|
| ▲ | rstupek 7 hours ago | parent | next [-] |
| I think the fact they don't require it shows it's moribund. If cert providers (or google with their big stick of chrome) specified it is required to have DNSSEC to get a certificate, everyone would jump in line and set it up because there'd be no other choice. |
| |
| ▲ | tptacek 7 hours ago | parent [-] | | I agree that not checking it all is an even worse signal. I'm just saying the fact that this is officially enforced only in 2026 is itself a bad signal. At any rate, the CAs you'd have worked with were enforcing DNSSEC this whole time. |
|
|
| ▲ | indolering 8 hours ago | parent | prev [-] |
| Which is really unfortunate, since it's pretty easy to do. |
| |
| ▲ | tptacek 8 hours ago | parent [-] | | I agree that it's relatively easy for CAs to validate DNSSEC. I think the fact that they weren't technically required to, despite the sole remaining use case for DNSSEC being to protect against misissuance, is a pretty strong indicator of how cooked DNSSEC is. |
|