On Jul 3, 2024, at 07:50, Ben Schwartz <bemasc=40meta....@dmarc.ietf.org> wrote:

> Section 1.1
> 
> I like the "assumed and not derived" notion for a "trust anchor", but it's 
> tricky and bears a bit more explanation.  Rather than repeating it in the 
> following sentence, perhaps you could say "the decision to trust this entity 
> is made outside of the system that relies on it".  My point is that "assumed 
> and not derived" requires a certain sort of "horizon" comprising a single 
> "system"; expand the horizon and it is indeed derived.  For example, trust in 
> these DNSKEYs can be derived from the CMS signature, making the ICANN CA the 
> trust anchor, but that process is outside of DNSSEC, so from DNSSEC's 
> perspective the root key is the trust anchor.

This is addressed in the revised draft coming out shortly.

> Section 3.1
> 
> The existence of a protocol called "HTTPS" is controversial in the HTTP 
> world.  I recommend checking with the HTTPBIS chairs or other relevant 
> experts on this point of style.

This can be done during IETF Last Call. I'm hesitant to change this based on 
opinions that are not instantiated in an RFC.

> Section 3.3
> 
> This section says "cryptographic assurance for the contents of the trust 
> anchor now comes from the web PKI as described in Section 3.2", but Section 
> 3.2 outlines two ways to verify the contents: an attached signature or TLS.  
> The TLS case looks like the Web PKI, especially since it is not guaranteed to 
> chain to any particular root CA,  but the attached signature does not seem to 
> represent a dependency on the Web PKI.

This is addressed in the revised draft coming out shortly.

--Paul Hoffman

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to