To:
Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
cc:
Alain Durand <Alain.Durand@sun.com>, dnsop@cafax.se, rdroms@cisco.com
From:
Francis Dupont <Francis.Dupont@enst-bretagne.fr>
Date:
Wed, 16 Jul 2003 19:56:01 +0200
In-reply-to:
Your message of Thu, 17 Jul 2003 00:57:12 +0859. <200307161557.AAA07423@necom830.hpcl.titech.ac.jp>
Sender:
owner-dnsop@cafax.se
Subject:
Re: proposal for a compromise on DNS discovery
In your previous mail you wrote: Francis.Dupont@enst-bretagne.fr; > > - DHCPv6 can also pass the address of the NTP server > > I think NTP configuration is obsoleted. > > => all the crypto things I know are valid only at limited amount > of time. How many of the crypto things you know can be autoconfigured? => my answer to the proper question "how many of devices which can be autoconfigured and don't use any crypto thing I know?" is none for recent (i.e., in this century) devices. > In fact the military measure of a secret is the duration > one can expect it will remain secret. So as soon as there is > some kind of security involved in the network (and it should be :-), So, it should be noted that root keys must also be periodically configured. => do it should be noted than nothing may stay valid forever, even root keys. Regards Francis.Dupont@enst-bretagne.fr #---------------------------------------------------------------------- # To unsubscribe, send a message to <dnsop-request@cafax.se>.