"Alissa Cooper" <ali...@cooperw.in> writes:

> - Agree with Terry's DISCUSS.

Fixed, FYI (Terry agrees with the solution at least; see that thread).
>
> - Sec. 2: The last paragraph here isn't really about "goals" and seems
> like it belongs more appropriately in Sec 3.

Good point.  Moving it to a new "NOTE" in section 3.

> - Sec 6.1: I thought recently gathered data has been pointing to the
> futility of popping up security warnings (e.g.,
> http://neurosecurity.byu.edu/media/Anderson_et_al._CHI_2015.pdf). Does it
> really make sense to recommend warning users in a BCP? What are users
> expected to do as a result? Is there any evidence about the proportion of
> users who even know what DNSSEC is?

I'll have to read your paper, thanks for the pointer.

As to section 6.1, it seems like in a BCP we should say *something*
about what to do.  Thus, the current text says this:

      <section title="What To Do">
        <t>If Host Validator detects that DNSSEC resolution is not
        possible it SHOULD log the event and/or SHOULD warn user. In
        the case there is no user no reporting can be performed thus
        the device MAY have a policy of action, like continue or
        fail. Until middle boxes allow DNSSEC protected information to
        traverse them consistently, software implementations may need
        to offer this choice to let users pick the security level they
        require.</t>
      </section>

I supposed we could replace "warn" with something like "report an error
to the user"?  I think that's better so am making that change.

-- 
Wes Hardaker
Parsons

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to