"color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;"><span =
style=3D"color: rgb(31, 73, 125);"><a =
href=3D"http://www.dhs.gov.edgekey.net/" style=3D"color: rgb(149, 79, =
114); text-decoration: underline;">www.dhs.gov.edgekey.net</a><span =
class=3D"Apple-converted-space">&nbsp;</span>is a CNAME to<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://e6485.dscb.akamaiedge.net/" style=3D"color: rgb(149, 79, =
114); text-decoration: =
underline;">e6485.dscb.akamaiedge.net</a></span></div></div></div></blockq=
uote><div><br></div><div>Dear Trevor,</div><div><br></div><div>Yes, =
there are many such CNAME wildcards in use. &nbsp;A poor practice from =
many perspectives. &nbsp;</div><div><br></div><div>Comcast has been =
helpful in vetting DNSSEC use. See&nbsp;<a =
href=3D"http://dns.comcast.net">http://dns.comcast.net</a>. &nbsp;<a =
href=3D"http://tools.ietf.org/html/draft-start-tls-over-dns-00">http://too=
ls.ietf.org/html/draft-start-tls-over-dns-00</a>&nbsp;solves many =
deployment and privacy issues. &nbsp;DNSSEC should be considered a much =
needed work in =
progress.</div><div><br></div><div>Regards,</div><div>Douglas =
Otis</div><div><br></div><div>&nbsp;</div><blockquote type=3D"cite"><div =
lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"font-family: =
Helvetica; font-size: 14px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><span style=3D"color: =
rgb(31, 73, 125);"><o:p></o:p></span></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(225, 225, =
225); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><b>From:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>perpass [<a =
href=3D"mailto:perpass-bounces@ietf.org" style=3D"color: rgb(149, 79, =
114); text-decoration: =
underline;">mailto:perpass-bounces@ietf.org</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"Apple-converted-space">&nbsp;</span></b>Trevor =
Freeman<br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Monday, April 28, 2014 2:17 =
PM<br><b>To:</b><span class=3D"Apple-converted-space">&nbsp;</span>Noel =
David Torres Ta=F1o;<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:perpass@ietf.org" style=3D"color: rgb(149, 79, 114); =
text-decoration: =
underline;">perpass@ietf.org</a><br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [perpass] Is DNSDEC a =
viable technology for perpass?<o:p></o:p></div></div></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">Hi =
Noel,<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">If DNNSEC is used in corporations, that may be an =
interesting data point but perpass is specify looking at the interne so =
it does not help much.<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">I =
understand they could be some benefit to adding some other filter to the =
data but the number to try and try to add a better quality metric. But =
absent that, the number is what is it. Happy to have the discussion on =
how we would consider what to filter on and maybe Verisign could provide =
more attributes with the data for use to mine the information. =
&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">I did some =
ad-hoc research and amongst the prominent internet services or financial =
institutions, the seems little evidence of DNSSEC. &nbsp;The only bright =
spot seemed to be government web sites, though here the deployment was =
still inconsistent in that government agencies have many web sites not =
part of the base domain and these were often not =
signed.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Trevor<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">-----Original Message-----<br>From: perpass [<a =
href=3D"mailto:perpass-bounces@ietf.org" style=3D"color: rgb(149, 79, =
114); text-decoration: underline;">mailto:perpass-bounces@ietf.org</a>] =
On Behalf Of Noel David Torres Ta=F1o<br>Sent: Monday, April 28, 2014 =
1:02 PM<br>To:<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:perpass@ietf.org" style=3D"color: rgb(149, 79, 114); =
text-decoration: underline;">perpass@ietf.org</a><br>Subject: Re: =
[perpass] Is DNSDEC a viable technology for =
perpass?<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">El lun, =
28-04-2014 a las 18:38 +0000, Trevor Freeman =
escribi=F3:<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">&gt; We have a range =
of technologies in the toolkit to address issues<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; identified by perpass.<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; One =
of the candidate technologies is DNSSEC. At a technology level =
it<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; has much to commend =
it.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt;<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; The =
vast majority of critical TLDs are signed, so another good =
point<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; in its =
favor.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
However when you look at the next tier down, the statistics point to =
a<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; =
problem.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
According to the Verisign labs scoreboard, 340K+ domains in the =
.com<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; namespace are secured by =
DNSSEC<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://scoreboard.verisignlabs.com/" style=3D"color: rgb(149, =
79, 114); text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">http://scoreboard.verisignlabs.com/</span></a><o:p></o:p></div><div=
 style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; If =
you express that number as % that is about 0.4% and the =
growth<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">&gt; trend is about =
0.1% per year<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://scoreboard.verisignlabs.com/percent-trace.png" =
style=3D"color: rgb(149, 79, 114); text-decoration: underline;"><span =
style=3D"color: windowtext; text-decoration: =
none;">http://scoreboard.verisignlabs.com/percent-trace.png</span></a><o:p=
></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt;<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; The =
trend seems about 2 orders of magnitude below where we need to =
be<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; for DNSSEC to be viable in =
a realistic timescale.<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; Am I =
misinterpreting the data? If not, then do we have consensus =
on<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; what is blocking =
deployment?<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
Trevor<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">Which are =
the numbers for .org ?<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">This one =
should have a little percentage of garbage, parked domains, etc. =
Moreover, it is kess used by corporations with large IT departments and =
more used by small organizations like Libre Software =
projects.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">And it is =
very important to trust the software you download.<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Regards<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Noel<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">er =
Envite<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div></div>________________________________=
_______________<br>perpass mailing list<br><a =
href=3D"mailto:perpass@ietf.org" style=3D"color: rgb(149, 79, 114); =
text-decoration: underline;">perpass@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/perpass" style=3D"color: =
rgb(149, 79, 114); text-decoration: =
underline;">https://www.ietf.org/mailman/listinfo/perpass</a></div></block=
quote></div><br></div></body></html>=

--Apple-Mail=_4A867450-40E5-4D50-87AD-2A98F0B78B6D--


From nobody Mon Apr 28 15:10:32 2014
Return-Path: <warren@kumari.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAE9D1A883A for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 15:10:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.978
X-Spam-Level: 
X-Spam-Status: No, score=-1.978 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 89NQly1kdaOI for <perpass@ietfa.amsl.com>; Mon, 28 Apr 2014 15:10:10 -0700 (PDT)
Received: from mail-wg0-f45.google.com (mail-wg0-f45.google.com [74.125.82.45]) by ietfa.amsl.com (Postfix) with ESMTP id D7E551A6FCE for <perpass@ietf.org>; Mon, 28 Apr 2014 15:10:09 -0700 (PDT)
Received: by mail-wg0-f45.google.com with SMTP id b13so958429wgh.4 for <perpass@ietf.org>; Mon, 28 Apr 2014 15:10:08 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=JZYo1at+fO5Tk9VIjbMBFLWH84RtGEhKoLG3nZKmbOE=; b=dLrS+4+/vhqdYsOauMeh2lFum+UzX/snTS03V/kP1wv3OnAXIkv9IAKCDwIcg/YsN4 1+290qewzYvHknahoagVxZcVb21MSCLlmyTbySQHhNYASfuzv5ZaYM5SmtDtIN+L3usf vb9/RhH80qzqwB8quLXfP7DcnNyV0E6mOkIdSkVe8SLVHNVRZHb78KAmwdZIW8FZOZ07 x5YGVPtrEEMwczloN4INIddnN5twuH9M0owHSjsP1KwxYmjsKHK6woBx9gUKvYQzBJXM 2o64TMrxFExwcgsxg+6MgDecBODaP1xk6gkA0ZmBSKxI/cYJ/kSb76Wvp59H2MSjGRpn bPZQ==
X-Gm-Message-State: ALoCoQkMGHCQ2VKnJVK/4TWRoEP6rJTOlGgp/hdYNxu1zJmcfONlwwNSce9GGsoJ8ODbdpKIDK3H
MIME-Version: 1.0
X-Received: by 10.180.105.132 with SMTP id gm4mr17298901wib.39.1398723008535;  Mon, 28 Apr 2014 15:10:08 -0700 (PDT)
Received: by 10.194.54.162 with HTTP; Mon, 28 Apr 2014 15:10:08 -0700 (PDT)
X-Originating-IP: [98.244.98.35]
In-Reply-To: <82d65ea8e469437cb74d96afd81be11c@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <CAHw9_iKh-M46-HYsHKY2urP70QWtoUOZT3YE6naa_GB0k453GQ@mail.gmail.com> <82d65ea8e469437cb74d96afd81be11c@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Date: Mon, 28 Apr 2014 18:10:08 -0400
Message-ID: <CAHw9_i+RO7ZveO5y1pJeYTzyCq3AhbE-yj0m5UBLp83E0FHivQ@mail.gmail.com>
From: Warren Kumari <warren@kumari.net>
To: Trevor Freeman <trevorf@exchange.microsoft.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/HfK0T4H8cDBbnf3zbf56tIzHKIw
Cc: "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 22:10:21 -0000

On Mon, Apr 28, 2014 at 4:46 PM, Trevor Freeman
<trevorf@exchange.microsoft.com> wrote:
> Hi Warren,
>
> Granted DNNSEC does not by itself provide encryption but that is like say=
ing X.509 does not do encryption, all it does is sign keys.  Generally ther=
e are two ways DNNSEC could be useful. One way, as you point out is to auth=
enticate encryption keys. The other way is to detect attempts to subvert DN=
S name resolution which may induce me to disclose information to someone. W=
e cannot assume all pervasive monitoring is totally passive.

OK, fully agree.

I just (re)read my email to you and realized I sounded like a jackass
-- that was not my intent[0].

W
[0]: When I am *intending* to sound like an ass, y'all will know :-P

>
> Trevor
>
> -----Original Message-----
> From: Warren Kumari [mailto:warren@kumari.net]
> Sent: Monday, April 28, 2014 1:20 PM
> To: Trevor Freeman
> Cc: perpass@ietf.org
> Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
>
> On Mon, Apr 28, 2014 at 2:38 PM, Trevor Freeman <trevorf@exchange.microso=
ft.com> wrote:
>> We have a range of technologies in the toolkit to address issues
>> identified by perpass.
>>
>>
>>
>> One of the candidate technologies is DNSSEC. At a technology level it
>> has much to commend it.
>>
>>
>
> For which aspects of perpass?  DNSSEC provides no encryption, so the fact=
 that I'm browsing to something on www.nakedfurries.com is visible to all..=
.
>
> Don't get me wrong -- I'm a big DNSSEC (and DANE :-)) proponent, but folk=
 often seem to miss the fact that DNSSEC doesn't do what the name implies..=
.
>
> W
>
>
>
>
>>
>> The vast majority of critical TLDs are signed, so another good point
>> in its favor.
>>
>>
>>
>> However when you look at the next tier down, the statistics point to a
>> problem.
>>
>>
>>
>> According to the Verisign labs scoreboard, 340K+ domains in the .com
>> namespace are secured by DNSSEC
>>
>> http://scoreboard.verisignlabs.com/
>>
>>
>>
>> If you express that number as % that is about 0.4% and the growth
>> trend is about 0.1% per year
>>
>> http://scoreboard.verisignlabs.com/percent-trace.png
>>
>>
>>
>> The trend seems about 2 orders of magnitude below where we need to be
>> for DNSSEC to be viable in a realistic timescale.
>>
>>
>>
>> Am I misinterpreting the data? If not, then do we have consensus on
>> what is blocking deployment?
>>
>>
>>
>> Trevor
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> _______________________________________________
>> perpass mailing list
>> perpass@ietf.org
>> https://www.ietf.org/mailman/listinfo/perpass
>>


From nobody Tue Apr 29 05:39:17 2014
Return-Path: <wilton@isoc.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F02111A08BB for <perpass@ietfa.amsl.com>; Tue, 29 Apr 2014 05:39:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URI_NOVOWEL=0.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jfSkQSoWnNQM for <perpass@ietfa.amsl.com>; Tue, 29 Apr 2014 05:39:11 -0700 (PDT)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2lp0203.outbound.protection.outlook.com [207.46.163.203]) by ietfa.amsl.com (Postfix) with ESMTP id B44291A0756 for <perpass@ietf.org>; Tue, 29 Apr 2014 05:39:10 -0700 (PDT)
Received: from BN1PR06MB119.namprd06.prod.outlook.com (10.255.204.25) by BN1PR06MB119.namprd06.prod.outlook.com (10.255.204.25) with Microsoft SMTP Server (TLS) id 15.0.929.12; Tue, 29 Apr 2014 12:39:07 +0000
Received: from BN1PR06MB119.namprd06.prod.outlook.com ([169.254.14.239]) by BN1PR06MB119.namprd06.prod.outlook.com ([169.254.14.239]) with mapi id 15.00.0929.001; Tue, 29 Apr 2014 12:39:07 +0000
From: Robin Wilton <wilton@isoc.org>
To: Douglas Otis <doug.mtview@gmail.com>
Thread-Topic: [perpass] Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VAADBzsAAAKcUYAAAIpvAAABPYuAAB5mIQA=
Date: Tue, 29 Apr 2014 12:39:06 +0000
Message-ID: <EF78D305-5AD9-4FA8-8FF6-081365E6CA0D@isoc.org>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <1398715312.17858.535.camel@tochox.rolamasao.org> <68855aa3650248608cac2a6377f7e48e@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <9173e62849894476ab29b6c1e49f268f@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <5E9948EB-9896-4057-B5D4-50343EFEA39F@gmail.com>
In-Reply-To: <5E9948EB-9896-4057-B5D4-50343EFEA39F@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [94.174.34.240]
x-forefront-prvs: 0196A226D1
x-forefront-antispam-report: SFV:NSPM; SFS:(10019001)(428001)(13464003)(51704005)(199002)(189002)(377424004)(377454003)(24454002)(86362001)(16601075003)(99396002)(83322001)(19580395003)(19580405001)(80976001)(99936001)(50986999)(15975445006)(82746002)(76176999)(2656002)(54356999)(83716003)(87936001)(101416001)(92726001)(99286001)(92566001)(83072002)(85852003)(36756003)(81542001)(81342001)(46102001)(4396001)(77982001)(76482001)(33656001)(15202345003)(20776003)(31966008)(74662001)(74502001)(16236675002)(66066001)(80022001)(79102001)(100906001); DIR:OUT; SFP:1102; SCL:1; SRVR:BN1PR06MB119; H:BN1PR06MB119.namprd06.prod.outlook.com; FPR:ECBCF1C5.A2F68D20.B2F77FBF.4EE8F341.205E1; MLV:sfv; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
received-spf: None (: isoc.org does not designate permitted sender hosts)
Content-Type: multipart/signed; boundary="Apple-Mail=_A93B7821-FF88-48E4-BD9D-51A26A57B134"; protocol="application/pgp-signature"; micalg=pgp-sha1
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/pif_kkO4Fd8vVxzkYhgorCVwQks
Cc: =?iso-8859-1?Q?Noel_David_Torres_Ta=F1o?= <envite@rolamasao.org>, Trevor Freeman <trevorf@exchange.microsoft.com>, "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Apr 2014 12:39:15 -0000

--Apple-Mail=_A93B7821-FF88-48E4-BD9D-51A26A57B134
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_BDEAF99A-44D8-435A-A186-66DA2A3401AF"


--Apple-Mail=_BDEAF99A-44D8-435A-A186-66DA2A3401AF
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1



On 28 Apr 2014, at 23:07, Douglas Otis wrote:

>=20
>=20
> On Apr 28, 2014, at 2:32 PM, Trevor Freeman =
<trevorf@exchange.microsoft.com> wrote:
>=20
>> I spoke to soon. While the US government domains  is signed, the =
actual web site is not in many cases.
>> For example:
>> www.dhs.gov is a cname entry www.dhs.gov.edgekey.net which is =
unsigned.
>> This is in turn a CNAME to another unsigned domain
>> =20
>> www.dhs.gov.edgekey.net is a CNAME to e6485.dscb.akamaiedge.net
>=20
> Dear Trevor,
>=20
> Yes, there are many such CNAME wildcards in use.  A poor practice from =
many perspectives. =20
>=20
> Comcast has been helpful in vetting DNSSEC use. See =
http://dns.comcast.net.  =
http://tools.ietf.org/html/draft-start-tls-over-dns-00 solves many =
deployment and privacy issues.  DNSSEC should be considered a much =
needed work in progress.
>=20
> Regards,
> Douglas Otis

PKI already suffers from the fact that its trust anchors do not align =
well (or, usually, at all) with the trust factors that underpin =
applications/services. Cloud architectures seem to me to exacerbate that =
state of affairs, because they often introduce a further level of =
abstraction in the certificate structure. I've seen this in two forms, =
each of which bears similarities to the akamai example Trevor cited =
above:

1 - you visit "nakedfurries.com" (sorry, Warren ;^)  ) but because their =
website is hosted, you see certificates for "cloudstorm.net" instead or =
as well, which doesn't contribute anything meaningful to the user's =
assessment of trust;

2 - the cloud service provider adds seemingly random qualifiers to the =
certificate label ( e.g. fjdo7pspddlfhe544gr6g.servicename.com). Again, =
this doesn't add to the user's trust assessment, and can look =
suspiciously as though the cert label is being used as the vehicle for a =
unique tracking ID.

Yrs.,
Robin

>=20
> =20
>> From: perpass [mailto:perpass-bounces@ietf.org] On Behalf Of Trevor =
Freeman
>> Sent: Monday, April 28, 2014 2:17 PM
>> To: Noel David Torres Ta=F1o; perpass@ietf.org
>> Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
>> =20
>> Hi Noel,
>> =20
>> If DNNSEC is used in corporations, that may be an interesting data =
point but perpass is specify looking at the interne so it does not help =
much.
>> =20
>> I understand they could be some benefit to adding some other filter =
to the data but the number to try and try to add a better quality =
metric. But absent that, the number is what is it. Happy to have the =
discussion on how we would consider what to filter on and maybe Verisign =
could provide more attributes with the data for use to mine the =
information. =20
>> =20
>> I did some ad-hoc research and amongst the prominent internet =
services or financial institutions, the seems little evidence of DNSSEC. =
 The only bright spot seemed to be government web sites, though here the =
deployment was still inconsistent in that government agencies have many =
web sites not part of the base domain and these were often not signed.
>> =20
>> Trevor
>> =20
>> -----Original Message-----
>> From: perpass [mailto:perpass-bounces@ietf.org] On Behalf Of Noel =
David Torres Ta=F1o
>> Sent: Monday, April 28, 2014 1:02 PM
>> To: perpass@ietf.org
>> Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
>> =20
>> El lun, 28-04-2014 a las 18:38 +0000, Trevor Freeman escribi=F3:
>> > We have a range of technologies in the toolkit to address issues
>> > identified by perpass.
>> >
>> >=20
>> >
>> > One of the candidate technologies is DNSSEC. At a technology level =
it
>> > has much to commend it.
>> >
>> >=20
>> >
>> > The vast majority of critical TLDs are signed, so another good =
point
>> > in its favor.
>> >
>> >=20
>> >
>> > However when you look at the next tier down, the statistics point =
to a
>> > problem.
>> >
>> >=20
>> >
>> > According to the Verisign labs scoreboard, 340K+ domains in the =
.com
>> > namespace are secured by DNSSEC
>> >
>> > http://scoreboard.verisignlabs.com/
>> >
>> >=20
>> >
>> > If you express that number as % that is about 0.4% and the growth
>> > trend is about 0.1% per year
>> >
>> > http://scoreboard.verisignlabs.com/percent-trace.png
>> >
>> >=20
>> >
>> > The trend seems about 2 orders of magnitude below where we need to =
be
>> > for DNSSEC to be viable in a realistic timescale.
>> >
>> >=20
>> >
>> > Am I misinterpreting the data? If not, then do we have consensus on
>> > what is blocking deployment?
>> >
>> >=20
>> >
>> > Trevor
>> >
>> >=20
>> >
>> Which are the numbers for .org ?
>> =20
>> This one should have a little percentage of garbage, parked domains, =
etc. Moreover, it is kess used by corporations with large IT departments =
and more used by small organizations like Libre Software projects.
>> =20
>> And it is very important to trust the software you download.
>> =20
>> Regards
>> =20
>> Noel
>> er Envite
>> =20
>> _______________________________________________
>> perpass mailing list
>> perpass@ietf.org
>> https://www.ietf.org/mailman/listinfo/perpass
>=20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass


--Apple-Mail=_BDEAF99A-44D8-435A-A186-66DA2A3401AF
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><br>
<br><div><div>On 28 Apr 2014, at 23:07, Douglas Otis wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><meta =
http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1"><div style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;"><div><br></div><div><br><div><div>On Apr 28, 2014, =
at 2:32 PM, Trevor Freeman &lt;<a =
href=3D"mailto:trevorf@exchange.microsoft.com">trevorf@exchange.microsoft.=
com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"font-family: =
Helvetica; font-size: 14px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><span style=3D"color: =
rgb(31, 73, 125);">I spoke to soon. While the US government domains =
&nbsp;is signed, the actual web site is not in many =
cases.<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><span style=3D"color: =
rgb(31, 73, 125);">For example:<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><span style=3D"color: rgb(31, 73, 125);"><a =
href=3D"http://www.dhs.gov/" style=3D"color: rgb(149, 79, 114); =
text-decoration: underline;">www.dhs.gov</a><span =
class=3D"Apple-converted-space">&nbsp;</span>is a cname entry<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://www.dhs.gov.edgekey.net/" style=3D"color: rgb(149, 79, =
114); text-decoration: underline;">www.dhs.gov.edgekey.net</a><span =
class=3D"Apple-converted-space">&nbsp;</span>which is =
unsigned.<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><span style=3D"color: =
rgb(31, 73, 125);">This is in turn a CNAME to another unsigned =
domain<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><span style=3D"color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;"><span =
style=3D"color: rgb(31, 73, 125);"><a =
href=3D"http://www.dhs.gov.edgekey.net/" style=3D"color: rgb(149, 79, =
114); text-decoration: underline;">www.dhs.gov.edgekey.net</a><span =
class=3D"Apple-converted-space">&nbsp;</span>is a CNAME to<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://e6485.dscb.akamaiedge.net/" style=3D"color: rgb(149, 79, =
114); text-decoration: =
underline;">e6485.dscb.akamaiedge.net</a></span></div></div></div></blockq=
uote><div><br></div><div>Dear Trevor,</div><div><br></div><div>Yes, =
there are many such CNAME wildcards in use. &nbsp;A poor practice from =
many perspectives. &nbsp;</div><div><br></div><div>Comcast has been =
helpful in vetting DNSSEC use. See&nbsp;<a =
href=3D"http://dns.comcast.net/">http://dns.comcast.net</a>. &nbsp;<a =
href=3D"http://tools.ietf.org/html/draft-start-tls-over-dns-00">http://too=
ls.ietf.org/html/draft-start-tls-over-dns-00</a>&nbsp;solves many =
deployment and privacy issues. &nbsp;DNSSEC should be considered a much =
needed work in =
progress.</div><div><br></div><div>Regards,</div><div>Douglas =
Otis</div></div></div></div></blockquote><div><br></div><div>PKI already =
suffers from the fact that its trust anchors do not align well (or, =
usually, at all) with the trust factors that underpin =
applications/services. Cloud architectures seem to me to exacerbate that =
state of affairs, because they often introduce a further level of =
abstraction in the certificate structure. I've seen this in two forms, =
each of which bears similarities to the akamai example Trevor cited =
above:</div><div><br></div><div>1 - you visit "<a =
href=3D"http://nakedfurries.com">nakedfurries.com</a>" (sorry, Warren =
;^) &nbsp;) but because their website is hosted, you see certificates =
for "<a href=3D"http://cloudstorm.net">cloudstorm.net</a>" instead or as =
well, which doesn't contribute anything meaningful to the user's =
assessment of trust;</div><div><br></div><div>2 - the cloud service =
provider adds seemingly random qualifiers to the certificate label ( =
e.g. <a =
href=3D"http://fjdo7pspddlfhe544gr6g.servicename.com">fjdo7pspddlfhe544gr6=
g.servicename.com</a>). Again, this doesn't add to the user's trust =
assessment, and can look suspiciously as though the cert label is being =
used as the vehicle for a unique tracking =
ID.</div><div><br></div>Yrs.,</div><div>Robin</div><div><br><blockquote =
type=3D"cite"><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: =
space; -webkit-line-break: =
after-white-space;"><div><div><div><br></div><div>&nbsp;</div><blockquote =
type=3D"cite"><div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" =
style=3D"font-family: Helvetica; font-size: 14px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;"><span style=3D"color: =
rgb(31, 73, 125);"><o:p></o:p></span></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(225, 225, =
225); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><b>From:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>perpass [<a =
href=3D"mailto:perpass-bounces@ietf.org" style=3D"color: rgb(149, 79, =
114); text-decoration: =
underline;">mailto:perpass-bounces@ietf.org</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"Apple-converted-space">&nbsp;</span></b>Trevor =
Freeman<br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Monday, April 28, 2014 2:17 =
PM<br><b>To:</b><span class=3D"Apple-converted-space">&nbsp;</span>Noel =
David Torres Ta=F1o;<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:perpass@ietf.org" style=3D"color: rgb(149, 79, 114); =
text-decoration: =
underline;">perpass@ietf.org</a><br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [perpass] Is DNSDEC a =
viable technology for perpass?<o:p></o:p></div></div></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">Hi =
Noel,<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">If DNNSEC is used in corporations, that may be an =
interesting data point but perpass is specify looking at the interne so =
it does not help much.<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">I =
understand they could be some benefit to adding some other filter to the =
data but the number to try and try to add a better quality metric. But =
absent that, the number is what is it. Happy to have the discussion on =
how we would consider what to filter on and maybe Verisign could provide =
more attributes with the data for use to mine the information. =
&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">I did some =
ad-hoc research and amongst the prominent internet services or financial =
institutions, the seems little evidence of DNSSEC. &nbsp;The only bright =
spot seemed to be government web sites, though here the deployment was =
still inconsistent in that government agencies have many web sites not =
part of the base domain and these were often not =
signed.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Trevor<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">-----Original Message-----<br>From: perpass [<a =
href=3D"mailto:perpass-bounces@ietf.org" style=3D"color: rgb(149, 79, =
114); text-decoration: underline;">mailto:perpass-bounces@ietf.org</a>] =
On Behalf Of Noel David Torres Ta=F1o<br>Sent: Monday, April 28, 2014 =
1:02 PM<br>To:<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:perpass@ietf.org" style=3D"color: rgb(149, 79, 114); =
text-decoration: underline;">perpass@ietf.org</a><br>Subject: Re: =
[perpass] Is DNSDEC a viable technology for =
perpass?<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">El lun, =
28-04-2014 a las 18:38 +0000, Trevor Freeman =
escribi=F3:<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">&gt; We have a range =
of technologies in the toolkit to address issues<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; identified by perpass.<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; One =
of the candidate technologies is DNSSEC. At a technology level =
it<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; has much to commend =
it.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt;<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; The =
vast majority of critical TLDs are signed, so another good =
point<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; in its =
favor.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
However when you look at the next tier down, the statistics point to =
a<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; =
problem.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
According to the Verisign labs scoreboard, 340K+ domains in the =
.com<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; namespace are secured by =
DNSSEC<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://scoreboard.verisignlabs.com/" style=3D"color: rgb(149, =
79, 114); text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">http://scoreboard.verisignlabs.com/</span></a><o:p></o:p></div><div=
 style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; If =
you express that number as % that is about 0.4% and the =
growth<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;">&gt; trend is about =
0.1% per year<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://scoreboard.verisignlabs.com/percent-trace.png" =
style=3D"color: rgb(149, 79, 114); text-decoration: underline;"><span =
style=3D"color: windowtext; text-decoration: =
none;">http://scoreboard.verisignlabs.com/percent-trace.png</span></a><o:p=
></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt;<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; The =
trend seems about 2 orders of magnitude below where we need to =
be<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; for DNSSEC to be viable in =
a realistic timescale.<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; Am I =
misinterpreting the data? If not, then do we have consensus =
on<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; what is blocking =
deployment?<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
Trevor<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">Which are =
the numbers for .org ?<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">This one =
should have a little percentage of garbage, parked domains, etc. =
Moreover, it is kess used by corporations with large IT departments and =
more used by small organizations like Libre Software =
projects.<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">And it is =
very important to trust the software you download.<o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Regards<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, =
sans-serif;">Noel<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;">er =
Envite<o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p>&nbsp;</o:p></div></div>________________________________=
_______________<br>perpass mailing list<br><a =
href=3D"mailto:perpass@ietf.org" style=3D"color: rgb(149, 79, 114); =
text-decoration: underline;">perpass@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/perpass" style=3D"color: =
rgb(149, 79, 114); text-decoration: =
underline;">https://www.ietf.org/mailman/listinfo/perpass</a></div></block=
quote></div><br></div></div>______________________________________________=
_<br>perpass mailing list<br><a =
href=3D"mailto:perpass@ietf.org">perpass@ietf.org</a><br>https://www.ietf.=
org/mailman/listinfo/perpass<br></blockquote></div><br></body></html>=

--Apple-Mail=_BDEAF99A-44D8-435A-A186-66DA2A3401AF--

--Apple-Mail=_A93B7821-FF88-48E4-BD9D-51A26A57B134
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAlNfnSoACgkQx1kEWLxmyT0nuQCghrEVEatseLXM3WqpQ0GV9x0N
BzsAoLpOTPoA1WYcuoXP5FnCJVWTKSdA
=FDes
-----END PGP SIGNATURE-----

--Apple-Mail=_A93B7821-FF88-48E4-BD9D-51A26A57B134--


From nobody Tue Apr 29 05:59:17 2014
Return-Path: <scott.rose@nist.gov>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA2051A08DA for <perpass@ietfa.amsl.com>; Tue, 29 Apr 2014 05:59:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZQ0B7dEy52Lo for <perpass@ietfa.amsl.com>; Tue, 29 Apr 2014 05:59:11 -0700 (PDT)
Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2lp0238.outbound.protection.outlook.com [207.46.163.238]) by ietfa.amsl.com (Postfix) with ESMTP id A87161A075D for <perpass@ietf.org>; Tue, 29 Apr 2014 05:59:11 -0700 (PDT)
Received: from BN1PR09MB057.namprd09.prod.outlook.com (10.255.201.143) by BN1PR09MB059.namprd09.prod.outlook.com (10.255.201.153) with Microsoft SMTP Server (TLS) id 15.0.929.12; Tue, 29 Apr 2014 12:59:09 +0000
Received: from BN1PR09MB057.namprd09.prod.outlook.com ([169.254.13.20]) by BN1PR09MB057.namprd09.prod.outlook.com ([169.254.13.20]) with mapi id 15.00.0929.001; Tue, 29 Apr 2014 12:59:09 +0000
From: "Rose, Scott" <scott.rose@nist.gov>
To: Dan York <york@isoc.org>
Thread-Topic: [perpass] Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VAADBzsAAAKcUYAAAIpvAAAAopKAAB+954A=
Date: Tue, 29 Apr 2014 12:59:08 +0000
Message-ID: <74E729A7-B72B-47D0-B43E-F52E83259B25@nist.gov>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <1398715312.17858.535.camel@tochox.rolamasao.org> <68855aa3650248608cac2a6377f7e48e@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <9173e62849894476ab29b6c1e49f268f@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <AFE2DF81-A297-4B92-9F2B-A9D456F8A49C@isoc.org>
In-Reply-To: <AFE2DF81-A297-4B92-9F2B-A9D456F8A49C@isoc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [129.6.140.6]
x-forefront-prvs: 0196A226D1
x-forefront-antispam-report: SFV:NSPM; SFS:(10009001)(6009001)(428001)(199002)(189002)(377454003)(51704005)(24454002)(99286001)(99396002)(83322001)(15975445006)(19580395003)(19580405001)(80976001)(87936001)(2656002)(15395725003)(81542001)(81342001)(82746002)(83716003)(76482001)(4396001)(80022001)(66066001)(20776003)(46102001)(36756003)(77982001)(76176999)(92726001)(15202345003)(92566001)(85852003)(101416001)(15974865002)(86362001)(83072002)(74502001)(31966008)(54356999)(74662001)(50986999)(33656001)(79102001)(100906001); DIR:OUT; SFP:1101; SCL:1; SRVR:BN1PR09MB059; H:BN1PR09MB057.namprd09.prod.outlook.com; FPR:B8064187.AF3457E0.F8CB9F74.804029CD.202F0; MLV:sfv; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
received-spf: None (: nist.gov does not designate permitted sender hosts)
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <8E3E403CC8038E48BC8A362B8DB6EB07@namprd09.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/A-dNMyEyXGTYFyILsC0ONcNRVkM
Cc: =?iso-8859-1?Q?Noel_David_Torres_Ta=F1o?= <envite@rolamasao.org>, Trevor Freeman <trevorf@exchange.microsoft.com>, "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Apr 2014 12:59:14 -0000

On Apr 28, 2014, at 5:50 PM, Dan York <york@isoc.org> wrote:

> Trevor,
>=20
> On Apr 28, 2014, at 5:32 PM, Trevor Freeman <trevorf@exchange.microsoft.c=
om>
>  wrote:
>=20
>> I spoke to soon. While the US government domains  is signed, the actual =
web site is not in many cases.
>> For example:
>> www.dhs.gov is a cname entry www.dhs.gov.edgekey.net which is unsigned.
>> This is in turn a CNAME to another unsigned domain
>> =20
>> www.dhs.gov.edgekey.net is a CNAME to e6485.dscb.akamaiedge.net
>=20
> Yes, support of DNSSEC by content distribution networks (CDNs) remains on=
e of the stumbling blocks to getting full DNSSEC support out there for web =
sites.  Some CDNs *do* support DNSSEC, but not for all customers, and other=
 simply don't.  We definitely need to see more CDN customers *asking* their=
 CDN providers for DNSSEC-signing.
>=20

(off topic really)

CDN's are the issue here, but another thing seen in DNSSEC deployment in .g=
ov is the problem seen in mandated deployments of other tech in .gov (like =
IPv6 :).  Admins only do the minimum of what will be checked.  Then on to t=
he next fire.  So if the auditors only know your 2nd level domains, some zo=
nes skip signing their lower level delegations.  Or if it is a CNAME to a n=
on-.gov, the target zone isn't signed since it isn't in .gov and won't coun=
t against you in the audit.=20

Sadly doing what's best is secondary to doing what the audit covers. =20

Scott



> Dan
>=20
> --
> Dan York
> Senior Content Strategist, Internet Society
> york@isoc.org   +1-802-735-1624
> Jabber: york@jabber.isoc.org=20
> Skype: danyork   http://twitter.com/danyork
>=20
> http://www.internetsociety.org/deploy360/=20
>=20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Scott Rose
NIST
scott.rose@nist.gov
+1 301-975-8439
Google Voice: +1 571-249-3671
http://www.dnsops.gov/
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D


From nobody Tue Apr 29 15:55:26 2014
Return-Path: <trevorf@exchange.microsoft.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E3EF41A09BE for <perpass@ietfa.amsl.com>; Tue, 29 Apr 2014 15:55:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YrQxu2rP44aM for <perpass@ietfa.amsl.com>; Tue, 29 Apr 2014 15:55:11 -0700 (PDT)
Received: from na01-sn2-obe.outbound.o365filtering.com (mail-sn2on0653.outbound.o365filtering.com [IPv6:2a01:111:f400:fc04::653]) by ietfa.amsl.com (Postfix) with ESMTP id 2744F1A0740 for <perpass@ietf.org>; Tue, 29 Apr 2014 15:55:10 -0700 (PDT)
Received: from BL2SR01CA103.namsdf01.sdf.exchangelabs.com (10.255.109.148) by BL2SR01MB605.namsdf01.sdf.exchangelabs.com (10.255.109.167) with Microsoft SMTP Server (TLS) id 15.0.944.2; Tue, 29 Apr 2014 22:54:46 +0000
Received: from BY1FFOFD001.ffo.gbl (2a01:111:f400:7c00::88) by BL2SR01CA103.outlook.office365.com (2a01:111:e400:c01::20) with Microsoft SMTP Server (TLS) id 15.0.944.2 via Frontend Transport; Tue, 29 Apr 2014 22:54:46 +0000
Received: from hybrid.exchange.microsoft.com (131.107.159.99) by BY1FFOFD001.mail.o365filtering.com (10.1.16.83) with Microsoft SMTP Server (TLS) id 15.0.939.3 via Frontend Transport; Tue, 29 Apr 2014 22:54:46 +0000
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com (157.54.109.44) by DFM-TK5EDG15-01.exchange.corp.microsoft.com (157.54.27.96) with Microsoft SMTP Server (TLS) id 15.0.913.17; Tue, 29 Apr 2014 15:54:39 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com (157.54.109.44) by DFM-TK5MBX15-05.exchange.corp.microsoft.com (157.54.109.44) with Microsoft SMTP Server (TLS) id 15.0.913.17; Tue, 29 Apr 2014 15:54:31 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com ([157.54.109.44]) by DFM-TK5MBX15-05.exchange.corp.microsoft.com ([169.254.5.13]) with mapi id 15.00.0913.011; Tue, 29 Apr 2014 15:54:31 -0700
From: Trevor Freeman <trevorf@exchange.microsoft.com>
To: Dan York <york@isoc.org>
Thread-Topic: [perpass] Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VAAGswyAADBxIWA=
Date: Tue, 29 Apr 2014 22:54:31 +0000
Message-ID: <565e30ccbded447185c88246d6468097@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <D10D2737-322D-40CC-8C8F-B368A4A8CD24@isoc.org>
In-Reply-To: <D10D2737-322D-40CC-8C8F-B368A4A8CD24@isoc.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.13]
Content-Type: multipart/alternative; boundary="_000_565e30ccbded447185c88246d6468097DFMTK5MBX1505exchangeco_"
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:131.107.159.99; CTRY:US; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(10009001)(377454003)(199002)(189002)(24454002)(85306002)(87266001)(93516002)(80022001)(2656002)(87936001)(71186001)(81342001)(66066001)(33646001)(83072002)(85852003)(77982001)(79102001)(90146001)(47976003)(47736002)(69226001)(51856002)(56776002)(63696004)(92566001)(93136001)(20776003)(98676001)(54316003)(54356002)(47446003)(50986002)(94316002)(49866002)(59766002)(65816002)(56816006)(99396002)(53806002)(512954002)(15395725004)(46102001)(74706001)(16236675003)(97186001)(97736001)(97336001)(15202345003)(95666003)(2009001)(74502001)(81542001)(74662001)(76482001)(31966008)(74876001)(15975445006)(74366001)(77096001)(84326002)(84676001)(81816001)(76796001)(76786001)(19300405004)(95416001)(94946001)(4396001)(6806004)(83322001)(44976005)(81686001)(80976001)(19580395003)(19580405001)(24736002); DIR:OUT; SFP:1101; SCL:1; SRVR:BL2SR01MB605; H:hybrid.exchange.microsoft.com;  FPR:; PTR:InfoDomainNonexistent; MX:1; LANG:en; 
X-Exchange-Antispam-Report-Test: BL:0; ACTION:Default; RISK:Low; SCL:0; SPMLVL:NotSpam; PCL:0; RULEID:
X-Forefront-PRVS: 0196A226D1
X-OriginatorOrg: exchange.microsoft.com
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/iWcKqFNS1rG1Cn7GjkH-trb25_8
Cc: "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Apr 2014 22:55:20 -0000

--_000_565e30ccbded447185c88246d6468097DFMTK5MBX1505exchangeco_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Dan,

Yes I want to consider the DNS authentication of encryption keys as one sce=
nario which has a dependency on DNSSEC so we quickly get full circle.

There have been a number of people who have offered opinions in this area, =
and none so far have pointed to a technology issue as holding up deployment=
.  Far from it, there seems to be advances in many area. This all seems goo=
dness.

It seems a little disturbing that it took a stick to get some level of DNSS=
EC deployment in the .gov domain. That model is hard to replicate elsewhere=
 so I don't see it as a general solution to deployment. I much prefer carro=
ts to drive dependents.  You are correct in that the Dutch government was o=
ne of the two governments I could find who's public web site was actually D=
NSSEC secured, despite many of the parent domain being signed. The only oth=
er was Estonia.

As you pointed out, there are a large number of content distribution networ=
ks hosting sites on behalf of organizations with signed domains, who have n=
ot signed their own domain thereby breaking the chain of trust to the web s=
ite dns record. We seem to be missing the carrot to get them to sign. What =
is the value proposition that would convince them to sign their domain?

I note that there is a session at the forthcoming ICANN DNSSEC workshop on =
DNSSEC and the enterprise. What about small and mediums sized organizations=
 who have typical  lower security skill and smaller budgets? They are mostl=
y migrating to cloud services of some form.  Aside from inviting speakers, =
has the been any research done with organizations on why they are not adopt=
ing DNSSEC?

It may also be fruitful to think about what are the next set of deployment =
goals in terms of what scenarios do we want to work. I would submit its tim=
e to move on from how many of the TLDS are signed onto tangible goals like =
what works. Do we want to look at a percentage of the email sent over the i=
nternet being DANE protected for example.

Trevor

From: Dan York [mailto:york@isoc.org]
Sent: Monday, April 28, 2014 2:47 PM
To: Trevor Freeman
Cc: perpass@ietf.org
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?

Trevor,

On Apr 28, 2014, at 2:38 PM, Trevor Freeman <trevorf@exchange.microsoft.com=
<mailto:trevorf@exchange.microsoft.com>>
 wrote:


We have a range of technologies in the toolkit to address issues identified=
 by perpass.

One of the candidate technologies is DNSSEC. At a technology level it has m=
uch to commend it.

Which of the perpass issues do you see DNSSEC helping with?  If I look at h=
ttp://tools.ietf.org/html/draft-trammell-perpass-ppa-01 or http://tools.iet=
f.org/html/draft-tschofenig-perpass-surveillance-01 or other documents that=
 have been circulated, they are almost all related to concerns around priva=
cy and more specifically confidentiality... which is not a focus of DNSSEC.=
  DNSSEC is focused on ensuring the *integrity* of the information carried =
in DNS queries, although when coupled with DANE for TLS certificates it can=
 help with confidentiality, too.

The trend seems about 2 orders of magnitude below where we need to be for D=
NSSEC to be viable in a realistic timescale.

Am I misinterpreting the data?

No, you're not misinterpreting the data for .COM.  Only a very small % of .=
com domains are signed.  The story is better in other TLDs such as .GOV, fo=
r instance, where 87% of all domains are DNSSEC-signed ( http://fedv6-deplo=
yment.antd.nist.gov/snap-all.html ).  Attaining this high level, of course,=
 took a mandate from the US government to all agencies.

Over in .NL, there are 1.7 million domains signed representing about 31% of=
 all .NL domains (see right sidebar of https://www.sidn.nl/ ).  We are trac=
king a number of other statistics sites that monitor the DNSSEC status of v=
arious TLDs at:
http://www.internetsociety.org/deploy360/dnssec/statistics/

You are correct, though, that overall the % of domains signed with DNSSEC i=
s low.


If not, then do we have consensus on what is blocking deployment?

I don't know that there is a "consensus"... and I could have a long convers=
ation on this topic...  but I know from conversations with a good number of=
 people within what I'll call the "DNSSEC community" over the past couple o=
f years that we have the fundamental bootstrapping issue with DNSSEC where =
we need both more signing of domains and more deployment of DNSSEC-validati=
ng DNS resolvers.  The challenge has been that people say "why should I bot=
her signing my domain when 'no one' is validating" and on the opposite side=
 ISPs and other network operators say "why should I enable DNSSEC validatio=
n in my DNS resolvers where there aren't a lot of domains signed".  About 2=
 years ago a colleague and I wrote a paper for the SATIN conference in the =
UK and while the situation *has* improved, many of the points are still val=
id:

http://www.internetsociety.org/deploy360/resources/whitepaper-challenges-an=
d-opportunities-in-deploying-dnssec/

The good news is that we've seen some good growth on the validation side, h=
elped largely by Google turning on full DNSSEC validation in their Public D=
NS servers and Comcast enabling DNSSEC validation in their large network in=
 North America.  Additionally, many ISPs in countries such as Sweden, the N=
etherlands, the Czech Republic and Brazil have turned on DNSSEC validation.=
   Geoff Huston, George Michaelson and the rest of the team at APNIC Labs h=
ave done a number of DNSSEC validation measurement projects and presented t=
hose at various conferences.   At RIPE67 last October, his set of slides ( =
https://ripe67.ripe.net/presentations/111-2013-10-15-dnssec.pdf ) was showi=
ng the May 2013 data where about 8.3% of all queries were being validated. =
 That's certainly a good start... and the validation % is much higher in so=
me countries.

We also now have DNSSEC validation easily configurable in most all the majo=
r DNS resolvers, including BIND, Unbound and Microsoft Windows Server 2012.=
  It was also recently added to dnsmasq, a DNS server widely used in many s=
maller environments.  So the conditions are now right to get more DNSSEC va=
lidation occurring - this was one of the roadblocks for some time.   We als=
o have the new getdns API ( http://www.vpnc.org/getdns-api/ ) that provides=
 an easier way for application developers to get to DNS info and to get DNS=
SEC records.

There are still some operational issues to sort out regarding deploying DNS=
SEC validation that have been documented by Wes Hardaker, Olafur Gudmundsso=
n and Suresh Krishnaswamy in a draft in the DNSOP working group:

http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-roadblock-avoidance

On the signing side, we know many of the deployment challenges and people a=
re working on them, although many of them are not anything that the IETF ca=
n do anything directly about. There are a few standardization issues that a=
re being worked through within the DNSOP working group, such as how a paren=
t zone is alerted when a key changes in a child zone.  There's a secure key=
 transfer mechanism working through EPPEXT.

As an example of one area outside of the IETF, one challenge historically h=
as been that many registrars have not provided any way to let you add DS or=
 DNSKEY records to your domain info, which would then be passed up to your =
TLD.  That is now changing because ICANN's 2013 Registrar Accreditation Agr=
eement (RAA) requires registrars to support the passing of DNSSEC records -=
 and to sell the newgTLDs, registrars have to sign the 2013 RAA.  So we're =
seeing more registrars offering at least some base level of DNSSEC support.

Beyond that, it would certainly be helpful if there were more automation in=
 the overall system to make it easier for people to just enable DNSSEC and =
have it "just work" - for example, it would be great to see more DNS hostin=
g providers offer DNSSEC-signing.  It would also be helpful to have more co=
ntent distribution networks (CDNs) supporting DNSSEC, as this is a barrier =
for getting many websites signed.

Perhaps a more fundamental factor "blocking" deployment is just that people=
 don't understand the value of DNSSEC and haven't felt the urgent need to d=
eploy it.  It's on "their list" of things to implement... but hasn't bubble=
d up enough in the priorities.  Many of us view DANE as a key driver here a=
s it provides a real use case for how DNSSEC can help add a layer of trust =
to your web security infrastructure.

I could go on... and probably what I should do is write an update to that S=
ATIN paper that provides a more current look at the remaining challenges...=
 but hopefully this provides a view into some of the state of deployment.  =
   I'm glad to expand on any points or be part of a larger discussion aroun=
d these issues.  I'm employed by the Internet Society on the Deploy360 prog=
ram where a large part of my work is focused on how we accelerate DNSSEC de=
ployment... so I'm here to help on these points.

Regards,
Dan

P.S. And if anyone is interested in being involved specifically with effort=
s around advancing DNSSEC deployment (both inside the IETF but more so outs=
ide in the larger industry), we have a separate mailing list set up at  htt=
ps://elists.isoc.org/mailman/listinfo/dnssec-coord  that is open to anyone =
to join.

--
Dan York
Senior Content Strategist, Internet Society
york@isoc.org<mailto:york@isoc.org>   +1-802-735-1624
Jabber: york@jabber.isoc.org<mailto:york@jabber.isoc.org>
Skype: danyork   http://twitter.com/danyork

http://www.internetsociety.org/deploy360/


--_000_565e30ccbded447185c88246d6468097DFMTK5MBX1505exchangeco_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<base href=3D"x-msg://995/"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hi Dan,<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Yes I want to consider th=
e DNS authentication of encryption keys as one scenario which has a depende=
ncy on DNSSEC so we quickly get full circle. &nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There have been a number =
of people who have offered opinions in this area, and none so far have poin=
ted to a technology issue as holding up deployment. &nbsp;Far
 from it, there seems to be advances in many area. This all seems goodness.=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">It seems a little disturb=
ing that it took a stick to get some level of DNSSEC deployment in the .gov=
 domain. That model is hard to replicate elsewhere so I
 don&#8217;t see it as a general solution to deployment. I much prefer carr=
ots to drive dependents. &nbsp;You are correct in that the Dutch government=
 was one of the two governments I could find who&#8217;s public web site wa=
s actually DNSSEC secured, despite many of the parent
 domain being signed. The only other was Estonia. <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">As you pointed out, there=
 are a large number of content distribution networks hosting sites on behal=
f of organizations with signed domains, who have not signed
 their own domain thereby breaking the chain of trust to the web site dns r=
ecord. We seem to be missing the carrot to get them to sign. What is the va=
lue proposition that would convince them to sign their domain?<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I note that there is a se=
ssion at the forthcoming ICANN DNSSEC workshop on DNSSEC and the enterprise=
. What about small and mediums sized organizations who have
 typical &nbsp;lower security skill and smaller budgets? They are mostly mi=
grating to cloud services of some form. &nbsp;Aside from inviting speakers,=
 has the been any research done with organizations on why they are not adop=
ting DNSSEC?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">It may also be fruitful t=
o think about what are the next set of deployment goals in terms of what sc=
enarios do we want to work. I would submit its time to move
 on from how many of the TLDS are signed onto tangible goals like what work=
s. Do we want to look at a percentage of the email sent over the internet b=
eing DANE protected for example.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Trevor<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-=
size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"> Dan Yo=
rk [mailto:york@isoc.org]
<br>
<b>Sent:</b> Monday, April 28, 2014 2:47 PM<br>
<b>To:</b> Trevor Freeman<br>
<b>Cc:</b> perpass@ietf.org<br>
<b>Subject:</b> Re: [perpass] Is DNSDEC a viable technology for perpass?<o:=
p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Trevor, <o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On Apr 28, 2014, at 2:38 PM, Trevor Freeman &lt;<a h=
ref=3D"mailto:trevorf@exchange.microsoft.com">trevorf@exchange.microsoft.co=
m</a>&gt;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">We have a range of technologies in the =
toolkit to address issues identified by perpass.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">One of the candidate technologies is DN=
SSEC. At a technology level it has much to commend it.<o:p></o:p></span></p=
>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal">Which of the perpass issues do you see DNSSEC helpin=
g with? &nbsp;If I look at&nbsp;<a href=3D"http://tools.ietf.org/html/draft=
-trammell-perpass-ppa-01">http://tools.ietf.org/html/draft-trammell-perpass=
-ppa-01</a>&nbsp;or&nbsp;<a href=3D"http://tools.ietf.org/html/draft-tschof=
enig-perpass-surveillance-01">http://tools.ietf.org/html/draft-tschofenig-p=
erpass-surveillance-01</a>&nbsp;or
 other documents that have been circulated, they are almost all related to =
concerns around privacy and more specifically confidentiality... which is n=
ot a focus of DNSSEC. &nbsp;DNSSEC is focused on ensuring the *integrity* o=
f the information carried in DNS queries,
 although when coupled with DANE for TLS certificates it can help with conf=
identiality, too.<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">The trend seems about 2 orders of magni=
tude below where we need to be for DNSSEC to be viable in a realistic times=
cale.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Am I misinterpreting the data?
<o:p></o:p></span></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">No, you're not misinterpreting the data for .COM. &n=
bsp;Only a very small % of .com domains are signed. &nbsp;The story is bett=
er in other TLDs such as .GOV, for instance, where 87% of all domains are D=
NSSEC-signed (&nbsp;<a href=3D"http://fedv6-deployment.antd.nist.gov/snap-a=
ll.html">http://fedv6-deployment.antd.nist.gov/snap-all.html</a>&nbsp;).
 &nbsp;Attaining this high level, of course, took a mandate from the US gov=
ernment to all agencies. &nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Over in .NL, there are 1.7 million domains signed re=
presenting about 31% of all .NL domains (see right sidebar of&nbsp;<a href=
=3D"https://www.sidn.nl/">https://www.sidn.nl/</a>&nbsp;). &nbsp;We are tra=
cking a number of other statistics sites that monitor
 the DNSSEC status of various TLDs at:<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"http://www.internetsociety.org/deploy360/=
dnssec/statistics/">http://www.internetsociety.org/deploy360/dnssec/statist=
ics/</a><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">You are correct, though, that overall the % of domai=
ns signed with DNSSEC is low.&nbsp;<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">If not, then do we have consensus on wh=
at is blocking deployment?<o:p></o:p></span></p>
</div>
</div>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">I don't know that there is a &quot;consensus&quot;..=
. and I could have a long conversation on this topic... &nbsp;but I know fr=
om conversations with a good number of people within what I'll call the &qu=
ot;DNSSEC community&quot; over the past couple of years that
 we have the fundamental bootstrapping issue with DNSSEC where we need both=
 more signing of domains and more deployment of DNSSEC-validating DNS resol=
vers. &nbsp;The challenge has been that people say &quot;why should I bothe=
r signing my domain when 'no one' is validating&quot;
 and on the opposite side ISPs and other network operators say &quot;why sh=
ould I enable DNSSEC validation in my DNS resolvers where there aren't a lo=
t of domains signed&quot;. &nbsp;About 2 years ago a colleague and I wrote =
a paper for the SATIN conference in the UK and
 while the situation *has* improved, many of the points are still valid:<o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"http://www.internetsociety.org/deploy360/=
resources/whitepaper-challenges-and-opportunities-in-deploying-dnssec/">htt=
p://www.internetsociety.org/deploy360/resources/whitepaper-challenges-and-o=
pportunities-in-deploying-dnssec/</a><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">The good news is that we've seen some good growth on=
 the validation side, helped largely by Google turning on full DNSSEC valid=
ation in their Public DNS servers and Comcast enabling DNSSEC validation in=
 their large network in North America.
 &nbsp;Additionally, many ISPs in countries such as Sweden, the Netherlands=
, the Czech Republic and Brazil have turned on DNSSEC validation. &nbsp; Ge=
off Huston, George Michaelson and the rest of the team at APNIC Labs have d=
one a number of DNSSEC validation measurement
 projects and presented those at various conferences. &nbsp; At RIPE67 last=
 October, his set of slides (&nbsp;<a href=3D"https://ripe67.ripe.net/prese=
ntations/111-2013-10-15-dnssec.pdf">https://ripe67.ripe.net/presentations/1=
11-2013-10-15-dnssec.pdf</a>&nbsp;) was showing the
 May 2013 data where about 8.3% of all queries were being validated. &nbsp;=
That's certainly a good start... and the validation % is much higher in som=
e countries.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">We also now have DNSSEC validation easily configurab=
le in most all the major DNS resolvers, including BIND, Unbound and Microso=
ft Windows Server 2012. &nbsp;It was also recently added to dnsmasq, a DNS =
server widely used in many smaller environments.
 &nbsp;So the conditions are now right to get more DNSSEC validation occurr=
ing - this was one of the roadblocks for some time. &nbsp; We also have the=
 new getdns API (&nbsp;<a href=3D"http://www.vpnc.org/getdns-api/">http://w=
ww.vpnc.org/getdns-api/</a>&nbsp;) that provides an easier
 way for application developers to get to DNS info and to get DNSSEC record=
s.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">There are still some operational issues to sort out =
regarding deploying DNSSEC validation that have been documented by Wes Hard=
aker, Olafur Gudmundsson and Suresh Krishnaswamy in a draft in the DNSOP wo=
rking group:<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"http://tools.ietf.org/html/draft-ietf-dns=
op-dnssec-roadblock-avoidance">http://tools.ietf.org/html/draft-ietf-dnsop-=
dnssec-roadblock-avoidance</a><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">On the signing side, we know many of the deployment =
challenges and people are working on them, although many of them are not an=
ything that the IETF can do anything directly about. There are a few standa=
rdization issues that are being worked
 through within the DNSOP working group, such as how a parent zone is alert=
ed when a key changes in a child zone. &nbsp;There's a secure key transfer =
mechanism working through EPPEXT.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">As an example of one area outside of the IETF, one c=
hallenge historically has been that many registrars have not provided any w=
ay to let you add DS or DNSKEY records to your domain info, which would the=
n be passed up to your TLD. &nbsp;That
 is now changing because ICANN's 2013 Registrar Accreditation Agreement (RA=
A) requires registrars to support the passing of DNSSEC records - and to se=
ll the newgTLDs, registrars have to sign the 2013 RAA. &nbsp;So we're seein=
g more registrars offering at least some
 base level of DNSSEC support.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Beyond that, it would certainly be helpful if there =
were more automation in the overall system to make it easier for people to =
just enable DNSSEC and have it &quot;just work&quot; - for example, it woul=
d be great to see more DNS hosting providers
 offer DNSSEC-signing. &nbsp;It would also be helpful to have more content =
distribution networks (CDNs) supporting DNSSEC, as this is a barrier for ge=
tting many websites signed.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Perhaps a more fundamental factor &quot;blocking&quo=
t; deployment is just that people don't understand the value of DNSSEC and =
haven't felt the urgent need to deploy it. &nbsp;It's on &quot;their list&q=
uot; of things to implement... but hasn't bubbled up enough
 in the priorities. &nbsp;Many of us view DANE as a key driver here as it p=
rovides a real use case for how DNSSEC can help add a layer of trust to you=
r web security infrastructure.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I could go on... and probably what I should do is wr=
ite an update to that SATIN paper that provides a more current look at the =
remaining challenges... but hopefully this provides a view into some of the=
 state of deployment. &nbsp; &nbsp; I'm glad
 to expand on any points or be part of a larger discussion around these iss=
ues. &nbsp;I'm employed by the Internet Society on the Deploy360 program wh=
ere a large part of my work is focused on how we accelerate DNSSEC deployme=
nt... so I'm here to help on these points.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Dan<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">P.S. And if anyone is interested in being involved s=
pecifically with efforts around advancing DNSSEC deployment (both inside th=
e IETF but more so outside in the larger industry), we have a separate mail=
ing list set up at &nbsp;<a href=3D"https://elists.isoc.org/mailman/listinf=
o/dnssec-coord">https://elists.isoc.org/mailman/listinfo/dnssec-coord</a>&n=
bsp;
 that is open to anyone to join.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"background:white"><span style=3D"font-size:=
10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">--<o:p></o:p=
></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"background:white"><span style=3D"font-size:=
10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">Dan York<o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"background:white"><span style=3D"font-size:=
10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">Senior Conte=
nt Strategist, Internet Society<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"background:white"><span style=3D"font-size:=
10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><a href=3D"m=
ailto:york@isoc.org">york@isoc.org</a> &nbsp; &#43;1-802-735-1624<o:p></o:p=
></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"background:white"><span style=3D"font-size:=
10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">Jabber:
<a href=3D"mailto:york@jabber.isoc.org">york@jabber.isoc.org</a>&nbsp;<o:p>=
</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"background:white"><span style=3D"font-size:=
10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">Skype: danyo=
rk &nbsp;
<a href=3D"http://twitter.com/danyork">http://twitter.com/danyork</a><o:p><=
/o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"background:white"><span style=3D"font-size:=
10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;<=
/o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"background:white"><span style=3D"font-size:=
10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><a href=3D"h=
ttp://www.internetsociety.org/deploy360/">http://www.internetsociety.org/de=
ploy360/</a>&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_565e30ccbded447185c88246d6468097DFMTK5MBX1505exchangeco_--


From nobody Tue Apr 29 16:03:20 2014
Return-Path: <bmanning@isi.edu>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77C981A0992 for <perpass@ietfa.amsl.com>; Tue, 29 Apr 2014 16:03:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.551
X-Spam-Level: 
X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QmXD8VFP_6hH for <perpass@ietfa.amsl.com>; Tue, 29 Apr 2014 16:03:16 -0700 (PDT)
Received: from darkstar.isi.edu (darkstar.isi.edu [128.9.128.127]) by ietfa.amsl.com (Postfix) with ESMTP id 33B0B1A0948 for <perpass@ietf.org>; Tue, 29 Apr 2014 16:03:16 -0700 (PDT)
Received: from [192.168.0.13] (cpe-23-241-118-60.socal.res.rr.com [23.241.118.60]) (authenticated bits=0) by darkstar.isi.edu (8.13.8/8.13.8) with ESMTP id s3TN2ooQ006683 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Tue, 29 Apr 2014 16:02:54 -0700 (PDT)
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
Content-Type: text/plain; charset=windows-1252
From: manning bill <bmanning@isi.edu>
In-Reply-To: <565e30ccbded447185c88246d6468097@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Date: Tue, 29 Apr 2014 16:02:50 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <2CA6BA9D-6445-4BC4-9207-BF9098045ADB@isi.edu>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <D10D2737-322D-40CC-8C8F-B368A4A8CD24@isoc.org> <565e30ccbded447185c88246d6468097@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
To: Trevor Freeman <trevorf@exchange.microsoft.com>
X-Mailer: Apple Mail (2.1874)
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: bmanning@isi.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/HkAAClvNdrkg6J0B1lHYsGU8GBA
Cc: "perpass@ietf.org" <perpass@ietf.org>, Dan York <york@isoc.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Apr 2014 23:03:18 -0000

Not going to speak for Dan, but the problems that were identified a =
decade ago still seem relevant since you bring them back up; e.g. the =
small/medium sized entity with
smaller resource pools to support enhanced crypto capabilities.   The =
answer then (and now) is -outsource-=85 but this path is fraught with =
peril if we truly want trusted systems.
Or we can just use the Baidu/Tata/Microsoft key escrow facilities=85. =
and we are back to square one!

Solving this problem requires folks to own/manage their personal digital =
identity.

/bill
Neca eos omnes.  Deus suos agnoscet.

On 29April2014Tuesday, at 15:54, Trevor Freeman =
<trevorf@exchange.microsoft.com> wrote:

> Hi Dan,
> =20
> Yes I want to consider the DNS authentication of encryption keys as =
one scenario which has a dependency on DNSSEC so we quickly get full =
circle. =20
> =20
> There have been a number of people who have offered opinions in this =
area, and none so far have pointed to a technology issue as holding up =
deployment.  Far from it, there seems to be advances in many area. This =
all seems goodness.
> =20
> It seems a little disturbing that it took a stick to get some level of =
DNSSEC deployment in the .gov domain. That model is hard to replicate =
elsewhere so I don=92t see it as a general solution to deployment. I =
much prefer carrots to drive dependents.  You are correct in that the =
Dutch government was one of the two governments I could find who=92s =
public web site was actually DNSSEC secured, despite many of the parent =
domain being signed. The only other was Estonia.
> =20
> As you pointed out, there are a large number of content distribution =
networks hosting sites on behalf of organizations with signed domains, =
who have not signed their own domain thereby breaking the chain of trust =
to the web site dns record. We seem to be missing the carrot to get them =
to sign. What is the value proposition that would convince them to sign =
their domain?
> =20
> I note that there is a session at the forthcoming ICANN DNSSEC =
workshop on DNSSEC and the enterprise. What about small and mediums =
sized organizations who have typical  lower security skill and smaller =
budgets? They are mostly migrating to cloud services of some form.  =
Aside from inviting speakers, has the been any research done with =
organizations on why they are not adopting DNSSEC?
> =20
> It may also be fruitful to think about what are the next set of =
deployment goals in terms of what scenarios do we want to work. I would =
submit its time to move on from how many of the TLDS are signed onto =
tangible goals like what works. Do we want to look at a percentage of =
the email sent over the internet being DANE protected for example.
> =20
> Trevor
> =20
> From: Dan York [mailto:york@isoc.org]=20
> Sent: Monday, April 28, 2014 2:47 PM
> To: Trevor Freeman
> Cc: perpass@ietf.org
> Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
> =20
> Trevor,
> =20
> On Apr 28, 2014, at 2:38 PM, Trevor Freeman =
<trevorf@exchange.microsoft.com>
>  wrote:
>=20
>=20
> We have a range of technologies in the toolkit to address issues =
identified by perpass.
> =20
> One of the candidate technologies is DNSSEC. At a technology level it =
has much to commend it.
> =20
> Which of the perpass issues do you see DNSSEC helping with?  If I look =
at http://tools.ietf.org/html/draft-trammell-perpass-ppa-01 or =
http://tools.ietf.org/html/draft-tschofenig-perpass-surveillance-01 or =
other documents that have been circulated, they are almost all related =
to concerns around privacy and more specifically confidentiality... =
which is not a focus of DNSSEC.  DNSSEC is focused on ensuring the =
*integrity* of the information carried in DNS queries, although when =
coupled with DANE for TLS certificates it can help with confidentiality, =
too.
> =20
> The trend seems about 2 orders of magnitude below where we need to be =
for DNSSEC to be viable in a realistic timescale.
> =20
> Am I misinterpreting the data?
> =20
> No, you're not misinterpreting the data for .COM.  Only a very small % =
of .com domains are signed.  The story is better in other TLDs such as =
.GOV, for instance, where 87% of all domains are DNSSEC-signed ( =
http://fedv6-deployment.antd.nist.gov/snap-all.html ).  Attaining this =
high level, of course, took a mandate from the US government to all =
agencies. =20
> =20
> Over in .NL, there are 1.7 million domains signed representing about =
31% of all .NL domains (see right sidebar of https://www.sidn.nl/ ).  We =
are tracking a number of other statistics sites that monitor the DNSSEC =
status of various TLDs at:
> http://www.internetsociety.org/deploy360/dnssec/statistics/
> =20
> You are correct, though, that overall the % of domains signed with =
DNSSEC is low.=20
>=20
>=20
> If not, then do we have consensus on what is blocking deployment?
> =20
> I don't know that there is a "consensus"... and I could have a long =
conversation on this topic...  but I know from conversations with a good =
number of people within what I'll call the "DNSSEC community" over the =
past couple of years that we have the fundamental bootstrapping issue =
with DNSSEC where we need both more signing of domains and more =
deployment of DNSSEC-validating DNS resolvers.  The challenge has been =
that people say "why should I bother signing my domain when 'no one' is =
validating" and on the opposite side ISPs and other network operators =
say "why should I enable DNSSEC validation in my DNS resolvers where =
there aren't a lot of domains signed".  About 2 years ago a colleague =
and I wrote a paper for the SATIN conference in the UK and while the =
situation *has* improved, many of the points are still valid:
> =20
> =
http://www.internetsociety.org/deploy360/resources/whitepaper-challenges-a=
nd-opportunities-in-deploying-dnssec/
> =20
> The good news is that we've seen some good growth on the validation =
side, helped largely by Google turning on full DNSSEC validation in =
their Public DNS servers and Comcast enabling DNSSEC validation in their =
large network in North America.  Additionally, many ISPs in countries =
such as Sweden, the Netherlands, the Czech Republic and Brazil have =
turned on DNSSEC validation.   Geoff Huston, George Michaelson and the =
rest of the team at APNIC Labs have done a number of DNSSEC validation =
measurement projects and presented those at various conferences.   At =
RIPE67 last October, his set of slides ( =
https://ripe67.ripe.net/presentations/111-2013-10-15-dnssec.pdf ) was =
showing the May 2013 data where about 8.3% of all queries were being =
validated.  That's certainly a good start... and the validation % is =
much higher in some countries.
> =20
> We also now have DNSSEC validation easily configurable in most all the =
major DNS resolvers, including BIND, Unbound and Microsoft Windows =
Server 2012.  It was also recently added to dnsmasq, a DNS server widely =
used in many smaller environments.  So the conditions are now right to =
get more DNSSEC validation occurring - this was one of the roadblocks =
for some time.   We also have the new getdns API ( =
http://www.vpnc.org/getdns-api/ ) that provides an easier way for =
application developers to get to DNS info and to get DNSSEC records.
> =20
> There are still some operational issues to sort out regarding =
deploying DNSSEC validation that have been documented by Wes Hardaker, =
Olafur Gudmundsson and Suresh Krishnaswamy in a draft in the DNSOP =
working group:
> =20
> http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-roadblock-avoidance
> =20
> On the signing side, we know many of the deployment challenges and =
people are working on them, although many of them are not anything that =
the IETF can do anything directly about. There are a few standardization =
issues that are being worked through within the DNSOP working group, =
such as how a parent zone is alerted when a key changes in a child zone. =
 There's a secure key transfer mechanism working through EPPEXT.=20
> =20
> As an example of one area outside of the IETF, one challenge =
historically has been that many registrars have not provided any way to =
let you add DS or DNSKEY records to your domain info, which would then =
be passed up to your TLD.  That is now changing because ICANN's 2013 =
Registrar Accreditation Agreement (RAA) requires registrars to support =
the passing of DNSSEC records - and to sell the newgTLDs, registrars =
have to sign the 2013 RAA.  So we're seeing more registrars offering at =
least some base level of DNSSEC support.
> =20
> Beyond that, it would certainly be helpful if there were more =
automation in the overall system to make it easier for people to just =
enable DNSSEC and have it "just work" - for example, it would be great =
to see more DNS hosting providers offer DNSSEC-signing.  It would also =
be helpful to have more content distribution networks (CDNs) supporting =
DNSSEC, as this is a barrier for getting many websites signed.
> =20
> Perhaps a more fundamental factor "blocking" deployment is just that =
people don't understand the value of DNSSEC and haven't felt the urgent =
need to deploy it.  It's on "their list" of things to implement... but =
hasn't bubbled up enough in the priorities.  Many of us view DANE as a =
key driver here as it provides a real use case for how DNSSEC can help =
add a layer of trust to your web security infrastructure.
> =20
> I could go on... and probably what I should do is write an update to =
that SATIN paper that provides a more current look at the remaining =
challenges... but hopefully this provides a view into some of the state =
of deployment.     I'm glad to expand on any points or be part of a =
larger discussion around these issues.  I'm employed by the Internet =
Society on the Deploy360 program where a large part of my work is =
focused on how we accelerate DNSSEC deployment... so I'm here to help on =
these points.
> =20
> Regards,
> Dan
> =20
> P.S. And if anyone is interested in being involved specifically with =
efforts around advancing DNSSEC deployment (both inside the IETF but =
more so outside in the larger industry), we have a separate mailing list =
set up at  https://elists.isoc.org/mailman/listinfo/dnssec-coord  that =
is open to anyone to join.
> =20
> --
> Dan York
> Senior Content Strategist, Internet Society
> york@isoc.org   +1-802-735-1624
> Jabber: york@jabber.isoc.org=20
> Skype: danyork   http://twitter.com/danyork
> =20
> http://www.internetsociety.org/deploy360/=20
> =20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass


From nobody Tue Apr 29 16:15:17 2014
Return-Path: <trevorf@exchange.microsoft.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFCC91A09E1 for <perpass@ietfa.amsl.com>; Tue, 29 Apr 2014 16:15:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kRDIHU4I_dsr for <perpass@ietfa.amsl.com>; Tue, 29 Apr 2014 16:15:11 -0700 (PDT)
Received: from na01-sn2-obe.outbound.o365filtering.com (mail-sn2on0659.outbound.o365filtering.com [IPv6:2a01:111:f400:fc04::659]) by ietfa.amsl.com (Postfix) with ESMTP id 3100F1A09DF for <perpass@ietf.org>; Tue, 29 Apr 2014 16:15:11 -0700 (PDT)
Received: from BLUSR01CA102.namsdf01.sdf.exchangelabs.com (10.255.124.147) by BLUSR01MB601.namsdf01.sdf.exchangelabs.com (10.255.124.166) with Microsoft SMTP Server (TLS) id 15.0.944.2; Tue, 29 Apr 2014 23:14:47 +0000
Received: from SN2FFOFD001.ffo.gbl (10.255.124.132) by BLUSR01CA102.outlook.office365.com (10.255.124.147) with Microsoft SMTP Server (TLS) id 15.0.944.2 via Frontend Transport; Tue, 29 Apr 2014 23:14:46 +0000
Received: from hybrid.exchange.microsoft.com (131.107.159.100) by SN2FFOFD001.mail.o365filtering.com (10.111.201.20) with Microsoft SMTP Server (TLS) id 15.0.939.3 via Frontend Transport; Tue, 29 Apr 2014 23:14:46 +0000
Received: from DFM-TK5MBX15-07.exchange.corp.microsoft.com (157.54.109.46) by DFM-TK5EDG15-02.exchange.corp.microsoft.com (157.54.27.97) with Microsoft SMTP Server (TLS) id 15.0.913.17; Tue, 29 Apr 2014 16:14:41 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com (157.54.109.44) by DFM-TK5MBX15-07.exchange.corp.microsoft.com (157.54.109.46) with Microsoft SMTP Server (TLS) id 15.0.913.17; Tue, 29 Apr 2014 16:14:40 -0700
Received: from DFM-TK5MBX15-05.exchange.corp.microsoft.com ([157.54.109.44]) by DFM-TK5MBX15-05.exchange.corp.microsoft.com ([169.254.5.13]) with mapi id 15.00.0913.011; Tue, 29 Apr 2014 16:14:39 -0700
From: Trevor Freeman <trevorf@exchange.microsoft.com>
To: manning bill <bmanning@isi.edu>
Thread-Topic: [perpass] Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VAAGswyAADBxIWAAEyq4AAAOcXtg
Date: Tue, 29 Apr 2014 23:14:39 +0000
Message-ID: <52b4fe7cb17c440e9bd307223b6d857f@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <D10D2737-322D-40CC-8C8F-B368A4A8CD24@isoc.org> <565e30ccbded447185c88246d6468097@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <2CA6BA9D-6445-4BC4-9207-BF9098045ADB@isi.edu>
In-Reply-To: <2CA6BA9D-6445-4BC4-9207-BF9098045ADB@isi.edu>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.13]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:131.107.159.100; IPV:NLI; EFV:NLI; SFV:NSPM;  SFS:(10009001)(13464003)(24454002)(51704005)(377454003)(189002)(199002)(69226001)(76796001)(85306002)(76786001)(23726002)(84676001)(74502001)(31966008)(74662001)(95666003)(81342001)(76482001)(95416001)(2656002)(2171001)(87936001)(81542001)(46102001)(80976001)(44976005)(19580395003)(83322001)(19580405001)(81686001)(81816001)(6806004)(94946001)(15975445006)(47776003)(79102001)(20776003)(77982001)(66066001)(77096001)(15395725004)(46406003)(80022001)(97186001)(98676001)(99396002)(87266001)(97736001)(2009001)(97756001)(97336001)(63696004)(56776002)(47976003)(47736002)(50986002)(59766002)(65816002)(56816006)(51856002)(49866002)(47446003)(54356002)(54316003)(53806002)(15202345003)(4396001)(93886001)(83072002)(93516002)(33646001)(90146001)(74706001)(74876001)(94316002)(74366001)(92566001)(50466002)(93136001)(85852003)(24736002); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUSR01MB601; H:hybrid.exchange.microsoft.com;  FPR:; PTR:InfoDomainNonexistent; MX:1; LANG:en; 
X-Exchange-Antispam-Report-Test: BL:0; ACTION:Default; RISK:Low; SCL:0; SPMLVL:NotSpam; PCL:0; RULEID:
X-Forefront-PRVS: 0196A226D1
X-OriginatorOrg: exchange.microsoft.com
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/aRnkj4ekxhK7QVWHSF7KNYWptqk
Cc: "perpass@ietf.org" <perpass@ietf.org>, Dan York <york@isoc.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Apr 2014 23:15:15 -0000

Are you referring to the assumption in the model that a domain in in contro=
l of its DNS keys and where we are dealing with small and medium sized org,=
 that may be a stretch.

-----Original Message-----
From: manning bill [mailto:bmanning@isi.edu]=20
Sent: Tuesday, April 29, 2014 4:03 PM
To: Trevor Freeman
Cc: Dan York; perpass@ietf.org
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?

Not going to speak for Dan, but the problems that were identified a decade =
ago still seem relevant since you bring them back up; e.g. the small/medium=
 sized entity with
smaller resource pools to support enhanced crypto capabilities.   The answe=
r then (and now) is -outsource-... but this path is fraught with peril if w=
e truly want trusted systems.
Or we can just use the Baidu/Tata/Microsoft key escrow facilities.... and w=
e are back to square one!

Solving this problem requires folks to own/manage their personal digital id=
entity.

/bill
Neca eos omnes.  Deus suos agnoscet.

On 29April2014Tuesday, at 15:54, Trevor Freeman <trevorf@exchange.microsoft=
.com> wrote:

> Hi Dan,
> =20
> Yes I want to consider the DNS authentication of encryption keys as one s=
cenario which has a dependency on DNSSEC so we quickly get full circle. =20
> =20
> There have been a number of people who have offered opinions in this area=
, and none so far have pointed to a technology issue as holding up deployme=
nt.  Far from it, there seems to be advances in many area. This all seems g=
oodness.
> =20
> It seems a little disturbing that it took a stick to get some level of DN=
SSEC deployment in the .gov domain. That model is hard to replicate elsewhe=
re so I don't see it as a general solution to deployment. I much prefer car=
rots to drive dependents.  You are correct in that the Dutch government was=
 one of the two governments I could find who's public web site was actually=
 DNSSEC secured, despite many of the parent domain being signed. The only o=
ther was Estonia.
> =20
> As you pointed out, there are a large number of content distribution netw=
orks hosting sites on behalf of organizations with signed domains, who have=
 not signed their own domain thereby breaking the chain of trust to the web=
 site dns record. We seem to be missing the carrot to get them to sign. Wha=
t is the value proposition that would convince them to sign their domain?
> =20
> I note that there is a session at the forthcoming ICANN DNSSEC workshop o=
n DNSSEC and the enterprise. What about small and mediums sized organizatio=
ns who have typical  lower security skill and smaller budgets? They are mos=
tly migrating to cloud services of some form.  Aside from inviting speakers=
, has the been any research done with organizations on why they are not ado=
pting DNSSEC?
> =20
> It may also be fruitful to think about what are the next set of deploymen=
t goals in terms of what scenarios do we want to work. I would submit its t=
ime to move on from how many of the TLDS are signed onto tangible goals lik=
e what works. Do we want to look at a percentage of the email sent over the=
 internet being DANE protected for example.
> =20
> Trevor
> =20
> From: Dan York [mailto:york@isoc.org]=20
> Sent: Monday, April 28, 2014 2:47 PM
> To: Trevor Freeman
> Cc: perpass@ietf.org
> Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
> =20
> Trevor,
> =20
> On Apr 28, 2014, at 2:38 PM, Trevor Freeman <trevorf@exchange.microsoft.c=
om>
>  wrote:
>=20
>=20
> We have a range of technologies in the toolkit to address issues identifi=
ed by perpass.
> =20
> One of the candidate technologies is DNSSEC. At a technology level it has=
 much to commend it.
> =20
> Which of the perpass issues do you see DNSSEC helping with?  If I look at=
 http://tools.ietf.org/html/draft-trammell-perpass-ppa-01 or http://tools.i=
etf.org/html/draft-tschofenig-perpass-surveillance-01 or other documents th=
at have been circulated, they are almost all related to concerns around pri=
vacy and more specifically confidentiality... which is not a focus of DNSSE=
C.  DNSSEC is focused on ensuring the *integrity* of the information carrie=
d in DNS queries, although when coupled with DANE for TLS certificates it c=
an help with confidentiality, too.
> =20
> The trend seems about 2 orders of magnitude below where we need to be for=
 DNSSEC to be viable in a realistic timescale.
> =20
> Am I misinterpreting the data?
> =20
> No, you're not misinterpreting the data for .COM.  Only a very small % of=
 .com domains are signed.  The story is better in other TLDs such as .GOV, =
for instance, where 87% of all domains are DNSSEC-signed ( http://fedv6-dep=
loyment.antd.nist.gov/snap-all.html ).  Attaining this high level, of cours=
e, took a mandate from the US government to all agencies. =20
> =20
> Over in .NL, there are 1.7 million domains signed representing about 31% =
of all .NL domains (see right sidebar of https://www.sidn.nl/ ).  We are tr=
acking a number of other statistics sites that monitor the DNSSEC status of=
 various TLDs at:
> http://www.internetsociety.org/deploy360/dnssec/statistics/
> =20
> You are correct, though, that overall the % of domains signed with DNSSEC=
 is low.=20
>=20
>=20
> If not, then do we have consensus on what is blocking deployment?
> =20
> I don't know that there is a "consensus"... and I could have a long conve=
rsation on this topic...  but I know from conversations with a good number =
of people within what I'll call the "DNSSEC community" over the past couple=
 of years that we have the fundamental bootstrapping issue with DNSSEC wher=
e we need both more signing of domains and more deployment of DNSSEC-valida=
ting DNS resolvers.  The challenge has been that people say "why should I b=
other signing my domain when 'no one' is validating" and on the opposite si=
de ISPs and other network operators say "why should I enable DNSSEC validat=
ion in my DNS resolvers where there aren't a lot of domains signed".  About=
 2 years ago a colleague and I wrote a paper for the SATIN conference in th=
e UK and while the situation *has* improved, many of the points are still v=
alid:
> =20
> http://www.internetsociety.org/deploy360/resources/whitepaper-challenges-=
and-opportunities-in-deploying-dnssec/
> =20
> The good news is that we've seen some good growth on the validation side,=
 helped largely by Google turning on full DNSSEC validation in their Public=
 DNS servers and Comcast enabling DNSSEC validation in their large network =
in North America.  Additionally, many ISPs in countries such as Sweden, the=
 Netherlands, the Czech Republic and Brazil have turned on DNSSEC validatio=
n.   Geoff Huston, George Michaelson and the rest of the team at APNIC Labs=
 have done a number of DNSSEC validation measurement projects and presented=
 those at various conferences.   At RIPE67 last October, his set of slides =
( https://ripe67.ripe.net/presentations/111-2013-10-15-dnssec.pdf ) was sho=
wing the May 2013 data where about 8.3% of all queries were being validated=
.  That's certainly a good start... and the validation % is much higher in =
some countries.
> =20
> We also now have DNSSEC validation easily configurable in most all the ma=
jor DNS resolvers, including BIND, Unbound and Microsoft Windows Server 201=
2.  It was also recently added to dnsmasq, a DNS server widely used in many=
 smaller environments.  So the conditions are now right to get more DNSSEC =
validation occurring - this was one of the roadblocks for some time.   We a=
lso have the new getdns API ( http://www.vpnc.org/getdns-api/ ) that provid=
es an easier way for application developers to get to DNS info and to get D=
NSSEC records.
> =20
> There are still some operational issues to sort out regarding deploying D=
NSSEC validation that have been documented by Wes Hardaker, Olafur Gudmunds=
son and Suresh Krishnaswamy in a draft in the DNSOP working group:
> =20
> http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-roadblock-avoidance
> =20
> On the signing side, we know many of the deployment challenges and people=
 are working on them, although many of them are not anything that the IETF =
can do anything directly about. There are a few standardization issues that=
 are being worked through within the DNSOP working group, such as how a par=
ent zone is alerted when a key changes in a child zone.  There's a secure k=
ey transfer mechanism working through EPPEXT.=20
> =20
> As an example of one area outside of the IETF, one challenge historically=
 has been that many registrars have not provided any way to let you add DS =
or DNSKEY records to your domain info, which would then be passed up to you=
r TLD.  That is now changing because ICANN's 2013 Registrar Accreditation A=
greement (RAA) requires registrars to support the passing of DNSSEC records=
 - and to sell the newgTLDs, registrars have to sign the 2013 RAA.  So we'r=
e seeing more registrars offering at least some base level of DNSSEC suppor=
t.
> =20
> Beyond that, it would certainly be helpful if there were more automation =
in the overall system to make it easier for people to just enable DNSSEC an=
d have it "just work" - for example, it would be great to see more DNS host=
ing providers offer DNSSEC-signing.  It would also be helpful to have more =
content distribution networks (CDNs) supporting DNSSEC, as this is a barrie=
r for getting many websites signed.
> =20
> Perhaps a more fundamental factor "blocking" deployment is just that peop=
le don't understand the value of DNSSEC and haven't felt the urgent need to=
 deploy it.  It's on "their list" of things to implement... but hasn't bubb=
led up enough in the priorities.  Many of us view DANE as a key driver here=
 as it provides a real use case for how DNSSEC can help add a layer of trus=
t to your web security infrastructure.
> =20
> I could go on... and probably what I should do is write an update to that=
 SATIN paper that provides a more current look at the remaining challenges.=
.. but hopefully this provides a view into some of the state of deployment.=
     I'm glad to expand on any points or be part of a larger discussion aro=
und these issues.  I'm employed by the Internet Society on the Deploy360 pr=
ogram where a large part of my work is focused on how we accelerate DNSSEC =
deployment... so I'm here to help on these points.
> =20
> Regards,
> Dan
> =20
> P.S. And if anyone is interested in being involved specifically with effo=
rts around advancing DNSSEC deployment (both inside the IETF but more so ou=
tside in the larger industry), we have a separate mailing list set up at  h=
ttps://elists.isoc.org/mailman/listinfo/dnssec-coord  that is open to anyon=
e to join.
> =20
> --
> Dan York
> Senior Content Strategist, Internet Society
> york@isoc.org   +1-802-735-1624
> Jabber: york@jabber.isoc.org=20
> Skype: danyork   http://twitter.com/danyork
> =20
> http://www.internetsociety.org/deploy360/=20
> =20
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass


From nobody Wed Apr 30 11:27:27 2014
Return-Path: <bmanning@isi.edu>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E141A1A886B for <perpass@ietfa.amsl.com>; Wed, 30 Apr 2014 11:27:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.551
X-Spam-Level: 
X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w0IA4xC0Aku9 for <perpass@ietfa.amsl.com>; Wed, 30 Apr 2014 11:27:22 -0700 (PDT)
Received: from darkstar.isi.edu (darkstar.isi.edu [128.9.128.127]) by ietfa.amsl.com (Postfix) with ESMTP id 22AB91A8878 for <perpass@ietf.org>; Wed, 30 Apr 2014 11:27:21 -0700 (PDT)
Received: from [128.9.184.144] ([128.9.184.144]) (authenticated bits=0) by darkstar.isi.edu (8.13.8/8.13.8) with ESMTP id s3UIR6Ku017191 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Wed, 30 Apr 2014 11:27:07 -0700 (PDT)
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
Content-Type: text/plain; charset=us-ascii
From: manning bill <bmanning@isi.edu>
In-Reply-To: <52b4fe7cb17c440e9bd307223b6d857f@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Date: Wed, 30 Apr 2014 11:27:06 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <D4A2CB7F-9BA3-4119-A89F-8B74461A9A9E@isi.edu>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <D10D2737-322D-40CC-8C8F-B368A4A8CD24@isoc.org> <565e30ccbded447185c88246d6468097@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <2CA6BA9D-6445-4BC4-9207-BF9098045ADB@isi.edu> <52b4fe7cb17c440e9bd307223b6d857f@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
To: Trevor Freeman <trevorf@exchange.microsoft.com>
X-Mailer: Apple Mail (2.1874)
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: bmanning@isi.edu
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/vRgbGXjW6ivR0di3lMOGGnG2TMA
Cc: "perpass@ietf.org" <perpass@ietf.org>, Dan York <york@isoc.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Apr 2014 18:27:26 -0000

yes.


/bill
Neca eos omnes.  Deus suos agnoscet.

On 29April2014Tuesday, at 16:14, Trevor Freeman =
<trevorf@exchange.microsoft.com> wrote:

> Are you referring to the assumption in the model that a domain in in =
control of its DNS keys and where we are dealing with small and medium =
sized org, that may be a stretch.
>=20
> -----Original Message-----
> From: manning bill [mailto:bmanning@isi.edu]=20
> Sent: Tuesday, April 29, 2014 4:03 PM
> To: Trevor Freeman
> Cc: Dan York; perpass@ietf.org
> Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
>=20
> Not going to speak for Dan, but the problems that were identified a =
decade ago still seem relevant since you bring them back up; e.g. the =
small/medium sized entity with
> smaller resource pools to support enhanced crypto capabilities.   The =
answer then (and now) is -outsource-... but this path is fraught with =
peril if we truly want trusted systems.
> Or we can just use the Baidu/Tata/Microsoft key escrow facilities.... =
and we are back to square one!
>=20
> Solving this problem requires folks to own/manage their personal =
digital identity.
>=20
> /bill
> Neca eos omnes.  Deus suos agnoscet.
>=20
> On 29April2014Tuesday, at 15:54, Trevor Freeman =
<trevorf@exchange.microsoft.com> wrote:
>=20
>> Hi Dan,
>>=20
>> Yes I want to consider the DNS authentication of encryption keys as =
one scenario which has a dependency on DNSSEC so we quickly get full =
circle. =20
>>=20
>> There have been a number of people who have offered opinions in this =
area, and none so far have pointed to a technology issue as holding up =
deployment.  Far from it, there seems to be advances in many area. This =
all seems goodness.
>>=20
>> It seems a little disturbing that it took a stick to get some level =
of DNSSEC deployment in the .gov domain. That model is hard to replicate =
elsewhere so I don't see it as a general solution to deployment. I much =
prefer carrots to drive dependents.  You are correct in that the Dutch =
government was one of the two governments I could find who's public web =
site was actually DNSSEC secured, despite many of the parent domain =
being signed. The only other was Estonia.
>>=20
>> As you pointed out, there are a large number of content distribution =
networks hosting sites on behalf of organizations with signed domains, =
who have not signed their own domain thereby breaking the chain of trust =
to the web site dns record. We seem to be missing the carrot to get them =
to sign. What is the value proposition that would convince them to sign =
their domain?
>>=20
>> I note that there is a session at the forthcoming ICANN DNSSEC =
workshop on DNSSEC and the enterprise. What about small and mediums =
sized organizations who have typical  lower security skill and smaller =
budgets? They are mostly migrating to cloud services of some form.  =
Aside from inviting speakers, has the been any research done with =
organizations on why they are not adopting DNSSEC?
>>=20
>> It may also be fruitful to think about what are the next set of =
deployment goals in terms of what scenarios do we want to work. I would =
submit its time to move on from how many of the TLDS are signed onto =
tangible goals like what works. Do we want to look at a percentage of =
the email sent over the internet being DANE protected for example.
>>=20
>> Trevor
>>=20
>> From: Dan York [mailto:york@isoc.org]=20
>> Sent: Monday, April 28, 2014 2:47 PM
>> To: Trevor Freeman
>> Cc: perpass@ietf.org
>> Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
>>=20
>> Trevor,
>>=20
>> On Apr 28, 2014, at 2:38 PM, Trevor Freeman =
<trevorf@exchange.microsoft.com>
>> wrote:
>>=20
>>=20
>> We have a range of technologies in the toolkit to address issues =
identified by perpass.
>>=20
>> One of the candidate technologies is DNSSEC. At a technology level it =
has much to commend it.
>>=20
>> Which of the perpass issues do you see DNSSEC helping with?  If I =
look at http://tools.ietf.org/html/draft-trammell-perpass-ppa-01 or =
http://tools.ietf.org/html/draft-tschofenig-perpass-surveillance-01 or =
other documents that have been circulated, they are almost all related =
to concerns around privacy and more specifically confidentiality... =
which is not a focus of DNSSEC.  DNSSEC is focused on ensuring the =
*integrity* of the information carried in DNS queries, although when =
coupled with DANE for TLS certificates it can help with confidentiality, =
too.
>>=20
>> The trend seems about 2 orders of magnitude below where we need to be =
for DNSSEC to be viable in a realistic timescale.
>>=20
>> Am I misinterpreting the data?
>>=20
>> No, you're not misinterpreting the data for .COM.  Only a very small =
% of .com domains are signed.  The story is better in other TLDs such as =
.GOV, for instance, where 87% of all domains are DNSSEC-signed ( =
http://fedv6-deployment.antd.nist.gov/snap-all.html ).  Attaining this =
high level, of course, took a mandate from the US government to all =
agencies. =20
>>=20
>> Over in .NL, there are 1.7 million domains signed representing about =
31% of all .NL domains (see right sidebar of https://www.sidn.nl/ ).  We =
are tracking a number of other statistics sites that monitor the DNSSEC =
status of various TLDs at:
>> http://www.internetsociety.org/deploy360/dnssec/statistics/
>>=20
>> You are correct, though, that overall the % of domains signed with =
DNSSEC is low.=20
>>=20
>>=20
>> If not, then do we have consensus on what is blocking deployment?
>>=20
>> I don't know that there is a "consensus"... and I could have a long =
conversation on this topic...  but I know from conversations with a good =
number of people within what I'll call the "DNSSEC community" over the =
past couple of years that we have the fundamental bootstrapping issue =
with DNSSEC where we need both more signing of domains and more =
deployment of DNSSEC-validating DNS resolvers.  The challenge has been =
that people say "why should I bother signing my domain when 'no one' is =
validating" and on the opposite side ISPs and other network operators =
say "why should I enable DNSSEC validation in my DNS resolvers where =
there aren't a lot of domains signed".  About 2 years ago a colleague =
and I wrote a paper for the SATIN conference in the UK and while the =
situation *has* improved, many of the points are still valid:
>>=20
>> =
http://www.internetsociety.org/deploy360/resources/whitepaper-challenges-a=
nd-opportunities-in-deploying-dnssec/
>>=20
>> The good news is that we've seen some good growth on the validation =
side, helped largely by Google turning on full DNSSEC validation in =
their Public DNS servers and Comcast enabling DNSSEC validation in their =
large network in North America.  Additionally, many ISPs in countries =
such as Sweden, the Netherlands, the Czech Republic and Brazil have =
turned on DNSSEC validation.   Geoff Huston, George Michaelson and the =
rest of the team at APNIC Labs have done a number of DNSSEC validation =
measurement projects and presented those at various conferences.   At =
RIPE67 last October, his set of slides ( =
https://ripe67.ripe.net/presentations/111-2013-10-15-dnssec.pdf ) was =
showing the May 2013 data where about 8.3% of all queries were being =
validated.  That's certainly a good start... and the validation % is =
much higher in some countries.
>>=20
>> We also now have DNSSEC validation easily configurable in most all =
the major DNS resolvers, including BIND, Unbound and Microsoft Windows =
Server 2012.  It was also recently added to dnsmasq, a DNS server widely =
used in many smaller environments.  So the conditions are now right to =
get more DNSSEC validation occurring - this was one of the roadblocks =
for some time.   We also have the new getdns API ( =
http://www.vpnc.org/getdns-api/ ) that provides an easier way for =
application developers to get to DNS info and to get DNSSEC records.
>>=20
>> There are still some operational issues to sort out regarding =
deploying DNSSEC validation that have been documented by Wes Hardaker, =
Olafur Gudmundsson and Suresh Krishnaswamy in a draft in the DNSOP =
working group:
>>=20
>> =
http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-roadblock-avoidance
>>=20
>> On the signing side, we know many of the deployment challenges and =
people are working on them, although many of them are not anything that =
the IETF can do anything directly about. There are a few standardization =
issues that are being worked through within the DNSOP working group, =
such as how a parent zone is alerted when a key changes in a child zone. =
 There's a secure key transfer mechanism working through EPPEXT.=20
>>=20
>> As an example of one area outside of the IETF, one challenge =
historically has been that many registrars have not provided any way to =
let you add DS or DNSKEY records to your domain info, which would then =
be passed up to your TLD.  That is now changing because ICANN's 2013 =
Registrar Accreditation Agreement (RAA) requires registrars to support =
the passing of DNSSEC records - and to sell the newgTLDs, registrars =
have to sign the 2013 RAA.  So we're seeing more registrars offering at =
least some base level of DNSSEC support.
>>=20
>> Beyond that, it would certainly be helpful if there were more =
automation in the overall system to make it easier for people to just =
enable DNSSEC and have it "just work" - for example, it would be great =
to see more DNS hosting providers offer DNSSEC-signing.  It would also =
be helpful to have more content distribution networks (CDNs) supporting =
DNSSEC, as this is a barrier for getting many websites signed.
>>=20
>> Perhaps a more fundamental factor "blocking" deployment is just that =
people don't understand the value of DNSSEC and haven't felt the urgent =
need to deploy it.  It's on "their list" of things to implement... but =
hasn't bubbled up enough in the priorities.  Many of us view DANE as a =
key driver here as it provides a real use case for how DNSSEC can help =
add a layer of trust to your web security infrastructure.
>>=20
>> I could go on... and probably what I should do is write an update to =
that SATIN paper that provides a more current look at the remaining =
challenges... but hopefully this provides a view into some of the state =
of deployment.     I'm glad to expand on any points or be part of a =
larger discussion around these issues.  I'm employed by the Internet =
Society on the Deploy360 program where a large part of my work is =
focused on how we accelerate DNSSEC deployment... so I'm here to help on =
these points.
>>=20
>> Regards,
>> Dan
>>=20
>> P.S. And if anyone is interested in being involved specifically with =
efforts around advancing DNSSEC deployment (both inside the IETF but =
more so outside in the larger industry), we have a separate mailing list =
set up at  https://elists.isoc.org/mailman/listinfo/dnssec-coord  that =
is open to anyone to join.
>>=20
>> --
>> Dan York
>> Senior Content Strategist, Internet Society
>> york@isoc.org   +1-802-735-1624
>> Jabber: york@jabber.isoc.org=20
>> Skype: danyork   http://twitter.com/danyork
>>=20
>> http://www.internetsociety.org/deploy360/=20
>>=20
>> _______________________________________________
>> perpass mailing list
>> perpass@ietf.org
>> https://www.ietf.org/mailman/listinfo/perpass
>=20


From nobody Wed Apr 30 12:08:49 2014
Return-Path: <york@isoc.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 687361A8897 for <perpass@ietfa.amsl.com>; Wed, 30 Apr 2014 12:08:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oGap8LrIE3PX for <perpass@ietfa.amsl.com>; Wed, 30 Apr 2014 12:08:45 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1lp0139.outbound.protection.outlook.com [207.46.163.139]) by ietfa.amsl.com (Postfix) with ESMTP id 444D41A8891 for <perpass@ietf.org>; Wed, 30 Apr 2014 12:08:45 -0700 (PDT)
Received: from BLUPR06MB243.namprd06.prod.outlook.com (10.242.191.154) by BLUPR06MB242.namprd06.prod.outlook.com (10.242.191.142) with Microsoft SMTP Server (TLS) id 15.0.929.12; Wed, 30 Apr 2014 19:08:42 +0000
Received: from BLUPR06MB243.namprd06.prod.outlook.com ([169.254.2.21]) by BLUPR06MB243.namprd06.prod.outlook.com ([169.254.2.21]) with mapi id 15.00.0929.001; Wed, 30 Apr 2014 19:08:41 +0000
From: Dan York <york@isoc.org>
To: Trevor Freeman <trevorf@exchange.microsoft.com>
Thread-Topic: [perpass] Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VAAGswyAADBxIWAALpyeAA==
Date: Wed, 30 Apr 2014 19:08:40 +0000
Message-ID: <339296B6-3650-4EC6-A703-3DDD0F2522D8@isoc.org>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <D10D2737-322D-40CC-8C8F-B368A4A8CD24@isoc.org> <565e30ccbded447185c88246d6468097@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
In-Reply-To: <565e30ccbded447185c88246d6468097@DFM-TK5MBX15-05.exchange.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [2604:6000:9fc0:53:801e:5527:2cfe:8df6]
x-forefront-prvs: 0197AFBD92
x-forefront-antispam-report: SFV:NSPM; SFS:(10019001)(428001)(52604005)(377454003)(24454002)(189002)(199002)(36756003)(16236675002)(77982001)(15395725003)(15975445006)(83322001)(2656002)(19580405001)(19580395003)(1511001)(74502001)(31966008)(79102001)(74662001)(92566001)(20776003)(83072002)(83716003)(46102001)(76482001)(85852003)(4396001)(80022001)(86362001)(33656001)(15202345003)(87936001)(81342001)(54356999)(76176999)(81542001)(50986999)(80976001)(101416001)(92726001)(99286001)(99396002)(82746002)(100906001); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR06MB242; H:BLUPR06MB243.namprd06.prod.outlook.com; FPR:6E40F145.A6329381.B9DF717B.8E68F961.20607; MLV:sfv; PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
received-spf: None (: isoc.org does not designate permitted sender hosts)
Content-Type: multipart/alternative; boundary="_000_339296B636504EC6A7033DDD0F2522D8isocorg_"
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/vbpR74zBhEYIMPpVzT8vizeUedM
Cc: "perpass@ietf.org" <perpass@ietf.org>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Apr 2014 19:08:48 -0000

--_000_339296B636504EC6A7033DDD0F2522D8isocorg_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Trevor,

Comments inline...

On Apr 29, 2014, at 6:54 PM, Trevor Freeman <trevorf@exchange.microsoft.com=
<mailto:trevorf@exchange.microsoft.com>>
 wrote:

Yes I want to consider the DNS authentication of encryption keys as one sce=
nario which has a dependency on DNSSEC so we quickly get full circle.

Thanks for explaining where your focus is.

There have been a number of people who have offered opinions in this area, =
and none so far have pointed to a technology issue as holding up deployment=
.  Far from it, there seems to be advances in many area. This all seems goo=
dness.

Yes, for the most part the issues holding up DNSSEC deployment are NOT tech=
nology-related.   That said, there *are* some remaining technology issues t=
hat do cause problems, most notably the key rollover issue being discussed =
in multiple drafts within DNSOP right now.  Additionally, while we have com=
e far in automation, there are still ways we could make the DNSSEC signing =
process even easier for smaller and less tech-savvy users.

But overall the technology behind DNSSEC is very solid and is not the deplo=
yment challenge.

 It seems a little disturbing that it took a stick to get some level of DNS=
SEC deployment in the .gov domain. That model is hard to replicate elsewher=
e so I don=92t see it as a general solution to deployment.

Neither do I.  And, as Scott Rose so rightly pointed out in a message earli=
er in this thread, a mandate often means that people will do exactly the ba=
re minimum necessary to comply with the mandate... and nothing more.  As a =
result we wind up with implementations that do not, in fact, deliver the fu=
ll level of security and are not "complete" in the way that we would think =
want them to be.

As you pointed out, there are a large number of content distribution networ=
ks hosting sites on behalf of organizations with signed domains, who have n=
ot signed their own domain thereby breaking the chain of trust to the web s=
ite dns record. We seem to be missing the carrot to get them to sign. What =
is the value proposition that would convince them to sign their domain?

Customers asking them for it!  That is the big missing piece that people at=
 multiple CDN providers have said to either me or others I know.  There *is=
* a certain level of complexity in what they do as a CDN that makes signing=
 it all non-trivial.  However, some CDNs *are* offering DNSSEC-signing to c=
ertain customers.... and if more customers were asking for it, I'm sure mor=
e CDNs would offer it.  So we go back to needing to get the end customer aw=
are of the value of DNSSEC - and then requesting it from their vendors.

I note that there is a session at the forthcoming ICANN DNSSEC workshop on =
DNSSEC and the enterprise. What about small and mediums sized organizations=
 who have typical  lower security skill and smaller budgets? They are mostl=
y migrating to cloud services of some form.

Speaking as one of the members of the program committee for that upcoming I=
CANN DNSSEC Workshop in London, we'd love to have someone offer to speak on=
 that topic.  The call for participation can be found on multiple mailing l=
ists or here:

http://www.internetsociety.org/deploy360/blog/2014/04/call-for-participatio=
n-icann-50-dnssec-workshop-on-25-june-in-london/

Aside from inviting speakers, has the been any research done with organizat=
ions on why they are not adopting DNSSEC?

Yes, a number of us have spoken with a good number of organizations about w=
hy.  In most cases for the folks I've spoken with it comes down to a lack o=
f understanding of what DNSSEC can do... and even when they do understand, =
the reality that they have 37 other higher IT priorities that they need to =
get implemented right now because they are very often operating in perpetua=
l crisis mode and whatever has the highest priority gets implemented.  Many=
 people are finally getting around to IPv6 implementations because we are, =
in fact, finally running out of IPv4 addresses.  There isn't the same urgen=
cy *yet* for DNSSEC for many people.   This is why I and others have been t=
alking up the value offered by DANE.

It may also be fruitful to think about what are the next set of deployment =
goals in terms of what scenarios do we want to work. I would submit its tim=
e to move on from how many of the TLDS are signed onto tangible goals like =
what works. Do we want to look at a percentage of the email sent over the i=
nternet being DANE protected for example.

Yes... and we are definitely working on those deployment goals.  But this i=
s where I think we really get out of the IETF territory of standards and ge=
t more into the operational side of things.  Rather than discuss this here =
on the perpass list, I'd encourage you to join the https://elists.isoc.org/=
mailman/listinfo/dnssec-coord list and engage in this discussion there.    =
(Unless others feel it should stay on this list... where I'm happy to discu=
ss this, obviously... but I feel like we're going outside of areas that are=
 in scope for the IETF.)

My 2 cents,
Dan

--
Dan York
Senior Content Strategist, Internet Society
york@isoc.org<mailto:york@isoc.org>   +1-802-735-1624
Jabber: york@jabber.isoc.org<mailto:york@jabber.isoc.org>
Skype: danyork   http://twitter.com/danyork

http://www.internetsociety.org/deploy360/


--_000_339296B636504EC6A7033DDD0F2522D8isocorg_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <7167832D4F56E6469FB00114DB2A4ACF@namprd06.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
<base href=3D"x-msg://995/">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
Trevor,
<div><br>
</div>
<div>Comments inline...</div>
<div><br>
<div apple-content-edited=3D"true"></div>
<div>
<div>On Apr 29, 2014, at 6:54 PM, Trevor Freeman &lt;<a href=3D"mailto:trev=
orf@exchange.microsoft.com">trevorf@exchange.microsoft.com</a>&gt;</div>
<div>&nbsp;wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: He=
lvetica; font-size: medium; font-style: normal; font-variant: normal; font-=
weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; te=
xt-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space=
: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -we=
bkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Time=
s New Roman', serif; ">
<span style=3D"color: rgb(31, 73, 125); font-family: Calibri, sans-serif; f=
ont-size: 11pt; ">Yes I want to consider the DNS authentication of encrypti=
on keys as one scenario which has a dependency on DNSSEC so we quickly get =
full circle. &nbsp;</span></div>
</div>
</div>
</blockquote>
<div><br>
</div>
Thanks for explaining where your focus is.</div>
<div><br>
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: He=
lvetica; font-size: medium; font-style: normal; font-variant: normal; font-=
weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; te=
xt-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space=
: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -we=
bkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Time=
s New Roman', serif; ">
<span style=3D"color: rgb(31, 73, 125); font-family: Calibri, sans-serif; f=
ont-size: 11pt; ">There have been a number of people who have offered opini=
ons in this area, and none so far have pointed to a technology issue as hol=
ding up deployment. &nbsp;Far from it,
 there seems to be advances in many area. This all seems goodness.</span></=
div>
</div>
</div>
</blockquote>
<div><br>
</div>
Yes, for the most part the issues holding up DNSSEC deployment are NOT tech=
nology-related. &nbsp; That said, there *are* some remaining technology iss=
ues that do cause problems, most notably the key rollover issue being discu=
ssed in multiple drafts within DNSOP
 right now. &nbsp;Additionally, while we have come far in automation, there=
 are still ways we could make the DNSSEC signing process even easier for sm=
aller and less tech-savvy users.</div>
<div><br>
</div>
<div>But overall the technology behind DNSSEC is very solid and is not the =
deployment challenge.</div>
<div><br>
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: He=
lvetica; font-size: medium; font-style: normal; font-variant: normal; font-=
weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; te=
xt-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space=
: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -we=
bkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Time=
s New Roman', serif; ">
<span style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: rg=
b(31, 73, 125); "><o:p></o:p></span></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Time=
s New Roman', serif; ">
<span style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: rg=
b(31, 73, 125); ">&nbsp;</span><span style=3D"color: rgb(31, 73, 125); font=
-family: Calibri, sans-serif; font-size: 11pt; ">It seems a little disturbi=
ng that it took a stick to get some level
 of DNSSEC deployment in the .gov domain. That model is hard to replicate e=
lsewhere so I don=92t see it as a general solution to deployment.</span></d=
iv>
</div>
</div>
</blockquote>
<div><br>
</div>
Neither do I. &nbsp;And, as Scott Rose so rightly pointed out in a message =
earlier in this thread, a mandate often means that people will do exactly t=
he bare minimum necessary to comply with the mandate... and nothing more. &=
nbsp;As a result we wind up with implementations
 that do not, in fact, deliver the full level of security and are not &quot=
;complete&quot; in the way that we would think want them to be.</div>
<div><br>
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: He=
lvetica; font-size: medium; font-style: normal; font-variant: normal; font-=
weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; te=
xt-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space=
: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -we=
bkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Time=
s New Roman', serif; ">
<span style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: rg=
b(31, 73, 125); ">As you pointed out, there are a large number of content d=
istribution networks hosting sites on behalf of organizations with signed d=
omains, who have not signed their
 own domain thereby breaking the chain of trust to the web site dns record.=
 We seem to be missing the carrot to get them to sign. What is the value pr=
oposition that would convince them to sign their domain?</span></div>
</div>
</div>
</blockquote>
<div><br>
</div>
Customers asking them for it! &nbsp;That is the big missing piece that peop=
le at multiple CDN providers have said to either me or others I know. &nbsp=
;There *is* a certain level of complexity in what they do as a CDN that mak=
es signing it all non-trivial. &nbsp;However, some
 CDNs *are* offering DNSSEC-signing to certain customers.... and if more cu=
stomers were asking for it, I'm sure more CDNs would offer it. &nbsp;So we =
go back to needing to get the end customer aware of the value of DNSSEC - a=
nd then requesting it from their vendors.</div>
<div><br>
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: He=
lvetica; font-size: medium; font-style: normal; font-variant: normal; font-=
weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; te=
xt-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space=
: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -we=
bkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Time=
s New Roman', serif; ">
<span style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: rg=
b(31, 73, 125); "><o:p></o:p></span></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Time=
s New Roman', serif; ">
<span style=3D"color: rgb(31, 73, 125); font-family: Calibri, sans-serif; f=
ont-size: 11pt; ">I note that there is a session at the forthcoming ICANN D=
NSSEC workshop on DNSSEC and the enterprise. What about small and mediums s=
ized organizations who have typical
 &nbsp;lower security skill and smaller budgets? They are mostly migrating =
to cloud services of some form. &nbsp;</span></div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>Speaking as one of the members of the program committee for that upcom=
ing ICANN DNSSEC Workshop in London, we'd love to have someone offer to spe=
ak on that topic. &nbsp;The call for participation can be found on multiple=
 mailing lists or here:</div>
<div><br>
</div>
<div><a href=3D"http://www.internetsociety.org/deploy360/blog/2014/04/call-=
for-participation-icann-50-dnssec-workshop-on-25-june-in-london/">http://ww=
w.internetsociety.org/deploy360/blog/2014/04/call-for-participation-icann-5=
0-dnssec-workshop-on-25-june-in-london/</a></div>
<br>
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: He=
lvetica; font-size: medium; font-style: normal; font-variant: normal; font-=
weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; te=
xt-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space=
: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -we=
bkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Time=
s New Roman', serif; ">
<span style=3D"color: rgb(31, 73, 125); font-family: Calibri, sans-serif; f=
ont-size: 11pt; ">Aside from inviting speakers, has the been any research d=
one with organizations on why they are not adopting DNSSEC?</span></div>
</div>
</div>
</blockquote>
<div><br>
</div>
Yes, a number of us have spoken with a good number of organizations about w=
hy. &nbsp;In most cases for the folks I've spoken with it comes down to a l=
ack of understanding of what DNSSEC can do... and even when they do underst=
and, the reality that they have 37 other
 higher IT priorities that they need to get implemented right now because t=
hey are very often operating in perpetual crisis mode and whatever has the =
highest priority gets implemented. &nbsp;Many people are finally getting ar=
ound to IPv6 implementations because
 we are, in fact, finally running out of IPv4 addresses. &nbsp;There isn't =
the same urgency *yet* for DNSSEC for many people. &nbsp; This is why I and=
 others have been talking up the value offered by DANE.</div>
<div><br>
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: He=
lvetica; font-size: medium; font-style: normal; font-variant: normal; font-=
weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; te=
xt-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space=
: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -we=
bkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Time=
s New Roman', serif; ">
<span style=3D"color: rgb(31, 73, 125); font-family: Calibri, sans-serif; f=
ont-size: 11pt; ">It may also be fruitful to think about what are the next =
set of deployment goals in terms of what scenarios do we want to work. I wo=
uld submit its time to move on from
 how many of the TLDS are signed onto tangible goals like what works. Do we=
 want to look at a percentage of the email sent over the internet being DAN=
E protected for example.</span></div>
</div>
</div>
</blockquote>
<br>
</div>
<div>Yes... and we are definitely working on those deployment goals. &nbsp;=
But this is where I think we really get out of the IETF territory of standa=
rds and get more into the operational side of things. &nbsp;Rather than dis=
cuss this here on the perpass list, I'd encourage
 you to join the&nbsp;<a href=3D"https://elists.isoc.org/mailman/listinfo/d=
nssec-coord">https://elists.isoc.org/mailman/listinfo/dnssec-coord</a>&nbsp=
;list and engage in this discussion there. &nbsp; &nbsp;(Unless others feel=
 it should stay on this list... where I'm happy to discuss
 this, obviously... but I feel like we're going outside of areas that are i=
n scope for the IETF.)</div>
<div><br>
</div>
<div>My 2 cents,</div>
<div>Dan</div>
<div><br>
</div>
<div>
<div apple-content-edited=3D"true">
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); position: static; z-index: auto; ">
--</div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Dan York</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Senior Content Strategist, Internet Socie=
ty</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif"><a href=3D"mailto:york@isoc.org">york@iso=
c.org</a> &nbsp; &#43;1-802-735-1624</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Jabber: <a href=3D"mailto:york@jabber.iso=
c.org">york@jabber.isoc.org</a>&nbsp;</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Skype: danyork &nbsp; <a href=3D"http://t=
witter.com/danyork">
http://twitter.com/danyork</a></font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif"><br>
</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); position: static; z-index: auto; ">
<font face=3D"Calibri,sans-serif"><a href=3D"http://www.internetsociety.org=
/deploy360/">http://www.internetsociety.org/deploy360/</a>&nbsp;</font></di=
v>
<div><font face=3D"Calibri,sans-serif"><br>
</font></div>
</div>
</div>
</div>
</body>
</html>

--_000_339296B636504EC6A7033DDD0F2522D8isocorg_--


From nobody Wed Apr 30 12:12:55 2014
Return-Path: <nweaver@icsi.berkeley.edu>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39B311A889A for <perpass@ietfa.amsl.com>; Wed, 30 Apr 2014 12:12:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.552
X-Spam-Level: 
X-Spam-Status: No, score=-2.552 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZfYR6eSCMUzu for <perpass@ietfa.amsl.com>; Wed, 30 Apr 2014 12:12:46 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id 205EF1A8839 for <perpass@ietf.org>; Wed, 30 Apr 2014 12:12:46 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 7D9B02C403B; Wed, 30 Apr 2014 12:12:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id AhP7OARbb1zq; Wed, 30 Apr 2014 12:12:40 -0700 (PDT)
Received: from gala.icir.org (gala.icir.org [192.150.187.130]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 8D9C22C400C; Wed, 30 Apr 2014 12:12:40 -0700 (PDT)
Content-Type: multipart/signed; boundary="Apple-Mail=_8EC6087E-F072-4D6F-B345-FAD32F426ACE"; protocol="application/pgp-signature"; micalg=pgp-sha512
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
From: Nicholas Weaver <nweaver@icsi.berkeley.edu>
In-Reply-To: <339296B6-3650-4EC6-A703-3DDD0F2522D8@isoc.org>
Date: Wed, 30 Apr 2014 12:12:39 -0700
Message-Id: <BB48E5E4-4EDB-47B9-9076-B8940708D88E@icsi.berkeley.edu>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <D10D2737-322D-40CC-8C8F-B368A4A8CD24@isoc.org> <565e30ccbded447185c88246d6468097@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <339296B6-3650-4EC6-A703-3DDD0F2522D8@isoc.org>
To: Dan York <york@isoc.org>
X-Mailer: Apple Mail (2.1874)
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/oCLZs8gTxHm4PpXL8Og7I-c7uJA
Cc: Trevor Freeman <trevorf@exchange.microsoft.com>, "perpass@ietf.org" <perpass@ietf.org>, Nicholas Weaver <nweaver@icsi.berkeley.edu>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Apr 2014 19:12:48 -0000

--Apple-Mail=_8EC6087E-F072-4D6F-B345-FAD32F426ACE
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252


On Apr 30, 2014, at 12:08 PM, Dan York <york@isoc.org> wrote:
>> There have been a number of people who have offered opinions in this =
area, and none so far have pointed to a technology issue as holding up =
deployment.  Far from it, there seems to be advances in many area. This =
all seems goodness.
>=20
> Yes, for the most part the issues holding up DNSSEC deployment are NOT =
technology-related.   That said, there *are* some remaining technology =
issues that do cause problems, most notably the key rollover issue being =
discussed in multiple drafts within DNSOP right now.  Additionally, =
while we have come far in automation, there are still ways we could make =
the DNSSEC signing process even easier for smaller and less tech-savvy =
users.
>=20
> But overall the technology behind DNSSEC is very solid and is not the =
deployment challenge.

There is one key problem with DNSSEC to the user's system: 1%+ of the =
network rejects it, because the user is behind a device which blocks =
3rd-party DNS requests and forces all requests through a =
non-DNSSEC-supporting recursive resolver. =20

This means that any protocol which uses DNSSEC to distribute key =
material needs an alternate mechanism to transmit the DNSSEC information =
to the client.

--
Nicholas Weaver                  it is a tale, told by an idiot,
nweaver@icsi.berkeley.edu                full of sound and fury,
510-666-2903                                 .signifying nothing
PGP: http://www1.icsi.berkeley.edu/~nweaver/data/nweaver_pub.asc


--Apple-Mail=_8EC6087E-F072-4D6F-B345-FAD32F426ACE
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQIcBAEBCgAGBQJTYUsnAAoJEG2B1w+SDi/u5BsQALrIZKboqjpIJx6cPoy+pJAb
QWGrM40lPpcdIOWHejaN+tq8/kcHHMRLZ3aWkKEPSBpNcicTcwO0brcqBG6RFYUI
hf3S1GYp+5wFCLDwghwzpqQ2U8EHYXhAJ0KMbOozIX+bpmlkDygrvgFw/MIfQtVr
0fE58gbyZAbWrbTWaHGtoKlqQLDdQ1u/xxSIckzN4dPnpPxdi6sL/qINA3IDO8Vg
wHbK8cah9+lVICy1Id8eMNfPvzIkXd2p6paNydE8yzSuvm4m28LhMNkKu5m0TgZW
VjGWu99pcV5XJL+JoMtgcufTaEzh658hdlWcK9ZYBBjs4nfrMx2sE/pQzgWew55Q
oFFrbgzlqYCn1jqpGTKPaJFY/3xU4KPwg2ioHXDMq5MsCqzVGztptvJCS4MpXkK9
n3qa1ZaMezT7NUDgiN+Hx+sgB045udBvqwNJVdICM7WwBM8AMb96XCi7abLRb8l7
8MzUw9c9kbH/y8Uozt7n+JdCrV+ko5AXKnjg+BpuujI11/t3s1SNKseQxkGPrHAk
XAyOugWXb/vKBuWG38CaD+2oURUlXReksBhiw6vQRhC8sB3H6ioaRNlz6o7gY4nh
U0Dr9xfaXJ9dv+5audJGBXf9fHWVOI/laGXwQ66fD3qWrNFIfRHIxGfI58c0WmLN
QqXd50ZkxfOhAJSYk+4x
=WHSV
-----END PGP SIGNATURE-----

--Apple-Mail=_8EC6087E-F072-4D6F-B345-FAD32F426ACE--


From nobody Wed Apr 30 13:01:57 2014
Return-Path: <york@isoc.org>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDCB71A8893 for <perpass@ietfa.amsl.com>; Wed, 30 Apr 2014 13:01:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DQqbvz1x2fsL for <perpass@ietfa.amsl.com>; Wed, 30 Apr 2014 13:01:52 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1blp0186.outbound.protection.outlook.com [207.46.163.186]) by ietfa.amsl.com (Postfix) with ESMTP id A22E71A8895 for <perpass@ietf.org>; Wed, 30 Apr 2014 13:01:51 -0700 (PDT)
Received: from BLUPR06MB243.namprd06.prod.outlook.com (10.242.191.154) by BLUPR06MB244.namprd06.prod.outlook.com (10.242.191.153) with Microsoft SMTP Server (TLS) id 15.0.929.12; Wed, 30 Apr 2014 20:01:48 +0000
Received: from BLUPR06MB243.namprd06.prod.outlook.com ([169.254.2.21]) by BLUPR06MB243.namprd06.prod.outlook.com ([169.254.2.21]) with mapi id 15.00.0929.001; Wed, 30 Apr 2014 20:01:48 +0000
From: Dan York <york@isoc.org>
To: Nicholas Weaver <nweaver@icsi.berkeley.edu>
Thread-Topic: [perpass] Is DNSDEC a viable technology for perpass?
Thread-Index: Ac9jEJV0t/SMThoOQSO6AKB0jSL/VAAGswyAADBxIWAALpyeAAAAI52AAAG21wA=
Date: Wed, 30 Apr 2014 20:01:46 +0000
Message-ID: <0D5CA243-DBE9-4122-8844-05DF4944409A@isoc.org>
References: <4c73ca3fa5c24ace8dce760932e2f791@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <D10D2737-322D-40CC-8C8F-B368A4A8CD24@isoc.org> <565e30ccbded447185c88246d6468097@DFM-TK5MBX15-05.exchange.corp.microsoft.com> <339296B6-3650-4EC6-A703-3DDD0F2522D8@isoc.org> <BB48E5E4-4EDB-47B9-9076-B8940708D88E@icsi.berkeley.edu>
In-Reply-To: <BB48E5E4-4EDB-47B9-9076-B8940708D88E@icsi.berkeley.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [2604:6000:9fc0:53:801e:5527:2cfe:8df6]
x-forefront-prvs: 0197AFBD92
x-forefront-antispam-report: SFV:NSPM; SFS:(10019001)(428001)(24454002)(189002)(199002)(377454003)(76482001)(74502001)(74662001)(31966008)(46102001)(77982001)(81542001)(81342001)(83716003)(87936001)(20776003)(86362001)(2656002)(2171001)(92726001)(99286001)(80022001)(82746002)(50986999)(36756003)(16236675002)(92566001)(99396002)(15202345003)(15975445006)(83072002)(85852003)(33656001)(79102001)(80976001)(83322001)(4396001)(15395725003)(101416001)(76176999)(54356999)(19580405001)(19580395003)(100906001); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR06MB244; H:BLUPR06MB243.namprd06.prod.outlook.com; FPR:BFC8553F.2FFCA7E3.B9D333C8.A4149B8.20202; MLV:sfv; PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
received-spf: None (: isoc.org does not designate permitted sender hosts)
Content-Type: multipart/alternative; boundary="_000_0D5CA243DBE94122884405DF4944409Aisocorg_"
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
Archived-At: http://mailarchive.ietf.org/arch/msg/perpass/b1Ua7-DZO8Apv-MhZ3XzccnExLA
Cc: "perpass@ietf.org" <perpass@ietf.org>, Trevor Freeman <trevorf@exchange.microsoft.com>
Subject: Re: [perpass] Is DNSDEC a viable technology for perpass?
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Apr 2014 20:01:56 -0000

--_000_0D5CA243DBE94122884405DF4944409Aisocorg_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable




On Apr 30, 2014, at 3:12 PM, Nicholas Weaver <nweaver@icsi.berkeley.edu<mai=
lto:nweaver@icsi.berkeley.edu>> wrote:

On Apr 30, 2014, at 12:08 PM, Dan York <york@isoc.org<mailto:york@isoc.org>=
> wrote:

But overall the technology behind DNSSEC is very solid and is not the deplo=
yment challenge.

There is one key problem with DNSSEC to the user's system: 1%+ of the netwo=
rk rejects it, because the user is behind a device which blocks 3rd-party D=
NS requests and forces all requests through a non-DNSSEC-supporting recursi=
ve resolver.

Yes, this is an issue.  Wes Hardaker, Olafur Gudmundsson and Suresh Krishna=
swamy have done a good job of documenting this and other related issues in =
this I-D:

http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-roadblock-avoidance

(And they are certainly open to comments and feedback on the draft.)

Dan

--
Dan York
Senior Content Strategist, Internet Society
york@isoc.org<mailto:york@isoc.org>   +1-802-735-1624
Jabber: york@jabber.isoc.org<mailto:york@jabber.isoc.org>
Skype: danyork   http://twitter.com/danyork

http://www.internetsociety.org/deploy360/


--_000_0D5CA243DBE94122884405DF4944409Aisocorg_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <9DE3B58EC599B14388633759F1C81C28@namprd06.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
<br>
<div apple-content-edited=3D"true">
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); position: static; z-index: auto; ">
<br>
</div>
</div>
<div><br>
</div>
<div>
<div>On Apr 30, 2014, at 3:12 PM, Nicholas Weaver &lt;<a href=3D"mailto:nwe=
aver@icsi.berkeley.edu">nweaver@icsi.berkeley.edu</a>&gt; wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">On Apr 30, 2014, at 12:08 PM, Dan York &lt;<a hre=
f=3D"mailto:york@isoc.org">york@isoc.org</a>&gt; wrote:<br>
<blockquote type=3D"cite"><br>
But overall the technology behind DNSSEC is very solid and is not the deplo=
yment challenge.<br>
</blockquote>
<br>
There is one key problem with DNSSEC to the user's system: 1%&#43; of the n=
etwork rejects it, because the user is behind a device which blocks 3rd-par=
ty DNS requests and forces all requests through a non-DNSSEC-supporting rec=
ursive resolver. &nbsp;<br>
</blockquote>
<div><br>
</div>
<div>Yes, this is an issue. &nbsp;Wes Hardaker, Olafur Gudmundsson and Sure=
sh Krishnaswamy have done a good job of documenting this and other related =
issues in this I-D:</div>
<div><br>
</div>
<a href=3D"http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-roadblock-avo=
idance">http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-roadblock-avoida=
nce</a></div>
<div><br>
</div>
<div>(And they are certainly open to comments and feedback on the draft.)</=
div>
<div><br>
</div>
<div>Dan</div>
<div><br>
</div>
<div apple-content-edited=3D"true">
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
--</div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Dan York</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Senior Content Strategist, Internet Socie=
ty</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif"><a href=3D"mailto:york@isoc.org">york@iso=
c.org</a> &nbsp; &#43;1-802-735-1624</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Jabber: <a href=3D"mailto:york@jabber.iso=
c.org">york@jabber.isoc.org</a>&nbsp;</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif">Skype: danyork &nbsp; <a href=3D"http://t=
witter.com/danyork">
http://twitter.com/danyork</a></font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); ">
<font face=3D"Calibri,sans-serif"><br>
</font></div>
<div style=3D"font-family: Calibri, sans-serif; font-size: 14px; background=
-color: rgb(255, 255, 255); position: static; z-index: auto; ">
<font face=3D"Calibri,sans-serif"><a href=3D"http://www.internetsociety.org=
/deploy360/">http://www.internetsociety.org/deploy360/</a>&nbsp;</font></di=
v>
<div><font face=3D"Calibri,sans-serif"><br>
</font></div>
</div>
</body>
</html>

--_000_0D5CA243DBE94122884405DF4944409Aisocorg_--

