[84376] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: DNSSEC in public

daemon@ATHENA.MIT.EDU (Marcus H. Sachs)
Mon Sep 12 09:33:57 2005

From: "Marcus H. Sachs" <marc@sachsfamily.net>
To: "'Dan Mahoney, System Admin'" <danm@prime.gushi.org>,
	<nanog@nanog.org>
Date: Mon, 12 Sep 2005 09:32:55 -0400
In-Reply-To: <20050912061033.C31458@prime.gushi.org>
Errors-To: owner-nanog@merit.edu


Dan, check out http://www.dnssec-deployment.org/

Marc


Marcus H. Sachs, P.E.
SRI International
1100 Wilson Blvd Suite 2800
Arlington VA  22209
www.hsarpacyber.com


-----Original Message-----
From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of Dan
Mahoney, System Admin
Sent: Monday, September 12, 2005 6:15 AM
To: nanog@nanog.org
Subject: DNSSEC in public



In response to a recent question I saw regarding DNSSEC on RIPE domains, 
I'd like to ask if there's any sort of draft or standard that anyone knows 
about for doing DNSSEC in the public, using either a "root" key and/or 
possibly having master keys pulished in WHOIS?

I see a very experimental thing Verisign is doing for the .net zone, and 
also for some other opt-in zone, but I'm sure that's highly experimental 
at this point.

I guess my question is: is there even something up for discussion at this 
point?  I know it's early in the game.

Thanks

Dan

--

"I can feel it, comin' back again...Like a rolling thunder chasin' the
wind..."

-Dan Mahoney, JS, JB & SL, May 10th, 1997, Approx 1AM

--------Dan Mahoney--------
Techie,  Sysadmin,  WebGeek
Gushi on efnet/undernet IRC
ICQ: 13735144   AIM: LarpGM
Site:  http://www.gushi.org
---------------------------


home help back first fref pref prev next nref lref last post