Terry,

I have two other comments on this draft.

4.1.  Algorithm based on jurisdiction

(Roque) My (basic) understanding of the GHOST problem when tackled by the 
DNSSEC people is that it end up been a no-problem. A lot of discussions, lot of 
waisted time, support for GHOST was added to standards but finally, .RU got 
signed using RSA just like the rest of the world. Do we have a summary of the 
DNSSEC experience that we could use as reference? 

4.2.  Algorithm vulnerability

(Roque)  We have a procedure in RFC6916. Have you evaluate it? is there a 
problem that needs to be fix?
>From your text I cannot figure out if what you are looking for is an emergency 
>algorithm rollover. This was discussed and agreed that algorithm roll-over 
>will be a long process and no emergency procedure is practically feasible.

5.  Key Length

(Roque)  I would go for a shorter lifetime until 2030 and keep 2048bits. The 
technology is ramping up and migrating to a longer key length at this time 
would not be advisable IMHO.

6.1.  Protocol support for key rollover events not requiring a change in 
cryptographic algorithm

(Roque) I believe you are talking about two things:
        - Rollover communication from parent CA to subordinate CA using 
top-down protocol (hosted environment is trivial):
                IMHO, out-of-band seams to be the right approach. I do not 
believe CAs will automate the roll-over request to its parent, so the use of an 
in band mechanism will basically triggers a manual action (probably an email) 
which is the same communication method used by out-of-band.
        
        - TAL rollover.
                You do not mentioned explicitly but I guess that when you refer 
to “communicated to validators” you are referring to the TAL file.
                There is no magic on how to distribute a new TAL, just like 
your DNSSEC keys or a new root cert for your browser. What you normally want is 
to have an independent trust anchor that signs that sets the authenticity of 
the content. In this case you need to make sure that it is hosted in a TLS 
secured site via a trusted certificate authority.
                Carlos Martinez had an idea about creating a signed object 
signed by the old TA CA that points to the new TAL file. Seams like a good idea 
at first view.

Regards,
Roque
        





On 09 Oct 2014, at 02:21, Terry Manderson <[email protected]> wrote:

> Hi All,
> 
> As you are probably aware ICANN has been following the SIDR work fairly
> closely, based in the IAB guidance that a single authoritative trust
> anchor should exist - what we term as the Global Trust Anchor (GTA).
> 
> In the process of looking at the implementation of this, the GTA, and the
> technical concerns relating to stability and resiliency, a few questions
> have bubbled to the surface over the past year. Instead of sitting on our
> hands and not communicating to the WG we thought it best to raise what we
> are thinking and seek a discussion. Thus we would very much like the WG
> guidance and advice on these questions.
> 
> We have created a draft to raise these discussion points.
> 
> http://tools.ietf.org/html/draft-vegoda-manderson-sidr-key-management-00
> 
> Are there simple answers? and if so, what are they? Have we
> mis-charatcerised some concerns? How? Are our concerns unfounded? and why?
> Are there more concerns that people see and which we haven't covered here?
> 
> Cheers
> Terry and Leo
> _______________________________________________
> sidr mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to