> On Jun 4, 2015, at 7:48 PM, Paul Hoffman <paul.hoff...@vpnc.org> wrote: > > On Jun 4, 2015, at 4:05 PM, Tony Finch <d...@dotat.at> wrote: >> Are there any implementations of this draft? > > Assuming you mean "is anyone deploying the ideas in this draft, particularly > those in Appendix B", that would be good information for the authors to have. > >> If resolvers are encouraged to use NSEC records to synthesize NXDOMAIN >> responses, would there still be any point to this draft? > > Yes. No one has written up a document on using NSEC records to synthesize > NXDOMAIN for the root, and if they do, there will certainly be operational > considerations for that that are different than the operational > considerations for this draft. I'm not saying one would be better than the > other, but I suspect that the operational description of this draft would be > easier for an operator to understand. > > --Paul Hoffman > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop
Paul, I consider this a good start in the discussion of NSEC aggressive use http://www.ietf.org/id/draft-fujiwara-dnsop-nsec-aggressiveuse-00.txt <http://www.ietf.org/id/draft-fujiwara-dnsop-nsec-aggressiveuse-00.txt> Olafur
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop