Verifying Keys through Publicity and Communities of Trust: Quantifying Off-Axis Corroboration

IEEE Transactions on Parallel and Distributed Systems(2014)

引用 1|浏览0
暂无评分
摘要
The DNS Security Extensions (DNSSEC) arguably make DNS the first core Internet system to be protected using public key cryptography. The success of DNSSEC not only protects the DNS, but has generated interest in using this secured global database for new services such as those proposed by the IETF DANE working group. However, continued success is only possible if several important operational issues can be addressed. For example, .gov and .arpa have already suffered misconfigurations where DNS continued to function properly, but DNSSEC failed (thus, orphaning their entire subtrees in DNSSEC). Internet-scale verification systems must tolerate this type of chaos, but what kind of verification can one derive for systems with dynamism like this? In this paper, we propose to achieve robust verification with a new theoretical model, called Public Data, which treats operational deployments as Communities of Trust (CoTs) and makes them the verification substrate. Using a realization of the above idea, called Vantages, we quantitatively show that using a reasonable DNSSEC deployment model and a typical choice of a CoT, an adversary would need to be able to have visibility into and perform on-path Man-in-the-Middle (MitM) attacks on arbitrary traffic into and out of up to 90 percent of the all of the Autonomous Systems (ASes) in the Internet before having even a 10 percent chance of spoofing a DNSKEY. Further, our limited deployment of Vantages has outperformed the verifiability of DNSSEC and has properly validated its data up to 99.5 percent of the time.
更多
查看译文
关键词
Internet,public key cryptography,trusted computing,.arpa,.gov,AS,CoT,DNS security extensions,DNSKEY spoofing,DNSSEC deployment model,IETF DANE working group,Internet-scale verification systems,MitM,Vantages,autonomous systems,communities of trust,core Internet system,key verification,man-in-the-middle attacks,off-axis corroboration,public data,public key cryptography,secured global database,DNDKEY,DNSSEC,p2p,verification
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要