| ▲ | ekr____ 4 hours ago | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Thanks for the explanation. It seems like there are two cases here: 1. Things that use TLS and hence the WebPKI 2. Other things. None of what you've written here applies to the TLS and WebPKI case, so I'm going to take it that you're not arguing that DNSSEC validation by clients provides a security improvement in that case. That leaves us with the non-WebPKI cases like SSH. I think you've got a somewhat stronger case there, but not much of one, because those cases can also basically go back to the WebPKI, either directly, by using WebPKI-based certificates, or indirectly, by hosting fingerprints on a Web server. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | tptacek 4 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||||||||||||||
In practice, fleet operators run their own PKIs for SSH, so tying them to the DNSSEC PKI is a strict step backwards for SSH security. There may be other applications where a global public PKI makes sense; presumably those applications will be characterized by the need to make frequent introductions between unrelated parties, which is distinctly not an attribute of the SSH problem. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | indolering 4 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||||||||||||||
> None of what you've written here applies to the TLS and WebPKI case, so I'm going to take it that you're not arguing that DNSSEC validation by clients provides a security improvement in that case. It would benefit the likes of Wikileaks. You could do all the crypto in your basement with an HSM without involving anyone else. > That leaves us with the non-WebPKI cases like SSH. I think you've got a somewhat stronger case there, but not much of one, because those cases can also basically go back to the WebPKI, either directly, by using WebPKI-based certificates, or indirectly, by hosting fingerprints on a Web server. But do they? That requires adding support for another protocol. I would like to live in a world where I don't have to copy/paste SSH keys from an AWS console just to have the piece-of-mind that my SSH connection hasn't been hijacked. | |||||||||||||||||||||||||||||||||||||||||||||||||||||