Hi Scott, Thank you very much for your feedback -- responses inline.
You can find the changes here (will submit to datatracker before the upcoming cut-off): https://github.com/desec-io/draft-ietf-dnsop-dnssec-bootstrapping/commit/dcb914737342184c503fbb23fc37c7d3b6e363d1#diff-356ec8c295379536ae015166d01de308455cded000afc5476019b3effbb2ae43 On 6/27/23 19:33, Scott Rose via Datatracker wrote:
Reviewer: Scott Rose Review result: Ready with Issues Review of dnssec-bootstrapping The draft is likely OK to proceed as there are only a few nits that do not change the overall contents. I am confused about if it adds to methods in RFC 8078 or replaces methods in RFC 8078. 1. Abstract: The Abstract says that this draft deprecates the DS enrollment methods in RFC 8078, which implies this draft will replace that text. However the Security Considerations section implies that this draft only adds a new method and removes none of the existing ones (possible just phrasing issue?). If this draft intends to only add a new secure method, the abstract could be changed to say “This document adds the new DS enrollment method to the list of methods described in Section 3 of [RFC8078].” If this is to replace the CDS/CDNSKEY based methods in RFC 8078, then perhaps the first sentence in the Security Considerations section should be updated to say “This draft document replaces the methods described in RFC 8078 Section 3 with a method that adds authentication. Its security level is therefore…” To make it explicit that this draft replaces that section rather than just add another method while retaining the methods previously described in RFC 8078.
The abstract is correct. The confusing sentence in the Security Considerations was supposed to be about the security model (not about the set of methods), where all existing security properties (e.g. CDS validation) remain in place (= removes nothing), but authentication is "added". I agree this was phrased in a confusing way, and I made changes along the lines you proposed.
That is the only potentially confusing issue. The rest are nits: 2. Section 1.1 Terminology: “Parent” and “Child” are defined the same way in the most recent version of the DNS Terminology RFC 8499, so a reference could be used instead of repeating the definition.
Done. (I thought it would be nice to "inline" the actual definition, but that was just a feeling.)
Also, “Signaling Name” sounds confusing compared to the Signaling Domain. Would it be easier to write it as: “Signaling Name The owner name of comprised of a prefix, the Child zone name and the Signaling domain name. Used by the Parental Agent to identify and retrieve the Signaling Type used by the Child zone (See Section 2.2). “ To stress it is a name in the Signaling Domain, but contains the child zone name.
Coming up with this terminology was really challenging. The reason that the Signaling Name is only the prefix, without the Signaling Domain, is that it makes the rest of the spec easier. For example, from Section 3.1: To [...] authenticate the Child's CDS/CDNSKEY RRsets, the Child DNS Operator MUST co-publish them at the corresponding Signaling Name under each out-of-bailiwick Signaling Domain [...] With your definition, one would have to say To [...] authenticate the Child's CDS/CDNSKEY RRsets, the Child DNS Operator MUST co-publish them at each corresponding out-of-bailiwick Signaling Name [...] Do you feel that's an improvement? I appreciate that "Signaling Name" is not ideal. Perhaps instead of making this term the FQDN including the full domain, we should rename "Signaling Name" to something else. Unfortunately, "Signaling Prefix" runs the risk of being mistaken for the "Signaling Type" (which is really a prefix, it's the first label). Taking all this into account, do you have any more suggestions?
3. Section 2.1 Strictly speaking, would the Signaling Zone really need a secure delegation? I could even be an island but the Parental Agent has the Signaling Zone’s SEP key (KSK or ZSK) as an installed trust anchor. If the Parental Agent really only needs to be able to validate RRSIGs in the Signaling Zone, the zone doesn’t necessarily need to have a secure delegation, as it is up to the Parental Agent to validate signatures. Not saying that is easier (it has other problems), just possible so the MUST may be unnecessarily strict.
Done
4. Section 4.2 Parental Agent: Last sentence in paragraph ends “…the cache does not need to get cleared in between.)”. Might be expanded to “…cache does not need be be cleared in between queries to unique Child Zone names.)” for clarity.
Done (along those lines). Thanks, Peter -- https://desec.io/ _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop