Replies: 5 comments 7 replies
-
Two API designs I can think of:
I personally like option 1 better, but 2 is more in line with dnspython in general I believe. |
Beta Was this translation helpful? Give feedback.
-
What would you include in a signing policy object? In my experience, the dnspython way is typically "method with a lot of parameters" (
I'm sure that's missing some things; it's only a starting point. I think it covers the common case, and could be extended to handle more cases. It's also just my opinion. |
Beta Was this translation helpful? Give feedback.
-
I think what Brian suggests is most in keeping with dnspython's style (for better or worse!). I'm not sure the abstract signer approach is good as while there are differences with NSEC3, there are also many shared things, and I'm sure it will split well into to instances. The policy object passed to function seems less good in this case, as the policy is basically everything, so it's seems you'd be better off with either function arguments or a class rather than a separate data-only policy class. |
Beta Was this translation helpful? Give feedback.
-
Regarding KSK vs ZSK:
I think I'd prefer (1) and always include all DNSKEYs use for signing in the zone. If one want to do it differently, one can always use a custom RRset signer. if there's not both SEP and non-SEP keys, sign all RRsets with all keys. |
Beta Was this translation helpful? Give feedback.
-
#911 submitted. |
Beta Was this translation helpful? Give feedback.
-
I have started work on a zone signer in check https://github.com/jschlyter/dnspython/tree/rdataset_signer. The gist of the code is in:
Things missing:
Beta Was this translation helpful? Give feedback.
All reactions