At Tue, 5 May 2015 17:06:04 -0400, Warren Kumari <war...@kumari.net> wrote:
> ... and now I'm replying to the rest of the comments. Thanks, I've confirmed that my major and minor points are addressed in the 05 version. So I'm now basically fine with shipping it. Some non-blocking comments follow... > I've integrated them and posted a new version with the clarifications > on a *positive* **trust anchor** under an NTA. > I'm not very happy with the text I added, if others have better text > happy to consider it... The added text looks good enough to me. If you don't like it yourself, I might suggest something else, but I'm not sure if it's obviously better than the current one. In any case, I think Section 2 is probably a better place to clarify this, partly because that section has example cases. But it's not a strong opinion. Two more related points: 1. In my very original comment on this matter: www.ietf.org/mail-archive/web/dnsop/current/msg12614.html I noted one other corner case, which we might also want to clarify: On a related note, there are some corner cases which may also be worth noting: queries for DS or DLV (or anything similar to that). So, for example, zone1.example.com/DS should still be validated even if there's an NTA for zone1.example.com. Again, this might sound obvious, but I think it's worthwhile. 2. What if both positive and negative trust anchors are specified for the same name at the same time? Maybe it's just implementation dependent, and it may or may not be something that is worth discussing in this document. And, here are some other editorial points I happened to notice in this round of read: - (this is technical rather than editorial in some sense) Section 4: When removing the NTA, the implementation SHOULD remove all cached entries below the NTA node. Probably s/below/at and below/ - Appendix B: s/do this/to do this/ ? There are several tools do this, an incomplete list includes: - Appendix B: It's better if we can use a different level of bullets for these: o DS pointing to a non existent key in the child zone. Questions... o DS pointing to an existent key, but no signatures are made with... o Data in DS or DNSKEY doesn't match the other. This is more common... since they are sub-bullets of this one: o DNSKEYs in child zone don't match the DS record in the parent zone. [...] Common Variations of this can be: (I don't know if I-D xml allows nested listing though). -- JINMEI, Tatuya _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop