In article <CABf5zvKnV_YodJSE3UcEXVfJaew0enCzDg_T7Ni=D8xS=s8...@mail.gmail.com> 
you write:
>-=-=-=-=-=-
>
>Let me play Candide and stumble into this naively.  If we’re imagining very
>wide spread distribution of the root zone, say 100,000 or 1,000,000 local
>copies distributed twice a day, I would expect the evolution of a set of
>trusted sources and the use of some existing secure transport protocol to
>protect the transmission.  No new protocol or data types, just a way of
>finding the address of one more trusted sources.  And the existing set of
>root servers seems like a perfectly good set of trusted sources.

I was with you until the last sentence.  This is about as ideal an
application for bittorrent as one can imagine.  No new protocol, but
it would be nice to have some way to validate it.

I also observe that about half of the roots allow AXFR and half don't.
It might be interesting to ask why they made those respective choices.

R's,
Pangloss

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to