Scott Rose wrote:

The original RFC 4641 came out before the update-timers draft became an RFC. The revision would need to incorporate that as well as the improved crypto stuff.



For the record, the DNSSEC deployment in .org has been approved by the ICANN board

http://www.icann.org/minutes/resolutions-26jun08.htm#_Toc76113176

while the DNSSEC experts at PIR (.org registry manager) stated publicly

[quote] Concerned about “stopping DNSSEC” if needed
• Proposes implementing RFC 5011
• In our opinion – this does not solve the problem, since a complete key set compromise would still need a “full stop” [/quote]

Ref: http://par.icann.org/files/paris/RaadDNSSEC.pdf on slide 4.

This is at least some feedback from experts with direct operational accountability for non-root-zone KSK management.


Personally, I think TA management guidelines for non-root-zone management is inefficient use of standards drafting resources. Instead, simply insist that the parent zone should support DNSSEC at the earliest opportunity - NSEC3 opt-out is available for large parent zones.


The discussions about TA repositories are addressing the same issue (IOT manager, the poor little orphan of DNSSEC) on a different approach. I guess DNSOP might explicitly exclude the registration of KSKs in TA repositories from the scope of an RFC4641 revision effort.


Best luck to those who will contribute to this document drafting effort, if any!


--

- Thierry Moreau


So yes, I would support this effort.

Scott

Paul Hoffman wrote:

Greetings. I had a brief discussion with Olaf Kolkman about some deficiencies in RFC 4641, and he agreed to revise the document if the WG is interested. This message is to start gauging interest in that task.

I started reading RFC 4641 when I was on the panel at ICANN that reviewed PIR's proposal to start signing .org. I am not a DNSSEC operator (yet), so I came to the document with a novice's eyes. There are three areas which I found problematic:

- The cryptography that got added after WG LC is flawed. The calculations of appropriate key sizes starts with solid numbers (quoted from an RFC that Hilarie Orman and I wrote) and then quick falls into handwaving. It can be greatly simplified.

- The discussion of key rollover times has no justification for the times chosen. There is no discussion of the attacks that the rollover is trying to mitigate. Such a discussion would help a zone decide that zone's rollover policies.

- It is not clear when the document is talking about publishing keys as trust anchors and when it is talking about publishing them in a signed parent zone. These two scenarios are vastly different, particularly with respect to key rollover.

Olaf agreed that there may be more operational input from people who are currently deploying DNSSEC, and that this document might be ripe for a renewal even though it is less than two years old. How do people in the WG feel about this?

--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop



_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to