> On Oct 30, 2018, at 8:27 PM, Mark Andrews <ma...@isc.org> wrote:
> 
>> On 31 Oct 2018, at 11:16 am, Jim Reid <j...@rfc1035.com> wrote:
>> 
>> On 30 Oct 2018, at 22:31, Mark Andrews <ma...@isc.org> wrote:
>>> 
>>> Ultra frequent key rolls are not necessary.  It takes years the latest 
>>> releases of name servers to make it into shipping OS’s.
>> 
>> So what? Key rollover policies cannot and should not be driven by vendor OS 
>> release schedules. Or the BIND/whatever version they choose to distribute. 
>> If key rollovers became dependent on these considerations, we’d never be 
>> able to roll the root’s KSK.
>> 
>> Software that had hard-wired the old key caused trouble for the recent 
>> rollover so we simply have to be in a much better place next time. I hope 
>> you don't want to perpetuate that legacy behaviour, albeit in a slightly 
>> different form.
>> 
>> If the (hypothetical) problem is DNS software gets shipped with the current 
>> KSK on the release date and that might lurk in vendor distributions long 
>> after the KSK has rolled, the solution is obvious. Don’t do that.
> 
> Bootstrap is still a issue.  Over fast TA rolling makes it more of a issue.
> 
> I think we would replace RFC 5011 with something else before we roll the root 
> key next while using RFC 5011 timings for the roll for legacy 
> implementations.  We really need a way to signal how long a TA is expected to 
> be valid for.  This allows machines to safely fail to insecure if they have 
> been off for too long.

It is a good time to do rfc5011-bis.  Real world experience from the KSK roll 
makes a lot os sense to me.

And, an operational considerations section can address the bootstrap issue.

Russ

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to