=JeffH (Jeff.Hodges) writes:
> 
> Thomas Ptacek replies to various questions re his original post..
> 
> questions and answers from "Against DNSSEC"
> http://sockpuppet.org/stuff/dnssec-qa.html

        Well, it's certainly opinionated, but there's a couple of points
        worth addressing:

* Can’t end-systems validate DNSSEC records themselves rather than trusting 
servers?

Sure they can. Everyone can also just run their own caching server. They
don’t, though, because the protocol was designed with the expectation
that they wouldn’t (this squares with the overall design of the DNS,
in which stub resolvers cooperate to reduce traffic to DNS authority
servers by relying on caching servers). DNSSEC deployment guides go
so far as to recommend against deployment of DNSSEC validation on
end-systems. So significant is the inclination against extending DNSSEC
all the way to desktops that an additional protocol extension (TSIG) was
designed in part to provide that capability.

        That's a bit of an old view at this point. Isn't the idea these days
        to validate as close to the user as possible ?

        Either T. Ptacek is purposefully ignoring this, or we're really
        bad at explaining it :)

* What’s so important about secret hostnames? Is revealing hostnames
  really that big a problem?

        He seems to be refering to zone walking with NSEC - which he kind of
        but not really addresses in the original post (there he says that
        minimally covering NSEC3 records aren't the default - based on what
        implementation ?).

        Cheers,
        Phil

Reply via email to