On 2/23/12 8:48 PM, "vinny_abe...@dell.com" <vinny_abe...@dell.com> wrote:

> I kind of had the same thought... If ISC had a DNS outage due to expired
> signatures of a zone, what chance do I have in successfully deploying and
> maintaining DNSSEC for my zones? Sure, everyone makes mistakes, but I think it
> speaks volumes to the inherent complexity and the further need for simplifying
> the maintenance of signed zones. I know that progress is continually being
> made on this front and I think others agree... Just pointing it out again. I
> have nothing against DNSSEC, personally. I'd love to deploy it. I just don't
> have the time to maintain it or worry about maintaining it right now.

Much agreed, though I want to point out that you should only generally
deploy DNSSEC (or any new technology?) if the benefit outweighs the cost.
Adopting new technology "just because" usually leads to trouble (or
overworked admins that give up and go elsewhere).

What's the potential risk to your organization if the mythical "determined
attacker" is able to negatively or positively spoof resource records under
your control?  Maybe not much for you, maybe millions for financial orgs.

If the potential cost to the organization is high enough...  It will justify
paying a team of folks to maintain DNSSEC.  :-)

That said, I too look forward to a day when security is easier and more
automatic.  Much progress has been made, and I have high hopes and faith in
ISC and the DNS community at large.

http://www.jnd.org/books.html

-- 
Time is the coin of your life. It is the only coin you have, and only you
can determine how it will be spent. Be careful lest you let other people
spend it for you.  -- Carl Sandburg

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to