carmp3fan wrote:
I don't disagree with you on most of that. The reason I brought up the password to make an update is that the encrypted private key would be stored at Linode, so if you make a change to your DNS zone then you could type in your password for the key. It's not perfect, but its better than an unencrypted key.
If they were to have an encrypted key that they don't have (or at least save) the passphrase for, the customer must come back on a regular basis, whether they make any changes or not, to allow for updating of expiring signatures. (I'm not sure I fully understand what you had in mind for the key management.)
carmp3fan wrote:
I also use Linode's API for DNS as part of my server build process. I could run my own DNS server and have Bind pull the record information from MySQL so I can programmatically make changes, but that requires even more effort and expense on my end.
BIND supports the standardized DNS update protocol, so at least if you are making changes to existing zones it's absolutely possible to programmatically make changes out of the box. No proprietary stuff and no MySQL needed.
carmp3fan wrote:
As far as the support nightmare statement, I think that is part of the benefit of having the Manager handle DNSSEC. You change your DNS record, the signature is updated automatically.
The automatic signing happens with BIND as well (
auto-dnssec maintain), can be used both with dynamically updated zones as well as static zones (
inline signing).