DNSSEC architecture vs reality (was: Re: Quic: the elephant in the room)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 4/11/21 7:05 PM, Viktor Dukhovni wrote:

There are of course pros/cons for CT and pros/cons for DNSSEC, but my
take is that architecturally DNSSEC is better suited for securing the
typical domain on the public Internet.
Architectural arguments are great, but pragmatically speaking there seem to be significant deployment problems with DNSSEC.
Adoption has been hampered
difficult KSK enrollment rollover, immaturity of tooling and by habitual
cynicism from plausibly authoritative voices.

These aren't the problems (except perhaps immaturity of tooling) that most immediately come to mind.

Where is the easy to understand guide for how to sign your own RRs or zone(s), and to verify that the signing is properly done?

Which registrars provide tools for signing, or do you have to operate your own master DNS server in order to do that?

How long does it take for the typical domain name owner to sign their RRs for the first time?

What's the ongoing commitment in time for a domain owner to maintain DNSSEC for their RRs?

What's the immediate benefit to the signer from signing one's own RRs?   (Note: if nothing is verifying signatures, the immediate benefit is zero.)

And how do we close these (and doubtless other) gaps?

I'd love for the Internet to be able to make better use of DNSSEC and to need to rely less on PKI.  But for all that I love about this idea, I don't think this is going to happen until most of these problems are fixed.

Keith

p.s. and I doubt I'm a plausibly authoritative voice on this subject, but please don't interpret this as cynicism so much as a genuine desire to get people using these tools.





[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux