There is also the physical solution.  Have removable storage for
the key and update the key using this externally when reqired.  Nano
sims or micro sd card would be a good form factor for this.  Pick
a standard file name and you just have them sitting on the shelves
in stores with the key date printed on the packaging.

Is it that hard to add a sim or sd card reader?  This is the solution
the cable industry uses for its crypto issues but with bigger form
factor cards.

Mark

In message <20161116203911.ga40...@isc.org>, Evan Hunt writes:
> On Wed, Nov 16, 2016 at 08:41:03AM -0500, Bob Harold wrote:
> > > Do you have a suggestion for a solution?
> > >
> > This is not well thought out, but what jumps to mind is to keep a chain of
> > signatures in the root DNS that links from the original KSK up through the
> > current KSK (or at least the last 10 years).  Perhaps a different record
> > type, so it is only sent if asked for.
> > 
> > Does that make any sense?
> 
> I believe that's what the TALINK RR type is for. The draft seems to
> have fizzled back in 2010, but I still think it's a good idea.
> 
> https://tools.ietf.org/html/draft-wijngaards-dnsext-trust-history-03
> 
> 
> -- 
> Evan Hunt -- e...@isc.org
> Internet Systems Consortium, Inc.
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to