Thanks for the comments. They are all addressed in the revised draft coming out 
shortly.

--Paul Hoffman

On Jun 30, 2024, at 15:31, John R Levine <jo...@taugh.com> wrote:
> 
> I took a look and didn't find anything particularly troubling.  I agree that 
> adding the new optional DNSKEY element doesn't need a version number. Getting 
> rid of private certificates in favor of a CA signed cert for the HTTPS server 
> makes sense.
> 
> On the other hand, I don't understand what the point of the new optional 
> DNSKEY field in the XML is.  I see that IANA does not currently include it.
> 
> It's always been possible to retrieve the DNSKEY records from the live root 
> and check that one of them matches the digest in the XML.  Is this to provide 
> a way to remember the old DNSKEYs that have been rotated out of the root?  A 
> sentence or two describing the motivation would help.
> 
> The third paragraph of section 3.2 describes a detached CMS signature. While 
> I realize it's there in 7958, I don't see how it provides any security at 
> all.  It's signed with an ICANN private key but there's no way I can see to 
> tell the "real" ICANN CA from one that I just made up to sign my fake XML.  
> The useful security is the accredited CA signed HTTPS certificate described 
> in the following paragraph, so I'd take the CMS signature out or at least 
> note that it's trivial to defeat unless you have external knowledge about 
> ICANN's private CA.
> 
> Regards,
> John Levine, jo...@taugh.com, Taughannock Networks, Trumansburg NY

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to