On Tue, 19 Aug 2008, Andrew Sullivan wrote:

Sure, large organizations with large, mostly competent, and very
conservative IT departments (think "banks") will probably not have
this problem and will probably deploy successfully.  None of that will
matter, however, if everyone else starts adopting policies like
"disable DNSSEC -- too risky."

DNSSEC is purely optional though. Anyone can decide to 1) not publish
DNSSEC auth data and 2) not use DNSSEC based resolvers. What happens
after that, is not up to engineers. It will be up to lawyers to proof
someone not deploying DNSSEC made the best decision in the interest
of their customers. As for TLD's, I wonder what will happen if .eu
decides to go DNSSEC, but .com won't. It will be interesting to watch
and see if organisations start migrating away from .com then, at
which point DNSSEC would have to be deployed to ensure not losing
customers.

Now, maybe that doesn't matter for many of these cases.  It is
entirely possible that DNSSEC deployment for most zones is just not
worth it.  If that's true, however, why are we so worried about poison
attacks?

Because this is only true for the authorative part of DNSSEC. Since
Dan showed you can cache poison any non-DNSSEC resolver for ANY domain,
not just the domains you are not protecting, you basically have no choice
but to mitigate this problem. And DNSSEC, for good or bad, is what we
have right now.

Paul
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to