@techreport{livingood-dnsop-dont-switch-resolvers-05, number = {draft-livingood-dnsop-dont-switch-resolvers-05}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-livingood-dnsop-dont-switch-resolvers/05/}, author = {Jason Livingood}, title = {{In Case of DNSSEC Validation Failures, Do Not Change Resolvers}}, pagetotal = 8, year = 2019, month = aug, day = 13, abstract = {DNS Security Extensions (DNSSEC) validation by recursive DNS resolvers has been deployed at scale. However, domain signing tools and processes are not yet as mature and reliable as is the case for non-DNSSEC-related domain administration tools and processes. This sometimes results in DNSSEC validation failures, for which operators of validating resolvers are often blamed. When these failures do occur, end users should not change to a non-validating DNS resolver, as that would downgrade their security. They should instead wait until the authoritative domain operator updates their DNS records to resolve the error and that change propagates across the Internet's DNS resolvers, the timing of which may be dependent upon the Time To Live (TTL) settings in the old and/or erroneous DNS resource records.}, }