*   In theory perhaps, but as a practical matter, no browser client, at 
least, can do DNSSEC hard fail, because the rate of organic DNSSEC interference 
is too high. Indeed, this is the primary reason why DANE over TLS is 
interesting.

But that doesn’t make Viktor’s statement wrong, does it?  Browsers are ignoring 
the FAIL state; they’re not getting a “neutral” result, are they?
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to