> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Mark Andrews wrote:
> >     It's not a issue.  You remove the DS's which have that
> >     algorithm then once they have expired from caches you can
> >     remove the DNSKEY.
> 
> That could still leave the zone itself in an inconsistent state... I'm
> not talking about the DS<->child apex case, but the apex<->zone data case.

        If there is a DS with algorithm A then you have to have the
        entire zone signed with that algorithm.  Once the DS has gone
        then that requirement no longer exists.
        
> The DNSKEY that is removed or added doesn't have to be one that is
> pointed to by a DS. Merely being present in the apex implies that there
> should be signatures of that algorithm in the zone.

        No.  The DS / published trust anchor indicates support for
        the algorithm.  Just having a DNSKEY at the apex does not
        indicate support for a algorithm.

        Mark
 
> If you don't add/remove all keys at the same time, the first or last
> DNSKEY couldn't even be a KSK; since those keys aren't used to sign the
> zone data, having a KSK as the only key of a certain algorithm number
> would always violate section 2.2.
> 
> Unless of course I am misreading that MUST there :)
> 
> Jelte
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (FreeBSD)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
> 
> iEYEARECAAYFAki/444ACgkQ4nZCKsdOncVoEACg2XThBDfSoUosRQBUTDcL2jYg
> bKkAoKNU4hLa/s5/xPlGVQp6XKXV7Uyv
> =TLej
> -----END PGP SIGNATURE-----
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: [EMAIL PROTECTED]
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to