Dear DNSOP, We have addressed the WG's feedback from the Interim on May 24, and also addressed remaining outstanding issues (mainly editorial).
From the authors' perspective, the protocol draft is now "final" (in the sense, that no action items remain). We would appreciate the group's thorough feedback, and -- if the group feels like it -- proceed to WG Last Call The most significant changes are:
Introduced Signaling Type prefix (_dsboot), renamed Signaling Name infix from _dsauth to _signal. Allow bootstrapping when some (not all) NS hostnames are in bailiwick.
Due to the first change, DS signaling records now live at names such as: _dsboot.example.co.uk._signal.ns1.example.net Other changes are:
Clarified Operational Recommendations according to operator feedback. Turn loose Security Considerations points into coherent text. Do no longer suggest NSEC-walking Signaling Domains. (It does not work well due to the Signaling Type prefix. What's more, it's unclear who would do this: Parents know there delegations and can do a targeted scan; others are not interested.) Editorial changes. Added IANA request.
On other news, Cloudflare has announced production deployment of the protocol on all their signed domains (see slide 10 of Christian's slides at https://74.schedule.icann.org/meetings/WiPRZ59cBZDvj5ws2). Thanks, Peter On 6/17/22 12:06, internet-dra...@ietf.org wrote:
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Domain Name System Operations WG of the IETF. Title : Automatic DNSSEC Bootstrapping using Authenticated Signals from the Zone's Operator Authors : Peter Thomassen Nils Wisiol Filename : draft-ietf-dnsop-dnssec-bootstrapping-01.txt Pages : 14 Date : 2022-06-17 Abstract: This document introduces an in-band method for DNS operators to publish arbitrary information about the zones they are authoritative for, in an authenticated fashion and on a per-zone basis. The mechanism allows managed DNS operators to securely announce DNSSEC key parameters for zones under their management, including for zones that are not currently securely delegated. Whenever DS records are absent for a zone's delegation, this signal enables the parent's registry or registrar to cryptographically validate the CDS/CDNSKEY records found at the child's apex. The parent can then provision DS records for the delegation without resorting to out-of-band validation or weaker types of cross-checks such as "Accept after Delay" ([RFC8078]). This document updates [RFC8078] and replaces its Section 3 with Section 3.2 of this document. [ Ed note: This document is being collaborated on at https://github.com/desec-io/draft-ietf-dnsop-dnssec-bootstrapping/ (https://github.com/desec-io/draft-ietf-dnsop-dnssec-bootstrapping/). The authors gratefully accept pull requests. ] The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-bootstrapping/ There is also an HTML version available at: https://www.ietf.org/archive/id/draft-ietf-dnsop-dnssec-bootstrapping-01.html A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-dnsop-dnssec-bootstrapping-01 Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop
-- Like our community service? 💛 Please consider donating at https://desec.io/ deSEC e.V. Kyffhäuserstr. 5 10781 Berlin Germany Vorstandsvorsitz: Nils Wisiol Registergericht: AG Berlin (Charlottenburg) VR 37525 _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop