<div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On 22 September 2016 at 16:30, Robert Edmonds <span dir="ltr"><<a href="mailto:edmonds@mycre.ws" target="_blank">edmonds@mycre.ws</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">John Levine wrote:<br>
> In article <<a href="mailto:57822085-036c-804b-0457-bf9eccea7412@centralnic.com">57822085-036c-804b-0457-<wbr>bf9eccea7412@centralnic.com</a>> you write:<br>
> >Hi Everyone,<br>
> ><br>
> >We've been using ldns-verify-zone to check and validate our zones<br>
> >including DNSSEC validation. It's a great tool and we've been using it<br>
> >for years, but the latest stable release is Jan/2014.<br>
><br>
> As far as I know, nothing about DNSSEC has changed since 2014. Why is<br>
> it a problem that a tool hasn't changed since then? Maybe the Dutch<br>
> write well debugged code.<br>
<br></span><br>
This means that even bug-free general purpose DNS libraries need to be<br>
updated regularly to support new RR types—if only because a user wants<br>
to use a new RR type.<br><br></blockquote><div>There also happen to be 33 bugs currently open against ldns, most of which are still marked as "new" (not yet assigned to anyone to fix). The earliest of these is from 2012, but most seem to be in the 2014 to 2015 range. ldns looks abandoned; I don't see any reason anyone looking at the NLNet pages would assume otherwise.</div></div></div></div>