On 29 Sep 2010, at 09:34, Anand Buddhdev wrote:

> Now, I have been given 2 keys, t1 and t2, to use for transferring z1 and
> z2 respectively.

        [Wandering off topic, perhaps]

        That seems to me a back-to-front way to do things.

        If the organization running the master is concerned to identify
        responsibility for purported slave access, the key needs to be
        provided by the organization responsible for running the slave,
        and accepted (or not) at the master end.

        That's what I expect from my slaves.
        None has revolted yet. 8-)

        One way or the other, using multiple keys to express what is
        intrinsically a single trust relationship seems to be both likely
        to increase the risk of compromise and certain to add administrative
        burden.  Why do it?

        ATB
        /Niall

_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to