On Fri, Aug 15, 2008 at 4:51 PM, Paul Hoffman <[EMAIL PROTECTED]> wrote:

> security layers are good. If we don't give those people the right tools to
> properly configure and properly maintain those configurations, there will be
> stability issues, as I listed earlier.


Let me tell you something.  All this DNSSEC fud has been very very good for
DNS consultants.  One thing I make clear to the client base is that DNSSEC
is just more bad patching on top of more bad patching.  The BIND boys are
patching freaks and have yet to build a BIND version that is stable.

My advise to them is to watch the developments in DNSSEC and not believe
everything they read.  The solution I like implementing instead of DNSSEC is
an IPS monitoring the resolver.  And of course making sure their resolvers
don't act as authoritative primaries or secondaries.

One things for sure - many businesses are going to end up paying big bucks
to protect themselves and even bigger bucks to deploy the DNSSEC patch.  The
BIND boys are marketing gurus.

cheers
joe baptista



-- 
Joe Baptista
www.publicroot.org
PublicRoot Consortium
----------------------------------------------------------------
The future of the Internet is Open, Transparent, Inclusive, Representative &
Accountable to the Internet community @large.
----------------------------------------------------------------
Office: +1 (360) 526-6077 (extension 052)
Fax: +1 (509) 479-0084
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to