[no hat] On Tue, Aug 12, 2008 at 12:00:09PM +0900, Masataka Ohta wrote:
> Social implementations of DNSSEC may be (or, considering its complexity, > will always be) vulnerable to tampering from any person. This seems like a strong claim. Are you really just claiming that, because humans are involved and because it depends on proving trust relationships; and because we know that humans make a lot of errors; therefore, DNSSEC is only as strong as the operational practices of the weakest point in the chain of trust? A -- Andrew Sullivan [EMAIL PROTECTED] +1 503 667 4564 x104 http://www.commandprompt.com/ _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop