Re: [DNSOP] WGLC draft-ietf-dnsop-dnssec-key-timing-03.txt until 2012-09-14

Matthijs Mekking <matthijs@nlnetlabs.nl> Fri, 07 September 2012 07:10 UTC

Return-Path: <matthijs@nlnetlabs.nl>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C37F121E809A for <dnsop@ietfa.amsl.com>; Fri, 7 Sep 2012 00:10:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mX5ju93POfBC for <dnsop@ietfa.amsl.com>; Fri, 7 Sep 2012 00:10:37 -0700 (PDT)
Received: from open.nlnetlabs.nl (open.nlnetlabs.nl [IPv6:2001:7b8:206:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id 53A3421E8037 for <dnsop@ietf.org>; Fri, 7 Sep 2012 00:10:37 -0700 (PDT)
Received: from [192.168.178.27] (a83-160-139-153.adsl.xs4all.nl [83.160.139.153]) (authenticated bits=0) by open.nlnetlabs.nl (8.14.5/8.14.4) with ESMTP id q877AUav053893 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO); Fri, 7 Sep 2012 09:10:31 +0200 (CEST) (envelope-from matthijs@nlnetlabs.nl)
X-DKIM: OpenDKIM Filter v2.6.7 open.nlnetlabs.nl q877AUav053893
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nlnetlabs.nl; s=default; t=1347001832; bh=MZxw10D4y6fF1hxuvBATiFhHC6vhQGuDQnYHRjrxqJM=; h=Date:From:To:CC:Subject:References:In-Reply-To; b=cyELUZ7eUBERhWLVHsgyaR+/ysfBTJHWpRX9HOYpGxS7iYAHnaU9pe0SMc7VyRwOS Bzpq4KstDMD1WT348eCWl0ceJjP5iHzjnS3v21WIuFkb1ABAMjJWeSqLeXtsfZBTdM gdwglNpRA8y9+RSAyEHOnZmaUDiV2HZoJZCFvZh8=
Message-ID: <50499DE8.6020001@nlnetlabs.nl>
Date: Fri, 07 Sep 2012 09:10:32 +0200
From: Matthijs Mekking <matthijs@nlnetlabs.nl>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:15.0) Gecko/20120827 Thunderbird/15.0
MIME-Version: 1.0
To: Tony Finch <dot@dotat.at>
References: <20120823214924.GL30725@x28.adm.denic.de> <50487B06.3030303@nlnetlabs.nl> <alpine.LSU.2.00.1209061211010.9973@hermes-1.csi.cam.ac.uk>
In-Reply-To: <alpine.LSU.2.00.1209061211010.9973@hermes-1.csi.cam.ac.uk>
X-Enigmail-Version: 1.4.4
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.7 (open.nlnetlabs.nl [213.154.224.1]); Fri, 07 Sep 2012 09:10:31 +0200 (CEST)
Cc: dnsop@ietf.org
Subject: Re: [DNSOP] WGLC draft-ietf-dnsop-dnssec-key-timing-03.txt until 2012-09-14
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Sep 2012 07:10:38 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/06/2012 01:44 PM, Tony Finch wrote:
> Matthijs Mekking <matthijs@nlnetlabs.nl> wrote:
>> 
> 
> Most of your points look OK to me though I have not yet reviewed
> the document in detail. I have a disagreement and a suggestion:
> 
>> * Section 2.1. ZSK Rollovers
>> 
>> - Bullet point 2, second paragraph. "Once the signing process is 
>> complete and enough time has elapsed to allow all old information
>> to expire from caches, ...". It is actually more about the new
>> information to propagate to caches, so I would suggest to replace
>> it with:
>> 
>> Once the signing process is complete and enough time has elapsed
>> to allow all new information to propagate to caches, ... 
>> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> 
> No, I think the original text is correct. You can't remove the old
> DNSKEY until all the old RRsets (and RRSIGs) have expired, and you
> can't remove the old RRSIGs until the old DNSKEY RRsets have
> expired. Whether the caches have the new data is irrelevant since
> it's also OK for them to have no data. And when caches are filled
> is not under the authority's control.

Good point. The reason why this text attracted my attention is that
with ZSK Double-Signature, the "old information" will not expire from
caches. The previous versions of the RRsets which contain *only* the
predecessor DNSKEY and predecessor signatures expire from the caches.
It will have either a replacement that contains *both* predecessor and
successor DNSKEY and signatures, or it will have no replacement.

So, "old information" is perhaps too loosely.

Best regards,
  Matthijs

> 
>> - Bullet point 1 says that the ZSK Double Signature rollover is
>> also known as Double-DNSKEY. I have not heard of this term before
>> reading this document. Is it really known as?
> 
> Double-KSK would be a better term, since Double-DNSKEY sounds like
> the normal steady state with a KSK and ZSK.
> 
> Tony.
> 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/

iQEcBAEBAgAGBQJQSZ3kAAoJEA8yVCPsQCW5RiYIAJnSXoqGf5foJ4ElchWbp9gC
KY5HtQJKynB0on5AHUTMUf1r8ccjFyjChlTj+3Plf2rlpTBJzZytmN7Zv6PEw5LM
kO8NcG64NKT2wi5ca1N2053FTo+wGOu5yB/eV8gPBLnf9InKvkXkE4+gfE5rfaFC
FgmUaj6AQHSxkt8q3Bizn6Wz0F92qNshyxqQCD6vQ6DWz2kJKgzmM4LZu0/Bju+U
dB15Ik8e9qOAj0eewkiQ1S9eBh1nsjbnZiTELq9pr8Y9CGYXq5hwyFpMHEA3GbxM
w9AnY7gzhtAjowbTlqqvwgvMJYYg4OfTZjX3gSNEqNMpKWEMYcfwTI+Rp0VfomY=
=FcRv
-----END PGP SIGNATURE-----