On Tue, Jul 04, 2017 at 11:42:56AM -0400,
 Shumon Huque <shu...@gmail.com> wrote 
 a message of 108 lines which said:

> We've posted a new draft on algorithm negotiation which we're hoping to
> discuss at IETF99

For the discussion on thursday:

> In contrast, many other security protocols, like TLS, IKE, SSH and
> others, support an algorithm or cipher suite negotiation mechanism

TLS and SSH are end-to-end. Not the DNS, and it makes things more
complicated (see section 6).

> because fragments are often blocked by network security devices.

by STUPID AND BROKEN network security devices. Otherwise, you do not
put the blame where it belongs.

> As can be readily seen from the RSA to ECDSA transition, very few
> zones have transitioned from RSA to ECDSA,

True, but not for the reasons of the response size. Both for my
employer's zones and for my own personal zones, the big issue is the
lack of support in tools like HSMs, the difficulty of algorithm
rollover, and the fact that tools like OpenDNSSEC don't make it
easy. So, we have apparently a disagreement on the basic diagnostic.

> the resolver has selectively cached signatures of a subset of
> algorithms supported by the zon

How does it know? I mean, in the response from the authoritative
server, nothing indicates if the signatures are a subset or
not. Suppose I send the list ECDSA;RSA, and I receive only ECDSA
signatures. How the resolver/cache would now if it was a complete
list?

> but prefers algorithms known to be supported for the name,

Again, where does this knowledge come from?

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to