Thanks!

On 10 Jun 2014, at 17:57, Olafur Gudmundsson <o...@ogud.com> wrote:

> Jari, 
> we will push one out today 
> 
>       Olafur
> 
> 
>       
> On Jun 10, 2014, at 8:30 AM, Jari Arkko <jari.ar...@ericsson.com> wrote:
> 
>> Thanks for the review, Brian, and thank you Warren and Olafur for answers. I 
>> do agree with the remaining issues as listed by Brian below; can I expect a 
>> new draft revision to address these?
>> 
>> Jari
>> 
>> On 06 Jun 2014, at 05:12, Brian E Carpenter <brian.e.carpen...@gmail.com> 
>> wrote:
>> 
>>> I am the assigned Gen-ART reviewer for this draft. For background on
>>> Gen-ART, please see the FAQ at
>>> < http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.
>>> 
>>> Please wait for direction from your document shepherd
>>> or AD before posting a new version of the draft.
>>> 
>>> Document: draft-ietf-dnsop-delegation-trust-maintainance-13.txt
>>> Reviewer: Brian Carpenter
>>> Review Date: 2014-06-06
>>> IETF LC End Date: 2014-05-26
>>> IESG Telechat date: 2014-06-12
>>> 
>>> Summary:  Almost ready
>>> --------
>>> 
>>> Comment:
>>> --------
>>> 
>>> These are my Last Call comments on version -13. The authors responded
>>> with helpful explanations, and I understand that they plan some
>>> corresponding changes before publication.
>>> 
>>> Minor issues:
>>> -------------
>>> 
>>>> 1. Introduction
>>> ...
>>>> Any manual process is susceptible to mistakes and / or errors.
>>> 
>>> Also susceptible to social engineering or malicious leaks, I think.
>>> There's a fairly strong security argument for getting humans out
>>> of the process.
>>> 
>>>> 3. CDS / CDNSKEY (Child DS / Child DNSKEY) Record Definitions
>>> ...
>>>> it is up to the consumer of the records to
>>>> translate that into the appropriate add/delete operations in the
>>>> provisioning systems
>>> 
>>> Not clear here whether this is expected to be an automated or manual 
>>> process.
>>> 
>>>> If no CDS / CDNSKEY RRset is present in child,
>>>> this means that no change is needed.
>>> 
>>> Not clear here how we ensure that update is performed exactly once. See 
>>> below.
>>> 
>>>> 4. Automating DS Maintenance With CDS / CDNSKEY records
>>>> 
>>>> CDS / CDNSKEY resource records are intended to be "consumed" by
>>>> delegation trust maintainers.  The use of CDS / CDNSKEY is optional.
>>> 
>>> I think that could be OPTIONAL.
>>> 
>>>> The child SHOULD publish both CDS and CDNSKEY resource records.
>>> 
>>> Given the previous sentence, I think this needs to be
>>> 
>>> If the child publishes either the CDS or the CDNSKEY resource record, it
>>> SHOULD publish both.
>>> 
>>>> 4.1. CDS / CDNSKEY Processing Rules
>>> ...
>>>> If there are no CDS / CDNSKEY RRset in the child, this signals that
>>>> no change should be made to the current DS set.  This means that,
>>>> once the child and parent are in sync, the Child DNS Operator MAY
>>>> remove all CDS and CDNSKEY resource records from the zone.
>>> 
>>> Does that mean the the child MAY/SHOULD/MUST monitor what the
>>> parent is publishing in order to automate this process? If not, you
>>> are calling for a manual operation. (The text in section 5
>>> is repetitious, by the way, but still doesn't clarify this.)
>>> 
>>>> If any these conditions fail the CDS / CDNSKEY resource record MUST
>>>> be ignored.
>>> 
>>> Silently? Should this be logged? Any DOS potential here? Should use of
>>> these RRs be rate-limited in both child and parent to avoid any DOS risk?
>>> 
>>>> 6. Parent Side CDS / CDNSKEY Consumption
>>> 
>>> I don't think you specify what the parent should do if it receives
>>> both a CDS and a CDNSKEY and they are inconsistent (in violation
>>> of section 4). Yes, it's a corner case but Murphy's law always applies.
>>> 
>>>> 9. Security Considerations
>>> ...
>>>> While it may be tempting, this SHOULD NOT be used for initial
>>>> enrollment of keys since there is no way to ensure that the initial
>>>> key is the correct one.  If is used, strict rules for inclusion of
>>>> keys such as hold down times, challenge data inclusion or similar,
>>>> ought to be used, along with some kind of challenge mechanism.
>>> 
>>> Shouldn't that "ought to" be MUST? Weak protection against a bogus
>>> initial key really seems like a "Crypto Won't Save You Either" poster
>>> child.
>>> 
>>> Nits:
>>> -----
>>> 
>>> (from the shepherd's write-up)
>>> "The document references the document draft-ietf-dnsop-dnssec-key-timing, 
>>> which had
>>> been approved for publication but never followed through on, and is shown 
>>> to be expired."
>>> 
>>> This is an informational reference and could probably be deleted without 
>>> harm.
>>> 
>>> "Additionally, the document references RFC2119 key word "NOT RECOMMENDED" 
>>> without referencing it. "
>>> 
>>> That is a well known bug in RFC 2119 itself. The citation can be fixed as 
>>> per
>>> http://www.rfc-editor.org/errata_search.php?eid=499
>>> 
>>> _______________________________________________
>>> Gen-art mailing list
>>> Gen-art@ietf.org
>>> https://www.ietf.org/mailman/listinfo/gen-art
>> 
> 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to