Hi,

I read this again. I still wonder if in the case of DNSSEC Delete
Algorithm it wouldn't be easier to say: In case the DNSSEC algorithm is
0, the Digest/Public Key MUST be ignored.

This way, you don't have to change the CDS/CDNSKEY format defined in RFC
7344, most likely causing less problems with deployed software.

Best regards,
  Matthijs

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop



On 31-10-16 16:35, internet-dra...@ietf.org wrote:
> 
> A New Internet-Draft is available from the on-line Internet-Drafts 
> directories.
> This draft is a work item of the Domain Name System Operations of the IETF.
> 
>         Title           : Managing DS records from parent via CDS/CDNSKEY
>         Authors         : Olafur Gudmundsson
>                           Paul Wouters
>       Filename        : draft-ietf-dnsop-maintain-ds-04.txt
>       Pages           : 10
>       Date            : 2016-10-31
> 
> Abstract:
>    RFC7344 specifies how DNS trust can be maintained across key
>    rollovers in-band between parent and child.  This document elevates
>    RFC7344 from informational to standards track and adds a standard
>    track method for initial trust setup and removal of secure entry
>    point.
> 
>    Changing a domain's DNSSEC status can be a complicated matter
>    involving multiple unrelated parties.  Some of these parties, such as
>    the DNS operator, might not even be known by all the organizations
>    involved.  The inability to disable DNSSEC via in-band signaling is
>    seen as a problem or liability that prevents some DNSSEC adoption at
>    large scale.  This document adds a method for in-band signaling of
>    these DNSSEC status changes.
> 
>    This document describes reasonable policies to ease deployment of the
>    initial acceptance of new secure entry points (DS records)
> 
>    It is preferable that operators collaborate on the transfer or move
>    of a domain.  The best method is to perform a Key Signing Key ("KSK")
>    plus Zone Signing Key ("ZSK") rollover.  If that is not possible, the
>    method using an unsigned intermediate state described in this
>    document can be used to move the domain between two parties.  This
>    leaves the domain temporarily unsigned and vulnerable to DNS
>    spoofing, but that is preferred over the alternative of validation
>    failures due to a mismatched DS and DNSKEY record.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-maintain-ds/
> 
> There's also a htmlized version available at:
> https://tools.ietf.org/html/draft-ietf-dnsop-maintain-ds-04
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-maintain-ds-04
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
> 

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to