On 8 Jul 2014, at 16:14, Tony Finch <d...@dotat.at> wrote:

> simply slaving the root zone doesn't give you any good way to detect or 
> recover from a corrupted zone transfer.

If that's a credible threat/risk, there are ways to mitigate it. Perhaps v2 of 
this draft could discuss these.

FWIW in playing with DNS for 20-odd years, I've never come across an actual 
example of zone transfer corruption, either in the protocol or the underlying 
TCP transport. That doesn't mean it can't happen of course. The risks are close 
to zero IMO. Which doesn't necessarily mean they should be ignored.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to