Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status
draft-ietf-dnsext-dnssec-algo-imp-status-04
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2013-04-30
|
04 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2013-04-29
|
04 | (System) | RFC Editor state changed to AUTH48 from IESG |
2013-04-26
|
04 | (System) | RFC Editor state changed to IESG from AUTH48 |
2013-04-26
|
04 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2013-04-12
|
04 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2013-03-22
|
04 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2013-03-21
|
04 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2013-03-14
|
04 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent |
2013-03-14
|
04 | Cindy Morgan | State changed to Approved-announcement sent from RFC Ed Queue |
2013-03-14
|
04 | Cindy Morgan | IESG has approved the document |
2013-03-14
|
04 | Cindy Morgan | Ballot approval text was changed |
2013-03-14
|
04 | Cindy Morgan | Ballot approval text was generated |
2013-03-14
|
04 | Cindy Morgan | Intended Status changed to Proposed Standard from Best Current Practice |
2013-03-14
|
04 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent |
2013-03-13
|
04 | (System) | RFC Editor state changed to EDIT |
2013-03-13
|
04 | (System) | Announcement was received by RFC Editor |
2013-03-13
|
04 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2013-03-13
|
04 | (System) | IANA Action state changed to In Progress |
2013-03-13
|
04 | Amy Vezza | State changed to Approved-announcement sent from Approved-announcement to be sent |
2013-03-13
|
04 | Amy Vezza | IESG has approved the document |
2013-03-13
|
04 | Amy Vezza | Closed "Approve" ballot |
2013-03-13
|
04 | Amy Vezza | Ballot approval text was generated |
2013-03-13
|
04 | Amy Vezza | State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2013-03-13
|
04 | Amy Vezza | Ballot writeup was changed |
2013-03-12
|
04 | Ralph Droms | Ballot writeup was changed |
2013-03-11
|
04 | Pete Resnick | [Ballot comment] Thanks for addressing all of my comments. |
2013-03-11
|
04 | Pete Resnick | [Ballot Position Update] Position for Pete Resnick has been changed to No Objection from Discuss |
2013-03-11
|
04 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2013-03-11
|
04 | Scott Rose | New version available: draft-ietf-dnsext-dnssec-algo-imp-status-04.txt |
2012-08-30
|
03 | Francis Dupont | Request for Telechat review by GENART Completed: Ready. Reviewer: Francis Dupont. |
2012-07-19
|
03 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation |
2012-07-19
|
03 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2012-07-18
|
03 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded for Ronald Bonica |
2012-07-18
|
03 | Robert Sparks | [Ballot comment] I support Pete's suggestion to make this standards track. |
2012-07-18
|
03 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks |
2012-07-18
|
03 | Adrian Farrel | [Ballot comment] I am Abstaining on this document. I have no specific objection to its publication, but it is so much not the document I … [Ballot comment] I am Abstaining on this document. I have no specific objection to its publication, but it is so much not the document I would have written, and I struggle to see its value as currently presented. I was left wondering whether it is trying to do the wrong thing. Instead of tying to mandate what must or must not be implemented it would be more helpful to me to state the usage profile of each algorithm. This could then be traced to "dangerous to deploy" or "must be implemented if your implementation is to play a part in the deployment of this function." Anyway, here are some thoughts and comments that arose... --- Citing conformance to this document is confusing because nearly all of the information in the table in Section 2.2 indicates a degree of choice. Conformance can only be interpretted with respect to the "must" and "must not". --- To say that the "IANA registry for these algorithms ... lacks the implementation status of each algorithm"implies that this information should be recorded in the registry. It should not since that is not the purpose of the registry. How about... There is currently an IANA registry for these algorithms, but there is no record of the recommended implementation status of each algorithm. --- I think Section 1 should observe that it is the intention to issue replacements to this document when the implementation status of any algorithm changes and when new algorithms are introduced. --- This implementation status indication is only to be considered for implementation, not deployment or operations. I can't extract meaning from this! If something is marked "MUST NOT" implement, how can it possibly be deployed? --- Since this document makes no requests for IANA allocations and makes no changes to the existing registries, I see no reason for it to be listed in the registry. The IANA registry tracks code points, it is not a repository for documentation references. --- I can't square the statement in the Security Considerations section with the MUST NOT implement status assigned to RSAMD5. Maybe a reference is needed for the classification of RSAMD5 and that would keep Section 4 honest. |
2012-07-18
|
03 | Adrian Farrel | [Ballot Position Update] New position, Abstain, has been recorded for Adrian Farrel |
2012-07-17
|
03 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley |
2012-07-17
|
03 | Wesley Eddy | [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy |
2012-07-17
|
03 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant |
2012-07-16
|
03 | Martin Stiemerling | [Ballot comment] A nit: Section 2.1., paragraph 2: > Likewise, ECDSA with the two identified curves (ECDSAP256SHA256 and > ECDSAP384SHA384) are algorithms that … [Ballot comment] A nit: Section 2.1., paragraph 2: > Likewise, ECDSA with the two identified curves (ECDSAP256SHA256 and > ECDSAP384SHA384) are algorithms that may see widespread use due to > the precieved similar level of security offered with smaller key size > compared to the key sizes of algorithms such as RSA. s/precieved/perceived/ |
2012-07-16
|
03 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2012-07-16
|
03 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss |
2012-07-16
|
03 | Sean Turner | [Ballot discuss] Did the WG consider including the table in the actual registry? That way you'd not have to rely on folks following the links. |
2012-07-16
|
03 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded for Sean Turner |
2012-07-14
|
03 | Stephen Farrell | [Ballot comment] I can't parse this: "It is believed that RSA/SHA-256 or RSA/SHA-512 algorithms will replace older algorithms (e.g. RSA/SHA-1) that have a perceived weakness … [Ballot comment] I can't parse this: "It is believed that RSA/SHA-256 or RSA/SHA-512 algorithms will replace older algorithms (e.g. RSA/SHA-1) that have a perceived weakness or these recommended algorithms are seen in major deployments." I guess something's wrong but hard to know what, maybe s/or/or as/ |
2012-07-14
|
03 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2012-07-14
|
03 | Pete Resnick | [Ballot discuss] Section 1: This implementation status indication is only to be considered for implementation, not deployment or operations. Operators are free to … [Ballot discuss] Section 1: This implementation status indication is only to be considered for implementation, not deployment or operations. Operators are free to deploy any digital signature algorithm available in implementations or algorithms chosen by local security policies. This status is to measure compliance to this document only. I think the above paragraph is either wrong or meaningless. I don't know what it means to say that the implementation status is for implementation but not deployment. The reason that one "MUST IMPLEMENT" RSASHA1 is that an implementation will not interoperate with other DNSSEC deployments if it doesn't allow the use of RSASHA1. Similarly, the reason it is "RECOMMENDED TO IMPLEMENT" RSASHA1-NSEC3-SHA1 is that you won't interoperate in DNSSEC if you don't do it, but there are circumstances under which you might not use it. The reason you "MUST NOT IMPLEMENT" RSAMD5 is because it is a broken algorithm and use of it will cause damage. These are not about implementation; they are absolutely about interoperation. Operators *are* free to deploy anything they like, but that's because there are no protocol police and you are free to ignore the considered consensus of the IETF. But the considered consensus of the IETF is that these are protocol requirements to allow for interoperation. The IETF is *not* supposed to be writing compliance documents. Please strike the paragraph in it's entirety. See next bit on 2119 keywords for more on this. Section 1.1: 2119 keywords are used as part of the implementation status. This is awfully confusing because you lose the meaning of the 2119. Please (a) title case the implementations status throughout Section 2 by changing, e.g., MUST IMPLEMENT to "Must Implement", etc. and then (b) define the terms in section 1.1: The implementation statuses used in this document are defined as follows: - "Must Implement" means that the algorithm MUST be used in order to interoperate with other implementations on the Internet. - "Must Not Implement" means that the algorithm MUST NOT be used so as to prevent the compromise of the DNS data; the algorithm has known weaknesses and is not considered safe to use anymore. - "Recommended To Implement" means that the algorithm SHOULD be used in order to interoperate with other implementations on the Internet, though there may be exist valid reasons in particular circumstances not to do so. An implementer must understand and weigh the full implications of choosing not to implement this particular algorithm. - "Optional" means that the algorithm MAY be implemented, but that all implementations MUST be prepared to interoperate with implementations that do or do not implement this algorithm. Section 2.2: Their implementation (or lack thereof) therefore cannot be included when judging compliance to this document. Strike this sentence. Again, it is meaningless in the context of an IETF document. This document should only talk about interoperability requirements. With regard to the status and title of this document: I believe in the normal course of events, each time a new document with a list of statuses is published, we will get implementation experience with the statuses to determine if they are correct. When we do, we can advance the document to indicate that, yes, we are sure that implementations have now taken up this new document and it is considered the standard way to implement. I therefore think that this document should be standards track instead of BCP. Indeed, the title of "Applicability Statement" I think is exactly right, and it's using the term as 2026 envisioned, which puts this on the standards track. If there is for some reason not consensus to move this to the standards track, I think a change of title and abstract are in order. "Applicability Statement" gets used in an odd way in the IETF (and in 2026 in particular), and I think using it for a BCP will add to our overall confusion. But I still believe that this is appropriate to the standards track. |
2012-07-14
|
03 | Pete Resnick | [Ballot comment] Section 1: Please also add a paragraph to indicate what's coming in 2.3: Since one of the motivations of this document is … [Ballot comment] Section 1: Please also add a paragraph to indicate what's coming in 2.3: Since one of the motivations of this document is to keep a single up-to-date list of implementations statuses, this document also establishes a procedure for updates to this document in the future. Section 2.2: Please add the sentence, "Any registered algorithm not listed in the table above has the status "Optional"." Section 2.3: Algorithms entered into the registry using that procedure are to be considered OPTIONAL for implementation purposes. Specifications that follow this path do not need to obsolete or update this document. I think the above got things around backwards. That is, we don't need this document (and obsoleting it) to be tied so directly to registration. We want to say that any registered algorithm that does not appear in this document is, by definition, "Optional". In fact, you can remove the specific algorithms in the "Optional" column in 2.2 and simply say, "Any IANA registered DNS Algorithm not otherwise listed." If you do that, this entire section can be: 2.3 Statuses For New Algorithms and Updating Existing Statuses This document establishes a procedure for additions and changes to the list of algorithm implementation statuses. In particular, it has turned out to be desirable for implementations to be able to point to a single document that describes the implementation statuses of all algorithms that they might use. Therefore, when a new algorithm is registered that has an implementation status other than "Optional", this document shall be obsoleted by a new similar document, adding the new algorithm to the table in section 2.2. Similarly, if any algorithm currently listed in the table in 2.2 changes status, this document shall be obsoleted by a new similar document and the table in 2.2 shall be fully replaced. In this way, there is always one authoritative document with the list of implementation statuses. I understand that you might want the "shall"s in the above to be "SHALL"s. I don't think it is necessary, and I think it's not a proper use of 2119 keywords, other IETF practice notwithstanding. |
2012-07-14
|
03 | Pete Resnick | [Ballot Position Update] New position, Discuss, has been recorded for Pete Resnick |
2012-07-13
|
03 | Samuel Weiler | Request for Last Call review by SECDIR Completed: Ready with Issues. Reviewer: Charlie Kaufman. |
2012-07-13
|
03 | Barry Leiba | [Ballot comment] Former DISCUSS, leaving it here for the record. In principle, I like the idea of preventing fragmentation of the documentation by keeping the … [Ballot comment] Former DISCUSS, leaving it here for the record. In principle, I like the idea of preventing fragmentation of the documentation by keeping the Section 2.2 table in one place, and by always replacing the document that has it with another, in its entirety. Only... isn't that what the IANA registry is supposed to be for? Why isn't that table just added to the IANA registry, and then maintained there? Doesn't this document now require us to OBSOLETE this document and replace it every time we want to change the registry? ------------ Update 1 ------------ I had no idea of the history of this, until Andrew pointed me at this: https://datatracker.ietf.org/doc/draft-ietf-dnsext-dnssec-registry-fixes/ballot/ I need to talk this over with Pete, Robert, and Russ, at least, on the telechat, and understand why we think we can't use the IANA registry the way registries are meant to be used. ------------ Update 2 ------------ After more discussion with the chairs, here's what I understand... 1. The conformance table needs to be normative, stable, and with maintained history. It needs to be clear, when you say you conform as of [date X], what it is that you claimed to conform to. You can conform to an RFC, because once it's published, you have a stable, immutable reference, and you can give the RFC number. But if I asked you whether something conformed to the RRTYPEs registry, you'd have to ask "at what date?" And IANA doesn't maintain a history. 2. The conformance table is necessary in the first place because as things stand, you can say you "implement DNSSEC" when (for instance) you don't do NSEC3. That's not going to be very useful, given that .com, .net, and .org are all using NSEC3. We need a single document to which people can point and say, "We do it the way that says to." 3. If it takes an RFC to update the registry, then any change to the table needs an RFC anyway. Thus, I suppose there's no *harm* in just publishing the table in the RFC and not in the registry. I do like that the basic table is still in the registry, and that this just extracts the conformance criteria into an RFC-maintained table. There's no point now, but it would have helped if, especially given the history of the earlier document, some of this information had been in the shepherd writeup. But now that I understand the issues, I'm OK with this method of handling it. |
2012-07-13
|
03 | Barry Leiba | Ballot comment text updated for Barry Leiba |
2012-07-13
|
03 | Brian Haberman | [Ballot comment] I agree with Barry that a discussion is needed as to why an IANA registry cannot capture the necessary information. |
2012-07-13
|
03 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2012-07-12
|
03 | Jean Mahoney | Request for Telechat review by GENART is assigned to Francis Dupont |
2012-07-12
|
03 | Jean Mahoney | Request for Telechat review by GENART is assigned to Francis Dupont |
2012-07-12
|
03 | Barry Leiba | [Ballot comment] Former DISCUSS, leaving it here for the record. In principle, I like the idea of preventing fragmentation of the documentation by keeping the … [Ballot comment] Former DISCUSS, leaving it here for the record. In principle, I like the idea of preventing fragmentation of the documentation by keeping the Section 2.2 table in one place, and by always replacing the document that has it with another, in its entirety. Only... isn't that what the IANA registry is supposed to be for? Why isn't that table just added to the IANA registry, and then maintained there? Doesn't this document now require us to OBSOLETE this document and replace it every time we want to change the registry? Update: I had no idea of the history of this, until Andrew pointed me at this: https://datatracker.ietf.org/doc/draft-ietf-dnsext-dnssec-registry-fixes/ballot/ I need to talk this over with Pete, Robert, and Russ, at least, on the telechat, and understand why we think we can't use the IANA registry the way registries are meant to be used. |
2012-07-12
|
03 | Barry Leiba | [Ballot Position Update] Position for Barry Leiba has been changed to No Objection from Discuss |
2012-07-11
|
03 | Ralph Droms | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2012-07-11
|
03 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2012-07-09
|
03 | Francis Dupont | Request for Last Call review by GENART Completed. Reviewer: Francis Dupont. |
2012-07-09
|
03 | Barry Leiba | [Ballot discuss] This is a DISCUSS-DISCUSS; no action is required by the document editor or working group. In principle, I like the idea of preventing … [Ballot discuss] This is a DISCUSS-DISCUSS; no action is required by the document editor or working group. In principle, I like the idea of preventing fragmentation of the documentation by keeping the Section 2.2 table in one place, and by always replacing the document that has it with another, in its entirety. Only... isn't that what the IANA registry is supposed to be for? Why isn't that table just added to the IANA registry, and then maintained there? Doesn't this document now require us to OBSOLETE this document and replace it every time we want to change the registry? Update: I had no idea of the history of this, until Andrew pointed me at this: https://datatracker.ietf.org/doc/draft-ietf-dnsext-dnssec-registry-fixes/ballot/ I need to talk this over with Pete, Robert, and Russ, at least, on the telechat, and understand why we think we can't use the IANA registry the way registries are meant to be used. My extreme apologies for getting the dnsext working group caught in the middle of a "daddy wants this and mommy wants that" argument. |
2012-07-09
|
03 | Barry Leiba | Ballot discuss text updated for Barry Leiba |
2012-07-09
|
03 | Barry Leiba | [Ballot discuss] In principle, I like the idea of preventing fragmentation of the documentation by keeping the Section 2.2 table in one place, and by … [Ballot discuss] In principle, I like the idea of preventing fragmentation of the documentation by keeping the Section 2.2 table in one place, and by always replacing the document that has it with another, in its entirety. Only... isn't that what the IANA registry is supposed to be for? Why isn't that table just added to the IANA registry, and then maintained there? Doesn't this document now require us to OBSOLETE this document and replace it every time we want to change the registry? |
2012-07-09
|
03 | Barry Leiba | [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba |
2012-07-09
|
03 | Pearl Liang | IANA has reviewed draft-ietf-dnsext-dnssec-algo-imp-status-03 and has the following comments: IANA understands that, upon approval of this document, there is a single action which IANA must … IANA has reviewed draft-ietf-dnsext-dnssec-algo-imp-status-03 and has the following comments: IANA understands that, upon approval of this document, there is a single action which IANA must complete. In the IANA Matrix located at: http://www.iana.org/protocols/ the reference for the Domain Name System Security (DNSSEC) Algorithm Numbers located at: http://www.iana.org/assignments/dns-sec-alg-numbers should be updated to reference [ RFC-to-be ]. In addition, the registry - Domain Name System Security (DNSSEC) Algorithm Numbers - should have [ RFC-to-be ] as a reference for the entire registry. IANA understands that this is the only action that must be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. |
2012-07-08
|
03 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2012-07-07
|
03 | Ralph Droms | Placed on agenda for telechat - 2012-07-19 |
2012-07-07
|
03 | Ralph Droms | Ballot has been issued |
2012-07-07
|
03 | Ralph Droms | [Ballot Position Update] New position, Yes, has been recorded for Ralph Droms |
2012-07-07
|
03 | Ralph Droms | Created "Approve" ballot |
2012-06-28
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Francis Dupont |
2012-06-28
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Francis Dupont |
2012-06-28
|
03 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Charlie Kaufman |
2012-06-28
|
03 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Charlie Kaufman |
2012-06-27
|
03 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Applicability Statement: DNS Security (DNSSEC) DNSKEY … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status) to Best Current Practice The IESG has received a request from the DNS Extensions WG (dnsext) to consider the following document: - 'Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status' as Best Current Practice The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2012-07-11. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The DNS Security Extensions (DNSSEC) requires the use of cryptographic algorithm suites for generating digital signatures over DNS data. There is currently an IANA registry for these algorithms that lacks the recommended implementation status of each algorithm. This document provides an applicability statement on algorithm implementation status for DNSSEC component software. This document lists each algorithm's status based on the current reference. In the case that an algorithm is specified without an implementation status, this document assigns one. This document updates RFCs 2536, 2539, 3110, 4034, 4398, 5155, 5702, and 5933. Note that this document responds to the objections raised against draft-ietf-dnsext-dnssec-registry-fixes-08; the earlier document was split into this document and draft-ietf-dnsext-dnssec-registry-update. The implementation status information published in this document was originally published in draft-ietf-dnsext-dnssec-registry-fixes-08, which made a novel and controversial use of the IANA registry. That approach was too controversial, so this document publishes that information separately. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-dnsext-dnssec-algo-imp-status/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-dnsext-dnssec-algo-imp-status/ballot/ No IPR declarations have been submitted directly on this I-D. |
2012-06-27
|
03 | Amy Vezza | State changed to In Last Call from Last Call Requested |
2012-06-27
|
03 | Ralph Droms | Last call announcement was changed |
2012-06-27
|
03 | Ralph Droms | Last call was requested |
2012-06-27
|
03 | Ralph Droms | Ballot approval text was generated |
2012-06-27
|
03 | Ralph Droms | State changed to Last Call Requested from Publication Requested |
2012-06-27
|
03 | Ralph Droms | Last call announcement was generated |
2012-06-27
|
03 | Ralph Droms | Ballot writeup was changed |
2012-06-27
|
03 | Ralph Droms | Ballot writeup was generated |
2012-06-18
|
03 | Cindy Morgan | Submission write-up for draft-ietf-dnsext-dnssec-algo-imp-status-03. Template date 2012-02-24 (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why … Submission write-up for draft-ietf-dnsext-dnssec-algo-imp-status-03. Template date 2012-02-24 (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? BCP (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The DNS Security Extensions (DNSSEC) requires the use of cryptographic algorithm suites for generating digital signatures over DNS data. There is currently an IANA registry for these algorithms that it lacks the recommended implementation status of each algorithm. This document provides an applicability statement on algorithm implementation status for DNSSEC component software. This document lists each algorithm's status based on the current reference. In the case that an algorithm is specified without an implementation status, this document assigns one. The document updates RFCs 2536, 2539, 3110, 4034, 4398, 5155, 5702, and 5933. Working Group Summary The intended effect of this draft was originally captured in draft-ietf-dnsext-dnssec-registry-fixes-08, which made a novel and controversial use of the IANA registry. That approach was too controversial, and so the WG split the document into two parts. This draft is one of them. The present approach was far less controversial than the previous one, and nobody has raised any objection to the current text. Document Quality The draft does not specify a protocol of any kind, but it does make a recommendation in favour of some algorithms that are so far not widely deployed. The discussion of dnssec-registry-fixes led to the approach instantiated in this draft. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Andrew Sullivan is the Document Shepherd, and Ralph Droms is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd reviewed the document for content, to make sure that it was in keeping with the WG's consensus, to ensure that its references were correct, and to ensure that it addressed previous objections to the approach adopted in dnssec-registry-fixes. The document is ready. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. There was adequate discussion of the draft, and a significant amount of it had to do with whether a particular word was the right one. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No, except that the IESG should confirm that the approach in the draft meets its objections to the predecessor draft. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The IESG should confirm that the approach in the draft meets its objections to the predecessor draft. Otherwise, none. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There appear to be no objections. The WG has previously lamented the problem that figuring out what is a conforming DNSSEC validator or server implementation has been hard because of the lack this draft seeks to address. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. Nits all pass. The nits tool says that two updates are missing from the header, but I can see them. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. N/A (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This draft is intended to update a number of others. They are all listed. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The document does not actually change or create any IANA registry, but it requests addition of itself as a reference from the relevant registry. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. N/A. |
2012-06-18
|
03 | Cindy Morgan | Note added 'Andrew Sullivan (ajs@anvilwalrusden.com) is the Document Shepherd' |
2012-06-18
|
03 | Cindy Morgan | Intended Status changed to Best Current Practice |
2012-06-18
|
03 | Cindy Morgan | IESG process started in state Publication Requested |
2012-06-18
|
03 | (System) | Earlier history may be found in the Comment Log for draft-srose-dnssec-algo-imp-status |
2012-06-18
|
03 | Andrew Sullivan | IETF state changed to Submitted to IESG for Publication from WG Document |
2012-06-12
|
03 | Andrew Sullivan | Publication request submitted 2012-06-18 |
2012-06-12
|
03 | Scott Rose | New version available: draft-ietf-dnsext-dnssec-algo-imp-status-03.txt |
2012-04-19
|
02 | Scott Rose | New version available: draft-ietf-dnsext-dnssec-algo-imp-status-02.txt |
2012-03-26
|
01 | Scott Rose | New version available: draft-ietf-dnsext-dnssec-algo-imp-status-01.txt |
2012-01-30
|
00 | (System) | New version available: draft-ietf-dnsext-dnssec-algo-imp-status-00.txt |