It's been a little over a year since the first draft on this subject was 
submitted.  I received a lot of feedback on that draft from the WG, including a 
request to remove all forms of redirect mentioned other than web error 
redirection (such as malware protection) and to add a much more pointed section 
concerning DNSSEC.  All of that should now be completed.

I welcome any review and comment on 
http://tools.ietf.org/html/draft-livingood-dns-redirect-02.

Some key notes:
- snippet from Abstract: This document specifically and narrowly addresses 
those cases where DNS Redirect is being utilized to provide a web error 
redirect service to end users, and describes the critical implications for DNS 
Redirect when DNSSEC is deployed.

- snippet from new Section 4: DNSSEC Considerations and Implications: It is 
critically important that service providers understand that adoption of DNSSEC 
is technically incompatible with DNS redirect. As such, in order to properly 
implement DNSSEC and maintain a valid chain of trust, DNS redirect MUST NOT be 
used any longer. Thus, once DNSSEC is in widespread use, this document should 
be considered historical. That being said, sections of this document concerning 
opt-in and opt-out practices may be useful for future reference in other, 
unrelated documents.

Regards,
Jason
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to