[no hat]

On Tue, Aug 12, 2008 at 12:00:09PM +0900, Masataka Ohta wrote:

> Social implementations of DNSSEC may be (or, considering its complexity,
> will always be) vulnerable to tampering from any person.

This seems like a strong claim.  Are you really just claiming that,
because humans are involved and because it depends on proving trust
relationships; and because we know that humans make a lot of errors;
therefore, DNSSEC is only as strong as the operational practices of
the weakest point in the chain of trust?

A
-- 
Andrew Sullivan
[EMAIL PROTECTED]
+1 503 667 4564 x104
http://www.commandprompt.com/
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to