On 30 Nov 2016, at 8:00, Mikael Abrahamsson wrote:

On Wed, 30 Nov 2016, Matt Larson wrote:

Did you see my message earlier in the thread? Is there a reason you don't include a third option: retrieving the trust anchor file published by IANA/PTI (https://data.iana.org/root-anchors/root-anchors.xml) and validating with the detached S/MIME signature published in the same place (https://data.iana.org/root-anchors/root-anchors.p7s)? That signature chains to the ICANN CA cert, which currently expires in 2029. Sure, it's more code, but it can all be done with OpenSSL, for example.

This sunds like a workable solution.

It would be great if ICANN could write a document outlining how to do this and perhaps even provide FOSS example code.

Such a document is in process. A FOSS tool can be found at https://github.com/kirei/dnssec-ta-tools/tree/master/get_trust_anchor (issues and pull requests invited!), but it might move in the future to an ICANN or PTI location. A few months ago, Jakob and I did a presentation about it at OARC.

--Paul Hoffman

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to