Dear all,

For what it's worth - all my concerns have been addressed. I believe
the document to be in good shape now and would support a progression
through WG LC. I appreciate the effort the authors have put into
making this an exemplary specification!

Kind regards,

Job


On Mon, Jun 11, 2018 at 7:30 PM, Warren Kumari <war...@kumari.net> wrote:
> Dear WG (and chairs),
>
> Firstly, thank you to everyone who supported this, those who provided
> comments (especially pull requests!) and implementers.
>
> We have made a number of improvements to the documents based upon your
> comments - the diff can be seen here:
> https://www.ietf.org/rfcdiff?url1=draft-ietf-dnsop-kskroll-sentinel-10&url2=draft-ietf-dnsop-kskroll-sentinel-14
>
> Possibly more helpful is the GitHub list of Pull Requests:
> https://github.com/APNIC-Labs/draft-kskroll-sentinel/pulls?q=is%3Apr+is%3Aclosed
>
> We've added an implementation section - I know that there were more "client"
> side (the Javascript or similar automated tests); I'd been keeping a note
> with a list, but seem to have misplaced it.
>
> BIND and Unbound now support this; AFAIK, Knot supports the older name.
>
>
> I *think* that we've managed to address the comments, but if we happened to
> miss yours, please let us know.
>
> From my read of the WGs views, these, being *labels*, are not *Special Use
> Domain Names*, and so don't need to be added to the SUDN registry.
>
> The authors would like to thank the WG again, and ask that WGLC be resumed.
>
> W
>
>
> On Tue, Apr 24, 2018 at 9:02 AM Ondřej Surý <ond...@isc.org> wrote:
>>
>> And the MR was peer-review and merged into BIND master branch with intent
>> to backport the feature into older release branches.
>>
>> I don’t think it’s a useful or helpful to change the rules for existing
>> adopted work.  We need to have a discussion on the mechanisms that would
>> allow implementors to know when to start the implementation of existing
>> draft. From implementors point, it makes little sense to start implementing
>> before the protocol change is almost fully baked (aka WGLC and further),
>> because until then the protocol might change considerably.
>>
>> So, if we require implementation report further down the road, it needs to
>> be more clearly defined than people suddenly shouting “this is not ready”
>> when WGLC starts.  And while the attempt to implement something is certainly
>> useful to get valuable feedback, it also imposes some costs (with undefined
>> limit) on implementors (especially the open source implementors) and it sort
>> of discards the whole “Proposed Standard” -> “Internet Standard”
>> classification at global IETF level.
>>
>> I get that we probably need something more lightweight than “Internet
>> Standard” at the WG level, but this needs to be discussed and consensus
>> reached.
>>
>> ISC gave our feedback during the implementation and here are some nits
>> from me (re-reading the document again):
>>
>> ~~~
>>
>> Section "2.  Protocol Walkthrough Example" will be made into Appendix at
>> publication time, so just reminder here that you also need to change the
>> references like "(see the logic below)” when you move the section - perhaps
>> add direct reference to the other section this refers to?
>>
>> ~~~
>>
>> The table in 3.2 says:
>>
>> "Key Tag is trusted” and “Key Tag is not trusted” - it seems little bit
>> confusing to me; I think that “Key is trusted” and “Key is not trusted”; or
>> some change similar to this needs to be made:
>>
>> “First, the resolver determines if the Key Tag is trusted by comparing
>> numerical value of <key-tag>
>>    to any of the Key Tags of an active root zone KSK which is
>>    currently trusted…"
>>
>> in paragraph just before the table you mix “Key Tag” and “keytag” and
>> there’s also <key-tag>…
>>
>> My understanding of the text and the proposed fix:
>>
>> […]
>>
>>    First, the resolver determines if the numerical value of <key-tag> is
>>    equal to any of the Key Tags of an active root zone KSK which is
>>    currently trusted by the local resolver and is stored in its store of
>>    trusted keys.  If a match is found the <key-tag> is trusted. An active
>>    root zone KSK is one which could currently be used for
>>    validation (that is, a key that is not in either the AddPend or
>>    Revoked state as described in [RFC5011]).
>>
>>    Second, the resolver alters the response being sent to the original
>>    query based on both the left-most label and the presence of a key
>>    with given Key Tag in the trust anchor store.  Two labels and two
>>    possible states of the <key-tag> generate four possible combinations
>>    summarized in the table:
>>
>>     Label      |   <key-tag> is trusted    |   <key-tag> is not trusted
>>     ------------------------------------------------------------------
>>     is-ta      | return original answer  | return SERVFAIL
>>     not-ta     | return SERVFAIL         | return original answer
>>
>> […]
>>
>> ~~~
>>
>>    o  A query name that is signed with a DNSSEC signature that cannot be
>>       validated (such as if the corresponding RRset is not signed with a
>>       valid RRSIG record).
>>
>> This is called “Bogus” by RFC 4033 Section 5 -> maybe a reference?
>>
>> ~~~
>>
>> In  Section: 7.  Privacy Considerations
>>
>> s/mechansim/mechanism/
>>
>> ~~~
>>
>> That is all folks.
>>
>> Cheers,
>> Ondrej
>> --
>> Ondřej Surý
>> ond...@isc.org
>>
>> > On 7 Apr 2018, at 08:27, Evan Hunt <e...@isc.org> wrote:
>> >
>> > On Fri, Apr 06, 2018 at 10:09:50PM -0400, Warren Kumari wrote:
>> >> I think I heard that ISC was considering adding support, but was
>> >> planning on waiting till RFC / some sort of LC.
>> >
>> > Yes. The work in progress is available here:
>> > https://gitlab.isc.org/isc-projects/bind9/merge_requests/123
>> >
>> > --
>> > Evan Hunt -- e...@isc.org
>> > Internet Systems Consortium, Inc.
>> >
>> > _______________________________________________
>> > DNSOP mailing list
>> > DNSOP@ietf.org
>> > https://www.ietf.org/mailman/listinfo/dnsop
>>
>
>
> --
> I don't think the execution is relevant when it was obviously a bad idea in
> the first place.
> This is like putting rabid weasels in your pants, and later expressing
> regret at having chosen those particular rabid weasels and that pair of
> pants.
>    ---maf
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to