On Sat, Dec 14, 2013 at 05:26:01AM +0000, Viktor Dukhovni wrote:
> On Sat, Dec 14, 2013 at 12:04:15AM -0500, John Allen wrote:
> > > The main difficulty with server-side DANE is that your zone 
> > > must be DNSSEC signed.  Deployment of DNSSEC is still fairly 
> > > thin. With a bit of luck DANE might motivate folks to consider 
> > > DNSSEC.
> >
> > My interest in TLSA was sparked by my looking for info when 
> > setting up my DNS with DNSSEC (still a work in progress).  It 
> > seemed to provide a better level of security than the current 
> > standard practice.
> 
> The trick is to find tools that make operating a DNSSEC zone
> relatively painless.  You get security, but it easier to mess
> up leaving the zone with stale signatures and thus essentially
> invisible to all DNSSEC-aware clients.  By all means deploy
> DNSSEC, but carefully.

Perhaps I am biased, but I use and recommend ISC BIND 9.9. The 
"auto-dnssec maintain;" zone option does most of the work. Used 
together with "update-policy local;" you get a simple means of 
updating your zone data with nsupdate(8).

Another choice with 9.9 is inline signing, whereby zone files are 
maintained as before, and the signing takes place "inline". These 
features and others are all documented in the BIND 9 ARM:

ftp://ftp.isc.org/isc/bind9/9.9.4-P1/doc/arm/Bv9ARM.ch04.html#dnssec.dynamic.zones

Each of BIND 9.7, 9.8, and 9.9 had new features which slightly 
reduced the pain of DNSSEC. 9.10 won't be an exception.
-- 
  http://rob0.nodns4.us/
  Offlist GMX mail is seen only if "/dev/rob0" is in the Subject:

Reply via email to