I have some high level questions about key rollover. The problem with RFC 5011 is that software has to have some out-of-band way to bootstrap its DNSSEC trust anchors. That is, the DNSSEC root KSK is not a trust anchor, for the purposes of bootstrapping.
At the moment the trust anchors are the ICANN x.509 self-signed certificate and/or the PGP keyring. What are the processes for rolling over these keys? How should manufacturers of software or hardware with a long shelf-life use them to bootstrap DNSSEC? I think it was a mistake to drop the trust anchor history draft, because it has a reaasonably coherent answer to the problem. I think the arguments that it is not secure enough are misguided. What we want is a way for software to bootstrap its DNSSEC trust anchor that is better than a leap of faith. This can perhaps be backed up with x.509 validation of the trust anchor once DNS is up and the higher levels of the stack are able to look up host names. Tony. -- f.anthony.n.finch <d...@dotat.at> http://dotat.at/ HUMBER THAMES DOVER WIGHT PORTLAND: NORTH BACKING WEST OR NORTHWEST, 5 TO 7, DECREASING 4 OR 5, OCCASIONALLY 6 LATER IN HUMBER AND THAMES. MODERATE OR ROUGH. RAIN THEN FAIR. GOOD. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop