On Thu, 21 Aug 2008, Masataka Ohta wrote:

Instead, MitM attack on DNSSEC is performed, for example, within
intermediate zones with forged signature on child zone with forged
end-users data.

Oh I see. DNSSEC is broken because we cannot trust RSA, DSA, SHA256,
DiffieHellman, and perhaps eliptic curve.... Ok, let's go for your
solution that does not depend on any of these :P

It means that there is no MitM attack on PODS.

Since I am not at "many places at once", how does PODS have no
mitm? My laptop stores info about 1 billion domain names? It's
first hop is a router you don't own.....

So your solution 1) scales, 2) no intermediaries whatsoever (on a packet
based internet no less), 3) does not use weak untrusted worldwide used
ciphers and public key systems.

Paul
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to