logoalt Hacker News

akerl_yesterday at 9:38 PM1 replyview on HN

Ok, it's inconvenient and clumsy in ways that make it easy to shoot oneself in the foot. But that's not dangerous?


Replies

cyberaxyesterday at 10:27 PM

When you shoot yourself in the foot with DNSSEC, you typically end up with a non-working setup.

The biggest problem is that DNS replies are often cached, so fixes for the mistakes can take a while to propagate. With Let's Encrypt you typically can fix stuff right away if something fails.

show 1 reply