----- Original Message ----- From: "Paul Wouters" <p...@xelerance.com> To: "George Barwood" <george.barw...@blueyonder.co.uk> Cc: "IETF DNSOP WG" <dnsop@ietf.org> Sent: Monday, April 18, 2011 10:34 PM Subject: Re: [DNSOP] WGLC <draft-ietf-dnsop-rfc4641bis-06.txt> [2011-05-17]
> On Mon, 18 Apr 2011, George Barwood wrote: > >> (1) It's my belief that almost all Zones except for the root zone should NOT >> use a KSK/ZSK split. >> With the signing of the root zone and many TLDs, manual distribution of >> trust anchors is likely >> to be uncommon. > > Not true. Any responsible organisation will configure their own zone's trust > anchoes in their > resolvers, so they can operate internally when their WAN/UPlink is down. Possibly. But I think this will be quite rare, and will only apply to organisations with very significant resources (maybe governments). I really doubt the significant extra complexity of managing these trust anchors is likely to lead to an overall increase in security. How are you going to distribute them? If you have a distribution mechanism ( other than the public one ) then you can presumably update the trust root config in a timely way when needed, so nothing is gained. >> (2) There is no point in using a larger key size than the smallest key size >> in the parent chain > > See 1) Those will benefit from additional strength that seems excessive to > any parent. I really doubt security would be improved in practical terms. The extra complexity of non-standard configuration would probably outweigh the minute benefit of longer keys, both in security terms, and even more certainly in terms of reliability. But anyway, yes, if you are really planning this, then a ZSK/KSK split might possibly be helpful, but not for typical domains. >> (3) Using a longer TTL for negative DS responses might be useful. Currently >> the negative TTL for >> the com zone is only 900 seconds (the SOA TTL). This is probably appropriate >> for a NameError >> (NxDomain) response, but 1 day might be more appropriate for a negative DS >> response, to improve >> caching performance and reduce load on servers. > > I think this issue should probably looked at in the light of the "child > centric" vs "parent centric" > issues we have seen. I don't know the right answer, but some others might > have better feedback on this. The DNSSEC standard seems vague (AFAICS) on the TTL of the negative DS information included with a referral from a secure to a non-secure zone (the SOA is not sent). I'm really not sure how it's meant to work ( this is possibly a bit off-topic here though - I asked a question in dnsext recently, no response yet ). > Paul _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop