> Correct, you need a validating, security-aware stub resolver, or the
> ISP needs to validate the records for you.

That would defeat the entire purpose of using DNSSEC.  In order for DNSSEC to 
actually provide any improvement in security whatsoever, the ROOT ZONE (.) 
needs to be signed, and every delegation up the chain needs to be signed.  And 
EVERY resolver (whether recursive or local on host) needs to understand and 
enforce DNSSEC.

If even one delegation is unsigned or even one resolver does not enforce 
DNSSEC, then, from an actual security perspective, you will be far worse off 
than you are now.

Until such time as EVERY SINGLE DOMAIN including the root is signed and every 
single DNS Server and resolver (including the local host resolvers) understand 
and enforce DNSSEC you should realize that DNSSEC does nothing for you 
whatsoever except give the uneducated a false sense of "security".

It is likely that IPv48 will be deployed long before DNSSEC is implemented.





Reply via email to