[dns-operations] DNSSEC impact on applications was Re: security-aware stub resolver

David Conrad drc at virtualized.org
Tue May 27 00:44:55 UTC 2008


Mark,

On May 26, 2008, at 3:18 PM, Mark Andrews wrote:
>> If you only get SERVFAIL on
>> invalid answers, users will complain that they cannot reach a site,
>> because they can't know better from the error message they get. So
>> keeping DNSSEC off is the only option for an ISP today to reduce
>> support calls. That should definitely be changed if you want a
>> widespread use of DNSSEC.
> 	You do not get answers that failed to validate.

This is, I believe, the problem.  Instead of getting an indication  
that validation failed, you get the same response you'd get if someone  
unplugged your router.  This will result in support calls which will  
result in caching server operators turning off DNSSEC.

> 	If you want to process answers that failed to validate set
> 	CD=1 and DO=1 and provide the application with its own trust
> 	anchors.  The application is then fully DNSSEC aware.

You forgot the part about the application having an actual validator  
embedded in it.  As you are no doubt aware, validators are non-trivial  
hunks of code (with all that entails).

Regards,
-drc




More information about the dns-operations mailing list