On 8/29/2024 4:24 PM, Paul Hoffman wrote:
On Aug 27, 2024, at 16:46, Warren Kumari<war...@kumari.net>  wrote:
Thank you very much for your comments. We've had some discussions, and the 
authors will be publishing a new version in the next few days addressing these.
As you can see, we have turned in -05. We think this deals with the comments 
from Petr and Mike. In the diff, you can see that we moved all things that said 
what a relying party who accepts the trust anchor file MUST/SHOULD do to the 
Security Considerations; this puts them in one place and gives the context for 
them. We also added some text about how to do the comparison for the two fields 
(referring to the specific part of RFC 4034 that they need).
Given that this is still in your (Warren's) two hands, not the WG's many hands, 
let us know if you need any more changes before the assigned telegchat.

--Paul Hoffman (for the authors)

_______________________________________________
DNSOP mailing list --dnsop@ietf.org
To unsubscribe send an email todnsop-le...@ietf.org
Hi -

Took a brief look at -05.  Still problems unaddressed.  Section 2.2 6th paragraph:
    The validFrom and validUntil attributes in the KeyDigest element
    specify the range of times that the KeyDigest element can be used as
    a trust anchor.
"can be used as a trust anchor" is problematic as it appears to be 
directive on the recipient.   As I've said - now at least three times - 
please change this language so it represents what the IANA is doing, not 
what the recipient should do.  Among other things, specifying a 
"validUntil" date on a trust anchor and then NOT ceasing to use that 
trust anchor and not "replacing" it is problematic.
Instead replace this paragraph with:

"The validFrom attribute in the KeyDigest element indicates the first planned date that the IANA intends to start signing the root DNSKEY RRSet with this key.  Likewise, the validUntil attribute indicates the last planned date of such signing.  However, these are for planning purposes only and relying parties should not automatically invoke a state change on a trust anchor based on these dates as operational considerations may result in a delay past these dates."
Section 4 - nit - generally we don't have single entry subsections.

Delete section 4.1.1 - continues to be a problem if IANA fails to supercede a trust anchor on the planned schedule. It is directive on the relying party in a way that could cause operational difficulties - to wit - iana actually continuing to sign with the set of trust anchors past their validUntil dates.  There is also no such thing as "change to a trust anchor" in DNSSEC.  All trust anchors are equally valid until revoked or removed.
Delete the third paragraph of section 5.

In section 5, replace the first sentence with:

"The intent is for the IANA to publish trust anchors using this format at least <6> months before the first use of a new trust anchor.  The intent is also that the published document will include all DNSSEC trust anchors for the root zone that are currently under management (e.g. generated and loaded for use within a key signing ceremony but not revoked) by the IANA at the time of publication."
Second paragraph - lower case the "may" - people are mostly not protocol 
elements, although the DNS crowd seems to think so. Also, add "Also for 
operational reasons, IANA may delay taking any trust anchor key out of 
service past the dates indicated in the most recent publication of the 
trust anchor file."
Please - can we avoid moving the deck chairs around again without 
actually fixing anything?
Thanks - Mike


_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to