From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2.tohojo.dk (mail2.tohojo.dk [IPv6:2a01:4f8:200:3141::101]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by huchra.bufferbloat.net (Postfix) with ESMTPS id EE15221F144 for ; Sun, 30 Mar 2014 11:38:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at example.com In-Reply-To: DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=toke.dk; s=201310; t=1396204694; bh=hMkdxWuuRoE0dadqO8qvLk3jFevx8gxWh8h3l0Agcvo=; h=References:Subject:From:Date:To:CC; b=LeIQpUVyQPSWRxxwpHMAs2YBFYbI8sbpls87SND1dWKt1aR7vFT0r5DKg+QnbaHzo 7k6Wevaary9ebDfTELxrvX9tQgV6BsM82TQGW4ttKrrt3g1NKI/8UlQTVbinVz2tsm qnUluvrFjuAFvbGDQTptSOnLTbnhvwjNjQtlvxNQ= References: <532DD9DD.8040301@thekelleys.org.uk> <871txut453.fsf@alrua-x1.karlstad.toke.dk> <532DE7A8.3010504@thekelleys.org.uk> <87ppleroks.fsf@alrua-x1.karlstad.toke.dk> <53348C32.4040907@thekelleys.org.uk> <87ha6idabz.fsf@alrua-x1.karlstad.toke.dk> <53353C07.9030000@thekelleys.org.uk> <87eh1madfy.fsf@toke.dk> <533551F6.9010402@thekelleys.org.uk> <87lhvu8uqi.fsf@toke.dk> <5335E1BD.7010304@thekelleys.org.uk> <87k3bdbbt6.fsf@alrua-x1.karlstad.toke.dk> <87bnwpb7f7.fsf_-_@alrua-x1.karlstad.toke.dk> <421.1396128076@sandelman.ca> <877g7bbz5g.fsf@alrua-x1.karlstad.toke.dk> Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 From: =?ISO-8859-1?Q?Toke_H=F8iland-J=F8rgensen?= Date: Sun, 30 Mar 2014 20:38:04 +0200 To: Dave Taht Message-ID: Cc: "cerowrt-devel@lists.bufferbloat.net" Subject: Re: [Cerowrt-devel] DNSSEC & NTP Bootstrapping -- prototype! X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 30 Mar 2014 18:38:26 -0000 > > Well conceivably you could be in a situation where the roots > validate, > > but validation fails further down the chain, making that scheme fail > in > > weird and unpredictable ways? > > http://www.bortzmeyer.org/dns-routing-hijack-turkey.html > > ? I was thinking more about the case where, say, the root server keys validate, but the keys further down the chain have been changed, and the clock is set to a time in the interval between the respective beginnings of validity time... I would think that could happen with no malicious intent way too often for the root keys to be a very useful heuristic to use... -Toke