| ▲ | cortesoft 2 days ago |
| TLS is to protect you from malicious actors somewhere along your connection path. DNS can't help you. Just imagine you succeeded in inventing a perfectly secure DNS server. Great, we know this IP address we just got back is the correct one for the server. Ok, then I go to make a connection to that IP address, but someone on hop 3 of my connection is malicious, and instead of connecting me to the IP, just sends back a response pretending to be from that IP. How would I discover this? TLS would protect me from this, perfectly secure DNS won't. |
|
| ▲ | parliament32 a day ago | parent [-] |
| If you had a perfectly secure DNS service, you could just stick the certificate fingerprint in DNS and be done. No need for trust stores, CAs, trust chains, OSCP/CRLs... |
| |
| ▲ | waste_monk a day ago | parent | next [-] | | Indeed, this already exists with record types such as TLSA, SMIMEA, and CERT. However I don't believe I've ever seen it used "in the wild". | |
| ▲ | cortesoft a day ago | parent | prev [-] | | How would you revoke a certificate? If you are running a malicious DNS server, couldn't you just refuse the update and keep servicing the prior results? | | |
| ▲ | parliament32 a day ago | parent [-] | | If the DNS service is "perfectly secure", we're assuming MITM attacks are impossible. You wouldn't need to revoke anything, you just update the fingerprint in the record. | | |
| ▲ | cortesoft a day ago | parent [-] | | Why would DNS being perfectly secure make MITM attacks impossible? It might be impossible to hijack DNS, but after DNS resolution happens, then the actual connection via IP address has to happen. If you are saying every packet sent is secure, then it would have nothing to do with DNS? | | |
| ▲ | cyphar a day ago | parent [-] | | You could store the certificate hashes in DNS (i.e., use DANE instead of the CA PKI) and so a MITM on the actual connection wouldn't succeed. | | |
| ▲ | cortesoft a day ago | parent [-] | | Right, but what if the certificate is compromised? How would your revoke it? | | |
| ▲ | cyphar 20 hours ago | parent [-] | | If the DNS entries for the certificates have a very short TTLs (i.e., 2 minutes) then you wouldn't need explicit revocation infrastructure. It would probably take more than 2 minutes for CRLs or OSCP changes to propagate anyway. (I'm not necessarily in favour of this, I just don't see the revocation part as being the main issue.) |
|
|
|
|
|
|