Bitcoin Forum
December 15, 2024, 12:10:14 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: .  (Read 2179 times)
freeloader247 (OP)
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
June 30, 2011, 05:36:53 AM
Last edit: December 09, 2024, 11:15:43 PM by freeloader247
 #1

.
marcus_of_augustus
Legendary
*
Offline Offline

Activity: 3920
Merit: 2349


Eadem mutata resurgo


View Profile
June 30, 2011, 09:11:05 AM
 #2


Following ... maybe rename title "Namecoin SSL/TLS" ... (in reference to RFC above.)?

talpan
Full Member
***
Offline Offline

Activity: 228
Merit: 100


View Profile
July 07, 2011, 08:53:29 AM
 #3

I'm following this thread, I'm very interested in Namecoin.
Metal
Newbie
*
Offline Offline

Activity: 17
Merit: 0


View Profile
July 25, 2011, 01:39:52 AM
 #4

FYI, Namecoin's domain spec ( http://dot-bit.org/Domain_names#TLS_support ) has something about SSL/TLS support.

Additionally, I'm putting some code together to implement the "fingerprint" field at https://github.com/itsnotlupus/nmcsocks

The general idea is to require .bit domains to use self-signed certs for SSL, and have a local namecoin client act as a man in the middle, verify that the self-signed certs' fingerprint matches the fingerprints found in the namecoin record for the same domain, and rephrase the SSL connection to the browser to appear to use a certificate signed by a "central" namecoin authority (a locally generated CA cert the user has to install in their browser.)

That's not exactly the same implementation as what freeloader247 suggested, but the end result is similar in that you're eliminating yet another central authority when interacting with namecoin domains.
As a bonus, browsers don't need to be tweaked beyond adding a new certificate authority in their browser and using a local namecoin proxy, and certificates can be created/updated/managed at will, as long as their fingerprint is present in the necessary namecoin record.

As an aside, the namecoin fingerprint field could also be used to validate other keys sent by a host to authenticate itself, SSH coming to mind here.

*edit: I just noticed this is almost exactly what da2ce7 proposed in a post from last December:
Since the domains all have fingerprints of their TLS certificates, when one connects to a server defined by a BitDNS record and the server replys with a secure connection, the client can check if the secure connection is valid, not by using a CA, but rather cross-referencing it with the fingerprint included in the block chain.  Man-In-The-Middle attacks are very, very, very difficult under this system.
Jine
Sr. Member
****
Offline Offline

Activity: 403
Merit: 250


View Profile
July 25, 2011, 03:31:46 PM
 #5

Let me get this straight - you're trying to do a "new" implementation of DNSSEC?

Previous founder of Bit LC Inc. | I've always loved the idea of bitcoin.
Metal
Newbie
*
Offline Offline

Activity: 17
Merit: 0


View Profile
July 25, 2011, 06:39:13 PM
 #6

Let me get this straight - you're trying to do a "new" implementation of DNSSEC?

In the same way one could call Namecoin a "new" implementation of DNS, I suppose.

I'd like to think Namecoin is sufficiently different and unique to justify its existence.
With that said, the feature overlap between Namecoin and DNS/DNSSEC is not coincidental.

Unlike DNSSEC however, Namecoin is completely decentralized.
You can use TLS connections with namecoin domains without depending on anyone's authoritah.
marcus_of_augustus
Legendary
*
Offline Offline

Activity: 3920
Merit: 2349


Eadem mutata resurgo


View Profile
July 25, 2011, 09:02:36 PM
 #7

Let me get this straight - you're trying to do a "new" implementation of DNSSEC?

Interesting that you should bring up DNSSEC specifically since that is the technology some nutcase government is looking at for legislative attention.

I think the possibilities for the transport layer security is what is going to make namecoin a big winner. Form follows function.

The current centralised model of DNS is what has made DNSSEC dev. such a nightmare for end-to-end securing.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!