Re: DNSSEC Readiness

2010-02-16 Thread Mark Andrews
In message <4b7af7f5.3030...@xyonet.com>, Curtis Maurand writes: > > I haven't run BIND in a number of years. There are a number of vendors that support DNSSEC on both the server side and on the client side. Check with your vendor about what they support. Mark -- Mark Andrews, ISC 1 Seymour

Re: DNSSEC Readiness

2010-02-16 Thread Curtis Maurand
I haven't run BIND in a number of years. --Curtis On 2/15/2010 2:06 PM, Charles N Wyble wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Tony Finch wrote: On Mon, 15 Feb 2010, Charles N Wyble wrote: How are folks verifying DNSSEC readiness of their environments? Any exi

Re: DNSSEC Readiness

2010-02-16 Thread Mark Andrews
In message <4b7a502f.8000...@knownelement.com>, Charles N Wyble writes: > > Repeat for IPv6. > > > > dig -6 ns . +norec @l.root-servers.net > > dig -6 ns . +dnssec +cd +norec @l.root-servers.net > > dig -6 any . +dnssec +cd +norec @l.root-servers.net > > dig -6 any . +dnssec +cd +norec @l.root-se

Re: DNSSEC Readiness

2010-02-15 Thread Charles N Wyble
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mark Andrews wrote: > In message <4b798f1e.6080...@knownelement.com>, Charles N Wyble writes: >> All, >> >> How are folks verifying DNSSEC readiness of their environments? Any >> existing testing methodologies

Re: DNSSEC Readiness

2010-02-15 Thread Mark Andrews
In message <4b798f1e.6080...@knownelement.com>, Charles N Wyble writes: > All, > > How are folks verifying DNSSEC readiness of their environments? Any > existing testing methodologies / resources that folks are using? > > It seems like this is something that will b

Re: DNSSEC Readiness

2010-02-15 Thread Florian Weimer
FWIW - .se did some consumer research during their > DNSSec launch. I belive there will be a new study. > > Tests of Consumer Broadband Routers in Sweden (DNSSEC) > in 2008: > http://www.iis.se/docs/Routertester_en.pdf Seriously, who puts recursive DNS resolvers behind consumer broadband routers?

Re: DNSSEC Readiness

2010-02-15 Thread Amar
Charles N Wyble wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 All, How are folks verifying DNSSEC readiness of their environments? Any existing testing methodologies / resources that folks are using? It seems like this is something that will become a front and center issue for help

Re: DNSSEC Readiness

2010-02-15 Thread Florian Weimer
* Charles N. Wyble: > However they will certainly start complaining when DNS stops working. Of > course they won't know that's what the issue is, but they will call > saying the internet is down. Okay, then the first way I mentioned for checking should be sufficient. Well, perhaps make it dig

Re: DNSSEC Readiness

2010-02-15 Thread Charles N Wyble
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Florian Weimer wrote: > * Charles N. Wyble: > > >> It seems like this is something that will become a front and center >> issue for help desks everywhere pretty quick. :) > > Why do you think so? Would you even notice if your webmail provider > swi

Re: DNSSEC Readiness

2010-02-15 Thread Charles N Wyble
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Tony Finch wrote: > On Mon, 15 Feb 2010, Charles N Wyble wrote: >> How are folks verifying DNSSEC readiness of their environments? Any >> existing testing methodologies / resources that folks are using? > > Here's my summary

Re: DNSSEC Readiness

2010-02-15 Thread Florian Weimer
* Charles N. Wyble: > How are folks verifying DNSSEC readiness of their environments? Any > existing testing methodologies / resources that folks are using? For now, running (with a real resolver address instead of 192.0.2.1) dig @192.0.2.1 $RANDOM. +dnssec and checking if a c

Re: DNSSEC Readiness

2010-02-15 Thread Tony Finch
On Mon, 15 Feb 2010, Charles N Wyble wrote: > > How are folks verifying DNSSEC readiness of their environments? Any > existing testing methodologies / resources that folks are using? Here's my summary of the situation (as of a couple of months ago) with links to a few key r

DNSSEC Readiness

2010-02-15 Thread Charles N Wyble
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 All, How are folks verifying DNSSEC readiness of their environments? Any existing testing methodologies / resources that folks are using? It seems like this is something that will become a front and center issue for help desks everywhere pretty