Hi Warren, all,

On 15-01-18 02:51, Warren Kumari wrote:
> The (new) rules:
> A: If the qname starts with _is-ta, and the included keyid is *NOT* in
> the trust store, the resolver changes the answer to a SERVFAIL
> (otherwise things proceed normally).
> B: If the qname starts with _not-ta and the included keyid *IS* in the
> trust store, the resolver changes the answer to a SERVFAIL (otherwise
> things proceed normally).

It is still not clear to me which trust anchor a validator should use
for the sentinel processing. Is that (1) the root trust anchor with
corresponding keyid, (2) the trust anchor with matching keyid for the
domain that is queried, so the example.com trust anchor in your example,
or (3) any trust anchor from the trust store with a matching keyid?

1. Does not require changes in the root zone and makes it possible for
anyone to create a root KSK test. It also means that this test can not
be used for any non-root trust anchor.
2. Requires changes in the root zone, but makes it possible to test the
trust anchor for any zone.
3. Reduces the usefulness of the data. You know that a trust anchor for
that keyid is configured, but you don't know for which zone. Given the
limited number of keyids this does not sound like a good option. A trust
anchor in the trust store with the keyid of the new root KSK does then
not imply that validation will work after the keyroll.

-- Ralph

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to