On Wed, 16 Nov 2016, Bob Harold wrote:

This is not well thought out, but what jumps to mind is to keep a chain of signatures in the root DNS that links from the original KSK up through the current KSK (or at least the last 10 years). Perhaps a different record type, so it is only sent if asked for.

Does that make any sense?

Someone told me that the information needed could be gained in replaying a root zone packet from every 3 months since when DNSSEC was originally developed (or at least from when whatever this proposed solution was done).

That seems to be similar to what you're thinking of here. Can we get a solution that does that, that isn't a DDOS amplification vector or something else hugely problematic?

--
Mikael Abrahamsson    email: swm...@swm.pp.se

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to