On Wednesday, March 11, 2015 10:02:31 AM Paul Hoffman wrote:
> Proposal: until there is evidence that there is a community that needs the
> features of NSEC5 that cannot be easily replicated in NSEC3, this WG does
> not consider a protocol change that would require every resolver to be
> updated.
I think that's reasonable.
On the other hand, I would still appreciate some feedback on the proposed
NSEC/NSEC3 -> NSEC5 transition mechanism, which is currently quite painful and
I consider it the weakest point of the proposal. I believe that finding an
alternative would make NSEC5 acceptable for more people.
Currently, the transition is done the same way as in NSEC -> NSEC3, using the
DNSKEY algorithm aliases. That time it was easy - only two aliases were
allocated for RSA and DSA with SHA-1. Right now, we have at least four
suitable algorithms: RSA with SHA-{256,512} and ECDSA P-{256,384}.
Jan
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop