In message <[EMAIL PROTECTED]>, Russ Housley writes:
> I have been approached about a plenary experiment regarding 
> DNSSEC.  The idea is for everyone to try using DNSSEC-enabled clients 
> during the plenary session.  I like the idea.  What do others think?
> 
> Russ
> 
> _______________________________________________
> Ietf mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/ietf

        The first thing we should address is the lack of signed
        zones under the control of the IETF.

; <<>> DiG 9.3.5-P2 <<>> dnskey ietf.org
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29574
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;ietf.org.                      IN      DNSKEY

;; AUTHORITY SECTION:
ietf.org.               7200    IN      SOA     ns0.ietf.org. glen.amsl.com. 
1200000073 1800 1800 604800 7200

;; Query time: 344 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Thu Nov 27 10:06:43 2008
;; MSG SIZE  rcvd: 79

        Secondly we should just turn on DNSSEC validation on the
        recursive servers offered by DHCP and RAs.  This should be
        on for the entire week.  This is what we are asking ISP's
        to do and I see no reason why we shouldn't do the same.

        Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: [EMAIL PROTECTED]
_______________________________________________
Ietf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf

Reply via email to