Moin! > On 10 Nov 2014, at 16:49, Brian Dickson <brian.peter.dick...@gmail.com> wrote: > > The addresses associated with those names ( [a-m].root-servers.net ) are > replaceable in a way which is undetectable and unprotected by DNSSEC. > > Thus, there is no need to hijack BGP routes. There is not even a requirement > that 13 unique addresses be used. The same single address could be served up > for all 13 entries (as glue data). > > In that respect, arguably the proposal is kind of moot. > > (On the other hand, I think this demonstrates the weakness of not pushing for > splitting the original "NS" into two different RR types (parent NS and child > NS), and making the authority for each the respective owner, and having the > owners signing them.) > > I'd prefer to live in a world where BGP hijacking WAS necessary, and where > the root server addresses were signed, authoritatively served from within the > root zone directly (with no delegations). Why. What matters if the content of the root zone aka the delegations to TLDs. All of these are signed if they use DNSSEC and that's the case for most TLDs. It really doesn't matter where the root zone is served from, quite the opposite. IMHO we should spread it as widely as possible right into the recursive resolvers.
With DNSSEC any modification (malicious or not) can be detected so the actual packet origin doesn't matter. The data origin/authenticity is what we care about. So long -Ralf --- Ralf Weber e: d...@fl1ger.de _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop