-- James A. Donald wrote: > > What is the penetration of Secure DNS?
Ben Laurie wrote: > Anyone who is running any vaguely recent version of > BIND is DNSSEC enabled, whether they are using it now > or not. I am not well informed about DNSSEC, but I am under the impression that: 1. Actually using DNSSEC is a major performance hit. 2. Actually using DNSSEC requires manual secure master public key distribution, which people are disinclined to do, and which may not scale very well, unless unspecified institutions and arrangements are put in place. 3. No one actually uses DNSSEC in the wild. Please advice me if these impressions are wrong, or have become outdated. I realize that I sound like a cold wet sponge with a non stop stream of unpleasantly negative posts, but one of the reasons that cryptography is not widely used is that the various standards, processes, and tools are not in fact very usable. Implementing protocols requires widespread consensus, but when too many people show at a meeting then either nothing gets done, or the outcome is extremely stupid, or both, and anyone who points to big problems in what is being done is dismissed as out of order or off topic in order to create the semblance of progress, with the result that what little progress occurs is usually in the wrong direction. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG GrAiqEAJZ+JTHX8XzGkkIqdEZiBNsCxO48sjUIrp 4Z3Mnj015pjujvoBENQ/n6+j9Kb3Q0DMKqWI/eKJR --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]