On Wednesday, March 11, 2015 10:02:31 AM Paul Hoffman wrote:
> Proposal: until there is evidence that there is a community that needs the
> features of NSEC5 that cannot be easily replicated in NSEC3, this WG does
> not consider a protocol change that would require every resolver to be
> updated.

I think that's reasonable.

On the other hand, I would still appreciate some feedback on the proposed 
NSEC/NSEC3 -> NSEC5 transition mechanism, which is currently quite painful and 
I consider it the weakest point of the proposal. I believe that finding an 
alternative would make NSEC5 acceptable for more people.

Currently, the transition is done the same way as in NSEC -> NSEC3, using the 
DNSKEY algorithm aliases. That time it was easy - only two aliases were 
allocated for RSA and DSA with SHA-1. Right now, we have at least four 
suitable algorithms: RSA with SHA-{256,512} and ECDSA P-{256,384}.

Jan

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to