On Wednesday, 29 April 2020 13:44:12 UTC Shumon Huque wrote: > On Wed, Apr 29, 2020 at 12:49 AM Paul Vixie <p...@redbarn.org> wrote: > > ... > > This is by no means a problem unique to DNSSEC. Many new protocol features > have and continue to face the middlebox challenge: SCTP, TCP fast open, > multi- > path TCP, QUIC, TLS 1.3 etc. Some have developed workarounds with varying > degrees of success, some like SCTP have more less died. The web has the > advantage (in my opinion) that a small number of browsers are able to impose > changes on the middlebox ecosystem in a way that the DNS will never be able > to.
so, there were two modes. first, the web was created. it worked everywhere and required no upgrades to the OS or any other protocol or any gateways or firewalls. later (today), the web is dominant and if it makes a change that doesn't work everywhere, the pain will be felt everywhere, and every operating system and gateway and firewall will conform or die. DNSSEC has never been in either mode. depending on DNSSEC for a product or service remains commercial suicide and always will. thus noone invests in such products or services, and anyone thinking about the X.509 CA problem ignores DANE and focuses on cert-pinning or similar. the pre-DS clear path requirement was really "allow unknown RRtypes". the post-DS clear path requirement was really "understand DS". that was a change we made, that stopped all progress beyond "let's opportunistically protect the RDNS cache, and geeky stuff like SSHFP, and DANE for SMTP". > As I mentioned in a previous note, DNS over HTTPS (however one might feel > about current deployment models and such), can probably provide the clean > path that end user applications of DANE need. i heard you say that, and i disagree, but it's off-topic, so, another time. -- Paul _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop