Hi,
Dne 31.10.2013 14:42, Johan Ihrén napsal(a):
No, I don't want to look inside all the K* files
to be able to figure out which key is only published, which is active and which is
retired. Nor do I want to delete old and retired keys with the Unix "rm"
command, and high probability of erasing the wrong file.
I have different opinion on this. I'm fine with private keys on disk. I
don't want to run SoftHSM using SQLite database full of strange binary
blobs, use three different tools to create, manage and export private
keys and work with long alphanumeric nonsense IDs. I'm happy with KSK
for
example.com in file named KSK_example.com.private, the same way I
work with SSL certificates or SSH keys. In case of emergency it is much
more simple to just recover the right key file from backup instead of
going through some lengthy process like [1].
[1]:
https://wiki.opendnssec.org/display/USERDOCREF/Recovery+of+a+single+dnskey+…
So, PKCS11 support would be nice to have, but please don't make it the
only option to deploy DNSSEC using Knot. Same way with the KASP policy.
The best database for me is the filesystem itself.
--
Ondřej Caletka