<tt><font size=2>"Antoin Verschuren" <Antoin.Verschuren@sidn.nl>
wrote on 03/26/2009 02:07:28 AM:<br>
<br>
> Hmm, that means an extra thing to think about as a registry to <br>
> implement DNSSEC: Upgrade your systems to be able handle 10M <br>
> transactions you normally do in a year to appear in 1 second. I <br>
> think our management will say no to DNSSEC.<br>
</font></tt>
<br><tt><font size=2>For what its worth, it would be really hard to stop
anyone from using a single key for all their zones. public keys can be
re-used, just change the ownername, right? This is independent of OpenDNSSEC.
One could have 100 keys on their HSM. All copies of the same key. Do you
require us to check them all? What about bind's dnssec tools? How can this
policy be technically enforced? Are you planning, as a registry, to cross
check a millions of DS records?</font></tt>
<br><tt><font size=2> <br>
> It is my business as a parent if I need to verify the trust anchor
<br>
> I'm providing to my children.</font></tt>
<br>
<br><tt><font size=2>That is besides the point, right? You authenticate
the registrar/registrant. You check if their DS matches their key. The
buck stops there I guess. Are you going to check the trust anchor against
all existing trust anchors ? What if one matches? Are you then telling
the registrar/registrant that they just can't do that?</font></tt>
<br><tt><font size=2><br>
> You can have as many keys in your zone as you want, but if you want
<br>
> me to update your DS in my zone, you better not send them to me all
at once.</font></tt>
<br>
<br><tt><font size=2>And _that_ is the way to do it. Drop these policy
bits in an SLA, but don't cripple the software.</font></tt>
<br><tt><font size=2> <br>
> I used to work for a number of ISP's too.<br>
</font></tt>
<br><tt><font size=2>I just worked for one in the past. does that count?</font></tt>
<br>
<br><tt><font size=2>;-)</font></tt>
<br>
<br><tt><font size=2>Roy</font></tt>