[185837] in North American Network Operators' Group
Re: DNSSEC and ISPs faking DNS responses
daemon@ATHENA.MIT.EDU (Roland Dobbins)
Sat Nov 14 07:29:22 2015
X-Original-To: Nanog@nanog.org
From: "Roland Dobbins" <rdobbins@arbor.net>
To: "Owen DeLong" <owen@delong.com>
Date: Sat, 14 Nov 2015 19:29:10 +0700
In-Reply-To: <0D020E81-7F3A-4BE6-8A1F-9D477B79EA32@delong.com>
Cc: "Nanog@nanog.org" <Nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
On 14 Nov 2015, at 16:27, Owen DeLong wrote:
> Today.
Yes, today, and tomorrow, and next week, and next month, and next year,
etc.
> Why on earth do you assume that this will not continue to expand
> and/or accelerate its rate of expansion as word spreads that it is
> possible?
Because it isn't a simple default.
If it ever becomes a simple default, we'll start to see greater
adoption. And probably not in the form of 'tunneling-everything' VPNs,
but 'application VPNs' which automagically utilize SSL/TLS
-----------------------------------
Roland Dobbins <rdobbins@arbor.net>