I think that Johan mentioned this sometime later in our conversation that got private,
that he don't really care about on-disk format, but he cares about UI on top of it.
Thus I don't think that filesystem as database is incompatible with this concept.
O.
--
 Ondřej Surý -- Chief Science Officer
 -------------------------------------------
 CZ.NIC, z.s.p.o.    --    Laboratoře CZ.NIC
 Americka 23, 120 00 Praha 2, CZE
 mailto:ondrej.sury@nic.cz    
 tel:+420.222745110      fax:+420.222745112
 -------------------------------------------
  On 31. 10. 2013, at 20:14, Ondřej Caletka
<ondrej.caletka(a)gmail.com> wrote:
 Hi,
 Dne 31.10.2013 14:42, Johan Ihrén napsal(a):
  No, I don't want to look inside all the K*
files to be able to figure out which key is only published, which is active and which is
retired. Nor do I want to delete old and retired keys with the Unix "rm"
command, and high probability of erasing the wrong file. 
 I have different opinion on this. I'm fine with private keys on disk. I
 don't want to run SoftHSM using SQLite database full of strange binary
 blobs, use three different tools to create, manage and export private
 keys and work with long alphanumeric nonsense IDs. I'm happy with KSK
 for 
example.com in file named KSK_example.com.private, the same way I
 work with SSL certificates or SSH keys. In case of emergency it is much
 more simple to just recover the right key file from backup instead of
 going through some lengthy process like [1].
 [1]:
https://wiki.opendnssec.org/display/USERDOCREF/Recovery+of+a+single+dnskey+…
 So, PKCS11 support would be nice to have, but please don't make it the
 only option to deploy DNSSEC using Knot. Same way with the KASP policy.
 The best database for me is the filesystem itself.
 --
 Ondřej Caletka
 _______________________________________________
 knot-dns-users mailing list
 knot-dns-users(a)lists.nic.cz
 
https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-dns-users