| Note: |
|
| This might be
one of the most difficult parts of DNSSEC. As, yet there are no documents
describing/advising a procedure. |
|
| Whatever you
choose to do, make sure that you document the procedure and the interactions. |
|
| This is a
one-off interaction. Once the KEY is accepted it can be used as a bootstrap
for future key exchanges. |