On Tue, Apr 26, 2016 at 5:13 AM, Matthijs Mekking <matth...@pletterpet.nl>
wrote:

> All,
>
> Matthijs thanks for the review
sorry for the delay in response.


> I have read it and I like it. Still there are I think some things that
> need to be addressed:
>
> - On enabling DNSSEC via CDS/CDNSKEY: most of the policies assume some
> sort of communication channel between the child zone operator and parent
> zone operator, while in fact RFC 7344 registers new resource records
> because we assume there is no such channel. CDS/CDNSKEY records are put
> in the child zone to signal the desired DS RRset in the parent. The
> child can only hope that the parent will pick it up and the only way to
> get confirmation is to query the parent zone. So how would the parent
> "send a notification requesting a confirmation" (section 3.2) or
> "instruct the requestor to insert some record into the child domain"
> (section 3.4)?
>

Ok the current text is sub-optimal  added:
"for example by sending email to the registrant requesting a confirmation."


>
> It could use the same CDS approach and put it in some new resource
> records in the parent zone (just stick it in the DNS ;)).
>
That is even bigger change :-) sorry no go

>
> Anyway, if we assume there is no other communication channel, the
> document should provide more details on where to put this notification
> or challenge such that the child can pick it up. If we say there is a
> different communication channel, there needs to be more details about
> how that channel looks. Or we should just keep saying it is a hard
> problem and leave it out of scope (and solve it in yet another document).
>
In general we envision three confirmation approaches
  - A proof of change control of zone by requesting record insertion
(covered)
  - A delay in acceptance, i.e. a stability check (covered)
  - A email to registrant asking for confirmation. (just added)
While there might be more this is all we envision.



>
> - On using 0 as the DNSSEC Delete Algorithm in CDS and CDNSKEY records,
> I think that is fine and is a cleaner approach then using a non-zero
> algorithm number. The document could perhaps make it explicit it is
> meant only to be used in CDS and CDNSKEY records, not DS/DNSKEY.
>

done

>
> - The document suggests that when disabling DNSSEC, only the fixed
> fields should appear in the records. Do you mean fixed length fields?
>

changed "fixed fields" to "exactly the fields"

>
> - Leaving out the Digest/Public Key field changes the definition of the
> CDS and CDNSKEY records: No longer are their formats identical to the
> DS/DNSKEY records. So at minimal this updates RFC 7344. Existing
> versions of DNS server that support RFC 7344 will likely not be able to
> load a CDS record as described in section 4 and consider it malformed.
>

Good point, making this clearer in text


>
>
> Finally, two nits:
>
> - Nit: The abstract gives the reader the feeling that initial trust is a
> very hard problem, but then section 1.2 says it can be easily solved
> with some simplifying assumptions :) Perhaps you meant to say that it is
> hard to solve technically unless some reasonable policies can be assumed.
>
> - Nit: The first use mentioned in section 2 is just KSK Rollover. What
> does explaining the different operations add to the document?
>
> Basically setting the stage and expectations


>
> Best regards,
>   Matthijs
>
>
> thanks again
Olafur
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to