I have reviewed the trust-anchor document, and have some comments. I am not sure if this issue has been up for discussion.
The following statement is in section 2: "Specifying a trust anchor using a DS format instead of a DNSKEY format offers an advantage because it forces the resolver to make a DNS query to obtain the trust anchor's complete DNSKEY RRSet during a priming operation (described below). If only a DNSKEY record were specified, resolver implementers could conceivably avoid priming the trust anchor. But priming is desirable because it causes the resolver to retrieve an up-to-date version of a zone's DNSKEY RRSet from one of the zone's authoritative servers. It should be noted that in practice, priming is frequently required, when the data in the trust anchor zone is signed with a different key than the one configured as the trust anchor." I fail to see how priming is the solution to up-to-date keys, either you trust the key or not. It's the signatures over the DNSKEY RRSet that forces the resolver to prime the DNSKEY for the zone, if there is missing keys. So the priming using the DS is a non-issue here. and also this: "Using a DS format is also recommended because it is smaller than the DNSKEY format and is easier to compare manually, either by typing or cutting and pasting." This seems to be the major reason for wishing to use the DS as a trust-anchor for a resolver. But I don't believe that this is not a good enough reason for avoiding the use of DNSKEY as a trust-anchor. In the case of using the Root or TLD trust-anchors, in most cases you also have to verify the key by other means, for example cryptographic signatures. These are also not easy to read, so you still need tools, copy&paste or file transfers to verify the key. The "easier to compare" argument fails me here. Using DS as the forced trust-anchor mechanism adds a lot more complexity to this document, for example the whole of section 3, and to be fair, I cannot really see the advantage. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop