Forums before death by AOL, social media and spammers... "We can't have nice things"
|    comp.misc    |    General topics about computers not cover    |    21,759 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 20,331 of 21,759    |
|    Computer Nerd Kev to All    |
|    [LINK] Calling time on DNSSEC?    |
|    27 Nov 24 08:44:07    |
      From: not@telling.you.invalid              Calling time on DNSSEC?        By Geoff Huston on 28 May 2024        - https://blog.apnic.net/2024/05/28/calling-time-on-dnssec/              "There have been quite a few Internet technologies that have not        been enthusiastically adopted from the outset. In many cases, the        technology has been quietly discarded in favour of the next        innovation, but in some cases, the technology just refuses to go        away and sits in a protracted state of partial adoption. In some        cases, this has seen a determinate state so protracted that much of        the original rationale for the technology has been overtaken by        events and the case to support adoption needs to be rephrased in        more recent terms.               IPv6 is a good case in point where the basic architecture of the        protocol, namely as an end-to-end address-based datagram        architecture, has become an imperfect fit for a client-server        network that makes extensive use of replicated service delivery        platforms.               Today's network is undertaking a transformation to a name-based        network, and running out of addresses to the extent that it is no        longer possible to uniquely address every attached client, is no        longer the catastrophic event that we once thought it would be. We        appear to have attached some 30B devices in today's Internet, yet        in terms of IPv4 use, we have achieved this using a little over 3B        unique IPv4 addresses visible in the routing system.               In this case, I'm referring to secured DNS, or DNSSEC, which has        been tied up in progressive adoption for some 30 years. Over this        time, we've seen many theories appear as to why the pace of        adoption of DNSSEC has been so lacklustre, including a lack of        awareness, poor tooling, inability to automate operational        management, too much operational complexity and a general inability        to sustain a case that the incremental benefits of adoption of        DNSSEC far outweigh the increased operational costs and added        service fragility. Because of the lack of clear signals of general        adoption of DNSSEC over three decades, is it time to acknowledge        that DNSSEC is just not going anywhere? Is it time to call it a day        for DNSSEC and just move on?               Now admittedly this is an extreme position, and I admit to        deliberately being somewhat provocative in asking this question to        get your attention but there is a grain of an uncomfortable truth        here. As a collection of service operators, we appear not to care        sufficiently to invest in supporting the additional costs to        operate a DNSSEC-secured DNS. After some 30 years of living with a        largely insecure DNS infrastructure, we appear to be comfortable        with this outcome.               How have we got to this point?" ...              --       __ __       #_ < |\| |< _#              --- SoupGate-DOS v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca