by seky on 1/24/14, 1:01 PM with 50 comments
by tptacek on 1/24/14, 3:27 PM
DNSSEC is a bad idea. It provides very little value. It drastically complicates the Internet. It bakes the worst part of TLS --- the static tree PKI --- into the core design of the Internet... and then gives the root of the tree to the US government. It's clunky, it uses antiquated crypto (its proponents have been trying to standardize it since 1995), and it leaks your private hostnames to the Internet.
I can go on and on and on. Instead, here's some older posts I've written about it:
https://news.ycombinator.com/item?id=5571937
by zdw on 1/24/14, 2:22 PM
If you think users are confused by SSL warnings now, how the heck would they understand similar errors at the DNS resolver level?
Also, there's no-in flight encryption, so it offers no privacy benefit. It also aggravates DNS amplification attacks.
The better technology to look into if you're concerned about individual user rights and privacy is DNSCurve: http://dnscurve.org
It's not comparable to DNSSEC other than "It uses crypto with DNS" - they have entirely different goals, but the goals it solves are much more relevant to end users (privacy, forgery, etc.).
Personally, I'd recommend people run both techs, as there's no technical reason that makes them incompatible.
I have no idea how to solve the UI problems. We've had 15+ years of SSL and there's been almost no progress on that.
by Jgrubb on 1/24/14, 2:06 PM
by sanxiyn on 1/24/14, 2:12 PM
by oliao on 1/24/14, 2:23 PM
by AndrewDucker on 1/24/14, 1:19 PM