[dnssec-key-tf] explaining the IANA requirement letter
Samuel Weiler
Mon Apr 28 18:53:43 CEST 2008
Someone elsewhere asked for clarification about requirement 1, re: technology neutral. Here's what I wrote in response (stealing briefly from a note from Peter). Feel free to let me know if you disagree, and feel free to steal the text for other things: I think the requirement re: technology neutrality means at least two things: First, the TAR should not exclude trust anchors based on crypto algorithm, key length, status of the SEP bit, use of the keys (e.g. separation of ZSK & KSK functionality), or similar reasons, so long as the trust anchors reasonably conform to the specifications. More requirements might be imposed by other parties or community consensus, but the TAR operator shouldn't be doing such on its own. The TAR operator might provide some helpful support ("er, are you sure you want to do that?"), but it shouldn't be making up rules. Second, the publication mechanism(s) and format(s) should not favor or disfavor any particular use of the trust anchors, as much as possible. It would be unacceptable to have the only mechanism for accessing the TAR require particular code (e.g., rsync, which doesn't have _independent_ interoperable implementations, or a particular resolver). And it would be unacceptable to use only an (uncommon) TA format that is not boardly supported (e.g., a configuration file for a resolver that, due to design, needs less information on each TA than other resolvers, meaning that it might not be trivially transformed into a config file for other resolvers). I think both IANA and most members of the task force are envisioning IANA's repository being formatted either as DS records or as config statements for common DNSSEC resolver(s) and published AT LEAST in some bulk distribution mechanism (e.g., a signed file or tarball, available over ftp or/and http), which easily meets this requirement. -- Sam