On Aug 12, 2008, at 11:40 AM, Dean Anderson wrote:
DNSSEC has been deployed on large scale by some TLD's and RIR's already.
It is very much operational.
Not very much--99 domains out of 70 million in .com.

As has been pointed out, .COM is not signed. The fact that there are 99 zones signed in .COM is actually a bit surprising and points out one of the larger flaws with DNSSEC -- the assumption of a hierarchical top-down trust model in a world where the likeliest deployment model is bottom-up. For the signing of any of those 99 .COM zones to be useful, caching server operators have to manually configure/update the trust anchors for each of those zones. That obviously won't scale. And VeriSign hasn't exactly been chomping at the bit to sign .COM, quite the opposite as I understand it.

Your argument would be stronger if you identified which TLD's and which RIR's.

Last I checked:

.SE, .BG, .PR, and .BR have been signed.
RIPE-NCC signs the in-addr.arpa zones they are responsible for.

I have been told there are several more top-level domains that have indicated they will be signing their zones before the end of the year. The IAB has asked IANA to sign .ARPA and its child zones and that process is underway, see https://ns.iana.org/dnssec/status.html (unfortunately, that effort has been a bit blocked for non-technical reasons). Others have indicated they are considering and/or attempting to do so, but are constrained for various reasons. Plans may have changed with the recent vulnerability announcements, but it would be inappropriate for me to pretend to speak for those TLD operators.

Regards,
-drc

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to