In message <20090310041105.ga4...@vacation.karoshi.com.>, bmann...@vacation.kar oshi.com writes: > On Tue, Mar 10, 2009 at 08:35:40AM +1100, Mark Andrews wrote: > > > > In message <200903091515.n29ffetp055...@stora.ogud.com>, Olafur Gudmundsson > wri > > tes: > > > --===============0733757033== > > > Content-Type: multipart/alternative; > > > boundary="=====================_777355448==.ALT" > > > > > > --=====================_777355448==.ALT > > > Content-Type: text/plain; charset="us-ascii"; format=flowed > > > > > > At 13:46 06/08/2008, Paul Hoffman wrote: > > > >Greetings again. The end of section 2 of this document says: > > > > Another advantage of configuring a trust anchor using a DS record is > > > > that the entire hash of the public key in the DS RDATA need not > > > > necessarily be specified. A validating resolver MAY support > > > > configuration using a truncated DS hash value as a human-factors > > > > convenience: shorter strings are easier to type and less prone to > > > > error when entered manually. Even with a truncated hash configured, > > > > a validating resolver can still verify that the corresponding DNSKEY > > > > is present in the trust anchor zone's apex DNSKEY RRSet. RFC 2104 > > > > [RFC2104] offers guidance on acceptable truncation lengths. > > > > > > > >This is not correct. You cannot say "here is the SHA-256 hash of a > > > >value" and then give less than 256 bits of the hash. If you wanted > > > >to do this, you need to define the truncated hash and use that new > > > >hash algorithm. So far, none of these truncated hashes have been > > > >defined for DNSSEC, although ones could be defined. > > > > > > > >Further, it is somewhat optimistic (and possibly sadistic) to think > > > >that a user can type Base64 by hand for more than maybe ten > > > >characters. This document should assume that the user is using > > > >copy-and-paste, and therefore using the full 256 bits of the hash is > > > >just as easy as using a truncated hash. If not, new, inherently > > >weaker, truncated hash algorithms need to be defined. > > > > > > > >--Paul Hoffman, Director > > > >--VPN Consortium > > > >_ > > > > > > You are not the first person to bring this issue up, and upon reflection > > > we have dropped truncation discussion. > > > > > > Olafur > > > > On a related issue DS -> DNSKEY translations cannot be > > performed until the DNSKEY is published in the zone. The > > use of DS prevents pre-publishing of keys. > > > > I can see no real reason to recommend that DS records be > > published in preference to DNSKEY records. > > > > DNSKEY -> DS is a conversion that can be at anytime. > > > > This make DNSKEY a better manditory record to publish. > > > > Mark > > -- > > Mark Andrews, ISC > > 1 Seymour St., Dundas Valley, NSW 2117, Australia > > PHONE: +61 2 9871 4742 INTERNET: mark_andr...@isc.org > > _______________________________________________ > > DNSOP mailing list > > DNSOP@ietf.org > > https://www.ietf.org/mailman/listinfo/dnsop > > > if the child produces the DS, then the TTL is preserved. > if the parent produces the DS, then the TTL is not.
That depends on the processes used. There is no reason a parent can't produce a DS with a specified TTL. There is also no requirement for the parent to honour the ttl, if any, passed to the parent. > i'd think that would be a reason to use DS as the record to > publish. -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: mark_andr...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop