Patrik, On Apr 14, 2012, at 11:33 PM, Patrik Fältström wrote: > ...and my point is that the effort should be spent on convincing AT&T, Cox > and others to do validation just like Comcast.
The decisions as to whether to deploy an NTA vs. whether to deploy DNSSEC are made a different times and (I suspect) different places within the organization. Obviously, an organization must decide to deploy DNSSEC before the question of whether to deploy NTAs becomes relevant. My impression is that NTAs are/can be argued to reduce the risks of deploying validating resolvers. > So, I rather see those that do not feel comfortable taking the discussion > with the press and their customers (and of course this is also due to zone > owners not doing enough press and help when they screw up) I don't think it is a question of comfort. My impression is that it is a question of not losing money due to customers being unable to get their pr0n because validation has been turned on (whereas the customers' friends at another ISP can get the same pr0n with no problems). I suspect the vast majority of end users will simply not believe the response of "the zone owner screwed up and our competition is not doing the right thing". > turn off validation completely, This strikes me as far more detrimental to DNSSEC-enabled security than NTAs. The implication of this approach is that a mistake of a single zone owner would mean DNSSEC is disabled for everyone, everywhere, regardless of how all the other signed zones are operating. NTAs mean that validation is disabled for the offender only. > and then work together in whatever community they operate with other resolver > operators to turn on validation on the same day, with the help of ISOC and > whoever and have a DNSSEC validation launch day. Similar work that you at > Google did for IPv6. While I think a DNSSEC validation day is a good idea, the implication here is that zone owners won't make mistakes after the DNSSEC validation launch day. > I see *today* many mistakes we have made that see the need for DNSSEC, and we > could, and still can, learn from the IPv6 advocates on how to deploy > something new. Easy to say afterwards though. Given the stunning level of IPv6 deployment after more than a decade, I'm not sure I see emulating IPv6 in this regard as the best idea. Regards, -drc _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop