In the last paragraph of 3.1.1, change:
   These
   can include the registry of the parent zone or administrators of
   verifying resolvers that have the particular key configured as secure
   entry points.
to:
   If there is a parent zone, these
   can include the registry of the parent zone or administrators of
   verifying resolvers that have the particular key configured as secure
   entry points. If this is a trust anchor, everyone relying on the trust
   anchor needs to roll over to the new key, which is a very big deal.

Remove all of 3.1.2. Longer keys are not useful because the crypto
guidance is that everyone should use keys that no one can break. Also,
it is impossible to judge which zones are more or less valuable to an
attacker. An attack can only be used if the compromise is unnoticed
and the attacker can act as an MITM in an unnoticed way. If .com is
compromised and the attacker forges answers for somebank.com and sends
them out as an MITM, when the attack is discovered it will be simple
to prove that .com has been compromised and the KSK will be rolled.
Defining a long-term successful attack is difficult for keys at any
level.

Remove the first phrase of the fourth paragraph of 3.3. At the end of
the paragraph, add:
   Note that if a trust anchor replacement is done incorrectly, the
   entire zone that the trust anchor covers will become bogus until
   the trust anchor is corrected.

Here's the biggie. Separate all of section 4 into two distinct
sections: zones publishing trust anchors, and zones publishing DS
records to a parent. Make each heading clear which one is being
discussed.

--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to