[dns-operations] Online DNSSEC debugging tool now availalbe
bmanning at vacation.karoshi.com
bmanning at vacation.karoshi.com
Mon Jul 19 17:35:36 UTC 2010
On Mon, Jul 19, 2010 at 11:14:42AM -0400, Andrew Sullivan wrote:
> On Mon, Jul 19, 2010 at 03:04:36PM +0000, bmanning at vacation.karoshi.com wrote:
> > because I don't know where the one trying to validate is coming from.
>
> I have no idea what that has to do with this. There is no sense of
> the "DNS location" of the originating requester being significant
> anywhere in any of the DNSSEC RFCs that I can see, but I'm probably
> missing something. Do you have a passage I should read?
>
> > if the origin of the validation request (the I in "I want to
> > validate www.example.org") is laptoy.example.org, then I
> > can't see how the TA for . would validate and the TA for .org would
> > not.
>
> Because .org rolled their key, changed the DS in ., and didn't publish
> a new TA?
sounds irresponsible to me. when I get new crypto tokens from
my employer, I expect them to work. if my employer changes the
crypto tokens and fails to tell me then I might suspect that I am
no longer employed. Or if I get crypto tokens from my bank and
they fail to tell me that they have changed them - as a customer
who no longer has access to my funds, I mght be unhappy. And just
because someone else _can_ validate that keyset doesn't mean that
I should trust that third party, esp if I have no defensible business case to
trust a third party with whom I have no binding service agreements.
Do you want to hang your corporate success on a third party?
on a global scale, I have found that always-on, always-connected
is increasingly not the norm. I expect to have a populous keyring
with dozens of keys for different SEPs.
>
> A
>
>
> --
> Andrew Sullivan
> ajs at shinkuro.com
> Shinkuro, Inc.
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
More information about the dns-operations
mailing list