Atlas probes can help us we can even measure this from webpages,
cellphones, OS updates can add a test etc.

Olafur
On Jun 29, 2015 7:33 PM, "Warren Kumari" <war...@kumari.net> wrote:

> On Mon, Jun 29, 2015 at 7:28 PM, Olafur Gudmundsson
> <ola...@cloudflare.com> wrote:
> > There is much simpler way.
> > Just add record to the rootzone that is only signed by the new key.
> > If resolver returns AD bit it has the new key.
> >
> > All that is needed is to sign a Rrset for a long time and add it at to
> the
> > rootzone and make sure no ZSK signs it.
>
> ... and know where the nameservers are, and be able to query the
> nameservers to see if they are returning the AD bit. This requires
> that they are open recursive, that IANA (or someone) is able to query
> them, or something similar...
>
>
> Unless I've completely misunderstood?
>
> W
>
>
> >
> > Olafur
> >
> > On Jun 29, 2015 4:49 PM, "Warren Kumari" <war...@kumari.net> wrote:
> >>
> >> Hi all,
> >>
> >> So, there is a project underway to roll the DNSSEC root key. There has
> >> been much written about this, including SAC063
> >> (https://www.icann.org/en/system/files/files/sac-063-en.pdf[0]), a
> >> DNSSEC Root KSK Rollover Plan Design Team, various consultations with
> >> the community, many presentations at DNS-OARCs, etc.
> >>
> >> One of the biggest impediments to actually performing the rollover is
> >> that some set of folk will not have performed RFC5011 style rollover,
> >> whether because their software doesn't support 5011, because they have
> >> statically configured a TA, because the bigger response makes them
> >> sad, whatever. The fact that we cannot tell who has only has the old
> >> key, and who has both makes the keyroll very scary - we cannot predict
> >> who, and how wide scale the outage will be when the old key is
> >> removed.
> >>
> >> I've written a draft that proposes a different way of performing root
> >> key rollover that exposes who all has which key - this allows one to
> >> know that 99.8% of resolvers have the new key, who has the old one,
> >> and who will break.
> >> It does this by encoding the current set of TAs that the resolver has
> >> into a query, and using that to fetch the new keys. By watching
> >> queries at the root one can see the population of people with each TA,
> >> and watch that change over time. This was written for root key roll,
> >> but is applicable to any TA in the tree.
> >>
> >>
> >> I'd appreciate any feedback, the draft announcment is here:
> >> Name:           draft-wkumari-dnsop-trust-management
> >> Revision:       00
> >> Title:          Simplified Updates of DNS Security (DNSSEC) Trust
> Anchors
> >> Document date:  2015-06-29
> >> Group:          Individual Submission
> >> Pages:          8
> >> URL:
> >>
> >>
> https://www.ietf.org/internet-drafts/draft-wkumari-dnsop-trust-management-00.txt
> >> Status:
> >> https://datatracker.ietf.org/doc/draft-wkumari-dnsop-trust-management/
> >> Htmlized:
> >> https://tools.ietf.org/html/draft-wkumari-dnsop-trust-management-00
> >>
> >>
> >> Abstract:
> >>    This document describes a simple means for automated updating of
> >>    DNSSEC trust anchors.  This mechanism allows the trust anchor
> >>    maintainer to monitor the progress of the migration to the new trust
> >>    anchor, and so predict the effect before decommissioning the existing
> >>    trust anchor.
> >>
> >>    It is primarily aimed at the root DNSSEC trust anchor, but should be
> >>    applicable to trust anchors elsewhere in the DNS as well.
> >>
> >>    [ Ed note - informal summary: One of the big issues with rolling the
> >>    root key is that it is unclear who all is using RFC5011, who all has
> >>    successfully fetched and installed the new key, and, most
> >>    importantly, who all will die when the old key is revoked.  A
> >>    secondary problem is that the response sizes suddenly increase,
> >>    potentially blowing the MTU limit.  This document describes a method
> >>    that is basically CDS, but for the root key (or any other trust
> >>    anchor).  Unlike the CDS record though, this record lives at a
> >>    special name - by querying for this name, the recursive exposes its
> >>    list of TAs to the auth server (signalling upstream) . This allows
> >>    the TA maintainer to predict how many, and who all will break.  It
> >>    also allows the pre-publication of a key before using it, and so
> >>    avoids the need to double response sizes...]
> >>
> >>    [ Ed note: Text inside square brackets ([]) is additional background
> >>    information, answers to frequently asked questions, general musings,
> >>    etc.  They will be removed before publication.]
> >>
> >>    [ This document is being collaborated on in Github at:
> >>    https://github.com/wkumari/draft-wkumari-dnsop-trust-management.
> The
> >>    most recent version of the document, open issues, etc should all be
> >>    available here.  The authors (gratefully) accept pull requests ]
> >>
> >>
> >>
> >> W
> >> [0]: Full disclosure: Author.
> >>
> >> --
> >> I don't think the execution is relevant when it was obviously a bad
> >> idea in the first place.
> >> This is like putting rabid weasels in your pants, and later expressing
> >> regret at having chosen those particular rabid weasels and that pair
> >> of pants.
> >>    ---maf
> >>
> >> _______________________________________________
> >> DNSOP mailing list
> >> DNSOP@ietf.org
> >> https://www.ietf.org/mailman/listinfo/dnsop
>
>
>
> --
> I don't think the execution is relevant when it was obviously a bad
> idea in the first place.
> This is like putting rabid weasels in your pants, and later expressing
> regret at having chosen those particular rabid weasels and that pair
> of pants.
>    ---maf
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to