In message <20090310041254.gb4...@vacation.karoshi.com.>, bmann...@vacation.kar
oshi.com writes:
> On Tue, Mar 10, 2009 at 12:55:51PM +1100, Mark Andrews wrote:
> > 
> > In message <f7c89744-a1ca-4fd6-b793-2f4e337e3...@verisign.com>, David Black
> a wr
> > ites:
> > > 
> > > On Mar 9, 2009, at 5:35 PM, Mark Andrews wrote:
> > > >
> > > >         On a related issue DS -> DNSKEY translations cannot be
> > > >         performed until the DNSKEY is published in the zone.  The
> > > >         use of DS prevents pre-publishing of keys.
> > > 
> > > Huh?  You can generate a DS from the DNSKEY record that you have  
> > > generated but not yet published, so you can pre-publish the DS just as  
> > > soon as you could pre-publish your DNSKEY.  As for actually *using*  
> > > the DS as a trust anchor, you can't use either the DS or the DNSKEY  
> > > prior to actually publishing and *using* the DNSKEY.  Or maybe I just  
> > > don't understand your point.
> > 
> >     When you pre-publish a DS you prevent implementations that
> >     use DNSKEYs from taking advantage of that pre-publication.
> 
>       sounds like an implementation bugll

        draft-ietf-dnsop-dnssec-trust-anchor is unfairly trying to
        restrict what is can be used as a trust anchor.  It is
        retroactively changing the specification.
        
   A security-aware resolver MUST be capable of being configured with at
   least one trusted public key or DS RR and SHOULD be capable of being
   configured with multiple trusted public keys or DS RRs.  Since a
   security-aware resolver will not be able to validate signatures
   without such a configured trust anchor, the resolver SHOULD have some
   reasonably robust mechanism for obtaining such keys when it boots;
   examples of such a mechanism would be some form of non-volatile
   storage (such as a disk drive) or some form of trusted local network
   configuration mechanism.


> --bill
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: mark_andr...@isc.org
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to