Dan,

I read your draft and I have a concern. The document makes a lot of observations about the current state of DNSSEC implementation, so I am afraid that this publication gets outdated quickly.

So I do think it's a good idea to highlight which pieces in the DNS infrastructure needs attention when deploying a new DNSSEC algorithm, I doubt that current limitations must be mentioned.

I am also not sure if the IETF is the appropriate place for this document, or that it would feel more at home within the RIPE/NANOG/... community.

Some more comments about the text:

In section 2.1.1 there is a note on an in 2016 standards non-compliant resolver. Having RFCs (to be) note that other RFCs are not safe to assume its implemented is a bit ridiculous to me. It is a given that there are bugs, and thus it can be said of any RFC that it is not safe to assume it is implemented correctly. I suggest to drop the paragraphs starting from "Note that at least one in 2016 case..."

In section 2.2 it says authoritative servers should be able to serve new crypto algorithms with no adjustment to the code, except for NSEC/NSEC3 responses. If it's signing algorithms you are talking about, these should also be agnostic right? If it's the hashing algorithm you are talking about, then the "NSEC" mentioning should be removed. In other words, this paragraph needs clarification.

In section 2.3 there is an identified issue that not all signing software supports algorithm rollover. This is an observation that can quickly go out to date and I suggest removing it.

Best regards,
  Matthijs



On 15-11-16 13:41, Dan York wrote:
As mentioned at the very end of DNSOP, Olafur Gudmundsson, Ondrej Sury,
Paul Wouters and I have a draft published that aims to document the
steps involved with deploying a new cryptographic algorithm for DNSSEC.
The overall goal is to make it easier to get new DNSSEC crypto
algorithms deployed, both through documenting existing steps - and then
potentially building off of this  work with new documents to improve
some of the steps.  Right now we'd like to get ECDSA out, but EdDSA is
coming out soon and it would be great to get that deployed sooner rather
than later.

As I said in the session, we'd like to get reviewers and then get the
document adopted by the WG and moved along toward publication.

The draft is at either of:

https://datatracker.ietf.org/doc/draft-york-dnsop-deploying-dnssec-crypto-algs/

https://tools.ietf.org/html/draft-york-dnsop-deploying-dnssec-crypto-algs-04

Please send any comments to the list or to us as authors.

I also am maintaining this over in Github
at: https://github.com/danyork/draft-deploying-dnssec-crypto-algs  If
you are a Github user you are welcome to file an issue there or send
text in a pull request.

Regardless, we'd just like any feedback (even if to say that it looks good).

Thanks,
Dan



--
Dan York
Senior Content Strategist, Internet Society
y...@isoc.org <mailto:y...@isoc.org>   +1-802-735-1624
Jabber: y...@jabber.isoc.org <mailto:y...@jabber.isoc.org>
Skype: danyork   http://twitter.com/danyork

http://www.internetsociety.org/






_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to