[thanks for including me in this discussion]
I will probably write a keymanager in Go at some point in time, my
interaction with HSM is already taken care of because I wrote a PKCS#11
wrapper for Go - just for this purpose :-)
[ Quoting <jan.vcelak(a)nic.cz> in "Re: [knot-dns-users] Knot DNS 1.3.3..."
]
Do you parse
the timing metadata or do you only use the keying material?
Yes, we parse timing metadata from .private key file. The simpliest
possible way right now... :-(
I'd love to see an alternative to OpenDNSSEC,
but at the same time I must say that OpenDNSSEC really has found the right abstractions
and the right design in many respects.
And we will give you an alternative to OpenDNSSEC. We just need more
time. :-)
All the previous emails sound right to me. A "lightweight" key-manager
thingy, unlike BIND and unlike OpenDNSSEC.
As for the user interface, that would be rather simple: a key should be
used to sign, or should be carried in the zone at some point in time.
The KSK flag deals with what should be signed.
So you talk to the key-manager, and it responds with:
key1, sign, KSK
key2, carry, KSK
key3, sign , ZSK
and then your smart incremental signer knows what to do, no?
Grtz Miek
--
Miek Gieben
PGP 3880D0F6