> On 7 Jul 2017, at 02:47, Shumon Huque <shu...@gmail.com> wrote:
> 
> I assume you're referring to the examples in Appendix D (Test Vectors)?

Yes.

> These are working examples that implementers can test code against. But it 
> looks like the testbed involved in these examples uses combined signing keys 
> (i.e. ones that are both the zone's secure entry point and the ZSK). Perhaps 
> we should use an example with the KSK/ZSK split to make them look more like 
> the real world. Let me discuss with Willem Toorop (co-author) who generated 
> these ...

Willem told me he’d used the KSK as the ZSK for cosmetic reasons. Examples 
showing the KSK/ZSK split would show how things generally work the real world.


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to