From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx.etorok.net (mx.etorok.net [62.113.205.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mx.etorok.net", Issuer "StartCom Class 1 Primary Intermediate Server CA" (not verified)) by huchra.bufferbloat.net (Postfix) with ESMTPS id ADE9421F3DB for ; Sun, 11 May 2014 06:43:30 -0700 (PDT) Received: by mx.etorok.net (OpenSMTPD) with ESMTP id a6a9510b; for ; Sun, 11 May 2014 16:43:26 +0300 (EEST) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=etorok.net; h= message-id:date:from:mime-version:to:references:in-reply-to :content-type:content-transfer-encoding; s=ml; l=551; bh=pJmim61 RnCGKeBwUTFzRfT7bJMM=; b=r4qirDdUEXIGo9sXZi9DraFWzoW42Gs0vStzowQ aPZ59NUlUI7bLG46z9JUDGWo/G52WjVf7MPqbRKmfcNU6uzTzFfUtbVsnje/bhcn nosav7QLSI7YNf+w1wSg1r+nI0DVAaj8br68BoyBi3Ua9sOdv2aO0cEDcBmJcJTT 5qyA= Received: by mx.etorok.net (OpenSMTPD) with ESMTPSA id 7fd4ad69; TLS version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES128-SHA bits=128 verify=NO; for ; Sun, 11 May 2014 16:43:26 +0300 (EEST) Message-ID: <536F7E7D.2010008@etorok.net> Date: Sun, 11 May 2014 16:43:25 +0300 From: =?ISO-8859-1?Q?T=F6r=F6k_Edwin?= User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Icedove/24.5.0 MIME-Version: 1.0 To: cerowrt-devel@lists.bufferbloat.net References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Re: [Cerowrt-devel] "DNSSEC considered harmful" X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 May 2014 13:43:31 -0000 On 05/10/2014 04:30 AM, David P. Reed wrote: > Reading a lot of this stuff suggests at most that DNSSEC is being overhyped and poorly implemented. > > As a reason to abandon work on deploying DNSSEC so that it's easier to instantiate man in the middle attacks I find it unconvincing. > > Is there an alternative? For protecting just the DNS client <-> DNS server communication there is http://dnscurve.org/index.html It doesn't seem to provide a way for a domain owner to cryptographically sign the records though. Best regards, --Edwin