Hacker News new | past | comments | ask | show | jobs | submit login

That was a very long way to type the words "no, they don't".



No, that was a comprehensive answer that explained why the question of whether the stub resolvers in macOS or iOS “supports” DNSSEC didn’t make sense to begin with.

But I should clarify further: the Unix part of macOS does what all Unix-style operating systems do: the stub resolver forwards the requests to whatever is in /etc/resolv.conf.

But the Foundation Kit part of macOS indeed supports DNSSEC and has for years; I gave the link to the docs that describe how an app can use it. I suspect Apple and various 3rd parties have been using it for years.

Macs are popular in higher ed and government; I’m sure enough of these accounts required macOS to have DNSSEC capability built-in. Same thing for iOS.


Neither higher ed nor government services require DNSSEC. It's understandable why you'd think they do, because for several years the federal government did require it. They rescinded that requirement. CLOUD.GOV doesn't even support DNSSEC.

By the way, .APPLE? New gTLDs are required to be DNSSEC-signed. It's no surprise that ICANN supports DNSSEC.


It’s not a matter of thinking DNSSEC is required by every government or higher ed account; it’s obviously not.

But different government agencies, colleges and universities have their individual requirements and for some of them, that may include DNSSEC.

Everyone knows all new gTLDs are DNSSEC-signed.

Like most global-scale companies, apple.com isn’t signed because of 40+ years of technical debt as the internet evolved.

But if Apple wanted to utilize DNSSEC features for future services, they could do so by using the .Apple TLD.


Apple can do whatever they want. The fact that their TLD is DNSSEC-signed is not an indication of what they will do, despite your claim to the contrary.


More receipts: a link to the source code for mDNS Responder, the macOS system resolver.

It’s at https://opensource.apple.com/source/mDNSResponder/mDNSRespon....


We've been talking on HN about mDNSResponder for over 5 years. It has un-baked DNSSEC support that macOS has never used. mDNSResponder was replaced by another service (Yosemite's Discoveryd) which had zero support for DNSSEC, but instability forced them to revert back.

The macOS system resolver does not support DNSSEC, has never supported DNSSEC, and the fact that mDNSResponder has/had DNSSEC code is not an indication that they're embracing it. By the way: I have better sources on this than just my opinion of the source code.


Pay attention to the fact that applications can use the DNSSEC support in the networking framework if they wanted to.

That was all.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: