On 2010-09-13, at 10:36, W.C.A. Wijngaards wrote: > On 09/10/2010 01:24 PM, Stephen Morris wrote: >> > >> 1. Is the situation addressed by the draft - that of a validator that >> has been offline or that has missed an (emergency) rollover needing >> to reconfigure itself - a problem that needs to be solved? > > Yes, I think that problems needs a solution. If you miss the > couple-week KSK rollover, RFC5011 cannot catch up your root anchor. > Maybe not a problem in the ISP-space (who are always online), but for > widespread deployment.
For the root trust anchor, I think a better solution is to retrieve a fresh copy from the IANA. The format and location have been well-specified, albeit not in an RFC (yet), and I don't see why this could not be automated. There are several methods provided for the integrity of the retrieved key to be checked. Perhaps I'm being overly optimistic about DNSSEC deployment in TLDs, but I think a realistic long-term solution for other trust anchors is not to use them (i.e. to use a single root trust anchor, and use DS records to publish trust anchors for other zones). >> 2. If the answer to (1) is yes, is the idea of using DNS the best way >> to do it? As I've mentioned before, the problem I have with trust-history is that it involves using old keys to make trust decisions about new keys. It is difficult to believe in the general case that old keys are entirely trustworthy. Presumably keys are rolled for a reason. Doesn't trust-history impose a requirement high standards of operational security for key materials which have long since fallen out of production, and hence extend the possible window for a key compromise long after the key has stopped being used? From an operational perspective this worries me. Joe _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop