story
1. I sign my domains and generate a DS record.
2. I upload the DS record to my registrar who passes the DS record up to the .COM registry.
Now, when someone does DNSSEC validation on my DNS records, they wind up doing this process:
1. Going through the DNS process to get my DNS records as well as the DNSKEY and RRSIGs.
2. Following the chain of DS records up to the .COM registry and on up to the root of DNS... being able to validate along the way the integrity of the records.
Where do world governments get to interfere here?
If a govt were able to manipulate the TLD registry the best they could do would be to point my domain to some other name servers that weren't mine... is THAT the attack you see? I seriously would like to understand.
This is not, of course, the only problem with DNSSEC. It's also an archaic 1990s cryptosystem built around 1024-bit PKCS1v15 RSA, which by default makes every DNS record in the system public, trivially dramatically amplifies DNS traffic, and does all this without actually securing DNS lookups from browsers, which still run the old insecure DNS protocol to talk to DNSSEC-enabled caches.
It's a silly system, has been since the USG paid TIS to design it in the 1990s, is nearing two decades delayed, and isn't going to happen. Look at what Chris Palmer from Google has to say about it. Whatever the opposite of "betting on it" is, that's what Chromium is doing with DNSSEC. We should get to work designing a modern alternative.
http://www.zdnet.com/article/europes-answer-to-terror-attack...
Welcome to the new world.