Joe,
On Dec 20, 2006, at 9:12 AM, Joe Abley wrote:
Well, I haven't read through the requirements document yet, but
there are approaches which meet the general goals that I think it's
talking about which don't involve a new protocol.
The document specifically mentions one (proprietary) protocol and
section 5 of the document starts with:
5. The requirments
The protocol:
1. MUST allow the requestor to authenticate the responder and
vice-
versa.
...
Consider the various approaches used by ISC and others to populate
a zone with data that can be extracted by a nameserver and used to
configure itself, for example. No protocol there -- more like a
zone schema.
Right. I think the idea (and I'm sure Stephane will correct me if
I'm wrong) is to come up with a standard way to do this sort of thing.
Rgds,
-drc
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop