In message <barmar-151ba5.20443611032...@news.eternal-september.org>, Barry Mar
golin writes:
> In article <mailman.792.1268343500.21153.bind-us...@lists.isc.org>,
>  Mark Andrews <ma...@isc.org> wrote:
> 
> > No.  It's I've tried real hard to get you a answer which is not a
> > forgery but I can't.
> 
> Not really.  It's "I've tried real hard to get you an answer that I can 
> *tell* is not a forgery, but I can't."  When validation fails, which is 
> really more likely, that it's a forgery or that the DNS administrator 
> screwed up?
> 
> When website admins mess up certificates, the browser alerts the user 
> and gives them the option of ignoring the error.  DNSSEC validation 
> doesn't have the same kind of continuation option.

And that this just plain bad security practices.  If the wrong CERT
is presented then the client should just fail.  Even when you report
the error to the administrator of the site they just ignore it
because they know you can work around it.  Even Verisign does this
this sort of thing.

If you don't give a work around then operators will fix the issue.
 
> -- 
> Barry Margolin, bar...@alum.mit.edu
> Arlington, MA
> *** PLEASE don't copy me on replies, I'll read them in the group ***
> _______________________________________________
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org
_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to