Stephen Farrell has entered the following ballot position for
draft-ietf-dnsop-dnssec-roadblock-avoidance-04: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-roadblock-avoidance/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------


Why omit sha256 (in particular Alg = 8) from this?  That
seems like a quite bad plan and *not* a BCP given our
current knowledge of hash functions.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


general, mostly 3.x.y: it'd have been nice to include a
dig command line for each of these tests - that'd save the
non-expert reader some time and allow easy scripting of
most of this BCP.

general: Why not say to include a test with a known, but
not well-known, public key (or DS) to check if anyone on
the path is fibbing? E.g. a tester could remember a few
public keys and check that they've not changed in a new
location.  While that may only catch out a cheating real
parent, did you consider including such a test?

- 3.1.4: How is a "recently defined type" a reasonable
thing to check for in a BCP? Seems odd anyway.

- 6.1: what if there is no user? Why not recommend telling
some network observatory? Aren't there some for DNSSEC?


_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to