On Wed, Dec 9, 2015 at 3:27 PM, <internet-dra...@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>  This draft is a work item of the Domain Name System Operations Working
> Group of the IETF.
>
>         Title           : The EDNS Key Tag Option
>         Author          : Duane Wessels
>         Filename        : draft-ietf-dnsop-edns-key-tag-00.txt
>         Pages           : 9
>         Date            : 2015-12-09
>
> Abstract:
>    The DNS Security Extensions (DNSSEC) were developed to provide origin
>    authentication and integrity protection for DNS data by using digital
>    signatures.  These digital signatures can be verified by building a
>    chain-of-trust starting from a trust anchor and proceeding down to a
>    particular node in the DNS.  This document specifies a way for
>    validating end-system resolvers to signal to a server which keys are
>    referenced in their chain-of-trust.  The extensions allow zone
>    administrators to monitor the progress of rollovers in a DNSSEC-
>    signed zone.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-edns-key-tag/
>
> There's also a htmlized version available at:
> https://tools.ietf.org/html/draft-ietf-dnsop-edns-key-tag-00
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/



5.2.1 
<https://tools.ietf.org/html/draft-ietf-dnsop-edns-key-tag-00#section-5.2.1>.
Validating Recursive Resolvers


This sentence concerns me:

"When the recursive server

   receives a query with the option set, the recursive server SHOULD set
   the edns-key-tag list for any outgoing iterative queries for that
   resolution chain to a union of the stub client's Key Tag(s) and the

   validating recursive resolver's Key Tag(s)."

That approach hides the fact that the stub client's Key Tag(s) might be
missing the latest tags, which is precisely the information that we are
trying to gather.  The intersection (only tags in all lists) would be a
better indicator of what tags everyone can use to validate.  Better yet
would be to forward multiple lists of keytags (either encoded in one
option, or repeated options) so that the receiver gets a better picture of
all the resolvers and their state.  I would suggest that the recursive
server's tag list be the last list, since that information might be useful
to the receiver.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to