Linked by Thom Holwerda on Fri 21st Jun 2013 19:08 UTC
Legal "Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency. The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate." Woah.
Thread beginning with comment 565519
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[9]: Enough already
by Alfman on Mon 24th Jun 2013 18:17 UTC in reply to "RE[8]: Enough already"
Alfman
Member since:
2011-01-28

Ok we're cross talking here. Your talking about the root DNS zones, DNSSEC changes nothing in regards to how these zones are managed, I'm speaking strictly in terms of the cryptographic root signing keys for DNSSEC itself. The mathematical properties which allow PKI to provide immense scalability also make it imperative that the root keys must never be leaked, otherwise the entire chain of trust is broken.

If I had access to DNSSEC root signing key, I could then create a fictitious chain of trust stemming from root and conduct man an the middle attacks against all DNSSEC implementations which trust the official public keys, which will be all of them. I don't need physical access to the root namesevers to pull it off, just the ability to intercept and forge packets to the target who will trust my forgeries because my cryptographic signatures will be valid. *THIS* is what I'm talking about. I'm *NOT* talking about coercing zone administrators to change the zone, that's completely different from breaking the cryptographic chain of trust.

Reply Parent Score: 2

RE[10]: Enough already
by Lennie on Tue 25th Jun 2013 00:07 in reply to "RE[9]: Enough already"
Lennie Member since:
2007-09-22

I didn't realize from your previous comment you meant Man-In-The-Middle-attack.

You mentioned that the root key is static, it isn't.

It's multiple keys, a zone signing key and a key signing key, you can't get access to the key signing key without people finding out.

The zone signing key is only valid for a limited time.

Reply Parent Score: 2

RE[11]: Enough already
by Alfman on Tue 25th Jun 2013 03:19 in reply to "RE[10]: Enough already"
Alfman Member since:
2011-01-28

"It's multiple keys, a zone signing key and a key signing key, you can't get access to the key signing key without people finding out."

The keys I'm talking about are ICANN's root keys at http://data.iana.org/root-anchors/ "CN=ICANN Root CA"

The question was never whether you or I can get access to them, but whether the NSA could, and I don't think we're any closer to closure than when we started. Are you ok with leaving it as an open question? ;)

Reply Parent Score: 2