Mark Andrews <ma...@isc.org> wrote:
>
> The purpose was for the CDS/CDNSKEY tools to not have to fetch the
> current DNSKEY RRset to be able to validate the records provided they
> have a current KSK.

Oh, that's neat, thanks!

Having thought about it a bit more I understand why the draft says what it
does and why that makes sense.

It's difficult that KSK can mean four different and not necessarily
congruent things:

 1. keys with the SEP bit set

 2. keys that sign the DNSKEY RRset

 3. keys with digests in the DS RRset

 4. keys that are trust anchors

My understanding is that for a validator the SEP bit is irrelevant.

For 2 and 3 the distinction I needed is that the DS keys are the ones
authenticated by the parent; the signing of the DNSKEY RRset allows the
child to authenticate additional keys (i.e. ZSKs). But from the parent's
point of view what matters is that the RRset as a whole is signed by a
parentally authenticated key.

Tony.
-- 
f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/  -  I xn--zr8h punycode
Tyne, Dogger, Fisher, German Bight: South or southwest 3 or 4, increasing 5 or
6, occasionally 7 later. Slight becoming moderate. Rain then showers. Moderate
or good.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to