Many others have made the points I would have made about the operational value 
of NTAs so I won't repeat those... but I want to just say that I think Paul 
Ebersman nails it here:

On Oct 26, 2014, at 12:09 PM, Paul Ebersman 
<list-dn...@dragon.net<mailto:list-dn...@dragon.net>>
 wrote:

 I see NTA as a tool that we should try to never use but which is
invaluable when we do need it.

Exactly!  Hopefully everything "just works" 99% of the time... but in the event 
something doesn't work right the operators have a narrow "scalpel" tool in 
their toolbox that they can pull out rather than resorting to more drastic 
measures such as, for example, disabling all DNSSEC validation.

Ideally NTAs never get used and as DNSSEC deployment moves along and DNS 
operators get increasingly familiar with the operational practices required of 
DNSSEC then the need for NTAs will eventually fade away.

My agenda in pushing this draft is not to advocate wide spread use but
to guarantee that all of my vendors have an RFC to code against so that
I have consistent behavior and plenty of server choices for server
diversity.

Yes!   If we have an operational need to have a way to generate DNSSEC 
validation exceptions, let's please have *one* way that we can collectively 
agree upon rather than having every different operator come up with some custom 
mechanism that works only for them.  This will make the overall deployment that 
much easier if the one method is spread across multiple software vendors and 
systems.

My 2 cents,
Dan

P.S. Nice quote, Warren!

--
Dan York
Senior Content Strategist, Internet Society
y...@isoc.org<mailto:y...@isoc.org>   +1-802-735-1624
Jabber: y...@jabber.isoc.org<mailto:y...@jabber.isoc.org>
Skype: danyork   http://twitter.com/danyork

http://www.internetsociety.org/deploy360/


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to