Florian Weimer wrote:

>>Anyway, the other problem of DNSSEC is that PKI, as a concept, is
>>fundamentally broken, against which no PKI protocol can be useful.

> I think we need to recast DNSSEC as mere transport protection measure.
> It might be a overengineered for this purpose, but

DNSSEC is too overengineered and, thus, complex to be a reliable
protection.

> I doubt that a simpler, more lightweight protocol
> could be deployed with less effort.

Isn't port randomization enough? If not, DNS over TCP is no more
difficult to deploy than DNSSEC.

> I think I can understand your pains.  With hindsight, the original
> IPv6 design ("Simple Internet Protocol") turned out to be superior to
> the current spec, too.

My understanding is that, though IPv6 is more complex than SIP, neither
really addresses the issue of routing table explosion that they are
equally bad.

So, I'm recently working on a protocol named IP--, which is carefully
desinged to enable automatic renumbering of not only customers but
also ISPs, which is an essential part to solve routing table
explosion.

> It 's not fair, but unfortunately, it doesn't matter. 8-(

It doesn't matter, because we keep using PODS and IPv4. DNS in a
new generation network will use 64 bit IDs.

                                                        Masataka Ohta

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to