At 20:13 +0200 4/22/09, Peter Koch wrote:
this is to initiate a working group last call on

        "DNSSEC Trust Anchor Configuration and Maintenance"
         draft-ietf-dnsop-dnssec-trust-anchor-03.txt

ending Friday, 2009-05-08, 23:59 UTC.  The tools site gives easy access to
diffs and such under
 <http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-trust-anchor-03>.


I keep forgetting this bit of document jockeying - can an Informational use
RFC 2119 terms in a normative way?

...
#3.  Trust Anchor Priming

   ...
#  3.  Verify that the DNSKEY RR corresponding to the configured trust
#      anchor (i.e., the DNSKEY whose hash is configured) appears in the
#      DNSKEY RRSet and that this DNSKEY RR has the Zone Key Flag
#     (DNSKEY RDATA bit 7) set.  (This bit only indicates that the
#      DNSKEY is allowed to sign the zone.  This DNSKEY may or not be a
#      zone signing key.)

Last sentence? - "This DNSKEY might not be a zone a zone signing key.")

But I'm not sure what is meant. At first the paragraph reads - make sure the Zone Key Flag is set and later says it "may or [may] not be a zone signing key."

Do you mean that "this" key could be a "key signing key?"

#  4.  Verify that the DNSKEY RRSet is signed by one of the DNSKEYs
#      found in the previous step, i.e., that there exists a valid RRSIG
#      (cryptographically and temporally) for the DNSKEY RRSet generated
#      with the private key corresponding to the DNSKEY found in the
#      previous step.

And here, are you saying that "this DNSKEY RR"'s private companion has to sign the key set for all this to work? In step three you refer to a singular ("this") key, in step four it is plural ("is signed by one of the").


...
#  For this reason, old trust anchors SHOULD be removed from a
#  validating resolver's trust anchor list soon after the corresponding
#  keys are no longer used by the zone, as described in RFC 5011
#  [RFC5011].

Recommend that the priming be done often enough to capture revoked
DNSKEY RR's - so that the zone doens't have to keep them indefinitely.

# 4.  Trust Anchor Maintenance
#
#   Trust anchors correspond to zones' key signing keys and these keys do

 <keeping the terminology clean>

Trust anchors *could* be zone signing keys. Still I think you want this here - SEPs? Is that what is meant?

(RFC 4034:
2.1.1.  The Flags Field

...
   Bit 15 of the Flags field is the Secure Entry Point flag, described
   in [RFC3757].  If bit 15 has value 1, then the DNSKEY record holds a
   key intended for use as a secure entry point.  This flag is only
)

# 5.  Security considerations
#
#   This document proposes a standard format for documenting DNSSEC trust
#   anchors.

I didn't see a standard format (a la a zone file). Just "use the DS fields." Perhaps I was expecting examples and such.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis NeuStar You can leave a voice message at +1-571-434-5468

Getting everything you want is easy if you don't want much.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to