On Wed, Nov 30, 2016 at 10:43 AM, Matt Larson <m...@kahlerlarson.org> wrote:

>
> > On Nov 29, 2016, at 8:31 AM, Olafur Gudmundsson <o...@ogud.com> wrote:
> >
> > IMHO the device should have two sources of truth for DNSSEC root TA
> > a) DNS via RFC5011
> > b) Secure Software update from the vendor
> >
> > If both fail then operator should be invoked.
>
> Did you see my message earlier in the thread?  Is there a reason you don't
> include a third option: retrieving the trust anchor file published by
> IANA/PTI (https://data.iana.org/root-anchors/root-anchors.xml) and
> validating with the detached S/MIME signature published in the same place (
> https://data.iana.org/root-anchors/root-anchors.p7s)?  That signature
> chains to the ICANN CA cert, which currently expires in 2029.  Sure, it's
> more code, but it can all be done with OpenSSL, for example.
>
> Matt
>
>
I saw your message, the issue is  it is not at this point well documented
how a Vendor can integrate this into
their setup scripts.
What is needed is Documentation as how to fetch this, and preferably a Open
Source tool demonstrating the process and verification.
The fundamental question is "what validates the root-anchors.xml file and
how can I trust that in 10 years?"

Olafur
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to