In message 
<968c470dac25fb419e0159952f28f0c06df65...@mem0200cp3xf04.ds.irsnet.gov>, 
Morizot Timothy S writes:
>
> DNSSEC validation is not a panacea, but if you refuse to implement it you
> are denying your users one layer of protection you could pretty easily
> provide. And given that in the US the large majority of federal agency
> DNS authoritative zones are signed, you also can't claim there's no
> benefit to the US public from validation. Implementing validation on
> recursive nameservers does not protect users from every attack. Nothing
> does. Nor is it as good as performing validation at the client. But it is
> a solid first step with real security benefits. And it's a step that can
> be followed and built upon with further enhancements later.

And validating in the recursive server is required for DNSSEC to
work reliably when the client is validating as it doesn't talk
directly to the authoritative servers.  Turning on DNSSEC validation
in the recursive servers is the first step in turning on validation
in the client.

> Scott
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to