Thanks Olaf!

   Patrik

On 8 jul 2010, at 15.04, Olaf Kolkman wrote:

> 
> On Mar 24, 2010, at 11:19 PM, Patrik Fältström wrote:
> 
>> General comment:
>> 
>> The document is not clear enough regarding the roles of the registrant, dns 
>> operator, registrar and registry -- where the dns operator is in the 
>> document implied to be the one that hold the private keys. Further, the same 
>> organsiation might have one or more of these roles.
> 
> 
> 
> ACK.
> 
> 
>> 
>> 4.4.1.
>> 
>> OLD:
>> 
>> The initial key exchange is always subject to the policies set by the
>> parent.
>> 
>> NEW:
>> 
>> The initial key exchange is always subject to the policies set by the 
>> parent. This is specifically important in a registry-registrar model where 
>> the key material is to be passed from the DNS operator, via a registrar to 
>> the (parent) registry, where both DNS operator and registrar is selected by 
>> the registrant and they might be different organisations.
>> 
> 
> ACK.
> 
> 
>> 4.4.2.
>> 
>> OLD:
>> 
>> In the registry-registrar model, one can use the
>> DNSSEC extensions to the Extensible Provisioning Protocol (EPP) [14],
>> which allows transfer of DS RRs and optionally DNSKEY RRs.
>> 
>> NEW:
>> 
>> In the registry-registrar model, one can between registry and registrar use 
>> the DNSSEC extensions to the Extensible Provisioning Protocol (EPP) [14], 
>> which allows transfer of DS RRs and optionally DNSKEY RRs. There is no 
>> standardized way for moving the data between DNS operator and registrar 
>> although the DNSSEC extensions to epp can be used there as well. Different 
>> registrars have different mechanisms, where a simple web interface is what 
>> is used in most cases, and various APIs are used in other cases.
>> 
> 
> This didn't quite parse 
> 
> I've rewritten:
>         <t>
>           The storage considerations also relate to the design of
>           the customer interface and the method by which data is
>           transferred between registrant and registry; Will the
>           child zone administrator be able to upload DS RRs with
>           unknown hash algorithms or does the interface only allow
>           DNSKEYs?  When Registries support the Extensible
>           Provisioning Protocol (EPP) <xref target="RFC4310"/> then
>           that can be used for registrar-registry interactions since
>           that protocol allows the transfer of DS and optionally
>           DNSKEY RRs. For moving data between DNS operator and
>           registrar there is no standardized way for moving the
>           data.  Different registrars have different mechanisms,
>           ranging from simple web interfaces to various APIs. In
>           some cases the use of the DNSSEC extentions to EPP may be
>           aplicable to.
>         </t>
> 
> 
> 
> 
>> 4.4.5.2.
>> 
>> OLD:
>> 
>> However, there is no operational methodology to work around this
>> business issue and proper contractual relations ships between
>> registrants and their registrars seem to be the only solution to cope
>> with these problems.
>> 
>> NEW:
>> 
>> However, there is no operational methodology to work around this business 
>> issue, and proper contractual relationships between all involved parties 
>> seems to be the only solution to cope with these problems. It should though 
>> be noted that the problem with temporary broken delegations in many cases 
>> already exists when DNS operator is changed for a zone, as that often 
>> implies also move of services that the DNS reference. So if not DNS is 
>> "down" for a while does in reality not have so much impact as services 
>> referenced by the DNS also will be down in the same service window. To 
>> minimise such problems, the only recommendation is to have relative short 
>> TTL on all involved resource records, and that will solve many of the 
>> problems regarding changes to a zone. Not only the time when DNS operator is 
>> changed and DNSSEC is in use.
>> 
> 
> 
> I agree with the changes (specifically the change of contracts between 
> registrants and registrars to 'all parties') although I've rewritten the 
> paragraphs a bit for clarity (I hope):
> 
> 
>    <t>
>             However, there is no operational methodology to work
>             around this business issue, and proper contractual
>             relationships between all involved parties seems to be
>             the only solution to cope with these problems. It should
>             be noted that in many cases, the problem with temporary
>             broken delegations already exists when a zone changes
>             from one DNS operator to another. Besides, it is often
>             the case that when the DNS moves from one operator to
>             another the services that that zone references also
>             change operator, possibly involving some downtime.
>           </t>
>           <t>
>             In any case. To minimise such problems, the classic
>             recommendation is to have relative short TTL on all
>             involved resource records. That will solve many of the
>             problems regarding changes to a zone regardless of
>             whether DNSSEC is used.
> 
>           </t>
>           
> 
> 
> --Olaf
> 
> 
> 
> 
> 
> 
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
> 
> ________________________________________________________ 
> 
> Olaf M. Kolkman                        NLnet Labs
>                                       Science Park 140, 
> http://www.nlnetlabs.nl/               1098 XG Amsterdam
> 
> 

Attachment: PGP.sig
Description: This is a digitally signed message part

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to