> On Jun 4, 2015, at 7:48 PM, Paul Hoffman <paul.hoff...@vpnc.org> wrote:
> 
> On Jun 4, 2015, at 4:05 PM, Tony Finch <d...@dotat.at> wrote:
>> Are there any implementations of this draft?
> 
> Assuming you mean "is anyone deploying the ideas in this draft, particularly 
> those in Appendix B", that would be good information for the authors to have.
> 
>> If resolvers are encouraged to use NSEC records to synthesize NXDOMAIN
>> responses, would there still be any point to this draft?
> 
> Yes. No one has written up a document on using NSEC records to synthesize 
> NXDOMAIN for the root, and if they do, there will certainly be operational 
> considerations for that that are different than the operational 
> considerations for this draft. I'm not saying one would be better than the 
> other, but I suspect that the operational description of this draft would be 
> easier for an operator to understand.
> 
> --Paul Hoffman
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

Paul, 
I consider this a good start in the discussion of NSEC aggressive use
http://www.ietf.org/id/draft-fujiwara-dnsop-nsec-aggressiveuse-00.txt 
<http://www.ietf.org/id/draft-fujiwara-dnsop-nsec-aggressiveuse-00.txt>

Olafur

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to