Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> But that's on top of the domain registry which underpins everything.

Everything but trust. A registry lying to issue certificates for its domains will become visible real quick. If CT makes "creaky WebPKI usable" then DNSSEC is just unusable.

> Yet most of the large TLDs manage with less screwups than many of the CAs.

Hard to screw up what you don't have. Even if a bunch do implement DNSSEC, nobody has really trusted them with the task in a way that it'd actually matter.

TLD operators can't even mandate the use of DNSSEC by registrars, requiring audits is lightyears away in comparison. WebPKI at least does that.

Nobody in their right mind would be claiming an opaque system with zero oversight is somehow better for trust, than the alternative.



The above comment is not right. How do the registrar come into this?

I don't know what you base your experience on, but it is not representative of the better ccTLDs. The oversight there are beyond what you have in any CA. That much is a fact.

If you have specific criticism, feel free to ask any of the people concerned at for example the next IETF. In my experience criticism is welcomed and listened to. That is, indeed, what builds trust.


> The above comment is not right. How do the registrar come into this?

People often use their name servers (and possibly delegate a zone further) instead of adding their keys directly. Or at least people use their registrar's interface for managing those keys.

> The oversight there are beyond what you have in any CA. That much is a fact.

Absolutely not. There's no system for monitoring key (mis)usage at all. There isn't a way to mistrust anyone if they do violate any agreements.

Maybe you mean oversight internally by some ccTLDs, but that does not build trust externally.

> If you have specific criticism, feel free to ask any of the people concerned at for example the next IETF. In my experience criticism is welcomed and listened to. That is, indeed, what builds trust.

These issues have been described in detail, but you've skipped over them a few times now. Plus they are not for the IETF to solve really, as they mostly relate to the human concept of trust (or lack of it), not the raw technical cryptographical aspects.

What indeed would build trust would be adopting public audits, transparency and revocation methods from WebPKI.

Let's start by logging all zone files signed. The fact that this doesn't exist already shows how much worse DNSSEC is and don't skip this point this time.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: