Hi Paul,

You said in the end of your message that "none of these are blocking issues for me. 
The WG can resolve these as it sees fit." That's also how I feel; as the current 
text was approved by the WG, I'll wait for the WG to chime in for any changes.

Some more comments below.

On 11/18/25 18:59, Paul Wouters wrote:
     >     During initial DS provisioning (DNSSEC bootstrapping), conventional 
DNSSEC
     >     validation for CDS/CDNSKEY responses is not (yet) available; in this 
case,
     >     authenticated bootstrapping ([RFC9615]) should be used.
     >
     > Or a regular EPP method can be used instead of trying to bootstrap 
through DNS.

    This is in the CDS/CDNSKEY section, explaining how to use that technique 
properly (which entails updates and bootstrapping).


It is basically saying, this paragraph is for DS updates. If you are going from 
insecure to secure, this paragraph does not really apply

No, it does not say that. Consistency is always required, also when going from insecure 
to secure. In case of RFC 9615, that's indeed ensured by the requirements of that method, 
but that is not the only in-band method for initializing a DS RRset: there is still RFC 
8078 Section 3, which includes things like "Accept after Delay".

"Accept after Delay" was not deprecated by RFC 9615 (actually, upon your suggestion 
during IESG review :-) [1]). The current text says that you should always apply the consistency 
checks specified here -- which includes the case of "Accept after Delay".

In this context, the cited paragraph is a non-normative reminder that the 
preferred method is RFC 9615; consistency requirements apply regardless.

[1]: https://mailarchive.ietf.org/arch/msg/dnsop/nns1_YDsvbVvopCS1W_7rP_uGsQ/

and these other things might be good alternatives. 9615 and epp are both 
alternatives.

EPP has nothing to do with CDS consistency. Also, the child operator generally 
doesn't speak EPP.

    RFC 7344 is about updating DS records (where the old key signs the new 
CDS/CDNSKEY RRset), whereas the cited example is about bootstrapping (where the 
is no DS RRset yet).


But that case is already covered in the RFC dedicated to dnssec boostrap. It's 
a fundamental security consideration section there.
[...]> I guess I am finding this draft mixes up with 9615 in odd ways, and find 
that 2 of the 3 examples in the appendix are about what 9615 already fully 
addresses.
I agree it is harmless, but I'm not sure repetition here instead of just 
pointing to 9615 is useful.

The failure mode described in this part of the appendix is applicable when using "Accept after 
Delay", and mitigated by applying a consistency check. RFC 9615 does not fully address the 
"Accept after Delay" case.

Best,
Peter

_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to