Sent from my iPhone

> On Nov 16, 2016, at 22:41, Bob Harold <rharo...@umich.edu> wrote:
> 
>> This is not well thought out, but what jumps to mind is to keep a chain of 
>> signatures in the root DNS that links from the original KSK up through the 
>> current KSK (or at least the last 10 years).  Perhaps a different record 
>> type, so it is only sent if asked for.
> 
> Does that make any sense?

The problem is that it does not protect against key compromise, either by 
operational causes or by mathematical progress.

Paul
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to