-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi dnsop,

On 09/10/2010 01:24 PM, Stephen Morris wrote:
> Colleagues
> 
> Although draft-ietf-dnsop-dnssec-trust-history (the DNSSEC Trust
> Anchor History Service) is a working group item and the editor has
> received a number of private comments on it, there has actually been
> relatively little discussion of the draft on the list, either pre- or
> post-adoption. If the draft is to go forward, it must represent the
> consensus of the working group.  To show that, we need people to
> comment on it and to support it.
> 
> So, to gauge feeling and to trigger discussion, could the chairs
> please have your views on the following issues:
> 
> 1. Is the situation addressed by the draft - that of a validator that
> has been offline or that has missed an (emergency) rollover needing
> to reconfigure itself - a problem that needs to be solved?

Yes, I think that problems needs a solution.  If you miss the
couple-week KSK rollover, RFC5011 cannot catch up your root anchor.
Maybe not a problem in the ISP-space (who are always online), but for
widespread deployment.

> 2. If the answer to (1) is yes, is the idea of using DNS the best way
> to do it?

Well, one way is to have the OS update handle it somehow.  But then the
OS update has to handle it.  Perhaps the OS update requires domain names
to resolve (remember, the world is bogus when the root trust anchor no
longer works; port distributions and mirrors may not work).  Also such
an OS update, if it is secure, would rely on exactly another key that is
that old.

Another solution is a vendor-update solution, i.e. an ISC or an
NLnetLabs or other-vendor key which is used to fetch a new root key.
Such a key would need to be kept as safe as the private key for the root
to be useful.

Another solution is to fetch the root key fresh from the iana website.
And check that it is correct using another key (which is necessarily
just as old): the PGP key or the https certificate.

Trust history, then, does not require additional keys.  It could run
over TCP (i.e. fetch a text file), but recall that domain names are all
bogus.

So, without saying I really want to do one of them, I would like to
promote deployment of DNSSEC, and include a 'foolproof' root trust
anchor (or deployment-method description or handy shell-script to
reinitialise).

Initially, in IETF fashion, I went immediately to solution, and went for
an in-band (since no DNS service), not-rely-on-other-key and
safety-provided-by-root-team solution.  Maybe that was wrong, I would
like, however, to promote DNSSEC deployment towards the (more likely
down or offline) end-hosts, and something needs to be done to make it
possible to have a fluent KSK rollover for the root: I think it is very
important to make this as easy as possible, so that new algorithms or
updated key parameters can easily be introduced.

Best regards,
   Wouter
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkyONu0ACgkQkDLqNwOhpPhcUACglbU+GsCIKmZAC69Q994K82w+
PpkAoIHZECi6raEFZ+OtvmJOsDnet8mo
=N0LK
-----END PGP SIGNATURE-----
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to