On 2011-06-17, at 13:31, Olafur Gudmundsson wrote: > Few nits and questions below: > > a) DP and DSP should be included in the Definitions section 2, even though > the abbreviations are are defined in section 1.2 > Alternatively spell out in section 3.1. and 3.2 titles what DP and DPS are.
Makes perfect sense. I prefer spelling it out in the section headers to keep the document from growing even further. > b) The document for all practical purposes is about the process until a zone > has been signed/resigned. There is almost no discussion about the operation > of the signed zone is this intentional or an omission ? > (the exceptions are the key rollover sections 4.5.4+5) The document is intended to cover all security-related aspects and topics (including operational) which is impacted by the introduction DNSSEC in a zone. So in this context, technical operation of the signed zone is covered in the key-rollover sections (6.4, 6.5), in the signing/re-signing section (6.6) and the verification of the data to be signed (6.7, 6.8). From a business-operational perspective, contingency and disaster-recovery planning is covered in 4.5 and 4.6. For key management life-cycle operations (such as generation of new keys and possibly also distribution, backup and destruction), should be covered in sections 5.1 and 5.3. Are other aspects to operations which you think should be included in the document? (Or do you think the scope is too narrow?) > c) Section 4.6.9 should not limit itself to TTL's to types it should cover > all types in the zone as the Maximum TTL in the zone impacts how fast keys > can be added/removed from DNSKEY set. Good point, you are absolutely right. SOA expire and negative caching is also part of the equation. > d) Section 4.6.8 does not indicate what the purpose of this test is. > I think the purpose is to prevent bad data from showing up in the DNS. Yes. It currently reads: This subsection addresses the controls around the verification of the resource records in order to validate and authenticate the data to be signed. Should we clarify in that? Suggestions? > f) There needs to be section (4.6.x) for zones that use NSEC3 as to the > policy for changing NSEC3 parameters as this is similar to a ZSK roll-over. The intention is to have this in 6.2. But I see that there are no mentions of policy for changing of NSEC3-parameters in 4.6.2 of the draft. I'm thinking of adding a sentence to the text in 4.6.2 instead of creating a new subsection? > Questions: > > c) should the DPS have a section describing if/when/how a zone (i.e. the one > covered by the DPS) goes to unsigned? There has been discussions about this among the authors, but so far we've agreed on that such procedure is a DR-procedure and may be described in 4.5. > d) Should the DPS have a section describing the zone's policy as how to > perform an algorithm rollover ? > what I'm in particular looking for is in particular how long the zone expects > to be signed by both algorithms. I'm thinking that whatever forces a zone to change the algorithm is an unexpected event which has many dependencies to unknown factors (such as resolver implementations, new algorithms .. ), which is really hard to plan ahead for in such detail. Although, the emergency case (where a algorithm has been fundamentally broken) should be covered in 4.5.3 (Entity private key compromise procedures). -- Fredrik _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop