Colleagues

This is a status update on RFC4641bis. Please refer to links provided for more 
details on the issues. I have no particular issues I need to discuss in the 
face to face meeting and will present what is written below in a somewhat 
condensed form. If folk have something they would like to discuss it is 
probably best to give a heads-up here.


High level summary:

Most changes in the document are with respect to the description about keys and 
key maintenance (section 3). I've tried to stress the operational tradeoffs and 
make those the basis of the cryptographic considerations. The idea is that the 
tradeoff between costs and threats set the operational handling of the keys. 
Once you know how you want to handle the keys operationally set the appropriate 
crypto parameters. 

Also there is a completely new section on the Next Record types (section 5) and 
there are considerations added about the changing ones dns operator (section 
4.4.5)





In detail
- http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/HSMs
Addressed in a section 3.1.4.3  "Private Key Storage"
I believe this issue to be resolved.

- http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/NSEC-NSEC3
Complete new section 5.

There is one remaining point there brought up in 
        From:   Florian Weimer <fwei...@bfk.de>
        Subject:        Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.
        Date:   February 22, 2010 11:20:16 PM PST
        To:     Olaf Kolkman <o...@nlnetlabs.nl>
        Cc:     Alex Bligh <a...@alex.org.uk>, Paul Wouters 
<p...@xelerance.com>, dnsop WG <dnsop@ietf.org>

NSEC making the packet too big base on the argument that " However, NSEC 
records are sometimes returned in response to
DO=0 queries"

I believe there is consensus that that is caused by an implementation bug. 
Therefore the issue can be closed.


- http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/Review-NIST

Scott reported that this issue can be closed.

- http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/ZSK-roll-frequency
- http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/cryptography_flawed
- 
http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/discussion_of_timescales
- http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/rollover_assumptions

I believe these issues where addressed by reordering and rewriting parts of 
section 3. But this section may need a little more work to clarify that the 
approach is from operational perspective rather than a highest achievable 
crypto perspective.

http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/non-cooperative-registrars
Added as:
4.4.5.2.  Non Cooperationg DNS Operators

This issue is resolved although a review of the supporting figure is needed.



The following issues have not yet been addressed and the issue needs to be 
reviewed on relevance against the current version

http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/trust_anchor_and_parent_keys
http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/differentiation_trustanchor_parent
http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/trust_anchor_configuration
http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/timing_terminology


I've added
http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/Signature_validity
>From the recent mail from Sebastian where he asks for guidance on signature 
>validity intervals

that is an issue that is probably closely related to 

http://www.nlnetlabs.nl/svn/rfc4641bis/trunk/open-issues/timing_terminology

which I will address in the next version.


Yours,

--Olaf Kolkman
  document editor



________________________________________________________ 

Olaf M. Kolkman                        NLnet Labs
                                       Science Park 140, 
http://www.nlnetlabs.nl/               1098 XG Amsterdam

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to