Joe,

On Dec 20, 2006, at 9:12 AM, Joe Abley wrote:
Well, I haven't read through the requirements document yet, but there are approaches which meet the general goals that I think it's talking about which don't involve a new protocol.

The document specifically mentions one (proprietary) protocol and section 5 of the document starts with:

5.  The requirments

   The protocol:

1. MUST allow the requestor to authenticate the responder and vice-
        versa.
...

Consider the various approaches used by ISC and others to populate a zone with data that can be extracted by a nameserver and used to configure itself, for example. No protocol there -- more like a zone schema.

Right. I think the idea (and I'm sure Stephane will correct me if I'm wrong) is to come up with a standard way to do this sort of thing.

Rgds,
-drc


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to