-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 16-07-12 22:37, Patrik Fältström wrote:

Just back from holidays, some aditions:

> JUST talk about things like:
> 
> 1. we have registry, registrar, registrant and DNS operator"

In the DNSSEC transfer issues we discussed, we did enter a reseller,
so the administrative chain that is general enough for any current
relationship is:

Registry-Registrar-Reseller-Registrant-DNS_operator.

Where there may be 0-1 Registrars and 0-multiple resellers in the
administrative chain.

The more general mistake is that one entity can play multiple roles.
So one entity may act as both Registrar and DNS_operator for a certain
delegation where in another delegation one entity may be both
registrant and DNS_operator. So they are roles, not players. This is
often not understood in discussions. (you may even have entities that
combine registrar and multiple reseller roles).

> 2. any of those might give the right to a third party to act on
> their behalf
> 
> 3. we only know there are direct connections and knowledge between
> registry-registrar, registrar-registrant and registrant-dns
> operator

The issue for the administrative chain is the question as to who
offers the authoritative data.

For a Registry, the registry database IS the authoritative data, which
is fed into the DNS parent zone.

So from the point of view of the parent zone, it only accepts changes
from the Registry database and not from another source.
Or to put it in pictures:

Registrant/Reseller/Registrar => Registry database => DNS Parent zone

If we only look technically at the DNS, what we're trying to do here is:

Parent zone <=> Child zone

To keep them both in sync.

But this leads to problems in the administrative chain:

Registrant/Reseller/Registrar => Registry database <=> DNS parent zone

Which data is authoritative for the Registry database, The registrar's
input, or the DNS input ?
Registrars claim they are always right, we DNS people claim DNS is
always right.
We need the registrar's input for bootstrapping the delegation at least.
The question is who is authoritative for the delegation after that.
DNS or the registrar's input.



> What we MUST have is:
> 
> - Enough data in the registry so that DS can be created that refer
> to key material used to sign the zone published by the dns
> operator
> 
> Today we know that we have cases like:
> 
> A. The DS is passed to the registry
> 
> B. The DNSKEY is passed to the registry that create the DS
> 
> C. The DNSKEY is fetched from the zone of the DNS operator and the
> DS is created
> 
> We have the following plus and minuses:
> 
> bla bla bla
> 
> Patrik
> 
> 
> _______________________________________________ DNSOP mailing list 
> DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop
> 


- -- 
Antoin Verschuren

Technical Policy Advisor SIDN
Meander 501, PO Box 5022, 6802 EA Arnhem, The Netherlands

P: +31 26 3525500  F: +31 26 3525505  M: +31 6 23368970
mailto:antoin.verschu...@sidn.nl  xmpp:ant...@jabber.sidn.nl
http://www.sidn.nl/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iQEcBAEBAgAGBQJQDqwxAAoJEDqHrM883AgnMw4H/Rzwxyomgr5AjzvQ8iLAYCgW
mDHCP99T6IX2N2qzTjxb3yCxuSenFYSjXEIjY+qCWj02ilVpDkaaj1OYoeA3QNax
aVckUbkDGXkIvT3Y9BNrMeNTRLovBZ8Tkt6YlkUM2QHCirvkkCnZ0FCRFxQZlXWj
V5jWkHtr7M+m5f965JutGSs+2P4JcqijAJAMXy+SNVpNJhwt2RxTARvzFLIeAZ0S
jH9/PAzyAcIF6gV5sTaIwz404VfY23dEJZ8GL5arQ3JEfGOBIQsRv2eaCwX29kaD
ziirytFdy/p4S0WQeF/K/4z4TFI9XQg3FiRJBBnIk34SD5cHu/JERQRpkOALgck=
=fmXB
-----END PGP SIGNATURE-----
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to