Re: [dnsext] WGLC on draft-ietf-dnsext-dnssec-algo-signal-05
Scott Rose <scottr.nist@gmail.com> Tue, 27 March 2012 16:44 UTC
Return-Path: <dnsext-bounces@ietf.org>
X-Original-To: namedroppers-archive-gleetwall6@lists.ietf.org
Delivered-To: ietfarch-namedroppers-archive-gleetwall6@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 944E321E820F; Tue, 27 Mar 2012 09:44:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1332866669; bh=DQlp/V+RaVppVey5D/fPhAy3fiCyrtP3i9MfRpv08V0=; h=Mime-Version:From:In-Reply-To:Date:Message-Id:References:To:Cc: Subject:List-Id:List-Unsubscribe:List-Archive:List-Post:List-Help: List-Subscribe:Content-Type:Content-Transfer-Encoding:Sender; b=WvmGNmJyjzTk9jsXNvcWk/1Ato/IbhrfRHIJSIQmOh213xoEkRWGPmxuPfK7Ii9i2 BU2wH3UwTT9g59gyOeghGqZazXcocyHXoAH1X+SqN9MnlXI7yepkuaLvr9MOmqOxoh U+3dkfJIhsiFVonHI4YGeiaIiGO+SBfgiee2TJXM=
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DABB21E8209 for <dnsext@ietfa.amsl.com>; Tue, 27 Mar 2012 09:44:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.371
X-Spam-Level:
X-Spam-Status: No, score=-6.371 tagged_above=-999 required=5 tests=[AWL=-0.072, BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UOnV2ed92mdd for <dnsext@ietfa.amsl.com>; Tue, 27 Mar 2012 09:44:27 -0700 (PDT)
Received: from smtp.nist.gov (rimp2.nist.gov [129.6.16.227]) by ietfa.amsl.com (Postfix) with ESMTP id 51F2421E81F0 for <dnsext@ietf.org>; Tue, 27 Mar 2012 09:44:27 -0700 (PDT)
Received: from 107-140.antd.nist.gov (107-140.antd.nist.gov [129.6.140.107]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id q2RGiFLR022682; Tue, 27 Mar 2012 12:44:16 -0400
Mime-Version: 1.0 (Apple Message framework v1084)
From: Scott Rose <scottr.nist@gmail.com>
In-Reply-To: <201203271402.QAA03645@TR-Sys.de>
Date: Tue, 27 Mar 2012 12:44:15 -0400
Message-Id: <2E875509-4B39-4876-806D-E8FE49F83B9E@gmail.com>
References: <201203271402.QAA03645@TR-Sys.de>
To: Alfred HÎnes <ah@TR-Sys.de>
X-Mailer: Apple Mail (2.1084)
X-NIST-MailScanner: Found to be clean
X-NIST-MailScanner-From: scottr.nist@gmail.com
Cc: dnsext@ietf.org
Subject: Re: [dnsext] WGLC on draft-ietf-dnsext-dnssec-algo-signal-05
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Sender: dnsext-bounces@ietf.org
Errors-To: dnsext-bounces@ietf.org
Thanks - we will fix those comments in the next revision. Scott On Mar 27, 2012, at 10:02 AM, Alfred HÎnes wrote: > A have a few more, mostly editorial comments on > draft-ietf-dnsext-dnssec-algo-signal-05 > (trying to avoid duplicates of items already mentioned this week > in review comments on the list): > > > 1) General Terminology (mostly in Section 1), and some nits > > * Sect. 1, 2nd para: > > "DS" should be spelled out "Delegation Signer", not "Delegated Signer" > -- cf. RFC 3034, sect. 2, "Definition of DNSSEC Terms"). > Also, a comma should be placed in front of "like" in that para. > > * Sect. 1, 3rd para: > > The draft should not say "EDNS attribute" in one place, always more > precisely "EDNS option" (see snippet below). > > * Sect. 1, 3rd para, and Sect. 8, 2nd line: > > The hashes used in DNSSEC are cryptographic functions/algorithms as > well. Using "cryptographic algorithm" in some places as a substitute > for "[cryptographic|digital] signature algorithm" seems confusing. > This should be fixed. > > Additionally, for enhanced clarity, I suggest to shuffle the words > a bit and improve the language in the 3rd para of Section 1: > > OLD: > This draft sets out to specify a way for validating end-system > resolvers to tell a server which cryptographic and/or hash algorithms > they support in a DNS query. This is done using the EDNS attribute > values in the OPT meta-RR [RFC2671]. > > NEW: > This draft sets out to specify a way for validating end-system > resolvers to tell a server in a DNS query which digital signature > and/or hash algorithms they support. This is done using the new > EDNS options specified below in Section 2 for use in the OPT meta-RR > [RFC2671]. > > > 2) "EDNS" vs. "EDNS0" > > The EDNS framework is designed to allow expansion while maintaining > backward compatibility, and one method to achieve this is based on > the versioning rules from RFC 2671[bis]. Therefore, we should better > avoid referring specifically to "EDNS0" or "EDNS(0)" when mentioning > facts that are expected to remain strictly unchanged in future EDNS > versions (however unlikely their occurrence may seem now). > > In particular, I suggest to s/EDNS0/EDNS/ twice in the 1st para > of Sect. 2, once in the 2nd para of Sect. 6, and once in Sect. 8. > > > 3) error in example ?? > > In the last para of Section 2, the byte counts given apparently > do not match the other information. I suspect the figures have > inadvertently not been updated upon the change in the EDNS option > structure the draft has undergone. > IMHO, "16-24 octets" should read "24-34 octets": > > OLD: > > However, in practical terms including all three options are likely to > | take up 16-24 octets (average of 6-10 digital signature algorithms, > ^^^^^ > 3-5 DS hash algorithms and 1-5 NSEC3 hash algorithms) including the > EDNS option codes and option lengths in a reasonable potential future > example. > > NEW: > v vv > | However, in practical terms, including all three options is likely to > | take up 24-34 octets (average of 6-10 digital signature algorithms, > ^^^^^ > 3-5 DS hash algorithms and 1-5 NSEC3 hash algorithms) including the > EDNS option codes and option lengths in a reasonable potential future > example. > > (Note that "including" acts as the subject in this sentence, so the > verb "are" needs to be in singular form, "is"; I also added a comma.) > > The lower bound (22) corresponds to the lower counts mentioned, > and the upper bound to the upper counts each: > > - fixed overhead for DAU: 4 octets \ > - code list for DAU: 6-10 octets / 10-16 octets > - fixed overhead for DHU: 4 octets \ > - code list for DHU: 3-5 octets / 7-9 octets > - fixed overhead for N3U: 4 octets \ > - code list for N3U: 3-5 octets / 7-9 octets > ++++++++++++++++++++++++++++++++++++++++++++++++++++++ > total: 24-34 octets > > > 4) typo in Sect. 3, 2nd para > > OLD: > > Note that the PRIVATEDNS (253) and/or the PRIVATEOID (254) digital > | signature codes for cover a potentially wide range of algorithms and > ^^^ > are likely not useful to a server. [...] > > NEW: > > Note that the PRIVATEDNS (253) and/or the PRIVATEOID (254) digital > | signature codes both cover a potentially wide range of algorithms and > ^^^^ > are likely not useful to a server. [...] > > > 5) Section structure > > The current sections 3.2 and 3.3 are, from a logical/semantical > perspective, subordinate to the current Section 3.1 in the same > way as Sections 3.4.1 and 3.4.2 are subordinate to Section 3.4. > I suggest to restructure s3.1-3.3 and renumber the rest of s3: > > 3.2 --> 3.1.1 > 3.3 --> 3.1.2 > 3.4 --> 3.2 > 3.4.1 --> 3.2.1 > 3.4.2 --> 3.2.2 > > > 6) Reference update > > The revised EDNS0 specification is ahead in the IESG, therefore I > suggest to update the citations to RFC 2671 toward the 'bis' document. > > > Best regards, > Alfred. > _______________________________________________ dnsext mailing list dnsext@ietf.org https://www.ietf.org/mailman/listinfo/dnsext
- Re: [dnsext] WGLC on draft-ietf-dnsext-dnssec-alg… Scott Rose
- Re: [dnsext] WGLC on draft-ietf-dnsext-dnssec-alg… Alfred Hönes
- Re: [dnsext] WGLC on draft-ietf-dnsext-dnssec-alg… Edward Lewis
- Re: [dnsext] WGLC on draft-ietf-dnsext-dnssec-alg… Miek Gieben
- Re: [dnsext] WGLC on draft-ietf-dnsext-dnssec-alg… Steve Crocker