Mark Andrews wrote:

>>To exchange the trust anchors, you need cryptographically secure
>>end to end security, which is not provided by DNSSEC.
>>
>>If you and your peer already have secure channel, you have no
>>reason to use DNSSEC for secure identification nor communication
>>with the peer.

>       Incorrect.

Thank you for the convincing demonstration that I am correct.

>>As the level of security is no different from PODS, it is the
>>worst thing to bother to exchange public keys.

>       Incorrect.

Thanks again.

>>>     If you have a solution that scales I'd love to hear it.

>>Because DNS is not end to end, DNS does not really scale,
>>manifestation of which is load on root servers.

>       None answer.

Wrong question.

                                                Masataka Ohta

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to