On 27 Apr 2024, at 03:37, Warren Kumari <[email protected]> wrote:

>>> For the record, the last time a ccTLD published a revoked SEP key was April 
>>> 9, 2019 (this was not the revocation of the root zone KSK but a TLD's KSK), 
>>> so I know that none of the TLDs have completed an Automated Updates roll 
>>> since then.
> 
> 
> I don't really understand under what conditions I'd want to have a 
> trust-anchor for any (public) zone.

Every zone administrator has the problem of key distribution if relying parties 
who want to validate signatures exist (if it can be established that none 
exist, why sign your zone). There are multiple approaches that can be used, of 
which publishing key material in your parent zone is just one. Just because we 
might think that's the right method for most people and most zones doesn't mean 
it's the only method.

Different zones and different zone administrators can reasonably make different 
assessments of risk when it comes to trust anchor distribution. There is 
nothing to stop a particular zone administrator making the local assessment 
that they don't like the practices associated with their parent zone, or their 
parent's parent, for example, especially if their concerns are concentrated 
around validation by a known set of relying parties. Zones exist which are not 
discoverable by referral responses (you have to know where the auth servers 
are), which means secure referrals are not available, and such zones want to 
offer validation they need other methods for key distribution.

It's a big Internet. There is a lot of surprising stuff in it. I find it's 
usually a mistake to imagine that anybody knows how all of it works just 
because they know how some of it works. Thinking the opposite and turning over 
rocks can reveal some interesting things.


Joe
_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Reply via email to