Paul,

At 2016-08-10 16:54:39 -0700
"Paul Hoffman" <paul.hoff...@vpnc.org> wrote:

> [[ A month later, we're still eager to hear responses to the draft. We 
> got a few that we have incorporated for a new version, but want to be 
> sure we're on the right track before we move ahead. ]]

I'm back from vacation and catching up on old mail. I decided to go
through this draft instead of finishing that. ;)


I have a couple questions about the Key Tag Query. (Apologies if these
have been discussed already - I do remember some mention of the first
question in a meeting so maybe it has been discussed and discarded.)

First, can we please just use the decimal version of the Key Tag
values? As an operator it sure is easier to be able to cut & paste from
a log instead of having to use "bc" or Python to convert from the hex
to the value that is actually in all of my configuration files
everywhere.

Second, the easiest way for a querier to use this might be to set up a
cron job that grabs the anchor information out of a configuration file
and sends it via "dig". That doesn't require any support from any
software beyond what I have today, but it doesn't match the idea of
sending it at the same time as a DNSKEY query.


Finally, the security concerns section got me to thinking about ways to
send the trust anchor information in an encrypted way. I don't see an
easy way to do this in the DNS itself, but we could use HTTPS for this.
A zone could add a RR something like:

_dns-trust-anchor-reporting._tcp.$ZONE. $TTL IN SRV 0 1 443 an.example

Then a resolver could use a RESTful query like:

https://an.example/$ZONE/$SRVID/keytag1,keytag2,keytag3

If we really wanted to keep it in DNS do something similar but submit a
DNS over TLS query instead. Maybe:

_dns_trust_anchor_reporting._tcp.$ZONE. $TTL IN SRV 0 1 853 an.example

Then the resolver could use the Key Tag query. This also has a slight
advantage of only reporting information to trust anchor operators who
plan on doing something with the data. It does require DNS over TLS
support though....

Cheers,

--
Shane

Attachment: pgpeSwGKKBhE_.pgp
Description: OpenPGP digital signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to