Peter Thomassen <[email protected]> writes:

[changes mentioned below are at:
https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-algorithm-update ]

> Thanks for the update. The new text contains "DNSSSEC" in multiple
> instances (one extra "S").

yikes!

Fixed.

> NEW
>    Use for DNSSEC Validation:  Indicates the recommendation for using
>       the algorithm in DNSSEC validators.
> /
>    Implement for DNSSEC Validation:  Indicates the recommendation for
>       implementing the algorithm within DNSSEC validators.
> 
> ... or similar.

Changed!

> Section 2.2 ("Adding and Changing Values"):
> The new paragraph ("Only values ...") says something about the "Use
> for DNSSEC Signing" column and the two "Use for DNSSEC Validation"
> columns, ditto for "implement". The allowed values for the two
> "delegation" columns are missing. Is this intentional?

Fixed.

> Section 6 ("Operational Considerations") has the following:
> 
> OLD
>    Upgrading algorithm at the same time as rolling to the new Key
>    Signing Key (KSK) key will lead to DNSSEC validation failures, and
>    users MUST upgrade the DS algorithm first before rolling to a new
>    KSK.
> 
> This sound like one can deploy a DS record for an algorithm that has not 
> DNSKEYs or RRSIGs in the child. This would currently be a violation of RFC 
> 6840 Section 5.11.

No, it's saying you shouldn't roll keys at the same time as an algorithm
change.  It never indicates (IMHO) that you should deploy a DS record
without DNSSEC in place ("upgrade").

> I may well have misunderstood, but if not, I would suggest dropping
> this paragraph, especially as this rule may be changed (authors of
> draft-huque-dnsop-multi-alg-rules haven't given up).

We can't easily base today's text on a maybe :-/
-- 
Wes Hardaker
USC/ISI

_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to