Re: [DNSOP] Proposed changes to RFC 4641: rollovers

2008-09-30 Thread Scott Rose
All of those issues relate to separate topics beyond the current scope of this effort. I was only thinking of authentication for the protocol. "Kept around" means there could be signatures out there still valid (sig validity period in the RRSIG) and in cache when the private portion is no

Re: [DNSOP] Proposed changes to RFC 4641: rollovers

2008-09-30 Thread TS Glassey
Scott - Original Message - From: "Scott Rose" <[EMAIL PROTECTED]> To: Sent: Tuesday, September 30, 2008 4:07 AM Subject: Re: [DNSOP] Proposed changes to RFC 4641: rollovers On Sep 29, 2008, at 7:46 AM, [EMAIL PROTECTED] wrote: any KSK can be used as a TA. there i

Re: [DNSOP] Proposed changes to RFC 4641: rollovers

2008-09-30 Thread Paul Hoffman
At 11:46 AM + 9/29/08, [EMAIL PROTECTED] wrote: your selection of 12-13 months and 25 years are suspect. Can you provide the underlaying bias for these tiemframes? The 12 month timeframe was adopted from the current 4641. I assume that this WG decided that, if you want to do rollovers to

Re: [DNSOP] Proposed changes to RFC 4641: rollovers

2008-09-30 Thread Scott Rose
On Sep 29, 2008, at 7:46 AM, [EMAIL PROTECTED] wrote: any KSK can be used as a TA. there is no way to know - unambigiously - that any given KSK is not being used as a TA in some validator. however, your assertion that at KSK should -never- be rolled unless compromise is known or strongly susp

Re: [DNSOP] Proposed changes to RFC 4641: rollovers

2008-09-29 Thread bmanning
any KSK can be used as a TA. there is no way to know - unambigiously - that any given KSK is not being used as a TA in some validator. however, your assertion that at KSK should -never- be rolled unless compromise is known or strongly suspected is -BAD- from an operational and liklely from a

Re: [DNSOP] Proposed changes to RFC 4641: rollovers

2008-09-29 Thread Paul Hoffman
At 6:23 AM -0700 9/29/08, Wes Hardaker wrote: > On Sun, 28 Sep 2008 21:14:34 -0700, Paul Hoffman <[EMAIL PROTECTED]> said: Overall I think the changes seem reasonable. However, I don't think everything is taken into account... I understand the desire for removing the specified timing ass

Re: [DNSOP] Proposed changes to RFC 4641: rollovers

2008-09-29 Thread Paul Hoffman
At 12:08 PM +0200 9/29/08, Matthijs Mekking wrote: I encourage making the 4641 document more up to date and adding better definitions. However, one issue draw my attention: I am not sure if doing key rollover in emergencies only is good practice, for a couple of reasons: * All keys have an expec

Re: [DNSOP] Proposed changes to RFC 4641: rollovers

2008-09-29 Thread TS Glassey
- Original Message - From: "Matthijs Mekking" <[EMAIL PROTECTED]> To: "Paul Hoffman" <[EMAIL PROTECTED]> Cc: Sent: Monday, September 29, 2008 3:08 AM Subject: Re: [DNSOP] Proposed changes to RFC 4641: rollovers -BEGIN PGP SIGNED MESSAGE- H

Re: [DNSOP] Proposed changes to RFC 4641: rollovers

2008-09-29 Thread Wes Hardaker
> On Sun, 28 Sep 2008 21:14:34 -0700, Paul Hoffman <[EMAIL PROTECTED]> said: Overall I think the changes seem reasonable. However, I don't think everything is taken into account... I understand the desire for removing the specified timing associated with key-age based on modern analysis. Bu

Re: [DNSOP] Proposed changes to RFC 4641: rollovers

2008-09-29 Thread Matthijs Mekking
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Paul, I encourage making the 4641 document more up to date and adding better definitions. However, one issue draw my attention: I am not sure if doing key rollover in emergencies only is good practice, for a couple of reasons: * All keys have an e

[DNSOP] Proposed changes to RFC 4641: rollovers

2008-09-28 Thread Paul Hoffman
In the last paragraph of 3.1.1, remove the last sentence ("Although, given a long enough key..."). Replace it with the following paragraphs: There are two schools of thought on rolling a KSK that is not a trust anchor: - It should be done regularly (possibly every few months) so that