Stephen Farrell has entered the following ballot position for draft-ietf-dnsop-dnssec-roadblock-avoidance-04: Discuss
When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html for more information about IESG DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-roadblock-avoidance/ ---------------------------------------------------------------------- DISCUSS: ---------------------------------------------------------------------- Why omit sha256 (in particular Alg = 8) from this? That seems like a quite bad plan and *not* a BCP given our current knowledge of hash functions. ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- general, mostly 3.x.y: it'd have been nice to include a dig command line for each of these tests - that'd save the non-expert reader some time and allow easy scripting of most of this BCP. general: Why not say to include a test with a known, but not well-known, public key (or DS) to check if anyone on the path is fibbing? E.g. a tester could remember a few public keys and check that they've not changed in a new location. While that may only catch out a cheating real parent, did you consider including such a test? - 3.1.4: How is a "recently defined type" a reasonable thing to check for in a BCP? Seems odd anyway. - 6.1: what if there is no user? Why not recommend telling some network observatory? Aren't there some for DNSSEC? _______________________________________________ DNSOP mailing list [email protected] https://www.ietf.org/mailman/listinfo/dnsop
