On May 16, 2014, at 6:41 AM, Ted Lemon <ted.le...@nominum.com> wrote:

> On May 16, 2014, at 8:18 AM, Andrew Sullivan <a...@anvilwalrusden.com> wrote:
>> But it seems to me we ought to
>> be more enthusiastic than resigned in this case, even if we have to
>> hold our collective nose as well.  Either those who understand how the
>> DNS works will document what to do, or else people who have no clue
>> will make more "improvements".
> 
> The big can of worms to which I was referring in the previous message was 
> DNSSEC.   Deploying CDN functionality with DNSSEC is hard.   Not impossible, 
> but definitely hard.  

No its not.  All you have to be willing to do is release the constraint on "all 
signatures offline".  Doing online signatures allows all the CDN functionality 
you want to be DNSSEC validated (not like DNSSEC really does much good for A 
records anyway...).

And even 4096b RSA signatures only take a handful of milliseconds to construct 
on the fly, you can cache signature validity for minutes even in the very 
dynamic case, and this is one of those operations that parallelize obscenely 
well.

If you want a funky-python-server, that really bends DNS, and supports dynamic 
signatures (including dynamic NSEC3 lies), tell me, I can give you my 
(ugly-ass) source.

--
Nicholas Weaver                  it is a tale, told by an idiot,
nwea...@icsi.berkeley.edu                full of sound and fury,
510-666-2903                                 .signifying nothing
PGP: http://www1.icsi.berkeley.edu/~nweaver/data/nweaver_pub.asc

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to