-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi Antoin,
On 04/19/2011 11:42 AM, Antoin Verschuren wrote: > On 18-04-11 21:01, George Barwood wrote: >> I have a few comments. > >> (1) It's my belief that almost all Zones except for the root zone should NOT >> use a KSK/ZSK split. > > I don't think this is true. > I think the split of when to use a KSK/ZSK and when not is not that > clear. But it depends on: > > -Time and operational difficulty to communicate a new DS to parent > -Size of the zone, and frequency of updates to zone content. > > A large zone, that has frequent updates, and has a timeconsuming, > difficult or strict parent-child relation is better off using KSK/ZSK. > > A small zone, that has very few updates, can just as well use 1 key. > > > I have some more questions on the draft. > In section 3.4.3 I read: > "Although > not mandatory, one could administer a zone using a "hidden master" > scheme that minimize the risk. In this arrangement the master that > processes the updates is unavailable from general hosts on the > Internet; it is not listed in the NS RRSet, although its name appears > in the SOA RRs MNAME field." > This seems to me to define what should be listed in the SOA RRs MNAME > field in case a hidden master is used. Another definition could well be > that when you use a hidden master, one of the public nameservers should > be appointed to be the public master, and it's name should be in the SOA > RRs MNAME field, as that server should allways be accesible over the > public Internet, and the name in the MNAME field should allways resolve > (to a public IP) and be in the NS RRset. > If would appreciate if someone could point me to standard-track text > where this is defined. Would it be resolved if we use the following text? s/appears/may appear/ ...; it is not listed in the NS RRSet, although its name may appear in the SOA RRs MNAME field. > Section 4.3.5.2, first paragraph: > "If the registry and registrars allow for DS records to be published, > that do not point to a published DNSKEY in the child zone, the > Double-DS KSK Rollover is preferred to resolve the non-cooperative > case." > > I think this should be: > > "the Double-DS KSK Rollover is preferred to resolve the cooperative > case." > > In the non-cooperative case even a Double-DS does not make sense, and > one should go insecure. You are right. Best regards, Matthijs > I have not finnished to review the complete document yet, but will do > before the deadline. > _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBAgAGBQJNrWFqAAoJEA8yVCPsQCW5cHMH/1Owj4PBlDByl4Qm/HzjWnSh WRXgrvTuwlsPomSbyUSSF7wSYZbq3S2MsRMizTR+IonGCBtbtlPC3WhKSZ4ZKyrd kDzzHthLauplspFZ8pwVZMQ9dzfZZ73PUErlpM2Jt1qnXeuWvAPK+G/0WboUnPkS iorowB/llIL+bXu9ugfagehk3m8XvlaEgMLNm5X6rzeZnrpl5osbFVMhaeOagzhV 6+QvwAEBBIc3Ttro1cz3rCtzqFdt6GOAUDC1yT15v1L6f6yDW6bCtdvwFUAaGYrQ WqqH/ZcxjOZtpOepmuRjX9N/YD1TWupOSccQochfqKTLLILQsAw4M6GDVP7/MXU= =6MqR -----END PGP SIGNATURE----- _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop