On Fri, Aug 15, 2008 at 11:29:13AM -0700, David Conrad wrote:
> Hi,
> 
> On Aug 15, 2008, at 9:15 AM, Ted Lemon wrote:
> >But until we have root and .com signed, and until the average end- 
> >user is protected by a validating resolver, we aren't done yet, and  
> >I don't really get any actual benefit from my efforts.   Which,  
> >tragically, is why it's taking so long.
> 
> There are people who appear to think deploying DNSSEC as soon as  
> possible would be a good thing.  There are also people who appear to  
> think deploying DNSSEC is a fools errand, that it won't get  
> significant use because it makes things too hard, too complicated, too  
> prone to failure, etc.
> 
> However, because of DO, folks who don't configure their resolvers to  
> do DNSSEC shouldn't ever see any DNSSEC goop.
> 
> Given this, does anyone see any DNS security and/or stability concerns  
> if a miracle were to happen and the root were to be signed tomorrow?

Having signed a large delegation centric zone and as expected not
seeing any security/stability issue for a significant amount of time I
would say NO.

> That is, if you don't care about DNSSEC, do you think it would be  
> bad(tm) if the root were to be signed (for the sake of argument,  
> ignore the time waste, administrative overhead, etc. associated with  
> DNSSEC-signing)?  If so, why?

Ok, I do care but the answer is still NO. Besides the large amount of
statements accusing if of being a pig-protocol it is really well
thought on incremental deployment for clients.

> Thanks,
> -drc

Fred
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to