New version  addressing this call by the chairs posted. 

        Olafur

On Dec 1, 2013, at 2:00 PM, Warren Kumari <[email protected]> wrote:

> 
> On Oct 16, 2013, at 4:41 PM, Olafur Gudmundsson <[email protected]> wrote:
> 
>> 
>> On Oct 6, 2013, at 5:38 PM, Jim Schaad <[email protected]> wrote:
>> 
>>> Sorry for being late on getting this in.
>>> 
>>> 1.  I do not understand the reasoning behind the 2119 language in the
>>> introduction.  How would one test this in a protocol fashion?   The document
>>> states that it does not change DANE in anyway, but there are requirement
>>> language statements that can be made?  This should be stated in  natural
>>> language not requirement language.  Section 1.1 can them be removed in its
>>> entirety.
>>> 
>> 
>> There two instances of MAY and MAY NOT
>> I reworded them and removed section 1.1
>> 
>>> It is expected that DANE parsers in applications and DNS software will adopt
>>> these acronyms for parsing and display purposes, however there are no
>>> requirements that they do so.
>>> 
>>> 2.  In section 2, it states that the references should be both RFC 6698 and
>>> this document, however that is not the way that the tables starting in
>>> section 2.1 are laid out.  They only use RFC 6698 as a reference document.
>>> 
>> 
>> There are two different set of references 
>> a) the references for the Registry itself 
>> b) the references for each allocation in the registry. 
>> 
>> This document only applies to the first one 
>> and that is what I said. 
>> 
>> 
>>> 3 s/input>/input./
>>> 
>> Fixed
>> 
>>> 4.  I don't think that this phrase "fewer bad TLSA records" is very helpful.
>>> What is meant by a bad TLSA record?  Is this just ones where the fields were
>>> put out of order or does it include ones where the certificate is
>>> incorrectly hashed?  If the goal is to avoid issues with the certificates
>>> and what is extracted, then doing something about what goes into the blob
>>> would make sense as well.  I would agree that specifying how this would be
>>> done is out of scope, but noting it as an issue would be reasonable.
>>> 
>> 
>> I agree and removed that sentence. 
>> 
>>> 5.  As I have stated before, I am not a fan of using DANE-TA for value 2.
>>> To me this loses the fact that there will be PKIX processing that occurs
>>> with this section.  I would strongly recommend that this become PKIX-TA.
>>> The use of PKIX-TA for the value of 0 never made any sense since there is
>>> not trust anchor decision that is associated with the certificate in this
>>> record.  The only two records currently that have a trust anchor, as oppose
>>> to a constraint, component are 2 and 3. 
>> 
>> I leave a call on that to the wise chairs :-) 
>> I do not care personally 
> 
> I'm not sure where these "wise chairs" are, but I believe we have consensus 
> for PKIX-TA.
> It's not ideal but seems good enough.
> 
> 
> Apologies for the delay, digging out from under backlogged mail from the 
> NANOG/RIPE/IETF/ICANN roadshow…
> 
> W
> 
> 
>> 
>>> 
>>> 6.  The note component at the end of section 2.1 should be deleted.
>> 
>> Gone
>> 
>>> 
>>> 7.  In section 3, the descriptive text and the example records do not match
>>> in very significant ways.
>>> 
>> 
>> I must be dense, there is not supposed to be any correlation between the
>> two paragraphs in section 3 they are supposed to be separate examples. 
>> thanks for good comments. 
>> 
>>      Olafur
>> 
>>> Jim
>>> 
>>> 
>>> _______________________________________________
>>> dane mailing list
>>> [email protected]
>>> https://www.ietf.org/mailman/listinfo/dane
>> 
>> _______________________________________________
>> dane mailing list
>> [email protected]
>> https://www.ietf.org/mailman/listinfo/dane
>> 
> 
> -- 
> "I think it would be a good idea." 
> - Mahatma Ghandi, when asked what he thought of Western civilization
> 
> 
> 

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to