> On 1 Nov. 2016, at 3:37 am, Matthew Pounsett <m...@conundrum.com> wrote:
> 
> 
> 
> On 31 October 2016 at 00:22, George Michaelson <g...@algebras.org> wrote:
> It is only my personal opinion, but I believe registrars are incorrect
> in performing crypto alg checks on proffered DS, and this is an
> entirely unwarranted, and incorrect understanding of their role. It
> conflates one public good (checking) with another public good
> (registry of data into the DNS) and assumes one out-ranks the other:
> It doesn't, and the inability to track crypto alg change, makes the
> checking wrong. Its the lesser of two evils to stop checking, and
> permit unknown algorithms through.
> 
> I think this needs to be flagged up. Either they should be told to
> stop, or the requirements for algorithm agility which their role
> places on them should be made explicit.
> 
> I know of a couple of cases where registries perform similar checking.   
> Depending on the implementation, the registrar may need to perform the checks 
> themselves in order to prevent future upstream calls from generating errors.  
> 
> I think the way I'd implement this is to perform "best effort" checking.  If 
> I know the algorithm, then make sure that the DS/DNSKEY supplied is correct 
> for that algorithm.  If I don't know the algorithm, pass it through as-is 
> (and log it so that I can have my developers investigate and add that algo to 
> the check library).  

I pretty much agree with Matt here. I believe that this falls into a similar 
area as checking the NS records, and the justification is approximately along 
the lines of “if it lives in the zone file I should check that resolvers won’t 
encounter errors - to the extent I can”





_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to