On Wed, Aug 13, 2008 at 08:04:08PM +0900, Masataka Ohta wrote:

> > relationships; and because we know that humans make a lot of errors;
> 
> It's interesting that you just mention erros and ignore social
> implementation details nor intentional attacks.

There are two elements to what you are claiming there:

1.  Social implementation details.  This was in fact what I was trying
to clarify.  It seemed to me you were suggesting that the social
implementation details are weak in some way (weaker than the existing
trust relationship with the parent for the parent side of the NS
record at the zone cut).  I thought that perhaps you were noting that
there is possibly somewhat more maintenance involved in DNSSEC
operations, and therefore more opportunities for human error, &c.  I
can't tell from your answer whether this is in fact what you meant or
not.

2.  Intentional attacks.  This appears to be a claim that DNSSEC is
inherently vulnerable to particular attacks.  If there are such
attacks that are not already mentioned in the specification, it'd be
nice to hear what they are now, before we have wider deployment.  Do
you have such details?

Best,

A

-- 
Andrew Sullivan
[EMAIL PROTECTED]
+1 503 667 4564 x104
http://www.commandprompt.com/
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to