W dniu 07.07.2019 o 01:46, Joe Abley pisze: > On Jul 6, 2019, at 19:28, Witold Krecicki <w...@isc.org> wrote: > >> Exactly - while the things you mentioned are configuration options that >> are 'human generated', the ZSK rollover should be, in the ideal case, >> something that happens automatically, without any human intervention. > > It wouldn't necessarily be harmful to be able to update those other > things automatically, too. Things like master servers and NOTIFY > targets perhaps change less frequently or predictably than a ZSK, but > in times of emergency all could benefit from a well-designed, > automated and secure mechanism to handle changes. > > TSIG secrets are rarely rolled in practice, in my experience, and > being able to improve upon that also seems useful. > > I still wonder whether what you're proposing really only solves one of > a wider set of problems, and whether doing it in the DNS really makes > sense. Perhaps a standardised, out-of-band provisioning protocol would > be better. > > We might have a need to exchange some other kind of metadata between > authoritative servers for a zone in the future, eg relating to secure > transports or privacy. The idea of being able to provide a general > solution to solve future such problems seems attractive. > But why put it out-of-band when it can be in-band? This draft is just an 'umbrella' - you can put whatever you want there, and you can be sure it won't be leaked. There can be a special RR type for master servers - in COVERT range, there can be a special RR type for TSIG keys - in COVERT range. It can be used for any type of metadata. Note: I'm considering adding a 'private' covert range, for implementation-specific things (just like we have a general 'private' RR types range).
-- Witold _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop