I just want to point out, that I am certainly not overthinking this with my 
implementors hat.
The RFC and code-point puts pressure on the DNS vendors to actually implement 
this
„because there’s RFC“. The whole reason for standardization is that there’s 
interoperatibility
between the implementations - and just giving the code points without 
implementing this
hardly fulfills that requirement.

Sure, I can ignore the new GOST code point in BIND 9, but that becomes harder 
when
either one of the other open source implementations or one of the big DNS silos 
will actually
do the implementation.

So, it’s definitively not „just giving the code point“, it has implications for 
some of us.

Ondrej
--
Ondřej Surý (He/Him)
ond...@isc.org

> On 18 Jun 2020, at 17:36, Jim Reid <j...@rfc1035.com> wrote:
> 
> I think we’re over-thinking this. Just issue new code point(s) for the new 
> algorithm(s) and be done with it.
> 
> IMO there’s no need for the WG or the IETF to make any statements about the 
> suitability of the underlying crypto used for optional signing and 
> validation. That’s largely a matter for those who use these algorithms. 
> Higher-level concerns about the crypto’s suitability should only come into 
> play whenever an algorithm is a MUST/SHOULD recommendation in a 
> standards-track RFC.
> 
> Maybe we need an RFC6895-like process for maintaining this IANA registry, 
> like we have for RRtype codes?
> 

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to