[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
cc: Alain Durand <Alain.Durand@sun.com>, dnsop@cafax.se, rdroms@cisco.com
From: Francis Dupont <Francis.Dupont@enst-bretagne.fr>
Date: Wed, 16 Jul 2003 19:56:01 +0200
In-reply-to: Your message of Thu, 17 Jul 2003 00:57:12 +0859. <200307161557.AAA07423@necom830.hpcl.titech.ac.jp>
Sender: owner-dnsop@cafax.se
Subject: Re: proposal for a compromise on DNS discovery

 In your previous mail you wrote:

   Francis.Dupont@enst-bretagne.fr;
   
   >    > - DHCPv6 can also pass the address of the NTP server
   >    
   >    I think NTP configuration is obsoleted.
   >    
   > => all the crypto things I know are valid only at limited amount
   > of time.
   
   How many of the crypto things you know can be autoconfigured?
   
=> my answer to the proper question "how many of devices which
can be autoconfigured and don't use any crypto thing I know?"
is none for recent (i.e., in this century) devices.

   > In fact the military measure of a secret is the duration
   > one can expect it will remain secret. So as soon as there is
   > some kind of security involved in the network (and it should be :-),
   
   So, it should be noted that root keys must also be periodically
   configured.
   
=> do it should be noted than nothing may stay valid forever, even
root keys.

Regards

Francis.Dupont@enst-bretagne.fr
#----------------------------------------------------------------------
# To unsubscribe, send a message to <dnsop-request@cafax.se>.

Home | Date list | Subject list