On Fri, 13 Mar 2015, Paul Vixie or Morizot Timothy S wrote:

[not sure of the quoting in this message]

DNSSEC is [...] even less finished and less deployed than IPv6.

I have to disagree with this continued claim by opponents of DNSSEC
that it is not widely deployed. The fact that Apple had an outage that
was caused by DNSSEC actually shows it has been deployed widely! All of
Google DNS and Comcast clients were affected! That's probably more than
all IPv6 users.

Also, while the DNSSEC opponents screamed (well, tweeted)  murder and
called for throwing out DNSSEC, when the next day all the online Apple
Stores were down because of Apple's "internal DNS error", those DNSSEC
opponents were very quiet and not screaming to rip DNS out of the
internet :P

then what we know now we'd've scrapped DNS itself and started from scratch just 
to avoid the
compromises we've made.

And we would not be able to avoid some of the same issues. For example,
any newly made solution would have the same choice of deciding in the
browser to soft fail or hard fail (or do a pop-up). People now complain
about the "hard fail" nature of DNSSEC in browsers, but DNSSEC has
actually been designed to allow a soft fail. All the browsers need to
do in resposne to a ServFail is to re-issue the query with the CD bit
set and if they receive an answer on the second go, pop-up to the user
for an override.

Paul

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to