> On 7 Jul 2017, at 02:47, Shumon Huque <shu...@gmail.com> wrote: > > I assume you're referring to the examples in Appendix D (Test Vectors)?
Yes. > These are working examples that implementers can test code against. But it > looks like the testbed involved in these examples uses combined signing keys > (i.e. ones that are both the zone's secure entry point and the ZSK). Perhaps > we should use an example with the KSK/ZSK split to make them look more like > the real world. Let me discuss with Willem Toorop (co-author) who generated > these ... Willem told me he’d used the KSK as the ZSK for cosmetic reasons. Examples showing the KSK/ZSK split would show how things generally work the real world. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls