On Wed, Apr 8, 2020 at 10:52 PM Roman Danyliw via Datatracker <
nore...@ietf.org> wrote:

Thank you for your review Roman.

----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> Thank you for responding to the SECDIR review by Daniel Migault (and
> thanks for
> doing the review Daniel!)  The proposed clarifications would be helpful.
>

Yes, I have several clarifications from that review in the pipeline for the
next
update of the draft.

** Per Section 6.1, “Provider A would generate a new ZSK and communicate
> their
> intent to perform a rollover …”, how is that communication done? Just as
> the
> Security Considerations already talks about API security, is there an
> analogous
> thing to say here in Section 12?
>

That's a good question. We are assuming the zone owner and provider would
either
use a secure out-of-band channel to signal this intent, or the provider API
would have
a relevant function that the zone owner could invoke for this. I'll spell
this out explicitly.

** Section 12.  As key generation is invoked as a step in a number of these
> procedures, provide a pointer good practices for this step would be
> helpful,
> say Section 3.4.4 of RFC6781.
>

We reference 6781 in the earlier section on key rollovers. But sure, I
think it would
be a good idea to re-mention it in Security Considerations for more general
practices
covering security relevant topics.

** Editorial Nits:
> -- A few places.  Typo. s/Authentiated/ Authenticated/g
>
> -- Section 5.1.  Typo. s/prefered/preferred/
>
> -- Section 5.2. Typo. s/Aggresive/Aggressive/
>

Ok.

Shumon Huque
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to