On Aug 15, 2008, at 8:10 AM, Paul Wouters wrote:
Whether
I get a fake CNN.com page is much less important to me then whether my nfs
or mail server can be access by something

I'm not sure how relevant this is to the discussion, but I'll answer the question anyway. I don't use NFS because (a) it doesn't work very well in cross-platform environments and (b) its security model is "I am the gooey center that your firewall must protect." And I pay about $100/year to use SSL certs to protect all my IMAP, POP, SMTP and HTTP transactions. And I use ssh for remote login, which if it is working correctly and not vulnerable to some zero-day hack should prevent MitM attacks from succceeding.

I don't see DNSSEC as being necessary to protect those protocols. Once I succeed in talking to my server, I'm probably really talking to my server. What I want DNSSEC for is to block the potential phishing attacks we've talked about. Securing my zones, and adding a signed zone in .se, are all steps on the way to that result.

But until we have root and .com signed, and until the average end-user is protected by a validating resolver, we aren't done yet, and I don't really get any actual benefit from my efforts. Which, tragically, is why it's taking so long.

The reason I signed these zones is because I'm trying to increase the net expertise in the world at doing these things by one head (mine) and hoping to inspire others to follow suit. The more of us non- DNSSEC-experts who decide they want DNSSEC and take the time to learn how to make it happen, the sooner it will actually happen, because we are the ones who will actually make it happen.

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to