[dnssec-key-tf] clarification of TAR requirements
Jim Reid
Wed Apr 16 11:07:19 CEST 2008
>> [5] Everybody should sign up to T&C's that hold everyone else >> harmless. > > That's the TAR maintainer and the key maintainer and? any potential > user? OK Peter. I see your Prussian tendencies have been re-asserted. :-) My idea behind [5] was that anyone directly using the TAR signs up to some T&Cs. ie The TAR says "we make no claims of any sort about this data" (maybe). Those submitting keys to the TAR say something similar and also promise timely updating of the TAR when a new key is introduced. And have responsive point of contacts. Anyone downloading stuff from the TAR agrees the TAR is making no claims about the validity of the data and they take full responsibility for everything they do with the stuff they download. End users would not be involved. Though they might have to agree to some sort of disclaimer in the contract with their TLD registry and/or service provider. > >> [7] The TAR must make it clear what they keying material is for and >> its political significance: eg "we're not undermining IANA" (or >> perhaps not) or "we make no claims about the appropriateness of >> the >> stuff in our TAR" (national sovereignty & competition issues). > > Given that [11] would mean TAs get inserted only with the consent of > the > key maintainer, is "appropriateness" still the right term? Yes. eg Not claiming or implying one TLD key or DNSSEC flavour or type of trust anchor is better or worse than another. Or that the hypothetical NCC's TAR was better or worse than one run by some other organisation. > More important > here would be some statement saying that "signing the root" is still a > goal (if it is) and that's why the requirements about exit strategies > should be kept. Let's avoid this rat-hole Peter. I think we're now working on the assumption that the IANA repository is going ahead. So this TF could support that effort with some ideas about that TAR's requirements. If we can get consensus on that, we can ask the WG to endorse that outcome, send it to ICANN and as Daniel says, declare victory and close the TF. >> [8] The TAR should treat all parties equally. Provided they >> demonstrate suitable levels of DNSSEC clue. > > Not sure what this was up to. The TAR would be for all ICANN-recognised TLDs, not just ccTLDs or those TLDs that happened to be in the NCC service region. Or were NCC members. At the same time however, a TLD that comes to the TAR looking for guidance on how to manage its keys or sign its zone should know they should look elsewhere for that assistance.