Link to home
Start Free TrialLog in
Avatar of K K
K K

asked on

DANE and Convergence

What exactly are the DANE (DNS-authentication of name entities) and Convergence methods and how do they work in regards to SSL certified authorities?  What issues can they resolve over from the SSL Public key infrastructure? What are some pros and cons of each method.  I cannot seems to gain a solid grasp on the DANE and how it relates to DNSSEC.
Avatar of Adam Brown
Adam Brown
Flag of United States of America image

DANE is a method of managing Certificate Trust without requiring the certificate to be generated with a trusted CA. For instance, instead of using a Third Party CA to generate a certificate, you could have any certificate generated by a CA under your control signed by a DNSSEC root authority. The general purpose of this technique is to ensure validity without requiring explicit trust in the certificate generator. DNSSEC involves generating "signing" data at the root domain (.com, .net, and .org are root domains). Additional signing data verifying the validity of a system or certificate can be added through requests by subdomain (company.com is a subdomain of .com) owners. Those owners provide information on their certificates and the systems that will use them to the root domain owners, the root domain owners verify ownership of the domain and list the information in the DNSSEC root zone for other DNS servers to read and publish. Thus, any certificate utilizing DANE can be authenticated without requiring the involvement of a third party CA's universally distributed Root CA Certificate. This allows certificate authenticity to be verified through DNS instead of with a Root CA Certificate.

The Convergence method is a more or less distributed form of Certificate authentication. It works similarly to building normal certificates, but the trust is done through the use of "Notaries". While only one CA can currently be used to generate a specific certificate, with Convergence, you could have multiple sources of trust verification. Essentially, Convergence allows certificate trust to continue functioning even if an issuing authority is compromised. Normally, if a CA is compromised, every certificate generated by that CA has to be revoked and re-issued. This is considered a single point of failure. Convergence would allow individual notaries to be revoked when compromised, without requiring revocation of all certificates using that notary.

Both solutions are not fully developed yet, and both are designed only to improve the Authenticity function of Digital Certificates (The term SSL Certificate is a misnomer. SSL uses digital certificates, but is not the only protocol that can use them. And since SSL is currently considered less secure and most websites are being encouraged to move to TLS implementations instead, calling it an SSL Certificate is not technically correct or advisable). It does not improve a Certificate's ability to encrypt data, but instead changes the way that systems verify the validity of a Digital Certificate.

Does that help clarify things a little better?
ASKER CERTIFIED SOLUTION
Avatar of Adam Brown
Adam Brown
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of K K
K K

ASKER

Thank you for your explanation.  This is helpful.  However, who sets up the notaries in convergence?  Is an administrator required to oversee and how can we be assured that there will be many notaries to choose from?  For DANE it seems as the trust is left with the domain owner rather than a third party.  Isn't this still a concern for man-in-the-middle attacks?  What are some negatives for using these methods?
Avatar of K K

ASKER

Thank you for your explanation.  This is helpful.  However, who sets up the notaries in convergence?  Is an administrator required to oversee and how can we be assured that there will be many notaries to choose from?  For DANE it seems as the trust is left with the domain owner rather than a third party.  Isn't this still a concern for man-in-the-middle attacks?  What are some negatives for using these methods if they do gain traction?
DANE registration goes through too domain registrars, so you have to register with a company that assists in providing root DNS data, so it I still managed by a third party, but it doesn't rely on a root CA, so you can use your own certs without having to distribute your root CA cert.

Notaries are also run by third party organizations. You can register a notary, but it would have to function publicly and provide authentication data for anyone who wants to use it.

Both methods still require interaction with a third party trust provider to work, but both support verification from multiple sources.

The downside with these solutions is that they won't work if applications don't support them, and once you move over to them, you'll have no trust validity at all with when a non supporting app requests validity data with convergence. DANE will always work if you use a third party CA to create your cert, though.

To me, DANE seems most likely to have good adoption in the future because it relies on existing infrastructure and has some backward compatibility built in. Convergence will require too much investment to become viable.
Avatar of K K

ASKER

Thank you.