+1 to Matthijs.
NSEC has been a sane default for a while and people who want NSEC3 have
already enabled it.
Changing it would break the rule of least surprise in current deployments,
when zones signed using
and old policy would be NSEC and zones signed with a new policy NSEC3.
That's something not trivially fixable once the zones are published.
Marek
On 9 June 2016 at 01:48, Matthijs Mekking <matthijs(a)pletterpet.nl> wrote:
Hi Jan,
On 09-06-16 10:26, Jan Včelák wrote:
Hello guys,
we are currently tuning the DNSSEC default parameters. And we haven't
settled on whether NSEC or NSEC3 should be used for authenticated
denial. Tough decision...
NSEC4! ;)
We would appreciate any comments from your point
of view. :-)
Obviously the DNSSEC policy is a local one, so there is no good default
that satisfies all.
RFC 6781 states that for smaller zones and structured zones, NSEC3
doesn't make much sense: In these cases, the use of NSEC is
preferred to ease the work required by signers and validating
resolvers.
Larger zones may benefit from NSEC3's Opt-Out and zone enumeration
mitigation. If these are of a concern to people I would say they have to
do the minimal extra effort to change the parameter. These are usually
organizations that know how to.
So my vote goes to NSEC.
Best regards,
Matthijs
Jan
_______________________________________________
knot-dns-users mailing list
knot-dns-users(a)lists.nic.cz
https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-dns-users
_______________________________________________
knot-dns-users mailing list
knot-dns-users(a)lists.nic.cz
https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-dns-users