At 23:49 +0200 8/23/12, Peter Koch wrote:
Dear DNSOP WG,

this is to initiate a working group last call (WGLC) for

        "DNSSEC Key Timing Considerations"
        draft-ietf-dnsop-dnssec-key-timing-03.txt
        <http://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-key-timing/>

First, my blanket objection to the draft, which isn't meant to be an insult to the effort that has gone into it.

The draft is too detailed.

Ok, I get that that is the purpose. And it achieves that, and probably should be lauded for that and be published for that. But, as an operator/implementor, the draft doesn't cut to the chase.

I first mentioned this a long time ago, and usually would just let it drop. But in the last few weeks a senior developer said the same to me - it's really well detailed, but very complex. He also added that our design complied with it in a very simplified form. I replied that that was no accident. ;)

So - I admire this draft, but wish there was a Gerber-ized version. (Gerber being a brand of baby food.)

To give a concrete example of what I mean by too detailed - Dprp (propagation delay) is something that can be ignored with the advent of NOTIFY and IXFR. Theoretically it is there, practically it isn't there.

Some specific comments:

Section 2.1

#   Of three methods, Double-Signature is conceptually the simplest -
#   introduce the new key and new signatures, then approximately one TTL
#   later remove the old key and old signatures.  Pre-Publication is more

Which TTL? The TTL of the DNSKEY set, the TTL that is the largest value of all the TTLs in the zone, etc.?

Because of that question, I disagree that double signature is the simplest. (I'm just sayin', that's my opinion.) I think pre-pub is simpler because I know what TTL is involved (DNSEKEY). For signatures, the TTL might vary through the set.

Section 2.3

#   +------------------+------------------+-----------------------------+
#   | ZSK Method       | KSK Method       | Description                 |
#   +------------------+------------------+-----------------------------+
#   | Pre-Publication  | (not applicable) | Publish the DNSKEY before   |
#   |                  |                  | the RRSIGs.                 |

Why is this "not applicable" for KSK? A KSK can be listed before it is used as one.

Perhaps it isn't "not applicable" but "not realistic/sensible/practical".

#   | (not applicable) | Double-DS        | Publish DS before the       |
#   |                  |                  | DNSKEY.                     |

This one is non-sensical for KSK. As an operator, I'd want to test locally before involving another party.

I guess my notes here reflect that I see this document as helping operations as opposed to being an analysis of the protocol engineering.

Section 4.

#   The aim of the emergency rollover is to allow the zone to be re-
#   signed with a new key as soon as possible.  As a key must be in the
#   ready state to sign the zone, having at least one additional key (a
#   standby key) in this state at all times will minimise delay.

I disagree with that goal. In designing emergency key changes, we realized the goal is to minimize operational disruption, not minimize time until a new key is "in place." In some cases, a key "break" might be a local event, local in the sense of the target name or the target of the poisoning. With this in mind, the only difference between a scheduled key change and an emergency key change is whether it is planned or not (;)) and how much more you pester the parent for the DS change (if needed).

And the latter sentence might be countered with - having a standby key is a tradeoff against having smaller responses. (The same old "time vs. space" tradeoff.) Here, it's a matter of optimizing for the sunny day or the cloudy day.

Section 6

#   The reader is therefore reminded that DNSSEC is, as of date of
#   publication, in the early stages of deployment, and best practices
#   may further develop over time.

This is true. I wish this would be emphasized in the earlier parts of the document.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis NeuStar You can leave a voice message at +1-571-434-5468

2012...time to reuse those 1984 calendars!
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to