[185837] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNSSEC and ISPs faking DNS responses

daemon@ATHENA.MIT.EDU (Roland Dobbins)
Sat Nov 14 07:29:22 2015

X-Original-To: Nanog@nanog.org
From: "Roland Dobbins" <rdobbins@arbor.net>
To: "Owen DeLong" <owen@delong.com>
Date: Sat, 14 Nov 2015 19:29:10 +0700
In-Reply-To: <0D020E81-7F3A-4BE6-8A1F-9D477B79EA32@delong.com>
Cc: "Nanog@nanog.org" <Nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On 14 Nov 2015, at 16:27, Owen DeLong wrote:

> Today.

Yes, today, and tomorrow, and next week, and next month, and next year, 
etc.

> Why on earth do you assume that this will not continue to expand 
> and/or accelerate its rate of expansion as word spreads that it is 
> possible?

Because it isn't a simple default.

If it ever becomes a simple default, we'll start to see greater 
adoption.  And probably not in the form of 'tunneling-everything' VPNs, 
but 'application VPNs' which automagically utilize SSL/TLS

-----------------------------------
Roland Dobbins <rdobbins@arbor.net>

home help back first fref pref prev next nref lref last post