We have had an off-line discussion with Paul on how to address his comments
and this is the result of that discussion.
New version will show up RSN.


At 13:55 06/08/2008, Paul Hoffman wrote:
Greetings again. Section 3 of this document says:
   If any of the steps above result in an error, the validating resolver
   SHOULD log them.

...and then what? Continue on merrily as if the priming worked? Just logging the error seems like undershooting the security of using trust anchors.

Later in that section, it says:
   If a validating resolver is unable to retrieve a signed DNSKEY RRSet
   corresponding to a trust anchor (i.e., prime the trust anchor), it
   SHOULD log this condition as an error.  Inability to prime a zone's
   trust anchor results in the validating resolver's inability to
   validate data from the corresponding zone.  The validating resolver
   SHOULD treat this zone as bogus.

It is not clear why not being able to get the DNSKEY RRSet is more serious (and thus worth bogofying the zone) than the validating steps not working.

The new version of the draft will have an explicit pointer to
RFC4035 saying that TA processing errors should be treated the
same way as DS processing errors.


Further, the last sentence has a "SHOULD" but doesn't say under what circumstances that a resolver can ignore the "SHOULD". Why isn't this a "MUST"?

You are right the new version says "MUST"

thanks for your comments.

        Olafur

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to