> Andrew Sullivan wrote: > > On Fri, Aug 22, 2008 at 12:01:16AM +1000, Mark Andrews wrote: > > > > > >> The issues David was pointing out have been visible for years. So > >> to has the recovery behaviour if one choose to look for it. There > >> is nothing new in what David has been saying. > >> > > > > I think you may be missing the import of what he's saying, though. > > The entire deployment strategy for DNSSEC has been a gradual > > deployment strategy, in which zone operators may start signing their > > zones and expect zero effects for security-oblivious resolvers. That > > assumption is still accurate, but we appear to have failed to think of > > one class of deployment: the security-oblivious resolver operator with > > a security-aware resolver. > > > > Yes, some of those people are already running into the issues, and yes > > the recovery is happening. But David was asking, "If we just start > > signing now, will anything happen to people who don't care about > > DNSSEC?" The answer, one might be surprised to learn, is, "Yes, > > although probably nothing unrecoverable." That answer is not as > > encouraging as, "No." > > > > > >> longer desirable now that DNSSEC is seeing deployment. It much > >> better to get the problems fixed and that requires noise. > >> > > > > Well, that's certainly true. > > > > Here's a couple of leading questions (not directed at anyone in > particular, just whoever knows the answers): > > How stable is the content of the root zone? > (Really, really stable, I'd guess.) > > If a signed root zone were installed on the root servers for some period > of time, e.g. one refresh interval, > what would the effects be towards DNSSEC-configured caching, validating > resolvers? > > And, if the signed root zone were pulled after that period, and replaced > with the unsigned version, how long > would the "good" aspects of the cached DNSSEC bits continue to be useful? > > If the root zone were to "strobe" between signed and unsigned, what > minimum duration of "signed", and what > maximum duration of "unsigned" would be likely to not cause operational > problems for the aforementioned > DNSSEC-configured caching, validating resolvers? > > I'm specifically pondering "short period signed, long period unsigned, > repeat again and again...". > > And what about DNSSEC-capable, but non-DNSSEC-configured caches, when > used by DNSSEC-validating > clients? Does this differ from the first case (caching validating > resolvers)? > > As a cautious first step, does this make sense? Or even doing this one > some subset of root servers or root server > instances? > > It's kind of like dipping one's toe into bath water, to avoid getting > too badly burned, while still testing the waters. > > Just thinking outside the box, out loud... > > Brian Dickson > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop
It won't work. You have no control over when the clients make queries. Mark -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED] _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop