David Conrad (drc) writes:
> 
> I'd suggest that in the BCP/RFC/whatever, in addition to recommending that 
> NTAs be time capped and not written to permanent storage, it should also 
> recommend NTAs be written as specifically as possible.  (Should be obvious, 
> but doesn't hurt to reiterate I suppose).

        What's wrong with "provide unvalidated results for this zone
        until it validates" ? I mean, we're now talking about automation,
        scripts to reinsert NTAs, etc. Then we might as well implement
        the logic to continually test validation for SOA or some other
        specified record for the given zone, and reenable validation.

        So instead of calling it NTA call it validation policy - the DNSSEC
        equivalent of IPSEC's "required" vs. "use" policy setting. Yes, we
        all know how succesful opportunistic encryption was. Yes, some are
        going to scream, but much better than nailing down an NTA ad vitam,
        or tracking TTLs, or which DS is active, or...

_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to