DNSSECbis Q-07: Discuss preconfigured trusted DSs in addition to preconfigured trusted KEYs?

Rob Austein <sra+namedroppers@hactrn.net> Wed, 09 April 2003 20:17 UTC

Received: from psg.com (mailnull@psg.com [147.28.0.62]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA12736 for <dnsext-archive@lists.ietf.org>; Wed, 9 Apr 2003 16:17:34 -0400 (EDT)
Received: from lserv by psg.com with local (Exim 3.36 #1) id 193Lrw-000BY7-00 for namedroppers-data@psg.com; Wed, 09 Apr 2003 20:08:28 +0000
Received: from [2002:425c:4242:0:250:daff:fe82:1c39] (helo=thrintun.hactrn.net) by psg.com with esmtp (Exim 3.36 #1) id 193Lrq-000BX1-00 for namedroppers@ops.ietf.org; Wed, 09 Apr 2003 13:08:22 -0700
Received: from thrintun.hactrn.net (localhost [::1]) by thrintun.hactrn.net (Postfix) with ESMTP id 440EC18E6 for <namedroppers@ops.ietf.org>; Wed, 9 Apr 2003 16:07:50 -0400 (EDT)
Date: Wed, 09 Apr 2003 16:07:50 -0400
From: Rob Austein <sra+namedroppers@hactrn.net>
To: namedroppers@ops.ietf.org
Subject: DNSSECbis Q-07: Discuss preconfigured trusted DSs in addition to preconfigured trusted KEYs?
References: <20030331132915.GA2912@atoom.net> <20030409015556.6CF3B18ED@thrintun.hactrn.net> <20030409030333.E8E6518ED@thrintun.hactrn.net>
User-Agent: Wanderlust/2.8.1 (Something) Emacs/20.7 Mule/4.0 (HANANOEN)
MIME-Version: 1.0 (generated by SEMI 1.14.4 - "Hosorogi")
Content-Type: text/plain; charset="US-ASCII"
Message-Id: <20030409200750.440EC18E6@thrintun.hactrn.net>
X-Spam-Status: No, hits=-29.3 required=5.0 tests=BAYES_01,EMAIL_ATTRIBUTION,QUOTED_EMAIL_TEXT,REFERENCES, REPLY_WITH_QUOTES,USER_AGENT autolearn=ham version=2.50
X-Spam-Checker-Version: SpamAssassin 2.50 (1.173-2003-02-20-exp)
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk

DNSSECbis Q-07:

   Should the DNSSECbis documents discuss use of preconfigured trusted
   DSs in addition to to preconfigured trusted KEYs?

Discussion:

   As currently written, the DNSSECbis documents (specifically,
   -protocol) only talk about how to establish a chain of trust
   starting with preconfigured trusted keys.  At least one member of
   the dnssec-editors team believes that this is just an oversight,
   since section 2.4.1 of -delegation-signer-13 specifically mentions
   the possibility of using DS RRs as a means of listing trusted keys
   in configuration files.

   Message from the DNSOP WG mailing list attached below for context.

   Miek has kindly volunteered to work with the editors on wording.


--[[message/rfc822]
Date: Tue, 08 Apr 2003 21:55:56 -0400
From: Rob Austein <sra+dnsop@hactrn.net>
To: dnsop@cafax.se
Subject: Re: preconfigured keys or ds's
References: <20030331132915.GA2912@atoom.net>
MIME-Version: 1.0 (generated by SEMI 1.14.4 - "Hosorogi")
Content-Type: text/plain; charset=US-ASCII
Message-Id: <20030409015556.6CF3B18ED@thrintun.hactrn.net>

At Mon, 31 Mar 2003 15:29:15 +0200, Miek Gieben wrote:
> 
> I would like to see the following documented, but I don't know for sure
> if it is a dnssec or dnsop issue:
> 
> The preconfigured keys for resolvers are large and are hard to compare
> and read (by humans). DS records on the other hand are much smaller
> and easier to handle. I think it would be better to preconfigure
> DS records in stead of zone keys for resolvers. This is also how
> my perl resolver works.

<hat dnsop-wg-co-chair=off dnssec-editors-team-member=off>

  This sounds like a reasonable implementation choice.

</hat>

> Where to put this? In the dnssec drafts or in a seperate dnsop BCP?

<hat dnsop-wg-co-chair=off dnssec-editors-team-member=on>

  The current DNSSECbis drafts don't talk about using trusted DS RRs
  as a starting point, only trusted KEYs.  Given the last paragraph of
  section 2.4.1 of draft-ietf-dnsext-delegation-signer-13.txt, this
  looks like an oversight (probably mine, since I was probably the
  last person to work on the relevant text in the DNSSECbis drafts).

  So the DNSSECbis spec needs fixing, and I don't expect anybody to
  argue against the fix, but for process reasons it'd be best to post
  an explanation to namedroppers first, so I'll do that.

</hat>

<hat dnsop-wg-co-chair=on dnssec-editors-team-member=off>

  Because of the above, at least part of this is a DNSEXT issue.

</hat>

--
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/namedroppers/>