On 3 Oct 2010, at 08:27, Jakob Schlyter <ja...@kirei.se> wrote:
> On 1 okt 2010, at 20.59, Tony Finch wrote:
>> 
>> Right, so it's aimed at human consumption rather than automatic tools?
> 
> Given the historical information (together with old DNSKEY), you could build 
> a trust anchor history zone.

Not really, since you need the private key of the old TA to sign the public key 
of the new one to get a cryptographic proof of the history. Without that it is 
just a third party attestation, which is rather weaker.

You can get a proof of the history by archiving the root DNSKEY and associated 
RRSIG RRsets, but that includes a lot of irrelevant noise from ZSK rollovers 
and signature refreshes.

> 
>> How much do you intend automated tools to use the trust anchor publication
>> web site? And which of the files that are published there?
> 
> I know of at least one vendor that has started to implement support to base 
> trust anchor fallback on the information in the TA repository. As soon as 
> their code and ideas are mature enough, I hope they'll share their thoughts.

Sounds good.

I should have asked more clearly whether you expect end-user devices to use the 
IANA publication site directly or whether vendors should re-publish it for 
their purposes.

Tony.
--
f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to