Registrars/IANA/Registries/Resellers ==> Parents or Parental Agents
Olafur On Mon, Nov 7, 2016 at 7:22 AM, Ondřej Surý <ondrej.s...@nic.cz> wrote: > And you can replace "registrars" with "IANA" and your > whole paragraph would still be correct. This is another > area that hinders deployment of "new" (ehm, ehm) algorithms. > > Cheers, > -- > Ondřej Surý -- Technical Fellow > -------------------------------------------- > CZ.NIC, z.s.p.o. -- Laboratoře CZ.NIC > Milesovska 5, 130 00 Praha 3, Czech Republic > mailto:ondrej.s...@nic.cz https://nic.cz/ > -------------------------------------------- > > ----- Original Message ----- > > From: "George Michaelson" <g...@algebras.org> > > To: "Dan York" <y...@isoc.org> > > Cc: "dnsop" <dnsop@ietf.org> > > Sent: Monday, 31 October, 2016 05:22:43 > > Subject: Re: [DNSOP] FYI - Added note about ECDSA resolver issue in > Sweden - Fwd: New Version Notification for > > draft-york-dnsop-deploying-dnssec-crypto-algs-02.txt > > > It is only my personal opinion, but I believe registrars are incorrect > > in performing crypto alg checks on proffered DS, and this is an > > entirely unwarranted, and incorrect understanding of their role. It > > conflates one public good (checking) with another public good > > (registry of data into the DNS) and assumes one out-ranks the other: > > It doesn't, and the inability to track crypto alg change, makes the > > checking wrong. Its the lesser of two evils to stop checking, and > > permit unknown algorithms through. > > > > I think this needs to be flagged up. Either they should be told to > > stop, or the requirements for algorithm agility which their role > > places on them should be made explicit. > > > > -George > > > > On Mon, Oct 31, 2016 at 1:49 PM, Dan York <y...@isoc.org> wrote: > >> FYI, I submitted a new version of this draft that added some text in the > >> section about "Resolvers" that mentions the case Mikael Abrahamsson > brought > >> to us about how they had to disable DNSSEC validation in the CPE they > >> deployed to their customers because the resolver software was not > following > >> RFC 4035 and was not ignoring signatures with unknown algorithms. > >> > >> Comments are of course welcome. > >> > >> For those who are interested in writing I-D's with markdown, I also > >> transitioned the source of this version of the document to the flavor of > >> markdown that works with Miek Gieben's 'mmark' processor. Paul Jones > nicely > >> packaged mmark and xml2rfc into a Docker container that works extremely > >> well. This document and other links can be found in my Github repo at: > >> https://github.com/danyork/draft-deploying-dnssec-crypto-algs > >> > >> Dan > >> > >> Begin forwarded message: > >> > >> From: <internet-dra...@ietf.org> > >> Subject: New Version Notification for > >> draft-york-dnsop-deploying-dnssec-crypto-algs-02.txt > >> Date: October 30, 2016 at 11:37:13 PM EDT > >> To: Ondrej Sury <ondrej.s...@nic.cz>, Olafur Gudmundsson > >> <olafur+i...@cloudflare.com>, Dan York <y...@isoc.org>, " y...@isoc.org > " > >> <y...@isoc.org>, Paul Wouters <pwout...@redhat.com> > >> > >> > >> A new version of I-D, draft-york-dnsop-deploying- > dnssec-crypto-algs-02.txt > >> has been successfully submitted by Dan York and posted to the > >> IETF repository. > >> > >> Name: draft-york-dnsop-deploying-dnssec-crypto-algs > >> Revision: 02 > >> Title: Observations on Deploying New DNSSEC Cryptographic Algorithms > >> Document date: 2016-10-31 > >> Group: Individual Submission > >> Pages: 9 > >> URL: > >> https://www.ietf.org/internet-drafts/draft-york-dnsop- > deploying-dnssec-crypto-algs-02.txt > >> Status: > >> https://datatracker.ietf.org/doc/draft-york-dnsop- > deploying-dnssec-crypto-algs/ > >> Htmlized: > >> https://tools.ietf.org/html/draft-york-dnsop-deploying- > dnssec-crypto-algs-02 > >> Diff: > >> https://www.ietf.org/rfcdiff?url2=draft-york-dnsop- > deploying-dnssec-crypto-algs-02 > >> > >> Abstract: > >> As new cryptographic algorithms are developed for use in DNSSEC > >> signing and validation, this document captures the steps needed for > >> new algorithms to be deployed and enter general usage. The intent is > >> to ensure a common understanding of the typical deployment process > >> and potentially identify opportunities for improvement of operations. > >> > >> > >> > >> > >> Please note that it may take a couple of minutes from the time of > submission > >> until the htmlized version and diff are available at tools.ietf.org. > >> > >> The IETF Secretariat > >> > >> > >> -- > >> Dan York > >> Senior Content Strategist, Internet Society > >> y...@isoc.org +1-802-735-1624 > >> Jabber: y...@jabber.isoc.org > >> Skype: danyork http://twitter.com/danyork > >> > >> http://www.internetsociety.org/ > >> > >> > >> > >> > >> > >> _______________________________________________ > >> DNSOP mailing list > >> DNSOP@ietf.org > >> https://www.ietf.org/mailman/listinfo/dnsop > >> > > > > _______________________________________________ > > DNSOP mailing list > > DNSOP@ietf.org > > https://www.ietf.org/mailman/listinfo/dnsop > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop