li...@rhsoft.net wrote: > Am 07.11.2014 um 18:22 schrieb Michael Ströder: >> Viktor Dukhovni wrote: >>> The rationale for the DANE work is in: >>> >>> >>> http://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-13#section-1.3 >> >> I've already read/analyzed all DANE related RFCs and almost all drafts in >> detail. Also some IETF presentation slides. >> >> As already mentioned on the IETF DANE WG list: >> The main obstacle is currently lack of DNSSEC deployments. >> >> And personally I strongly dislike the DNSSEC auto-signing people usually >> implement in their DNS servers > > how else do you imagine to maintain 500, 1000, 10000 signed zones
Those numbers above may be impressive for you but not for me. > while you > also are enforced for repeatly key changes and if you make one mistake in that > context one or all zones are dead? Well, besides signaling mandatory use of TLS the promise of DNSSEC/DANE is to mitigate all the risks leading to real security incidents of existing X.509 PKI. But note that most attacks were conducted through crappy RA interfaces. So ask yourself: If everybody uses the same sort of crappy registration interfaces for their DNS entries while simply auto-signing DNS zone entries. Is there a real chance to achieve the goal? I have some doubts. Ciao, Michael.
smime.p7s
Description: S/MIME Cryptographic Signature