[dnssec-key-tf] Proposed Mesage to IANA
Daniel Karrenberg
Wed Apr 16 11:34:22 CEST 2008
Let m make a fresh start. Propsed mesage to IANA at bottom.
Here is what we had:
[1] The TAR should be technology neutral. It should not exclude or
prevent different flavours of trust anchors to be published.
[2] The TAR should be OS/DNS implementation neutral. Tools and
documentation should be provided for the common platforms: "here's how
to transform this tarball of crypto gunk into stuff to plug into your
name server configuration".
[3] The TAR should somehow verify the keying material it's given
before publishing or storing it. There should also be a secure channel
for authenticating the TAR and any data it's publishing.
[4] A process is needed to revoke a trust anchor and notify those who
may be using the now withdrawn or invalid trust anchor.
[5] Everybody should sign up to T&C's that hold everyone else harmless.
[6] The TAR should be clear what support, if any, is available.
[7] The TAR must make it clear what they keying material is for and
its political significance: eg "we're not undermining IANA" (or
perhaps not) or "we make no claims about the appropriateness of the
stuff in our TAR" (national sovereignty & competition issues).
[8] The TAR should treat all parties equally. Provided they
demonstrate suitable levels of DNSSEC clue.
[9] There should be regular reviews of the TAR's usefulness: ie clear
goals for defining "success" or "failure" and some way of establishing
consensus around these goals.
[10] The TAR must have exit and escrow strategies
[11] The TAR should only publish keying material with the consent of
the respective key manager.
Discussion:
[1] is being satisfied by the proposal. Just publishing RRs as defined in the standards
which would otherwise go into the root zone is abut as neutral as one can get.
[2] can be done, and we can help. IAnA could publish info or pointers to it.
[3] IANA SOP should be good enough.
[4] needs to be implemented. Can be opt-in maillist.
[5] not sure if relevant in context. drop?
[6] relevant
[7] not relevant n contet, drop!
[8] not clear what this really means, don't know about cluelevel qualiication, drop that?
[9] dangerous in ICANN context, really needed? drop?
[10] exit part of proposal, escrow not, could delay things, drop?
[11] SOP I believe, anyway: relevant
So I propose toend the following to IANA (with numbering of requiremetns fixed) :
------
Dear Barbara,
thank you for your note about the proposed DS key registry for TLDs.
The RIPE DNSSEC Trust Anchor Repository task force welcomes this
development. We would like to see IANA providing such a registry as
soon as possible. From our own work we have developed the following
set of reuirements which may be useful for you when implementing
the service:
[1] The registry should be technology neutral. It should not exclude or
prevent different flavours of trust anchors to be published.
Comment: Publishing RRs as defined by the relevant standards meets
this requirement.
[2] The TAR should be OS/DNS implementation neutral. Tools and
documentation should be provided for the common platforms: "here's how
to transform this tarball of crypto gunk into stuff to plug into your
name server configuration".
Comment: IANA should publish such docmentation and tools, or pointers to
them. Once we know details of repository, we can help putting together
this documentation.
[3] The TAR should somehow verify the keying material it's given
before publishing or storing it. There should also be a secure channel
for authenticating the TAR and any data it's publishing.
Comment: We assume this is SOP for TLD requests and would be implemented
here also.
[4] A process is needed to revoke a trust anchor and notify those who
may be using the now withdrawn or invalid trust anchor.
Comment: An opt-in mailing list for operational news should be sufficient
to satisfy this.
[6] The TAR should be clear what support, if any, is available.
[10] The TAR must have exit strategy.
Comment: The proposal includes that.
[10a] the TAR must store its data under escrow somewhere.
Comment: Not necessary to start with, i.e. should not delay but needs to be developed
[11] The TAR should only publish keying material with the consent of
the respective key manager.
Comment: we believe that is SOP and part of the proposa.
Please let us know any the details of the repository as well as the time-line
for implementation as soon as they become available. Please feel free to make
our supoort for this repository known to anyone in the ICANN govenance structure
if it helps to push this along.
Kind rregards
RIPE DNSSEC trust Anchor Repository Task Forkce
Jim Reid
Chair
--------
Can we have a discussion on what needs to be changed in the draft message?
Daniel