Make sure your CPE supports IPv6 only operations before putting on the shelf, it's hopefully IPv4 will be decommissioned 10 years from now, so DNSSEC bootstrap could be moot point.
>-----Original Message----- >From: DNSOP [mailto:dnsop-boun...@ietf.org] On Behalf Of Mikael >Abrahamsson >Sent: November-16-16 8:45 PM >To: Ondřej Surý >Cc: dnsop >Subject: Re: [DNSOP] DNSSEC operational issues long term > >On Thu, 17 Nov 2016, Ondřej Surý wrote: > >> Again, you are using unfair arguments. The devices have to cope with >> that and it doesn't have to be a protocol design. > >Agreed. It can also be method design. There have been some suggestions in this >thread for ways to handle the problem. I have not seen any that is actually an >RFC, preferrably a BCP type document that descibes the problem and suggests >how it can be handled. > >Or is there a document I have missed I can point vendors and IETF people to, to >understand and handle this DNSSEC property (that doesn't seem to be well >known, I talked to several people this morning who had no idea this DNSSEC >limitation existed). > >-- >Mikael Abrahamsson email: swm...@swm.pp.se _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop