On Aug 22, 2013, at 7:05 PM, Suzanne Woolf <wo...@isc.org> wrote:

> On Aug 22, 2013, at 6:25 PM, Paul Vixie <p...@redbarn.org> wrote:
> 
>> 
>> 
>> Paul Hoffman wrote:
>>> 
>>> On Aug 22, 2013, at 2:47 PM, David Conrad <d...@virtualized.org> wrote:
>>> 
>>>> A resolver operator deploying an NTA is making an assertion that data 
>>>> behind a name is safe despite protocol indications that is may not be.
>>> 
>>> Where is that stated? I ask, because it would seem that a better 
>>> description would be that they are asserting that the data behind a name is 
>>> unprotected by DNSSSEC.
>> 
>> agreed, and that's why, over and above the absurd engineering economics 
>> behind it, i don't like NTA. if my signatures don't work because i've been 
>> attacked (for example, one of my name servers has been compromised), the 
>> last thing i'd want is comcast telling their customers  that the data 
>> they're getting from my compromised name server is ok to consume because 
>> it's unsigned.

To elaborate on Paul's comment:  

We really do not need to create another clever attack vector. We have 
sufficient already.
_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to