Thanks for the response. Discussion inline, with things that appear to be addressed removed.

Ben.

On 8 Jul 2016, at 16:26, Wes Hardaker wrote:

"Ben Campbell" <[email protected]> writes:

[...]


- 1.2, 2nd paragraph: Is "full non-support" effectively different from
"non-support" in this context?

CHanged to "Detecting complete lack of support", which I hope works for you?

It answers my question. But don't the described tests detect degrees of non-supportness?


Do we have reason to expect the github project to be maintained for the
life of the RFC?

I wondered about including such a URL.  I doubt github or olafur will
ever drop the repository, however.

I'm okay if the answer is "yes" or even "we hope so"; I just want to make sure people thought about it.


- 3.1.1 et. al. : Do we have reason to believe the dnssec-tools.org
domain will be maintained for the life of the RFC?

I think for some of the tests we may be able to use the root of the DNS
instead.  However, in some cases we need specific data types.

I have no intention of ever dropping the signing of dnssec-tools.org,
and my co-workers have backup responsibility for it and the means to
sign it should I get thrown in jail by the protocol police, eg.

(repeat previous comment)



[...]


-8: Seems like there could be  more to say about the potential
consequences about the “fail or proceed without security” decision in 6
and 6.1.

I think the world is very much at a loss as to the best thing to do in
that case.  And is likely very case specific.  Military installations
tend to be a bit more strict about continuing through to a unacceptable security certificate, eg. I'm not sure we can enumerate every context, but rather say each local policy will need to do what is appropriate for them.


I think it would be useful to say _that_. (as in "here's a security consideration people need to, well, consider")

--
Wes Hardaker
Parsons

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to