-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

Changes to trust-history draft that are to be done are listed below.
There are no open issues that I am aware of.

Section 3.
* step 1. change: Otherwise, store the DNSKEY RR set as result
to: Otherwise, store the possibly empty DNSKEY RR set as result.

* step 1. change: Otherwise, the history lookup fails.
to: The algorithm should not continue but fails.

* step 2. change: Fetch the trust history list end points.
to: Fetch the trust history list names for the first and last key set.

* step 2, put after: "trying to update the trust-anchor for",
text: or lookup the TALINK in the zone.

* step 3, change: "Go backwards through the trust history list as
provided by the TALINK linked list."
to: "Step backwards through the trust history list as provided by the
TALINK linked list until valid with the currently configured
trust-anchor, then go to step 4.  At each step perform the following checks.

* step 3, remove 'Editor note: Are we shure that there are no server
implementations that will not server expired RRSIG, are such smart
servers allowed by the specs. In other words do we need clarification in
the DNSSEC-updates document? '.
There are no known obstacles to publishing signatures with old dates.

Section 5.
* instead of h0,h1,h2 make the example have the domains in the list: h0,
h1, .., hi-1, hi.  Luckily hi-1 is LDH and an allowed hostname :-)

Section 6.
* change the first line: "The trust history is advertised with TALINK
RRs at the zone apex"
to: "The trust history can be and may be advertised with TALINK RRs at
the zone apex".

Section 7 (security considerations)
* Insert a new heading: "Revoked Keys" before the paragraph that
discusses 5011. remove the last line from that paragraph, 'The old keys
that the ... if they are revoked' and instead put: If the final result
of the algorithm contains revoked keys then those keys must be put in
state REVOKED and not state VALID.  The check in step 4 must of course
succeed with the currently configured keys that are in state VALID.

* Insert a new heading "Trust history versus 5011" before the paragraph
'Depending on choices by the validator operator".
* Insert a new heading "Time".

* Remove the paragraph 'The algorithm can be used to get inception and
expiration ... visible to others'.  Instead put: the expiration times
are not checked during the history algorithm, but the final keyset
should validate with the current time, as it represents the keyset
currently in use.   [ And this naturally leads to Barwood's comments
about influencing the validator clock ]

Best regards,
   Wouter
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkufrAwACgkQkDLqNwOhpPhrrACfeK7P8/wwz2+2iqOtdlvfCFmt
JowAnjqShnty0H8jV5Ha2axXOuAzLtKl
=HLPS
-----END PGP SIGNATURE-----
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to