Thanks for the review, Brian, and thank you Warren and Olafur for answers. I do agree with the remaining issues as listed by Brian below; can I expect a new draft revision to address these?
Jari On 06 Jun 2014, at 05:12, Brian E Carpenter <brian.e.carpen...@gmail.com> wrote: > I am the assigned Gen-ART reviewer for this draft. For background on > Gen-ART, please see the FAQ at > < http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>. > > Please wait for direction from your document shepherd > or AD before posting a new version of the draft. > > Document: draft-ietf-dnsop-delegation-trust-maintainance-13.txt > Reviewer: Brian Carpenter > Review Date: 2014-06-06 > IETF LC End Date: 2014-05-26 > IESG Telechat date: 2014-06-12 > > Summary: Almost ready > -------- > > Comment: > -------- > > These are my Last Call comments on version -13. The authors responded > with helpful explanations, and I understand that they plan some > corresponding changes before publication. > > Minor issues: > ------------- > >> 1. Introduction > ... >> Any manual process is susceptible to mistakes and / or errors. > > Also susceptible to social engineering or malicious leaks, I think. > There's a fairly strong security argument for getting humans out > of the process. > >> 3. CDS / CDNSKEY (Child DS / Child DNSKEY) Record Definitions > ... >> it is up to the consumer of the records to >> translate that into the appropriate add/delete operations in the >> provisioning systems > > Not clear here whether this is expected to be an automated or manual process. > >> If no CDS / CDNSKEY RRset is present in child, >> this means that no change is needed. > > Not clear here how we ensure that update is performed exactly once. See below. > >> 4. Automating DS Maintenance With CDS / CDNSKEY records >> >> CDS / CDNSKEY resource records are intended to be "consumed" by >> delegation trust maintainers. The use of CDS / CDNSKEY is optional. > > I think that could be OPTIONAL. > >> The child SHOULD publish both CDS and CDNSKEY resource records. > > Given the previous sentence, I think this needs to be > > If the child publishes either the CDS or the CDNSKEY resource record, it > SHOULD publish both. > >> 4.1. CDS / CDNSKEY Processing Rules > ... >> If there are no CDS / CDNSKEY RRset in the child, this signals that >> no change should be made to the current DS set. This means that, >> once the child and parent are in sync, the Child DNS Operator MAY >> remove all CDS and CDNSKEY resource records from the zone. > > Does that mean the the child MAY/SHOULD/MUST monitor what the > parent is publishing in order to automate this process? If not, you > are calling for a manual operation. (The text in section 5 > is repetitious, by the way, but still doesn't clarify this.) > >> If any these conditions fail the CDS / CDNSKEY resource record MUST >> be ignored. > > Silently? Should this be logged? Any DOS potential here? Should use of > these RRs be rate-limited in both child and parent to avoid any DOS risk? > >> 6. Parent Side CDS / CDNSKEY Consumption > > I don't think you specify what the parent should do if it receives > both a CDS and a CDNSKEY and they are inconsistent (in violation > of section 4). Yes, it's a corner case but Murphy's law always applies. > >> 9. Security Considerations > ... >> While it may be tempting, this SHOULD NOT be used for initial >> enrollment of keys since there is no way to ensure that the initial >> key is the correct one. If is used, strict rules for inclusion of >> keys such as hold down times, challenge data inclusion or similar, >> ought to be used, along with some kind of challenge mechanism. > > Shouldn't that "ought to" be MUST? Weak protection against a bogus > initial key really seems like a "Crypto Won't Save You Either" poster > child. > > Nits: > ----- > > (from the shepherd's write-up) > "The document references the document draft-ietf-dnsop-dnssec-key-timing, > which had > been approved for publication but never followed through on, and is shown to > be expired." > > This is an informational reference and could probably be deleted without harm. > > "Additionally, the document references RFC2119 key word "NOT RECOMMENDED" > without referencing it. " > > That is a well known bug in RFC 2119 itself. The citation can be fixed as per > http://www.rfc-editor.org/errata_search.php?eid=499 > > _______________________________________________ > Gen-art mailing list > Gen-art@ietf.org > https://www.ietf.org/mailman/listinfo/gen-art
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ Gen-art mailing list Gen-art@ietf.org https://www.ietf.org/mailman/listinfo/gen-art