[dns-operations] Forgery resilience idea - wildcard cooperative defense

Brian Dickson briand at ca.afilias.info
Thu Aug 7 17:49:47 UTC 2008

bert hubert wrote:
> On Thu, Aug 07, 2008 at 05:18:28PM +0000, Paul Vixie wrote:
>> any solution requiring cooperative action/change by both the RDNS and ADNS
>> has a cost that's equivilent to "deploy DNSSEC".  the thing that's good
> That's simply not true - DNSSEC does not function automatically even if both
> ADNS and RDNS support it. 
> DNSSEC needs a change to:
> 	ADNS,
> 	RDNS, 
> 	the zone, 
> 	the registry, 
> 	the registrar,
> 	and even the operational procedures of domain owner.
> 	(the stub, the application - if you want to give the end-user a
> 	choice)

Paul's point was that there are orders (many) of magnitude more systems 
enumerated in the sets { ADNS } and { RDNS } than in all the rest of the 

And, if you are talking about touching them, you may as well touch them 
in a way that facilitates DNSSEC - possibly in addition to other things.

"the zone" and "the registry" are often under the same administrative 
control, and in the case of TLDs, (a) there are very few currently, and 
(b) there are choices of TLD once there exists one TLD that does DNSSEC.

And, technically, it only requires a change to ONE registrar, to enable 
DNSSEC, since it is possible to change registrars, if one wants DNSSEC.

So, the bare minimum for DNSSEC deployment is:
ADNS, RDNS, *one* zone + registry, *one* registrar, and the ops 
procedures and tools for the domain owner - which may be further 
facilitated by the outsourcing of some aspects of domain maintenance to 
a DNS hosting provider that "does" DNSSEC.


> EDNS PING or other entropy enhancing solutions provide benefit to anybody
> deploying them, without further work, and require only ADNS and RDNS work.
> DNSSEC provides lots of other things beyond entropy of course. 
> 	Bert

More information about the dns-operations mailing list