Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

As I wrote a month ago (https://news.ycombinator.com/item?id=29378633#29385866):

The problem for Slack was not caused by DNSSEC directly. It was caused by:

1. A bug in Route 53 which caused wildcard record not to work with DNSSEC signing. Anyone not using Route 53 would not have had any problems with DNSSEC.

2. Slack decided to revert the DNSSEC rollout, but botched the process badly, effectively locking themselves in the trunk and throwing away the key. If they hadn’t tried to revert the DNSSEC rollout, or if they had been a bit more deliberate and careful while doing it, this would not have happened.

(Also, except for DNSSEC solving the obvious problem of not having any way to authenticate DNS responses, you also can’t use newer e-mail security standards like DANE without DNSSEC. MTA-STS is an obvious ugly hack, requiring a web server to run an e-mail server.)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: