Re: [dnsext] historal root keys for upgrade path?

Andrew Sullivan <ajs@shinkuro.com> Tue, 25 January 2011 18:26 UTC

Return-Path: <ajs@shinkuro.com>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CDBEE3A6403 for <dnsext@core3.amsl.com>; Tue, 25 Jan 2011 10:26:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.587
X-Spam-Level:
X-Spam-Status: No, score=-102.587 tagged_above=-999 required=5 tests=[AWL=0.012, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y0gL+6kYsZhP for <dnsext@core3.amsl.com>; Tue, 25 Jan 2011 10:26:28 -0800 (PST)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by core3.amsl.com (Postfix) with ESMTP id 534E23A6849 for <dnsext@ietf.org>; Tue, 25 Jan 2011 10:26:28 -0800 (PST)
Received: from crankycanuck.ca (69-196-144-230.dsl.teksavvy.com [69.196.144.230]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id ED3E91ECB421 for <dnsext@ietf.org>; Tue, 25 Jan 2011 18:29:25 +0000 (UTC)
Date: Tue, 25 Jan 2011 13:29:24 -0500
From: Andrew Sullivan <ajs@shinkuro.com>
To: dnsext@ietf.org
Message-ID: <20110125182924.GG5011@shinkuro.com>
References: <alpine.LFD.1.10.1101251250040.30991@newtla.xelerance.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <alpine.LFD.1.10.1101251250040.30991@newtla.xelerance.com>
User-Agent: Mutt/1.5.18 (2008-05-17)
Subject: Re: [dnsext] historal root keys for upgrade path?
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jan 2011 18:26:30 -0000

On Tue, Jan 25, 2011 at 12:53:11PM -0500, Paul Wouters wrote:

> Are there plans to create a zone with all old root keys, that all sign the
> DNSKEY RRset (eg rootkeys.root-servers.net) so that having ANY one old root
> key could lead you to get a signed version of the latest root key? This way
> you could disable DNSSEC to resolve rootkeys.root-servers.net, use your
> current key to confirm the latest key, configure it, and drop the cache,
> and you're golden.

I think the answer is
http://tools.ietf.org/html/draft-wijngaards-dnsop-trust-history-02
(and the opposition it has faced).

A
-- 
Andrew Sullivan
ajs@shinkuro.com
Shinkuro, Inc.